Latest Publications

Share:

Important Considerations When Tech Service Providers and Life Science Companies Collaborate in the Digital Health Space

When negotiating a digital health collaboration agreement between a tech company and a life sciences company, whether for the development of artificial intelligence or other software, the provision of data hosting and...more

Legislation Introduced to Reform Section 230 of the Communications Decency Act

Following the US Department of Justice’s recent recommendations to reform Section 230 of the Communications Decency Act (CDA) to provide incentives for online platforms to address illicit material on their platforms, two US...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 3)

In an ideal outsourcing relationship, technology transformation through innovation, continuous improvement, and future project work is never really “over.” When documenting an initial transformation program and individual...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 2)

Earlier this month, we discussed the significance of the transformation workstream in outsourcing transactions and outlined important topics and points to consider when documenting the overall transformation methodology...more

Practical Steps to Take Before CCPA Enforcement Begins

The July 1 enforcement of the California Consumer Privacy Act (CCPA) is one week away. Despite calls by the business community and trade associations to push back the enforcement date to January 2021 due to the coronavirus...more

Contract Corner: Key Provisions in Transition Services Agreements

Transition services agreements (TSAs) are often an integral part of a transaction when a buyer or a seller needs to use the other’s services, infrastructure, or resources for an agreed-upon period of time after an...more

Contract Corner: Technology Transformation in Outsourcing Agreements (Part 1)

Transformation is often a critical component of outsourcing and managed services transactions. The transition of core or non-core functions to a third-party provider can provide an opportunity for the customer to leverage the...more

FTC Seeks Comments on Children's Online Privacy Protection Act Rule

The Federal Trade Commission (FTC) is seeking comments on the effectiveness of the amendments it made to the Children’s Online Privacy Protection Rule (COPPA Rule) in 2013, to determine whether additional changes are needed...more

Update: NY Governor Signs SHIELD Act into Law

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act was signed into New York law by Governor Andrew Cuomo on July 25, after passing the New York State Assembly on June 17. ...more

Do Consumers Care Enough About Their Data to Change Their Behavior?

As lawmakers, policymakers, tech companies, and other data collectors try to determine how much access and control of consumer data is appropriate or acceptable, and how much notice and choice consumers should have, consumers...more

Open Source Is Becoming a ‘Best Practice’

Open source programs are becoming a best practice in the technology, telecom/media, and financial services industries. Companies are establishing open source best practices to streamline and organize the way their employees...more

Contract Corner: Considerations When University Employees Provide Consulting Services to University Licensees

When an inventor of technology who is also a university employee wants to commercialize university-developed technology, it is customary for the university and the inventor to “spin out” the technology via a license agreement...more

Executive Order Seeks to Secure Information and Communications Technology

Executive Order 13873 was issued on May 15 with the goal of “Securing the Information and Communications Technology and Services Supply Chain.” The order ultimately seeks to manage the national security risk that can exist in...more

Contract Corner: Drafting Sublicense Provisions in Intellectual Property Licenses

In this Contract Corner, we are highlighting considerations for drafting sublicense provisions in the context of an Intellectual Property License. ..Definition of Sublicense. A sublicense in the context of an IP license is...more

Lawmaking for the Internet of Things

Internet-connected devices contributing to the Internet of Things (IoT) are projected to exceed 50 billion devices by 2025, according to the Federal Trade Commission’s Bureau of Consumer Protection in its June 2018 comments...more

GDPR: Year 2

The European General Data Protection Regulation (GDPR) took effect in May 2018, requiring companies that handle or process EU residents’ personal information to conform to practices that seek to more fully protect consumer...more

NIST Small Business Cybersecurity Act Signed into Law

President Donald Trump signed the NIST Small Business Cybersecurity Act, S. 770 (formally known as the “Min Street Cybersecurity Act”) into law on August 14....more

Update on California Privacy Law

As detailed in a prior blog post, California’s new privacy law, commonly referred to as the CCPA, seeks to impose tougher privacy requirements on companies that collect and use consumer data....more

DHS Establishes National Risk Management Center

The US Department of Homeland Security (DHS) hosted the first National Security Summit on July 31 in New York City. In attendance were US Vice President Mike Pence, senior members of the DHS and other federal agencies, as...more

Is It Time to Update Your Website Terms of Use?

Website terms of use are often copied and pasted from other sites, and viewed as “standard” or “boilerplate” terms to protect site operators and set forth the basic rules governing the relationship between the site operator...more

8/27/2018  /  Terms of Use , Websites

Contract Corner: IP Warranties v. IP Indemnification

A frequent point of contention between parties negotiating the allocation of risk related to intellectual property rights in connection with the acquisition of intellectual property is the interplay between the warranty and...more

World Bank Using Blockchain Technology

The World Bank announced on August 10 that 70 years after its first bond transaction, it will be issuing the first bond to use entirely blockchain technology, in part to help the bank gain experience in the use of blockchain....more

The Cost of Data Breaches in 2018

This July, the 2018 Cost of Data Breach Study: A Global Overview was released as an independent study by Ponemon Institute, LLC, sponsored by IBM Security. The study breaks down the rising costs of data breaches and the...more

Life in the Fast Lane: FCC Releases Final Rule Repealing Net Neutrality

This week, the Federal Communications Commission (FCC) published the proposed final rule repealing “net neutrality,” the open internet rules that classified internet service providers (ISPs) as common carriers under Title II...more

Potential Issues When Monetizing Websites with Targeted Ads

Thinking about monetizing your website with targeted ads? If so, you should have a basic understanding of the potential issues and associated risks when making online advertisement media buys. Although the Interactive...more

2/26/2018  /  Advertising , Monetization , Outsourcing
67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide