The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
OK at Work: Navigating Customer Terms and Usage
OG Talks: Good Energy and Navigating Transactions
7 Key Takeaways | Ethics in Construction Contract Negotiations and Claims
M&A Considerations for Serial Acquirers
What's the Timeline for a Sale Process?
Balch’s Decision Dive: Texas Trial Court Struck Down the FTC’s Noncompete Rule
Making the Lawyer-Client Relationship Work in Challenging Litigation – Speaking of Litigation Video Podcast
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
On 17 March 2025, the Australian Government published Model Clauses to help government purchasers manage vendor relationships when procuring AI technology based systems and services. The Model Clauses cover issues relevant to...more
As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more
The Digital Operational Resilience Act (DORA) establishes a harmonised and comprehensive framework for information and communication technology (ICT) risk management in the financial sector. It is a directly applicable EU...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Outbound Data Transfer Security Review Measures - On July 7, 2022, the Cybersecurity Administration of China (“CAC”) issued the Outbound Data Transfer Security Assessment Measures (“Security Assessment Measures”) effective...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
With the recent onslaught of ransomware attacks, it’s time to revisit force majeure clauses (again). Earlier in the pandemic, we reviewed how COVID-19 could impact force majeure provisions. Since then, there has been a flurry...more
Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more
Employers’ engagement and use of various types of vendors has expanded recently, to include vendors who assist with office re-entry screening and contact tracing as employees return to work during the COVID-19 pandemic. ...more
The possibility of a cybersecurity incident—and ensuing litigation—is a fact of life for almost every business. Even companies that do not process or handle consumer information collect personal information about their...more
One of the foremost threats companies face today is that posed by cybercriminals, and the unique vulnerabilities of companies in the oil and gas sector create heightened cybersecurity risks for those pursing transactions in...more
Cybersecurity company Carbon Black recently issued are port of the results of a survey of chief information security officers (CISOs) of financial organizations, which showed that the financial industry is getting hammered by...more
In Part 1 and Part 2 of this Contract Corner, we discussed the importance of assessing and defining the types of data involved in a services agreement, and highlighted issues to consider with respect to the ownership and...more
As the pace of innovation increases at an ever faster rate, many products that traditionally may not have been thought of as involving computers or software are incorporating these elements. In 2007, the iPhone revolutionized...more