News & Analysis as of

Vendors

9 Top Trade Secrets You Need to Protect Now

by Revision Legal on

In practice, a trade secret can be pretty much anything. The federal Trade Secrets Act, 18 U.S. Code § 1839(3), defines a “trade secret” as...more

European Court of Justice: Intercompany Pricing Cannot Be Used For EU Import/Customs Purposes If Subject to Adjustments

• A recent judgment of the European Court of Justice for bars the use of intercompany transfer prices for EU imports and EU customs duty purposes if (as is commonly the case) these are subject to retroactive adjustments. ...more

Avoiding The Blame Game: How To Limit Your Liability To Other Companies’ Employees

by Fisher Phillips on

Numerous individuals who work in retail stores are actually employed by a company other than the retailer itself. These include vendor employees stocking product, sampling employees who offer customers tasty treats, inventory...more

Critical Considerations for Service Level Management

by Foley & Lardner LLP on

In the last couple of weeks you have certainly been thinking about your New Year’s resolutions. As 2018 kicks off, there’s no better time to the think about how to manage your suppliers and your procurement process. Service...more

A Software Vendor and Its Customer: “Like Ships Passing on a Foggy Night”

by Field Law on

When a customer got into a dispute with the software vendor about the license fees, the resulting case reads like a cautionary tale about software licensing. In ProPurchaser.com Inc. v. Wifidelity Inc., 2017 ONSC 7307...more

Contract Corner: Software License Checklist for Licensees: 20 Issues to Consider When Working from the Vendor’s Form (Part 2)

by Morgan Lewis on

Picking up where we left off, below is the remainder of our quick checklist of issues that customers should consider in any software licensing agreement. Today’s items include more traditional legal issues to add to those...more

Contract Corner: Software License Checklist for Licensees: 20 Issues to Consider When Working from the Vendor’s Form (Part 1)

by Morgan Lewis on

Everybody does it. We may say that we only use the “customer’s paper” when contracting, but we know that is often not the case when entering into licenses for commercially available, off-the-shelf (COTS) software products....more

All That Glitters is Not One to Mold

by Winthrop & Weinstine, P.A. on

To me, one of the most exciting aspects of intellectual property law is when patent law and trademark law intersect in product or packaging design. Last week, I had the honor of speaking to a graduate product design class at...more

Addressing AML Risks in Your Third-Party and Vendor/Supplier Relationships (Part II of III)

by Michael Volkov on

Global companies should incorporate AML risks into their risk analysis of their third-party distributors, agents and other intermediaries. The basic questionnaire, due diligence risk analysis, contractual provisions,...more

[Webinar] Murphy’s eDiscovery Law – How to Keep What Could Go Wrong From Going Wrong - December 1st, 12:00pm CT

by CloudNine on

As data complexity, discovery costs, and regulatory challenges increase in volume and impact, the pulse rate of publicly highlighted eDiscovery mistakes continues to build. While these mistakes are unfortunate for those who...more

To Have and to Hold: Third Circuit Rules That Physical Possession of Goods Is Required Under Section 503(b)(9) of the Bankruptcy...

by Jones Day on

Since its enactment as part of the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005, section 503(b)(9) of the Bankruptcy Code has provided an important safety net for creditors selling goods to financially...more

Don't Ignore Privacy and Data Security: Pre-Deal and Negotiation Considerations for Buyers in Merger and Acquisition Transactions

Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more

Changes to Supply Chain Management and Commercial Item Contracting in FY 2018 NDAA

For Department of Defense (DoD) acquisitions, the Conference Report for Fiscal Year 2018 NDAA includes provisions that simplify and others that complicate contractor responsibilities. Proposed supply chain diligence...more

Patent Invalidation Paves the Way for Automated Fare Collection Systems

by Holland & Knight LLP on

Next generation automated fare collection systems (AFC) typically characterized by open architecture designs, open payment approaches, and contactless card readers, are being installed in an increasing number of public...more

Who gets the money when crops are sold? The answer is not as straight forward as you may think

by Hellmuth & Johnson PLLC on

With three straight years of depressed economic conditions in the agricultural marketplace, many farmers are really feeling the strain. When farmers feel the strain for long periods of time, eventually their bank, their...more

The Cookie Crumbles in Baker’s Bid for a § 503(b)(9) Administrative Claim

Under section 503(b)(9) of the Bankruptcy Code, a creditor may recover as a priority administrative expense the value of goods sold to the debtor in the ordinary course of its business that are “received” by the debtor within...more

Terms and Conditions Land Online Trader in Difficulty in Australia

by Jones Day on

The Ruling: A computer retailer was order to pay a fine for violating the Australian Consumer Law. The Impact: Businesses must ensure that the terms and conditions in their warranty notices comply with the law, or risk an...more

Do Your Vendor Contracts Comply with GDPR?

by Womble Bond Dickinson on

Any entity processing personal data on your behalf (i.e., your vendors) must have a written contract in place. The GDPR requires specific language in your vendor contracts. Review steps 1–4 below to bring your vendor...more

Healthcare Cyber: House Inquiry Targets Medical Software

In its latest inquiry into cybersecurity risks in the healthcare sector, the House Energy and Commerce Committee last week requested a “formal briefing” from medical transcription vendor Nuance Communications, Inc. concerning...more

Global In-House Centers in India, v2.0

GICs in India are evolving from cost-saving platforms into Innovation Centers for emerging digital technologies that can provide a competitive advantage. Recent years have seen a resurgence of interest in GICs in India...more

Allocation of Data Breach Risks and Costs in Vendor Contracts: Negotiate, Negotiate, Negotiate (And Negotiate Again!) Limitations...

by McGuireWoods LLP on

“A significant data breach is likely to cost the company materially, and costs could drag on for a number of years,” analyst Shlomo Rosenbaum, commenting on the Equifax breach. Organizations increasingly rely on...more

Building a Health App? Part 5: Contracting for Health App Construction

As you take your health app from innovative idea to reality, you will be engaging in a development project that will likely entail the procurement of technology, services and perhaps even content from third parties. For...more

7 things you might not know about cybersecurity insurance

by Thompson Coburn LLP on

The number of cyber attacks and data breaches are increasing, and the costs to respond to such incidents are also increasing. This underscores the importance of cyber insurance, a valuable tool that companies can access that...more

Client Alert: Vendor Section 503(b)(9) Administrative Priority Claims: When Goods are Received is Critical

Debtors in Chapter 11 proceedings rarely pay unsecured creditors a meaningful dividend on prepetition accounts receivable balances, much less pay them in full. In an era of aggressive lending to place capital in the market,...more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

272 Results
|
View per page
Page: of 11
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.