Latest Posts › Software

Share:

Stop the Virus: Negotiating No Virus Warranties in Outsourcing and Licensing Agreements

An essential feature for customers in outsourcing software licensing and arrangements is the provision of robust protection against any software that could embed and distribute malware. To address these concerns, the...more

Back to Basics: The Use and Purpose of Defined Terms

There are many basic contracting principles that can help streamline and create a readable and clear contract, including the proper use of defined terms. Consistent with the phrase, a defined term is a word or term, often...more

DHS Guidelines for IoT Device Security

In a recent post, we noted that the US federal government has become increasingly concerned about the security of Internet of Things (IoT) devices. On November 15, the US Department of Homeland Security (DHS) issued guidance...more

Data Breach Trends

Verizon’s annual report investigating data breach information finds that phishing—which it defines as malicious correspondence involving a link or attachment to install malware on the victim’s computer or system—is still the...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide