The Briefing: Court Says “No Way” To 50 Cent’s Battle Over Skill House
From Rent to Rights: Building a Solid Lease Abstract
Protect Yourself and Your Business with Indemnification Understanding
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Nonprofit Basics: Grant Agreement Best Practices
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
Money-Saving Licensing Tips for Startups
Impuesto de Timbre: Cuantía indeterminada
Expert or Arbitrator? — PE Pathways Podcast
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
Artificial intelligence (AI) is transforming the way companies develop, deploy, and license technology. But with that transformation comes new intellectual property (IP) challenges that extend far beyond traditional software...more
A proposed class action lawsuit filed against Empower last month highlights the importance for 401(k) plan fiduciaries to carefully negotiate their services agreements with recordkeepers and other services providers. The...more
Imagine signing off on an update to your customer support portal and later discovering that an AI agent the development team added to the portal has been quietly sending snippets of support tickets to an unsecured LLM for...more
This update is part of our AI FAQ Series. Learn more at our AI Law Center. What questions should I ask before using an AI tool? There are a number of questions that should be considered before using an AI tool, including: (1)...more
Artificial intelligence, generative AI, machine learning, large language models and similar technologies (“AI”) are quickly becoming a mainstay of business software. There is no doubt that AI has endless possibilities as it...more
As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more
In the fast-evolving world of software licensing, mobile app, and software-as-a-service (SaaS) agreements, your end user license agreement (EULA) or end user customer agreement is more than a formality. It is a risk...more
Contract Law is a foundational first year course in any law school. As fledgling lawyers everywhere know, when they come out of law school and prepare for the bar exam, contracts form a critical component of our global...more
In an era where digital threats are more sophisticated than ever, cybersecurity has become a pressing concern for family enterprises. These businesses are attractive targets for cyberattacks and need to balance the critical...more
Negotiating a data processing agreement (DPA) is typically a necessary step when engaging vendors that handle personal data. However, these negotiations have become time consuming and complex, given the evolving privacy...more
Sports sponsorship contracts traditionally focus on category exclusivity and entitlements while overlooking data sharing language. However, with the rapid evolution of data usage in the industry, incorporating data sharing...more
Generative AI (GenAI) vendors, models, and uses cases are not created equal. Model providers must be trusted to handle sensitive data. Models, like tools in a toolbox, may be better suited for some jobs than others. Use cases...more
Are you using artificial intelligence in your business operations? Do you have AI embedded in the goods and services you offer customers? The regulatory framework applicable to AI continues to develop, including across US...more
The Department of Justice’s National Security Division (NSD) released several documents on April 11, 2025, to assist entities that must comply with the Final Rule regulating or prohibiting the transfer of bulk U.S. sensitive...more
The integration of artificial intelligence (AI) tools in healthcare is revolutionizing the industry, bringing efficiencies to the practice of medicine and benefits to patients. However, the negotiation of third-party AI tools...more
Artificial intelligence (AI) is reshaping the future of manufacturing. As manufacturing operations shift back to the U.S. in response to recent tariff policies, general counsels (GCs) in the manufacturing sector face a...more
During the course of 2024, interest in generative and other types of artificial intelligence, machine learning and predictive applications and services (collectively, AI) accelerated across industries. Some sectors, such as...more
Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users. The vendor suffered a data breach...more
The tightening of privacy and data protection compliance obligations in Canada and the United States, has led to increasingly comprehensive “data security and privacy” representations and warranties in purchase agreements, as...more
As the new year begins, prudent service providers will review and consider updating their contract forms to ensure they align with the company's strategic goals and comply with any current or upcoming laws and regulations. ...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
Cannabis businesses have cyber security and privacy risks. While the risks are varied, many arise from the businesses’ holding of highly sensitive consumer information or confidential data about business partners. Cannabis...more
Employers’ engagement and use of various types of vendors has expanded recently, to include vendors who assist with office re-entry screening and contact tracing as employees return to work during the COVID-19 pandemic. ...more
Some interesting links we found across the web this week: How Enforceable is Your Non-Compete Clause? Courts frequently hold non-compete clauses, that state that an individual cannot compete with a certain company in a...more