Latest Publications

Share:

Considerations for Autorenewal Provisions

Autorenewal provisions (sometimes referred to as evergreen provisions) are common in commercial agreements for the provision of technology and related services. Vendors may want their agreements to autorenew to save time...more

NCAA to Allow College Athletes to Profit on Name, Image, and Likeness

On July 1, 2021, the National Collegiate Athletic Association (NCAA) officially changed its rules prohibiting college athletes from receiving benefits from their name, image, and likeness. ...more

US Government’s Cloud Expansion Continues

As discussed in a post from last month, annual spending worldwide on cloud services continues to rise with an expected increase up to $332 billion by the end of 2021, which is an increase from $270 billion in 2020. While the...more

Common Misconceptions on Contracting with Developers in Russia and Tips for Contract Review and Negotiation

There are often misconceptions in connection with negotiating intellectual property (IP) development agreements with developers located in Russia. This post details five common misconceptions and provides tips for complying...more

Biden Budget Targets Cybersecurity Improvements

As discussed in a post from earlier this week, President Joseph Biden issued an executive order on May 12, 2021 to improve the nation’s cybersecurity. The White House has put its proverbial money where its mouth is by...more

Important Considerations When Tech Service Providers and Life Science Companies Collaborate in the Digital Health Space

When negotiating a digital health collaboration agreement between a tech company and a life sciences company, whether for the development of artificial intelligence or other software, the provision of data hosting and...more

Legislation Introduced to Reform Section 230 of the Communications Decency Act

Following the US Department of Justice’s recent recommendations to reform Section 230 of the Communications Decency Act (CDA) to provide incentives for online platforms to address illicit material on their platforms, two US...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 3)

In an ideal outsourcing relationship, technology transformation through innovation, continuous improvement, and future project work is never really “over.” When documenting an initial transformation program and individual...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 2)

Earlier this month, we discussed the significance of the transformation workstream in outsourcing transactions and outlined important topics and points to consider when documenting the overall transformation methodology...more

Practical Steps to Take Before CCPA Enforcement Begins

The July 1 enforcement of the California Consumer Privacy Act (CCPA) is one week away. Despite calls by the business community and trade associations to push back the enforcement date to January 2021 due to the coronavirus...more

Contract Corner: Key Provisions in Transition Services Agreements

Transition services agreements (TSAs) are often an integral part of a transaction when a buyer or a seller needs to use the other’s services, infrastructure, or resources for an agreed-upon period of time after an...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 1)

Transformation is often a critical component of outsourcing and managed services transactions. The transition of core or non-core functions to a third-party provider can provide an opportunity for the customer to leverage the...more

FTC Seeks Comments on Children's Online Privacy Protection Act Rule

The Federal Trade Commission (FTC) is seeking comments on the effectiveness of the amendments it made to the Children’s Online Privacy Protection Rule (COPPA Rule) in 2013, to determine whether additional changes are needed...more

Update: NY Governor Signs SHIELD Act into Law

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act was signed into New York law by Governor Andrew Cuomo on July 25, after passing the New York State Assembly on June 17. ...more

Do Consumers Care Enough About Their Data to Change Their Behavior?

As lawmakers, policymakers, tech companies, and other data collectors try to determine how much access and control of consumer data is appropriate or acceptable, and how much notice and choice consumers should have, consumers...more

Open Source Is Becoming a ‘Best Practice’

Open source programs are becoming a best practice in the technology, telecom/media, and financial services industries. Companies are establishing open source best practices to streamline and organize the way their employees...more

Contract Corner: Considerations When University Employees Provide Consulting Services to University Licensees

When an inventor of technology who is also a university employee wants to commercialize university-developed technology, it is customary for the university and the inventor to “spin out” the technology via a license agreement...more

Executive Order Seeks to Secure Information and Communications Technology

Executive Order 13873 was issued on May 15 with the goal of “Securing the Information and Communications Technology and Services Supply Chain.” The order ultimately seeks to manage the national security risk that can exist in...more

Contract Corner: Drafting Sublicense Provisions in Intellectual Property Licenses

In this Contract Corner, we are highlighting considerations for drafting sublicense provisions in the context of an Intellectual Property License. ..Definition of Sublicense. A sublicense in the context of an IP license is...more

Lawmaking for the Internet of Things

Internet-connected devices contributing to the Internet of Things (IoT) are projected to exceed 50 billion devices by 2025, according to the Federal Trade Commission’s Bureau of Consumer Protection in its June 2018 comments...more

GDPR: Year 2

The European General Data Protection Regulation (GDPR) took effect in May 2018, requiring companies that handle or process EU residents’ personal information to conform to practices that seek to more fully protect consumer...more

NIST Small Business Cybersecurity Act Signed into Law

President Donald Trump signed the NIST Small Business Cybersecurity Act, S. 770 (formally known as the “Min Street Cybersecurity Act”) into law on August 14....more

Update on California Privacy Law

As detailed in a prior blog post, California’s new privacy law, commonly referred to as the CCPA, seeks to impose tougher privacy requirements on companies that collect and use consumer data....more

DHS Establishes National Risk Management Center

The US Department of Homeland Security (DHS) hosted the first National Security Summit on July 31 in New York City. In attendance were US Vice President Mike Pence, senior members of the DHS and other federal agencies, as...more

Is It Time to Update Your Website Terms of Use?

Website terms of use are often copied and pasted from other sites, and viewed as “standard” or “boilerplate” terms to protect site operators and set forth the basic rules governing the relationship between the site operator...more

8/27/2018  /  Terms of Use , Websites
72 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide