The Briefing: Court Says “No Way” To 50 Cent’s Battle Over Skill House
From Rent to Rights: Building a Solid Lease Abstract
Protect Yourself and Your Business with Indemnification Understanding
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Nonprofit Basics: Grant Agreement Best Practices
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
Money-Saving Licensing Tips for Startups
Impuesto de Timbre: Cuantía indeterminada
Expert or Arbitrator? — PE Pathways Podcast
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
While external cyber threats make headlines, the reality is that your biggest risk often comes from within. For North Carolina businesses, from tech startups in Durham to manufacturers in Greensboro, understanding how to...more
Imagine signing off on an update to your customer support portal and later discovering that an AI agent the development team added to the portal has been quietly sending snippets of support tickets to an unsecured LLM for...more
The rapid integration of artificial intelligence (AI) across industries is reshaping how businesses operate, particularly within the transportation sector. One area seeing significant transformation is equipment leasing and...more
L’attribution de la responsabilité dans les contrats relatifs aux technologies en cas d’atteintes à la protection des données est une préoccupation croissante pour les entreprises canadiennes. Récemment, Blakes a publié la...more
The International Swaps and Derivatives Association (ISDA) recently announced the launch of the ISDA Notices Hub and the ISDA 2025 Notices Hub Protocol....more
Allocating liability for data breaches in technology contracts is a growing concern for Canadian businesses. Blakes recently launched the first edition of the Canadian Data Liability Study, which identifies and analyzes...more
On July 16, 2025, the International Swaps and Derivatives Association launched the ISDA Notices Hub, a centralized online platform designed to make the process of delivering, receiving, and updating certain notices under the...more
Commission Delegated Regulation (EU) 2025/532 has been published in the Official Journal of the European Union. The Delegated Regulation supplements the Digital Operational Resilience Act (DORA) with regard to regulatory...more
According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more
In an era where digital threats are more sophisticated than ever, cybersecurity has become a pressing concern for family enterprises. These businesses are attractive targets for cyberattacks and need to balance the critical...more
The demand for data centers is continuing to accelerate, fueled largely by generative artificial intelligence (Gen AI), broader digital transformation, and organizations migrating to cloud infrastructure. Gen AI adoption...more
Artificial intelligence (AI), machine learning algorithms, and other emerging technologies impact nearly every business and industry. The rapid deployment of Generative AI (GenAI) is reshaping how organizations do business...more
Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more
As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more
The digital revolution has fundamentally changed the way businesses and individuals conduct transactions. Electronic contracts and electronic signatures have become vital to modern commerce, enabling efficiency and...more
In this podcast, the hosts discuss the importance of managing third-party risk for financial institutions. They highlight how institutions rely on external providers for technological innovation and operational support, but...more
In the current, highly competitive, business landscape, businesses face the challenge of optimizing efficiency, enhancing productivity, and reducing costs, all while maintaining the quality of their services. One of the...more
The hospitality industry will need to focus on several key areas to ensure compliance and minimize risk in the year ahead, including data privacy and cybersecurity protections, employment and labor law compliance, and even...more
As we have previously explored, litigation involving account takeovers (“ATOs”) and business email compromise (“BEC”) fraud have produced a muddled legal landscape. As between payors and intended payees, courts have tended to...more
In the interconnected, global business environment, trade secret information regularly crosses international boundaries, and trade secret misappropriation can occur anywhere in the world. Trade secret holders should thus...more
The Digital Operational Resilience Act (DORA) establishes a harmonised and comprehensive framework for information and communication technology (ICT) risk management in the financial sector. It is a directly applicable EU...more
The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
During times of economic turbulence and commercial uncertainty, your business team and corporate counsel are well advised to undertake a more deliberate and thorough due diligence process when entering into contract and...more