
- 376 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry. These trends include:
-
- The Dawn of the "As-Is" Technology Product
-
- The Ever-Changing Product
-
- Where in the World Is My Data?
To meet these challenges, the Second Edition helps business managers and lawyers explore alternate solutions from other vendors, conduct simultaneous negotiations with other vendors, and, generally, ensure prospective vendors understand they can "lose the deal" if they refuse to act reasonably.
Distilling the most critical business and legal lessons learned through the author's decades of legal experience drafting and negotiating IT-related agreements, this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues, the book:
-
- Contains checklists to help readers organize key concepts for ready reference
-
- Supplies references to helpful online resources and aids for contract drafting
-
- Includes a complete glossary that defines key legal, business, and technical terms
Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1
CHECKLIST
- ā” Marshal basic information
- ā” Value of proposed transaction?
- ā” Term of agreement?
- ā” Criticality of technology to business?
- ā” Unique regulatory issues?
- ā” Other foundational information?
- ā” Circulate a ādeal memoā
- ā” Circulate a āterm sheetā
- ā” What is the deal about?
- ā” Business advantage from contract?
- ā” Use nontechnical English
- ā” Anticipated duration of contract
- ā” Desired renewal terms
- ā” Duration of services rendered
- ā” License for years or perpetual?
- ā” Renewal rights
- ā” Costs for renewal
- ā” Compensation to vendor
- ā” Breakdown of first-year fees
- ā License
- ā Professional services
- ā Implementation
- ā Customization
- ā Hardware
- ā Telecommunication
- ā” If no fees, good faith estimate
- ā” When to use customerās form
- ā” Customer-facing application?
- ā” Location for service performance?
- ā” Offshore vendor?
- ā” Vendor uses offshore partners/affiliates?
- ā” Vendor uses subcontractors? If so, who?
- ā” Location for vendor performance?
- ā” Vendor provides hosting services?
- ā” Will the customer want to own vendor-created IP?
- ā” Vendor cannot share with competitors?
- ā” Vendor cannot share with industry?
- ā” Vendor has access to sensitive IP?
- ā” Vendor access to personally identifiable information?
- ā” What information is at risk?
- ā” Financial account information?
- ā” Health information?
- ā” Social Security Numbers?
- ā” Legal and regulatory requirements
- ā” Transmission across international borders
- ā” Vendor access to sensitive customer data?
- ā” Cloud computingābased service?
- ā” Hosting service?
- ā” Is vendor sole custodian of customer data?
- ā” Vendorās financial situation is suspect
- ā” Vendor is subject of litigation
- ā” Vendor had recent security breach
- ā” Performance constraints
- ā” Substantial regulatory/compliance issues
Overview
Key Considerations
- ā Executive description of engagement. Write a sentence or two describing in plain, nontechnical English what the deal is about, including a clear statement establishing the business advantage to be gained by entering into the contract. For example, āThe license of a new expense tracking application designed to identify duplicate expenses more readily. Expected cost savings are projected to be $500,000 per year.ā This type of description helps all those involved in the process immediately understand the nature of the transaction.
- ā Useful life. Establish the anticipated duration of the contract, including desired renewal terms. In particular, if professional services will be rendered, what is the expected duration of those services (e.g., if software will be implemented, the duration of that implementation)? Will services take only a few weeks or will the services extend over many months? The longer the term of services, the greater the need for contractual protections relating to project management and cost control. Similarly, if a license is being granted, is the software being licensed for a term of years or perpetually? If for a term of years, the agreement should address renewal rights and the costs for renewal, including price protection for those renewals. Technology is constantly involving. In many cases, leading-edge products today are yesterdayās news in just a few years. This is why many technology agreements generally have relatively short initial terms (e.g., 2ā5 years). The customer needs the ability to move to the next ābig thingā and not be tied to outdated technology.
- ā Expected fees. Describe the compensation due to the vendor over the life of the contract, inclu...
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Acknowledgments
- About the Author
- Preface to the First Edition
- Preface to the Second Edition
- 1 Collecting Basic Deal Information
- 2 Software License Agreements
- 3 Nondisclosure Agreements
- 4 Professional Services Agreements
- 5 Statements of Work
- 6 Cloud Computing Agreements
- 7 Click-Wrap, Shrink-Wrap, and Web-Wrap Agreements
- 8 Maintenance and Support Agreements
- 9 Service Level Agreements
- 10 Idea Submission Agreements
- 11 Joint Marketing Agreements
- 12 Software Development Kit (SDK) Agreements
- 13 Key Issues and Guiding Principles for Negotiating a Software License or OEM Agreement
- 14 Drafting OEM Agreements (When the Company Is the OEM)
- 15 Original Equipment Manufacturer (OEM) Agreements
- 16 Health Insurance Portability and Accountability Act (HIPAA) Compliance
- 17 Reducing Security Risks in Information Technology Contracts
- 18 Website Assessment Audits
- 19 Critical Considerations for Protecting IP in a Software Development Environment
- 20 Transactions Involving Financial Services Companies as the Customer
- 21 Source Code Escrow Agreements
- 22 Integrating Information Security into the Contracting Life Cycle
- 23 Distribution Agreements
- 24 Data Agreements
- 25 Website Development Agreements
- 26 Social Media Policies
- 27 Critical Considerations for Records Management and Retention
- Glossary
- FFIEC Booklet
- Index