The Briefing: Court Says “No Way” To 50 Cent’s Battle Over Skill House
From Rent to Rights: Building a Solid Lease Abstract
Protect Yourself and Your Business with Indemnification Understanding
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Nonprofit Basics: Grant Agreement Best Practices
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
Money-Saving Licensing Tips for Startups
Impuesto de Timbre: Cuantía indeterminada
Expert or Arbitrator? — PE Pathways Podcast
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
The real estate development and construction industry has traditionally been driven by brick, mortar, and manpower. Yet, in today’s market, technology has become just as important a building block as concrete. From...more
Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more
Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users. The vendor suffered a data breach...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
Draft Kings and Fan Duel, competing daily fantasy sports (DFS) sites, have been vying for attention by flooding the airwaves with a reported 60,000 commercials this year. However, a recent data leak has resulted in less...more
The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more