In a recent Seventh Circuit Case, the dangers of a bank cashing a fraudulent check based on an electronic image raises important business banking concerns. In a recent Commercial Banking Law Case, an attorney’s client Fumiko Anderson asked attorney Goodson … Continue reading
A new US Department of Labor (“DOL”) Regulation that is set to go into effect on December 1, 2016 provides for overtime pay to individuals that are earning up to a salary of $47,500. This means even if, they are … Continue reading
One often, overlooked method of financing growth is long term supply agreements with specific unit and pricing requirements. Once, these long term supply agreements are finalized the supplier can rely on them for planning future growth. The supplier gets a … Continue reading
Gender discrimination may be more prevalent in Silicon Valley, the Startup and VC culture than most realize. The reality is that most partners, VCs and Startup CEOs are men. The Ellen Pao trial has brought these issues to light, but … Continue reading
Many tech startups are started by immigrants to the United States and they require a visa to continue to stay in the U.S. Often, the startups are created and operated by immigrants that do not know if, they will be … Continue reading
In the past, copyright syndication was generally a method of licensing copyrighted videos, music, television episodes and movies to a variety of broadcasters in return for royalties. This generally entails licensing content for a return of royalties or percentage of … Continue reading
1) Wait time to go through security screenings for workers is not compensable under the FLSA and the Portal to Portal Act, because it is not part of the principal activities the employees were hired to perform. Integrity Staffing Solutions … Continue reading
How do you draft a good Master Technology Service Agreement? What do you consider? What is reasonable? What is foreseeable? What is too remote? How do you respond to an Evidence Preservation Letter? What is your clients’ doom and gloom fears? These are all things that all technology and information technology consultants and teams have to consider and make good decisions on. Without having a good team of professionals that can identify the areas of risk for the clients, the method and means of exploiting known or identified vulnerabilities, and creating a prompt data security protection protocol you may end up losing out from a change in ISPs or IT vendors.
Having good change management procedures is vital to the success of your clients and to protect them from many would be competitors looking to acquire your clients’ knowledge, trade secrets and intellectual property. A good first step for protecting your clients is using good provisions in your Master Technology Service Agreements that all vendors have to comply with to ensure that the proper procedures are followed to ensure that key personnel, key clients, key vulnerabilities, key consultants and key terms and caveats are negotiated and drafted to protect against reasonably anticipated problems.
The Master TSA allows for a method of interjecting vital controls that can be adapted to the needs of the clients–sometimes all that is needed is a wise and seasoned Chief Technology Officer (“CTO”). Other times–key schedules and predefined procedures to follow for implement changes in information technology services or hardware. Sometimes good limitations on damages, warranties and representations and third party indemnification provisions are required to ensure that your clients are protected from potential errors in the change management procedures.
Finally, having good enforcement and corrective actions predefined and provided for in the Master TSA will save you a lot of headaches down the line–including delays based on the need for board or shareholder’s approval, manager or member’s approval, or similar delays that may be required in following corporate formalities. Sometimes a rigid adherence to corporate formalities can allow a problem to become bigger over time and based on delays–it is generally advisable to deal with these types of data security problems sooner rather than later.
For more go to: http://www.bipeblawg.com, http://www.vrplawgroup.com, http://www.eebrunchclub.com
Posted in Angel Investment Updates, Commercial Agreements, Copyright Updates, Corporate Counseling, Cyberlaw Upddates, Employment Law Publication, Employment Law Updates, Entertainment Law Updates, General Business, General Litigation, IP Publications, Last Week's Update, Mergers and Acquisitions, Patent Law Publications, Patent Law Updates, This Weeks Update, Trademark Law Updates, Trial Updates
Tagged CFCA, Chicago Attorney, Chicago Copyright Attorney, Chicago Copyright Lawyer, Chicago Cyberattorney, Chicago Cyberlawyer, Chicago IP Attorneys, Chicago IP Counsels, chicago IP lawyers, Chicago IT Attorney, Chicago IT Attorneys, Chicago IT Counsel, Chicago IT Counsels, Chicago IT lawyer, Chicago IT Lawyers, Chicago Lawyer, chicago patent attorney, Chicago Patent Counsel, chicago patent lawyer, Chicago Technology Service Agreements, Chicago Trademark Attorney, Chicago Trademark Counsel, Computer Fraud and Abuse Act, Data Security, Hacking, IT Agreements, IT Litigation, Master Service Agreements, Technology Agreements, Technology Attorneys, Technology Counsel, Technology Law Firms, Technology Lawyer, technology lawyers