A Guide to IT Contracting
eBook - ePub

A Guide to IT Contracting

Checklists, Tools, and Techniques

  1. 376 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

A Guide to IT Contracting

Checklists, Tools, and Techniques

About this book

Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry. These trends include:



  • The Dawn of the "As-Is" Technology Product


  • The Ever-Changing Product


  • Where in the World Is My Data?

To meet these challenges, the Second Edition helps business managers and lawyers explore alternate solutions from other vendors, conduct simultaneous negotiations with other vendors, and, generally, ensure prospective vendors understand they can "lose the deal" if they refuse to act reasonably.

Distilling the most critical business and legal lessons learned through the author's decades of legal experience drafting and negotiating IT-related agreements, this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues, the book:



  • Contains checklists to help readers organize key concepts for ready reference


  • Supplies references to helpful online resources and aids for contract drafting


  • Includes a complete glossary that defines key legal, business, and technical terms

Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access A Guide to IT Contracting by Michael R. Overly in PDF and/or ePUB format, as well as other popular books in Business & IT Industry. We have over one million books available in our catalogue for you to explore.

Information

Edition
2
Subtopic
IT Industry

Chapter 1

Collecting Basic Deal Information

CHECKLIST

Basic Principles
  • ā–” Marshal basic information
  • ā–” Value of proposed transaction?
  • ā–” Term of agreement?
  • ā–” Criticality of technology to business?
  • ā–” Unique regulatory issues?
  • ā–” Other foundational information?
  • ā–” Circulate a ā€œdeal memoā€
  • ā–” Circulate a ā€œterm sheetā€
Describe the Engagement
  • ā–” What is the deal about?
  • ā–” Business advantage from contract?
  • ā–” Use nontechnical English
Useful Life
  • ā–” Anticipated duration of contract
  • ā–” Desired renewal terms
  • ā–” Duration of services rendered
  • ā–” License for years or perpetual?
  • ā–” Renewal rights
  • ā–” Costs for renewal
Expected Fees
  • ā–” Compensation to vendor
  • ā–” Breakdown of first-year fees
    • – License
    • – Professional services
    • – Implementation
    • – Customization
    • – Hardware
    • – Telecommunication
  • ā–” If no fees, good faith estimate
  • ā–” When to use customer’s form
Performance
  • ā–” Customer-facing application?
  • ā–” Location for service performance?
  • ā–” Offshore vendor?
  • ā–” Vendor uses offshore partners/affiliates?
  • ā–” Vendor uses subcontractors? If so, who?
  • ā–” Location for vendor performance?
  • ā–” Vendor provides hosting services?
Intellectual Property
  • ā–” Will the customer want to own vendor-created IP?
  • ā–” Vendor cannot share with competitors?
  • ā–” Vendor cannot share with industry?
  • ā–” Vendor has access to sensitive IP?
Personal Information
  • ā–” Vendor access to personally identifiable information?
  • ā–” What information is at risk?
  • ā–” Financial account information?
  • ā–” Health information?
  • ā–” Social Security Numbers?
  • ā–” Legal and regulatory requirements
  • ā–” Transmission across international borders
Information Security
  • ā–” Vendor access to sensitive customer data?
  • ā–” Cloud computing–based service?
  • ā–” Hosting service?
  • ā–” Is vendor sole custodian of customer data?
Unique Issues
  • ā–” Vendor’s financial situation is suspect
  • ā–” Vendor is subject of litigation
  • ā–” Vendor had recent security breach
  • ā–” Performance constraints
  • ā–” Substantial regulatory/compliance issues

Overview

Before any proposed technology contract can be reviewed, certain basic information about the deal must be marshaled. This includes the value of the proposed transaction, the term of the agreement, the criticality of the technology to the business, how long to implement, unique regulatory issues (e.g., is sensitive personally identifiable data at risk?), and other foundational information. While this process may seem self-evident, it is common for businesses to rush forward in the review of a proposed technology contract without this critical information.
In our experience, moving forward without a clear understanding of the ā€œdealā€ can result in misunderstandings with the vendor, failure to achieve an adequate and appropriate contract, delays in negotiations, and increased costs. For example, it would likely not be appropriate to require the same level of contractual protection in a $20,000 off-the-shelf license agreement as one would require in a $20 million custom software development deal for a critical client-facing application. Similarly, it would probably not be fruitful to propose extensive information security language in a contract that does not involve highly sensitive information. Finally, it would be all but impossible to impose one-off service level obligations in a small, noncritical Application Service Provider (ASP) deal, but those obligations may well be entirely appropriate in a large-scale transaction.
While the foregoing may seem obvious, we frequently see businesses proposing contract terms that are inappropriate for the contemplated engagement. In most cases, the problem arises from a failure to assess the transaction adequately from the outset. The reason for that failure is almost always a lack of clear foundational information about the transaction.
In this chapter, we identify key areas for which information should be obtained and understood before any review of draft contracts commences. By assessing this information, businesses can make more informed decisions about their proposed technology engagements and ensure their contracts are appropriate to those engagements. This list is not intended to be exhaustive. Other issues unique to a particular transaction or business should be added and, of course, the vendor should conduct appropriate due diligence.
Many businesses now require the foregoing information to be recorded in an internal ā€œdeal memoā€ and circulated to all relevant stakeholders (e.g., risk management, legal counsel, information security, and, of course, senior decision-makers). The deal memo is different from and should not be confused with a ā€œterm sheet,ā€ which is designed to summarize the business terms of the deal. The term sheet will be circulated between the vendor and the customer. The deal memo is intended to be a purely internal document to educate relevant company stakeholders regarding the transaction. An example deal memo is provided at the end of the chapter.

Key Considerations

  • ā–  Executive description of engagement. Write a sentence or two describing in plain, nontechnical English what the deal is about, including a clear statement establishing the business advantage to be gained by entering into the contract. For example, ā€œThe license of a new expense tracking application designed to identify duplicate expenses more readily. Expected cost savings are projected to be $500,000 per year.ā€ This type of description helps all those involved in the process immediately understand the nature of the transaction.
  • ā–  Useful life. Establish the anticipated duration of the contract, including desired renewal terms. In particular, if professional services will be rendered, what is the expected duration of those services (e.g., if software will be implemented, the duration of that implementation)? Will services take only a few weeks or will the services extend over many months? The longer the term of services, the greater the need for contractual protections relating to project management and cost control. Similarly, if a license is being granted, is the software being licensed for a term of years or perpetually? If for a term of years, the agreement should address renewal rights and the costs for renewal, including price protection for those renewals. Technology is constantly involving. In many cases, leading-edge products today are yesterday’s news in just a few years. This is why many technology agreements generally have relatively short initial terms (e.g., 2–5 years). The customer needs the ability to move to the next ā€œbig thingā€ and not be tied to outdated technology.
  • ā–  Expected fees. Describe the compensation due to the vendor over the life of the contract, inclu...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Acknowledgments
  8. About the Author
  9. Preface to the First Edition
  10. Preface to the Second Edition
  11. 1 Collecting Basic Deal Information
  12. 2 Software License Agreements
  13. 3 Nondisclosure Agreements
  14. 4 Professional Services Agreements
  15. 5 Statements of Work
  16. 6 Cloud Computing Agreements
  17. 7 Click-Wrap, Shrink-Wrap, and Web-Wrap Agreements
  18. 8 Maintenance and Support Agreements
  19. 9 Service Level Agreements
  20. 10 Idea Submission Agreements
  21. 11 Joint Marketing Agreements
  22. 12 Software Development Kit (SDK) Agreements
  23. 13 Key Issues and Guiding Principles for Negotiating a Software License or OEM Agreement
  24. 14 Drafting OEM Agreements (When the Company Is the OEM)
  25. 15 Original Equipment Manufacturer (OEM) Agreements
  26. 16 Health Insurance Portability and Accountability Act (HIPAA) Compliance
  27. 17 Reducing Security Risks in Information Technology Contracts
  28. 18 Website Assessment Audits
  29. 19 Critical Considerations for Protecting IP in a Software Development Environment
  30. 20 Transactions Involving Financial Services Companies as the Customer
  31. 21 Source Code Escrow Agreements
  32. 22 Integrating Information Security into the Contracting Life Cycle
  33. 23 Distribution Agreements
  34. 24 Data Agreements
  35. 25 Website Development Agreements
  36. 26 Social Media Policies
  37. 27 Critical Considerations for Records Management and Retention
  38. Glossary
  39. FFIEC Booklet
  40. Index