TreatiseTreatise

Technology Transactions: A Practical Guide to Drafting and Negotiating Commercial Agreements

 by Mark G Malven
 
 Copyright: 2015-2017
 Last Updated: January 2017

 Product Details >> 

Product Details

  • ISBN Number: 9781402423703
  • Page Count: 410
  • Number of Volumes: 1
  •  

Technology Transactions: A Practical Guide to Drafting and Negotiating Commercial Agreements provides the reader with the tools necessary to draft, review and negotiate technology transaction agreements with confidence.

Spearheaded by lead author Mark G. Malven (Dykema Gossett PLLC), this book walks the reader through the major legal considerations that surround technology transactions, including:

  • Software license agreements
  • IT services
  • Software development agreements
  • Reseller agreements
  • Cloud computing agreements
  • Domain name transactions
  • Technology licensing and IP-centric joint ventures
  • Technology escrow agreements
  • Non-disclosure agreements

Technology Transactions also provides a useful discussion of many privacy considerations that must be kept in mind in an agreement to leverage any emerging technology.

Technology Transactions provides practical examples, form agreements, and practice tips on how to avoid common and uncommon legal traps for the unwary.
  Table of Contents
  Preface
Chapter 1: Software License Agreements; and Appendix 1A-1B
  • § 1:1 : Introduction1-2
  • § 1:2 : Scope of License Rights1-3
    • § 1:2.1 : License Grant1-3
    • § 1:2.2 : Limitations on the License Grant1-3
    • § 1:2.3 : Use of Functional Language1-4
    • § 1:2.4 : Commonly Understood Terms (That Really Are Not)1-5
    • § 1:2.5 : Backup Copies1-5
    • § 1:2.6 : Defined Terms1-5
    • § 1:2.7 : Subsequent Refinements1-5
  • § 1:3 : Protection of Intellectual Property Rights1-5
    • § 1:3.1 : Vendor Ownership of Off-the-Shelf Software1-6
    • § 1:3.2 : Customer Ownership of Data1-6
    • § 1:3.3 : Reverse-Engineering1-6
  • § 1:4 : Taxes1-7
  • § 1:5 : Certification and Audit Rights1-7
  • § 1:6 : Warranties1-8
    • § 1:6.1 : Software Performance1-8
    • § 1:6.2 : System Warranties1-9
    • § 1:6.3 : Quality of Services1-9
    • § 1:6.4 : Viruses and Limiting Routines1-9
    • § 1:6.5 : Compliance with Laws1-9
    • § 1:6.6 : Data Security and Privacy1-10
    • § 1:6.7 : Free and Open Source Software1-10
    • § 1:6.8 : Other Warranties1-11
    • § 1:6.9 : Remedies1-11
    • § 1:6.10 : Disclaimers1-12
      • [A] : Generally1-12
      • [B] : Title and Noninfringement1-12
    • § 1:10.3 : Magnuson-Moss Warranty Act1-13
  • § 1:7 : Implementation and Acceptance1-13
  • § 1:8 : Indemnification for Infringement or Misappropriation of Intellectual Property1-14
    • § 1:8.1 : Scope1-15
    • § 1:8.2 : Exclusions/Limitations1-15
    • § 1:8.3 : Terminology: “Indemnify,” “Defend,” and “Hold Harmless”1-16
  • § 1:9 : Limitations of Liability1-17
    • § 1:9.1 : Dollar Cap1-17
    • § 1:9.2 : Exclusion of Consequential and Other Types of Damages1-18
  • § 1:10 : Termination1-21
  • § 1:11 : Licensee Transferability Rights1-22
  • § 1:12 : Bankruptcy-Related Issues1-24
    • § 1:12.1 : Applicable Bankruptcy Principles1-24
      • [A] : Unenforceability of Ipso Facto Clauses1-24
      • [B] : Assignment and Assumption of Executory Contracts1-25
      • [C] : Unenforceability of Anti-Assignment Language1-25
      • [D] : Avoidance of Transfers1-25
    • § 1:12.2 : Bankruptcy of the Customer1-25
      • [A] : Protections for Vendors1-25
      • [B] : Potential Consequences for the Customer1-26
    • § 1:12.3 : Bankruptcy of the Vendor1-26
      • [A] : Protections for Customers1-26
      • [B] : Limitations of Bankruptcy Code Section 365(n)1-27
    • § 1:12.4 : Technology Escrow Agreements1-27
  • § 1:13 : Secured Creditors1-27
    • § 1:13.1 : Security Interests in Licensed IP1-27
    • § 1:13.2 : Nonexclusive Licensees in the Ordinary Course1-27
    • § 1:13.3 : Mitigating Secured Creditor Risks1-28
  • § 1:14 : Other Provisions1-29
    • § 1:14.1 : Force Majeure/Disaster Recovery1-29
    • § 1:14.2 : Price Protection1-29
    • § 1:14.3 : Export Regulations1-30
  • Appendix 1A : Software License Agreement (Vendor-Favorable)App. 1A-1
  • Appendix 1B : Product Evaluation AgreementApp. 1B-1
Chapter 2: Software Development and Other IT Services Agreements; and Appendices 2A-2B
  • § 2:1 : Introduction2-2
  • § 2:2 : Overview: The Setting and the Players2-2
  • § 2:3 : Statements of Work: Setting Forth the “Five W’s”2-3
  • § 2:4 : Acceptance Process2-4
  • § 2:5 : Fees and Taxes2-5
  • § 2:6 : Intellectual Property Rights2-5
    • § 2:6.1 : Categories of Intellectual Property Rights2-6
    • § 2:6.2 : Ownership of Custom Software2-6
    • § 2:6.3 : Work-for-Hire Doctrine2-7
    • § 2:6.4 : Choice of Governing Law2-7
    • § 2:6.5 : Confidential Information2-8
  • § 2:7 : Vendor Personnel2-8
  • § 2:8 : Insurance2-8
  • § 2:9 : Term and Termination2-8
    • § 2:9.1 : Software Development Agreements2-8
    • § 2:9.2 : Ongoing IT Services Agreements2-9
    • § 2:9.3 : Termination for Cause2-9
    • § 2:9.4 : Effects of Termination2-9
  • § 2:10 : Vendor Warranties2-9
    • § 2:10.1 : Commonly Included Warranties2-9
      • [A] : Software Performance2-10
      • [B] : System Warranties2-10
      • [C] : Quality of Services2-10
      • [D] : Due Authority2-11
      • [E] : Compliance with Laws2-11
      • [F] : Data Security and Privacy2-11
      • [G] : Free and Open Source Software2-11
      • [H] : Viruses and Limiting Devices/Routines2-12
      • [I] : Other Warranties2-13
    • § 2:10.2 : Remedies2-13
    • § 2:10.3 : Disclaimers2-13
      • [A] : Generally2-13
      • [B] : Title and Noninfringement2-14
  • § 2:11 : Service Levels2-14
  • § 2:12 : Indemnification2-15
    • § 2:12.1 : Types of Indemnification2-15
    • § 2:12.2 : Infringement or Misappropriation of Intellectual Property2-15
      • [A] : Scope2-15
      • [B] : Exclusions/Limitations2-16
    • § 2:12.3 : Terminology: “Indemnify,” “Defend,” and “Hold Harmless”2-17
  • § 2:13 : Limitations of Liability2-18
    • § 2:13.1 : Dollar Cap2-18
    • § 2:13.2 : Exclusion of Consequential and Other Types of Damages2-19
  • Appendix 2A : Short-Form Services Agreement (Vendor-Favorable)App. 2A-1
  • Appendix 2B : Short-Form Services Agreement (Customer-Favorable)App. 2B-1
Chapter 3: Reseller Agreements; and Appendices 3A-3C
  • § 3:1 : Introduction3-2
  • § 3:2 : Scope of Relationship3-3
    • § 3:2.1 : Terminology3-3
    • § 3:2.2 : Subject Matter3-3
    • § 3:2.3 : Exclusivity3-4
    • § 3:2.4 : Geographical or Industry Limitations3-5
    • § 3:2.5 : Licensing Structure3-5
    • § 3:2.6 : Branding3-5
    • § 3:2.7 : Sales and Marketing Efforts3-5
    • § 3:2.8 : Product Development and Support3-6
    • § 3:2.9 : International Considerations3-6
    • § 3:2.10 : Prohibitions on Delegation and Assignment3-7
    • § 3:2.11 : Defined Terms3-7
    • § 3:2.12 : Subsequent Amendments3-7
  • § 3:3 : Sample Reseller Duties3-8
  • § 3:4 : Term of Relationship3-9
    • § 3:4.1 : Initial Length and Renewal3-9
    • § 3:4.2 : Termination3-10
      • [A] : Termination Rights3-10
      • [B] : Consequences of Termination3-10
  • § 3:5 : Price and Payment3-10
    • § 3:5.1 : Resale Price Maintenance Agreements3-10
    • § 3:5.2 : Price Discrimination (Robinson-Patman Act Violations)3-12
    • § 3:5.3 : Price Protection3-13
    • § 3:5.4 : Tax Treatment3-13
  • § 3:6 : Audit Rights3-13
  • § 3:7 : Compliance with Laws3-14
    • § 3:7.1 : Generally3-14
    • § 3:7.2 : Data Security and Privacy3-14
    • § 3:7.3 : Export Regulations3-14
  • § 3:8 : Warranties3-15
    • § 3:8.1 : Product Performance3-15
    • § 3:8.2 : Quality of Services3-15
    • § 3:8.3 : Other Warranties3-16
    • § 3:8.4 : End User Warranties3-16
  • § 3:9 : Protection of Intellectual Property Rights3-16
    • § 3:9.1 : Supplier Ownership of Off-the-Shelf Software3-16
    • § 3:9.2 : Reverse-Engineering3-17
    • § 3:9.3 : Confidential Information3-17
  • § 3:10 : Indemnification3-17
    • § 3:10.1 : Types of Indemnification3-17
    • § 3:10.2 : Infringement or Misappropriation of Intellectual Property3-18
      • [A] : Scope3-18
      • [B] : Exclusions/Limitations3-19
    • § 3:10.3 : Terminology: “Indemnify,” “Defend,” and “Hold Harmless”3-19
  • § 3:11 : Limitations of Liability3-21
    • § 3:11.1 : Dollar Cap3-21
    • § 3:11.2 : Exclusion of Consequential and Other Types of Damages3-21
  • § 3:12 : Bankruptcy-Related Issues3-24
    • § 3:12.1 : Applicable Bankruptcy Principles3-25
      • [A] : Unenforceability of Ipso Facto Clauses3-25
      • [B] : Assignment and Assumption of Executory Contracts3-25
      • [C] : Unenforceability of Anti-Assignment Language3-25
      • [D] : Avoidance of Transfers3-26
    • § 3:12.2 : Bankruptcy of the Reseller3-26
      • [A] : Protections for Suppliers3-26
      • [B] : Potential Consequences for the Reseller3-27
    • § 3:12.3 : Bankruptcy of the Supplier3-28
      • [A] : Protections for Resellers3-28
      • [B] : Limitations of Bankruptcy Code Section 365(n)3-28
  • Appendix 3A : Authorized Reseller AgreementApp. 3A-1
  • Appendix 3B : Referral Partner AgreementApp. 3B-1
  • Appendix 3C : Distribution AgreementApp. 3C-1
Chapter 4: Cloud Computing Agreements
  • § 4:1 : Introduction4-2
  • § 4:2 : Cloud Computing4-3
    • § 4:2.1 : Cloud Computing Defined4-3
    • § 4:2.2 : Cloud Deployment Models4-4
      • [A] : Private Cloud4-4
      • [B] : Public Cloud4-4
      • [C] : Community Cloud4-5
      • [D] : Hybrid Cloud4-5
    • § 4:2.3 : Cloud Services4-5
      • [A] : Software As a Service (SaaS)4-5
      • [B] : Platform As a Service (PaaS)4-5
      • [C] : Infrastructure As a Service (IaaS)4-5
      • [D] : Business Process As a Service (BPaaS)4-6
  • § 4:3 : Pre-Contract Considerations4-6
    • § 4:3.1 : Business Goals4-6
    • § 4:3.2 : Cloud Use and Risk Management4-6
    • § 4:3.3 : The “Cloud Team”4-6
    • § 4:3.4 : Due Diligence4-7
      • [A] : Security, Privacy, Jurisdictional Concerns4-8
      • [B] : Data Access and Control4-9
      • [C] : Regulatory Requirements/Compliance4-9
      • [D] : Intellectual Property Ownership/Use of Data4-10
      • [E] : Due Diligence Tools and Strategies4-11
      • [F] : Third-Party Services/Contractors4-12
  • § 4:4 : Negotiating Cloud Computing Agreements4-13
    • § 4:4.1 : Significant Cloud Contract Issues4-13
    • § 4:4.2 : Limitation of Liability4-15
    • § 4:4.3 : Indemnification4-16
    • § 4:4.4 : Service Levels and Service Credits4-17
  • Figure 4-1 : Support/Service Desk SLAs: Uptime Percentages4-19
    • § 4:4:5 : Security and Privacy4-22
    • § 4:4:6 : Standards for Tracking and Auditing Data in the Cloud4-23
      • [A] : SSAE 164-24
      • [B] : SOC Reports4-25
      • [C] : SOC 3 Reports4-25
      • [D] : ISO 27000 Standards4-25
      • [E] : Federal Risk and Authorization Management Program (FedRAMP)4-26
      • [F] : U.S. Regulations and Industry Standards4-27
      • [G] : Audit and Security Standards—Sample Provision4-27
    • § 4:4:7 : Preservation/Production of Data in Litigation or Investigations4-28
    • § 4:4:8 : Pricing4-29
    • § 4:4:9 : Tax Considerations4-30
    • § 4:4:10 : Term and Termination4-30
Chapter 5: Domain Name Transactions; and Appendices 5A-5B
  • § 5:1 : Introduction5-1
  • § 5:2 : Pre-Contract Considerations5-2
    • § 5:2.1 : Gathering Background Information5-2
      • [A] : Ownership History5-2
      • [B] : Use History5-3
      • [C] : Unknown Unknowns5-4
    • § 5:2.2 : Spam Issues5-4
    • § 5:2.3 : Trademark Issues5-4
  • § 5:3 : Payment Considerations5-5
    • § 5:3.1 : Escrow Process and Fees5-5
    • § 5:3.2 : Ownership During Pay-Out Period5-5
  • § 5:4 : Transfer Considerations5-7
  • § 5:5 : Warranties5-8
    • § 5:5.1 : Seller’s Warranties5-8
    • § 5:5.2 : Buyer’s Warranties5-9
  • § 5:6 : Indemnification5-10
  • § 5:7 : Other Terms5-10
  • Appendix 5A : Internet Domain Name Purchase AgreementApp. 5A-1
  • Appendix 5B : Internet Domain Name Escrow AgreementApp. 5B-1
Chapter 6: Technology Licenses and IP-Centric Joint Ventures
  • § 6:1 : Introduction6-3
  • § 6:2 : License Grants6-3
    • § 6:2.1 : General Principles6-3
    • § 6:2.2 : Key Drafting Tips6-4
      • [A] : Contents and Placement6-4
      • [B] : Typical Licensing Terms6-4
      • [C] : Defined Terms6-5
      • [D] : Presently Effective Grant6-5
      • [E] : Subsequent Refinements6-5
    • § 6:2.3 : Parties6-6
    • § 6:2.4 : Additional Considerations for Exclusive Licenses6-6
  • § 6:3 : Royalty and Financial Terms6-7
    • § 6:3.1 : Royalty Structures6-7
    • § 6:3.2 : Royalty Base6-7
    • § 6:3.3 : Scope Considerations6-8
    • § 6:3.4 : Special Dispositions6-8
    • § 6:3.5 : Audit Rights6-9
    • § 6:3.6 : Tax and Currency Issues6-9
  • § 6:4 : Developed Intellectual Property6-10
    • § 6:4.1 : Ownership Options6-10
      • [A] : Vertical Relationships6-10
      • [B] : Collaborative Relationships6-10
    • § 6:4.2 : Joint Ownership6-11
      • [A] : Creation of Joint Ownership6-11
      • [B] : The Problems with Joint Ownership6-12
  • Figure 6-1 : Exploiting Patents6-13
  • Figure 6-2 : Exploiting Copyrights6-13
  • § 6:5 : Protection and Enforcement of Intellectual Property Rights6-14
    • § 6:5:1 : Standing6-15
    • § 6:5:2 : Control and Financial Terms6-16
  • § 6:6 : Termination6-17
  • § 6:7 : Licensee Transferability6-17
    • § 6:7:1 : General Rules Regarding Transferability6-17
    • § 6:7:2 : Transferability of Nonexclusive Patent and Copyright Licenses6-18
    • § 6:7:3 : Transferability of Exclusive Patent and Copyright Licenses6-18
    • § 6:7:4 : Transferability of Trade Secret Licenses6-19
    • § 6:7:5 : Avoiding Transaction Surprises6-19
  • § 6:8 : Bankruptcy-Related Issues6-21
    • § 6:8:1 : Applicable Bankruptcy Principles6-21
      • [A] : Unenforceability of Ipso Facto Clauses6-21
      • [B] : Assignment and Assumption of Executory Contracts6-21
      • [C] : Unenforceability of Anti-Assignment Language6-22
      • [D] : Avoidance of Transfers6-22
    • § 6:8:2 : Bankruptcy of the Licensee6-22
      • [A] : Protections for Licensors6-22
      • [B] : Transferability of Nonexclusive Patent and Copyright Licenses6-23
      • [C] : Transferability of Exclusive Patent and Copyright Licenses6-23
      • [D] : Transferability of Trade Secret Licenses6-23
      • [E] : Potential Consequences for the Licensee6-24
    • § 6:8:3 : Bankruptcy of the Licensor6-24
      • [A] : Protections for Licensees6-24
      • [B] : Limitations of Bankruptcy Code Section 365(n)6-25
  • § 6:9 : Secured Creditors6-25
    • § 6:9.1 : Security Interests in Licensed IP6-25
    • § 6:9:2 : Nonexclusive Licensees in the Ordinary Course6-25
    • § 6:9:3 : Mitigating Secured Creditor Risks6-26
  • § 6:10 : Other Provisions6-27
    • § 6:10:1 : Warranties6-27
    • § 6:10:2 : Limitations of Liability6-27
      • [A] : Dollar Caps6-27
      • [B] : Exclusion of Consequential and Other Types of Damages6-27
    • § 6:10:3 : Confidential Information6-31
Chapter 7: Technology Escrow
  • § 7:1 : Introduction7-2
  • § 7:2 : Source Code7-2
  • § 7:3 : Escrow Arrangements7-3
    • § 7:3.1 : Function of Technology Escrow7-3
    • § 7:3.2 : Forms of Technology Escrow7-4
      • [A] : Two-Party Escrow Agreement7-4
      • [B] : Three-Party Escrow Agreement7-4
      • [C] : Hybrid Escrow Agreement7-4
    • § 7:3.3 : Elements of a Technology Escrow Agreement7-4
      • [A] : Deposit7-5
      • [B] : License7-5
      • [C] : Release Conditions and Procedure7-6
      • [D] : Other Provisions7-6
  • § 7:4 : Bankruptcy-Related Issues7-7
  • § 7:5 : Practical Considerations7-10
    • § 7:5.1 : Source Code Turnover Provisions7-10
    • § 7:5.2 : Tangible Property7-11
    • § 7:5.3 : Timing7-11
    • § 7:5.4 : Period During Which Escrow Should Apply7-12
    • § 7:5.5 : Release Conditions7-12
      • [A] : Immediate Release7-12
      • [B] : Tempering Bankruptcy or Receivership Conditions7-12
    • § 7:5.6 : Escrow in Hosted Service Models7-13
    • § 7:5.7 : Defining “Source Code”: Verification and Related Processes7-13
      • [A] : Ancillary Components7-14
      • [B] : Sample Definition7-14
      • [C] : Verification and Related Processes7-14
    • § 7:5.8 : Choosing to Use an Escrow Arrangement: Advantages and Disadvantages7-15
Chapter 8: Nondisclosure Agreements; and Appendices 8A-8B
  • § 8:1 : Overview8-2
  • § 8:2 : Key Provisions8-2
    • § 8:2.1 : Confidential Information8-2
      • [A] : Definition of CI8-2
      • [B] : Specific Types of CI8-3
      • [C] : Marking and Verbal Disclosures8-3
    • § 8:2.2 : Exceptions8-4
    • § 8:2.3 : Identifying the Parties8-5
    • § 8:2.4 : Recipient Duties8-5
      • [A] : Nondisclosure Obligations8-5
      • [B] : Limitations on Use8-6
    • § 8:2.5 : Personally Identifiable Information8-6
    • § 8:2.6 : Compliance with Government Authorities8-6
  • Figure 8-1 : Compelled Disclosure Provisions: Negotiable Points8-7
    • § 8:2:7 : Return/Destruction of CI; Backup Copies8-7
    • § 8:2:8 : Duration8-7
    • § 8:2:9 : Compliance with Export Laws8-8
    • § 8:2:10 : Remedies8-8
    • § 8:2:11 : Limitations of Liability; Exclusions of Certain Damage Types8-8
  • § 8:3 : Possibly Inappropriate Provisions8-8
  • § 8:4 : NDAs As a Precursor to a Corporate Transaction8-8
  • § 8:5 : Interaction with Subsequent Agreements8-9
  • Appendix 8A : Mutual Nondisclosure AgreementApp. 8A-1
  • Appendix 8B : Unilateral Nondisclosure AgreementApp. 8B-1
Chapter 9: Understanding the IP Basics
  • § 9:1 : Introduction9-2
  • § 9:2 : Intellectual Property Law Basics9-3
    • § 9:2.1 : Copyright9-3
      • [A] : Registration9-3
      • [B] : Work for Hire9-4
      • [C] : Derivative Works9-4
    • § 9:2.2 : Trade Secrets and Know-How9-5
    • § 9:2.3 : Patents9-6
    • § 9:2.4 : Trademarks9-7
    • § 9:2.5 : Some Other IP Rights—Industrial Designs and Mask Works9-7
    • § 9:2.6 : Distinguishing Technology and Intellectual Property9-8
    • § 9:2.7 : Distinguishing Technology Licenses and Patent Licenses9-8
    • § 9:2.8 : Choice of Governing Law9-8
    • § 9:2.9 : The Intersection of Patent Law and Antitrust Law9-8
  • § 9:3 : Types of IP Transfers or Exchanges of Rights9-9
    • § 9:3.1 : Assignment9-9
    • § 9:3.2 : Licenses9-10
      • [A] : Exclusive Licenses9-10
      • [B] : Nonexclusive Licenses9-11
    • § 9:3.3 : Covenants Not to Sue9-11
    • § 9:3.4 : Presently Effective Grant9-11
  • § 9:4 : Licensee Transferability9-12
    • § 9:4.1 : General Rules Regarding Transferability9-12
    • § 9:4.2 : Transferability of Nonexclusive Patent and Copyright Licenses9-12
    • § 9:4.3 : Transferability of Exclusive Patent and Copyright Licenses9-13
    • § 9:4.4 : Transferability of Trade Secret Licenses9-13
    • § 9:4.5 : Avoiding Transaction Surprises9-13
  • § 9:5 : Bankruptcy-Related Issues9-14
    • § 9:5.1 : Applicable Bankruptcy Principles9-15
      • [A] : Unenforceability of Ipso Facto Clauses9-15
      • [B] : Assignment and Assumption of Executory Contracts9-15
      • [C] : Unenforceability of Anti-Assignment Language9-15
      • [D] : Avoidance of Transfers9-16
    • § 9:5.2 : Bankruptcy of the Licensee9-16
      • [A] : Protections for Licensors9-16
      • [B] : Transferability of Nonexclusive Patent and Copyright Licenses9-16
      • [C] : Transferability of Exclusive Patent and Copyright Licenses9-16
      • [D] : Transferability of Trade Secret Licenses9-17
      • [E] : Potential Consequences for the Licensee9-17
    • § 9:5.3 : Bankruptcy of the Licensor9-17
      • [A] : Protections for Licensees9-17
      • [B] : Limitations of Bankruptcy Code Section 365(n)9-18
  • § 9:6 : Secured Creditors9-18
    • § 9:6.1 : Security Interests in Licensed IP9-18
    • § 9:6.2 : Nonexclusive Licensees in the Ordinary Course9-18
    • § 9:6.3 : Mitigating Secured Creditor Risks9-19
  • § 9:7 : Joint Ownership Concerns9-20
    • § 9:7.1 : How Joint Ownership Is Created9-20
    • § 9:7.2 : The Problems with Joint Ownership9-20
  • Figure 9-1 : Exploiting Patents9-22
  • Figure 9-2 : Exploiting Copyrights9-22
  • § 9:8 : Protection and Enforcement of Intellectual Property Rights9-23
    • § 9:8:1 : Standing9-24
    • § 9:8:2 : Control and Financial Terms9-25
Chapter 10: The Internet and Domain Name System
  • § 10:1 : Introduction10-1
  • § 10:2 : The Internet: What It Is and Where It Started10-2
  • § 10:3 : The Domain Name System10-3
    • § 10:3.1 : Creation10-3
    • § 10:3.2 : Governance10-3
      • [A] : Before 1998 (Pre-ICANN)10-3
      • [B] : The ICANN Era10-5
      • [C] : Future Outlook10-7
    • § 10:3.3 : Structure and Hierarchy10-8
    • § 10:3.4 : Operation10-9
      • [A] : Registrants10-9
      • [B] : Registrars10-9
      • [C] : Registries10-10
Chapter 11: Digital Millennium Copyright Act
  • § 11:1 : Introduction11-2
  • § 11:2 : Overview of the DMCA11-3
    • § 11:2.1 : Title I—WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 199811-3
    • § 11:2.2 : Title II—Online Copyright Infringement Liability Limitation Act11-3
    • § 11:2.3 : Title III—Computer Maintenance or Repair11-3
    • § 11:2.4 : Title IV—Miscellaneous Provisions11-4
    • § 11:2.5 : Title V—Protection of Certain Original Designs11-4
  • § 11:3 : Service Provider Safe Harbor Eligibility Requirements11-4
    • § 11:3.1 : Qualifying As a “Service Provider”11-4
    • § 11:3.2 : Policy for Repeat Infringers; Technical Copyright Protection Measures11-4
    • § 11:3.3 : No Direct Financial Benefit11-5
    • § 11:3.4 : No Actual Knowledge of Infringement11-5
    • § 11:3.5 : Expeditious Removal of Infringing Content11-5
    • § 11:3.6 : Additional Conditions for System Caching11-6
  • § 11:4 : Takedown Notification Requirements and Procedures11-7
    • § 11:4.1 : Designated Agent11-7
    • § 11:4.2 : The Takedown Notice11-7
      • [A] : Required Elements11-7
      • [B] : How to Respond to a Takedown Notice11-8
    • § 11:4.3 : Counter Notice to Restore Original Content11-9
      • [A] : Required Elements11-9
      • [B] : How to Respond to a Counter Notice11-10
    • § 11:4.4 : Service Provider Liability for Removing Content11-10
    • § 11:4.5 : Penalties for Misrepresentations in Notices11-10
    • § 11:4.6 : Recent Takedown Disputes11-11
  • § 11:5 : Subpoena to a Service Provider11-12
  • § 11:6 : Available Relief for Copyright Owners11-12
  • § 11:7 : Anti-Circumvention Provisions11-13
    • § 11:7.1 : Generally11-13
    • § 11:7.2 : Responding to Violations11-13
      • [A] : Civil Remedies11-13
      • [B] : Criminal Penalties11-14
Chapter 12: Cybersecurity and Privacy: An Overview
  • § 12:1 : Introduction12-2
  • § 12:2 : Fundamental Concepts12-2
    • § 12:2.1 : Data Security Versus Data Privacy12-2
    • § 12:2.2 : “Privacy by Design”12-4
      • [A] : Business Case for a New Approach to Privacy and Security12-4
      • [B] : Principles of Privacy by Design Framework12-5
      • [C] : Review and Certification Processes12-6
    • § 12:2.3 : Personally Identifiable Information12-8
  • § 12:3 : Cybersecurity and Privacy Within Organizations12-13
    • § 12:3.1 : Designing and Implementing Internal Controls12-13
      • [A] : Key Drivers12-13
      • [B] : Operational Considerations12-14
    • § 12:3.2 : Internal Data Privacy Programs: Personal Information from Cradle to Grave12-15
  • Figure 12-1 : Comprehensive Data Privacy Program12-15
    • [A] : Data Element Inventory; Data Map12-16
    • [B] : Determining Applicable Laws and Standards12-17
    • [C] : Compliance with Applicable Standards12-20
    • [D] : Compliance Roadmap12-21
  • § 12:4 : Data Security Breaches—The “Liability” Factor12-22
    • § 12:4:1 : Federal Agency Enforcement12-22
      • [A] : Federal Trade Commission12-22
  • Figure 12-2 : FTC’s Ten Practical Privacy and Data Security Lessons for Businesses12-23
    • [B] : Consumer Financial Protection Bureau12-24
    • [C] : Securities and Exchange Commission12-24
    • § 12:4:2 : Proposed Federal Data Security Breach Laws12-25
    • § 12:4:3 : State Data Security Breach Notification Laws12-25
    • § 12:4:4 : Trends in Data Breach Litigation12-27
    • § 12:4:5 : Designing and Implementing a Response Plan12-28
    • § 12:4:6 : Cyber Liability Insurance Litigation12-30
  • § 12:5 : Big Data—The “Asset” Factor12-31
    • § 12:5:1 : Defining “Big Data”12-31
    • § 12:5:2 : Next-Generation Data Issues and Legal Compliance12-32
    • § 12:5:3 : Data Ownership and Provenance12-32
  • § 12:6 : Practice Tips12-33
    • § 12:6:1 : Product Design and Privacy by Design12-33
    • § 12:6:2 : Defining Data Ownership and Rights of Use12-34
    • § 12:6:3 : Assuring the Provenance of Third-Party Data Contractually12-34
    • § 12:6:4 : Data Security Breaches: Liability, Indemnification, and Remedies12-35
Chapter 13: Privacy: International Data Transfers
  • § 13:1 : Introduction13-2
  • § 13:2 : International Privacy Laws13-2
    • § 13:2.1 : U.S. Privacy Framework13-2
    • § 13:2.2 : European Economic Area Privacy Model13-3
      • [A] : EU Directive13-3
      • [B] : The General Data Protection Regulation (GDPR)13-4
  • § 13:3 : Transfers of Data13-4
    • § 13:3.1 : Examples of Transfers to a Third Country13-4
    • § 13:3.2 : Compliant Transfers13-5
      • [A] : Consent of the Data Subject13-5
      • [B] : Adequate Protection Under Third Country’s Local Law13-6
      • [C] : Safe Harbor, Privacy Shield, or Similar Arrangements13-6
      • [D] : Standard Contractual Clauses13-7
      • [E] : Binding Corporate Rules13-8
      • [F] : Exempted Transfers13-8
    • § 13:3.3 : Onward Transfers13-9
    • § 13:3.4 : Transfers of Encrypted Data13-9
  • § 13:4 : Consequences of Failure to Comply with International Data Transfer Law13-9
  • § 13:5 : Compliance13-10
    • § 13:5.1 : What to Do If Noncompliant Transfers Are Already Happening13-10
    • § 13:5.2 : Getting Management on Board13-10
    • § 13:5.3 : How to Start or Maintain a Compliance Program13-11
      • [A] : Identify Data Flows13-11
      • [B] : Develop a Compliance Plan for Each Data Flow13-12
      • [C] : Put the Compliance Filings and Contracts in Place13-12
      • [D] : Monitor13-13
  • § 13:6 : The General Data Protection Regulation13-13
    • § 13:6.1 : Background13-13
    • § 13:6.2 : Adoption/Enforcement Timeline13-13
    • § 13:6.3 : Provisions; Compliance Considerations13-14
      • [A] : Privacy by Design and by Default13-14
      • [B] : Binding Corporate Rules13-15
      • [C] : Cloud Computing; Vendor Contracts13-15
      • [D] : Data Processing Officer13-16
      • [E] : Data Breach Notification13-16
Chapter 14: Privacy: HIPAA and Business Associate Agreements
  • § 14:1 : Introduction14-1
  • § 14:2 : HIPAA Jurisdiction, Applicability, and Enforcement14-2
    • § 14:2.1 : Preemption and “Reverse Preemption”14-2
    • § 14:2.2 : Who Must Comply with HIPAA?14-3
      • [A] : Covered Entities14-3
      • [B] : Business Associates14-4
    • § 14:2.3 : Enforcement14-4
  • § 14:3 : HIPAA Privacy and Security Requirements14-5
    • § 14:3.1 : Privacy Standards14-5
      • [A] : Permitted Uses and Disclosures14-5
      • [B] : Individual Rights14-6
      • [C] : Administrative Requirements14-6
    • § 14:3.2 : Security Standards14-6
      • [A] : Administrative Safeguards14-6
      • [B] : Physical Safeguards14-8
      • [C] : Technical Safeguards14-9
      • [D] : Policies and Procedures and Documentation Requirements14-10
  • § 14:4 : Business Associate Agreements14-10
  • § 14:5 : Breach Notification14-12
Chapter 15: Privacy: Gramm-Leach-Bliley Act
  • § 15:1 : Introduction15-2
  • § 15:2 : Overview of the Gramm-Leach-Bliley Act15-2
    • § 15:2.1 : Legislative History and Structure15-2
    • § 15:2.2 : Select Definitions15-3
      • [A] : Consumers and Customers15-3
      • [B] : Financial Institutions15-3
      • [C] : Nonpublic Personal Information15-4
      • [D] : Personally Identifiable Financial Information15-4
  • § 15:3 : The Privacy Rule15-5
    • § 15:3.1 : Purpose and Overview15-5
    • § 15:3.2 : Required Privacy Notices and Opt-Out Rights15-5
    • § 15:3.3 : Section 14 and 15 Exceptions to the Notice and Opt-Out Requirements15-5
    • § 15:3.4 : Section 13 Exceptions to the Opt-Out Requirements15-6
    • § 15:3.5 : Limits on the Reuse and Redisclosure of NPI15-7
      • [A] : Restrictions on Reuse and Redisclosure If NPI is Received Under the Section 14 Or 15 Exceptions15-7
      • [B] : Restrictions on Reuse and Redisclosure If NPI is Not Received Under the Section 14 or 15 Exceptions15-7
    • § 15:3.6 : Applicability to Colleges and Universities15-7
  • § 15:4 : The Safeguards Rule15-8
    • § 15:4.1 : Overview15-8
    • § 15:4.2 : Required Elements for Information Security Program15-8
Chapter 16: Privacy: Children’s Online Privacy Protection Act
  • § 16:1 : Introduction16-2
  • § 16:2 : Overview of the Children’s Online Privacy Protection Act16-2
    • § 16:2.1 : Purpose; FTC Rules16-2
    • § 16:2.2 : General Requirements16-2
    • § 16:2.3 : Who Must Comply with COPPA?16-3
    • § 16:2.4 : Covered Online Services16-4
    • § 16:2.5 : Key Definitions16-5
      • [A] : “Personal Information”16-5
      • [B] : “Directed to Children”16-6
      • [C] : “Actual Knowledge”16-6
      • [D] : “Collection”16-7
      • [E] : “Disclosure”16-7
      • [F] : “Operator”16-7
  • § 16:3 : Notice16-8
    • § 16:3.1 : Website Privacy Notice16-8
    • § 16:3.2 : Direct Notice to Parent16-9
  • § 16:4 : Verifiable Parental Consent16-9
    • § 16:4.1 : Requirements16-9
    • § 16:4.2 : Methods16-9
    • § 16:4.3 : Exceptions16-10
  • § 16:5 : Confidentiality, Security, and Integrity Procedures16-10
  • § 16:6 : Enforcement16-11
    • § 16:6.1 : Jurisdiction16-11
    • § 16:6.2 : Penalties for Violations16-11
    • § 16:6.3 : Safe Harbor Provision16-11
Chapter 17: State Transaction Taxes; and Appendices 17A-17F
  • § 17:1 : Overview17-2
    • § 17:1.1 : Sales Tax Versus Use Tax17-3
    • § 17:1.2 : Goods and Services Subject to State Sales Tax17-3
      • [A] : Tangible Personal Property: Hardware and Software17-3
      • [B] : Specifically Enumerated Services17-3
    • § 17:1.3 : Streamlined Sales Tax Project17-4
  • § 17:2 : Software17-4
    • § 17:2.1 : Licenses17-5
    • § 17:2.2 : Digital Downloads17-5
    • § 17:2.3 : Canned Software Versus Custom Software17-6
  • § 17:3 : Services Relating to Software17-6
    • § 17:3.1 : Consulting and Training Services17-6
    • § 17:3.2 : Installation and Configuration of Software17-6
    • § 17:3.3 : Maintenance Services17-7
    • § 17:3.4 : Software Modification Services17-7
    • § 17:3.5 : Services Provided by Software Vendor17-7
      • [A] : Services Integral to Sale of Software17-7
      • [B] : Services Separately Identifiable and Bargained For17-8
    • § 17:3.6 : Services Provided by Third Party17-8
  • § 17:4 : Cloud Computing and Software As a Service17-8
    • § 17:4.1 : Overview of State Sales Tax Implications17-10
    • § 17:4.2 : Software, Service, or Software As a Service17-10
      • [A] : Service17-11
      • [B] : Software License—Tangible Personal Property17-11
    • § 17:4.3 : Situs and Sourcing17-11
  • § 17:5 : Nexus and Multistate Use Considerations17-12
    • § 17:5.1 : Nexus Standards17-12
    • § 17:5.2 : Software Licenses and Service Agreements—Situs and Sourcing17-13
      • [A] : User Licenses17-13
      • [B] : Master License—Unlimited Users17-14
      • [C] : Delivery Location17-14
      • [D] : Installation Location17-14
      • [E] : Use Location17-14
      • [F] : Benefit Location17-15
      • [G] : Agreement and Other Records17-15
  • § 17:6 : Considerations for Specific Industries and Businesses17-16
    • § 17:6.1 : Software Developers17-17
      • [A] : Generally17-17
      • [B] : Custom Programming17-17
    • § 17:6.2 : Manufacturers17-18
    • § 17:6.3 : Software Resellers and Sellers17-18
    • § 17:6.4 : Service Providers17-19
  • Appendix 17A : Streamlined Sales Tax Project MembershipApp. 17A-1
  • Appendix 17B : Sales Tax Base—Installation ChargesApp. 17B-1
  • Appendix 17C : Sales Tax Treatment of Certain Technology ItemsApp. 17C-1
  • Appendix 17D : Establishment of NEXUSApp. 17D-1
  • Appendix 17E : Sourcing TreatmentApp. 17E-1
  • Appendix 17F : Sales and Use Tax Credits and Incentives for Technology InvestmentsApp. 17F-1
  Index

  Please click here to view the latest update information for this title: Last Update Information  
 

Share
Email
UPKEEP SERVICE
Your purchase will also sign you up for “Upkeep Service,” whereby you will receive future automatic shipments of updates, new editions and supplements to this edition, as they become available, for a 30-day preview. Updates, new editions and supplements published within 90 days of your purchase will be issued free of charge; all other updates will be subject to an additional charge if kept beyond the preview period, invoiced at the time of delivery. This service will continue until canceled by you at any time. See here.
“Mark Malven’s Technology Transactions book has helped expedite our software agreements drafting and negotiation process.  Mark provides a balanced perspective on market terms & conditions and practical advice that empowers legal professionals to minimize redlines and expedite negotiations.”
Director of Legal, LLamasoft, Inc.


  • FOLLOW PLI:
  • twitter
  • LinkedIn
  • GooglePlus
  • RSS

All Contents Copyright © 1996-2017 Practising Law Institute. Continuing Legal Education since 1933.

© 2017 PLI PRACTISING LAW INSTITUTE. All rights reserved. The PLI logo is a service mark of PLI.