News & Analysis as of

Technology Contracts

Technology Policies Protect The Company and its IP

A computer and technology policy is an important part of protecting and managing intellectual property. A business should consider establishing a policy that addresses the following points...more

Does blockchain's trust architecture make dumb contracts smarter?

by Hogan Lovells on

In a thought-provoking paper presented at this year’s TPRC Research Conference on Communications, Information and Internet Policy, Internet scholar Kevin Werbach explains how the use of blockchain technology creates a new...more

Alert: Technology Contracts and Boilerplate Language: Be Aware of the Pitfalls

by Pullman & Comley, LLC on

All contracts follow a similar pattern in their structure. They first contain an introduction (known as “Recitals”) that sets forth the purpose of the contract and the expectations of the parties in entering into the...more

Regular audits of technology license agreements may reduce your patent royalty payments

by McAfee & Taft on

Patent license royalty payments can be habit-forming. Some patent licenses have terms extending for potentially two decades or longer. As a result, patent licenses are frequently filed away never to be seen again....more

SEC Files Financial Fraud Actions, Mired In Controversy

by Dorsey & Whitney LLP on

In the wake of the market crisis and the formation of a task force, the SEC has sought to focus in part on financial fraud actions. The action filed at the close of last week against Computer Sciences Corporation and seven of...more

Cloud computing contracts – the EU Commission report

by DLA Piper on

Further to the EU Commission communication on “Unleashing the potential of cloud computing in Europe” the Commission adopted a European Cloud Computing Strategy (you can find more information here) which is also based on a...more

Cloudy Days….Where Next for Outsourcing?

by DLA Piper on

In recent times, we have seen an increasing number of deals where the required services have been delivered from the cloud, i.e., from remotely hosted solutions, usually (albeit not always) offered on a “one to many” basis...more

7 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.