Scott & Scott, LLP - Articles

Scott Technology Attorneys

Articles


SSLLP Interior
Software Asset Management: Getting Started

Being unprepared for just one software license audit will convince any organization to invest in a software asset management (SAM) system and to gain the skills to use it. Maintenance is less expensive than an audit fire drill, Robert J. Scott says, and far less disruptive to the organization.

Read Article

Managing Software License Disputes: Cooperation or Litigation

Cooperate or litigate? That’s the question company executives must answer when software publishers claim that the company is violating the terms of its software licenses. In our experience, the best strategy depends on a variety of legal and business factors. This article discusses common software dispute resolution frameworks and concludes that a combined approach of cooperation and preparation for litigation usually leads to the most favorable outcome for clients.

Read Article

The Business Impact of Data Breach

 Reports of corporate data breachcontinue to pass through news headlines with such frequency that they barely merit a time slot in the evening news. However in 2006, as many as 9,300,000 Americans were victims of identity theft. According to the Better BusinessBureau, each victim lost on average more than $6,300 and over 40 hours on thephone with creditors and credit bureaus working to clear their names.Businesses suffer greatly as well, losing a collective $50 million each year asa result of data breach.

Read Article

Defending Enterprise Clients in Publisher Software Audits

While publishers may have targeted smaller and nonstrategic customers in the past, many large enterprises are encountering software-compliance audits from publishers they consider strategic partners.

Read Article

Understanding the Legal Risks of Cloud Computing

Cloud computing can deliver greater speed, flexibility, and tangible IT cost savings; three reasons why businesses should not disregard the cloud as hype. But entering into cloud computing contracts without understanding the inherent risks can cripple an otherwise healthy organization. The significant network security and data privacy risks associated with cloud services should be addressed through proper contracting and risk transfer using insurance.

Read Article

IBM Virtualization; Five Hidden Costs

Many enterprises are exploring virtual technology as a way to reduce both hardware and software technology costs related to IBM solutions. For disaster recovery, security, and resource allocation purposes, virtualization can present an attractive solution. However many organizations might reconsider virtualization if the stakeholders realized the total costs before deploying virtualized solutions.

Read Article

Drafting Contracts for the Cloud

Drafting Contracts for the Cloud

Read Article

7 Software Audit Secrets

I am a lawyer that represents businesses in software audit cases initiated by software publishers and their trade groups including Business Software Alliance and the SIIA. I work with a team of lawyers and technology professionals defending software license disputes involving Microsoft, IBM, Autodesk, Oracle and Adobe. My clients range from global multinational corporations navigating enterprise agreements to small architectural firms targeted by Autodesk. Here are the secrets that I have learned in over 300 software audit cases across the United States, Canada and South America.

Read Article

The Art of the Deal: A Guide to M&A Strategies for the Managed Services Profession

The Art of the Deal: A Guide to M&A Strategies for the Managed Services Profession

Read Article

Time for trademark counsel to get their heads into the cloud

Cloud computing creates many legal issues, from jurisdictional questions to privacy and security concerns. For brand owners, the cloud can be an especially frustrating place, but by understanding the legal and business issues involved, IP risks can be balanced and mitigated.

Read Article

Winning the War Against Digital Espionage and Data Privacy Leaks

A company needs to protect its confidential or trade-secret information from disclosure by employees and outsiders. Failing to implement appropriate safeguards may lead to important business data falling into the hands of those who would use it for malicious purposes. But, there are limits to what a company trying to protect its data can do. Exceeding those limits may lead to a court finding that the company’s program is unenforceable or, worse, that it constitutes an actionable breach of employee rights.

Read Article

Art of the Deal

The Art of the Deal: A Guide to M&A Strategies for the Managed Services Profession

Read Article

A.M. Best Insurance Law Podcast

Podcast in which Rob Scott answers questions on insurance law issues—defending IP and technology claims—from John Czuba, Editor of  Best’s Directory of Recommended Insurance Attorneys, and Brendan Noonan, of Best’s communication team.

Read Article

Program Pirates: Steering Clear of Software Audits

Imagine you head a small company, with just a few dozen employees and computers. One day you receive a letter from a software industry trade group, such as the Business Software Alliance (BSA) or the Software & Information Industry Association (SIIA), informing you that it knows your company has unlicensed—or illegal—software within the network. They tell you to audit your whole system for improperly licensed software and hand over detailed results

Read Article

Hot Topics in Open Source Software Licensing

Businesses and software developers who incorporate new or pre-existing open-source software (OSS) code as part of their hardware or software solutions are on the leading edge of a new dynamic in software licensing. Where the historical, proprietary model was based on protection and enforcement of the original developer’s ability to control how and by whom the software could be copied or modified, the new framework is based instead on protection and enforcement of subsequent developers’ and users’ abilities to freely copy, modify and re-distribute the original work.

Read Article

Privacy, Network Security, and the Law

Data breach paper discussing legal issues in network security and data privacy.  Since California took the lead and enacted SB 1386, many states have followed suit and enacted similar legislation. While many state data breach noticication laws are similar, the laws contain varying definitions of personal information. The laws also provide for different types of notification after a data breach security breach. 

Read Article

Laptop Data Breaches

Since February 2005, the identities of approximately 93 million people have been exposed because of data leaks.1 Ponemon Institute conducted a recent survey of almost 500 corporate information technology departments regarding the security risks associated with portable devices, such as laptops, personal data assistants (PDAs) and USB memory sticks. Ponemon reported that 81 percent of respondents have experienced a lost or stolen laptop or portable storage device. 

Read Article

Managing Software License Disputes

Software audit strategy article. When company executives are approached by software publishers who claim that the companies are violating the terms of their software licenses, they often wonder whether they should cooperate or dig in and prepare for litigation.

Read Article

Ethical Considerations for Attorneys in Responding to a Data-Security Breach

Attorneys are increasingly confronting the significant ethical issues raised when a data-security breach occurs. Many traps exist for the unwary in this newly evolving area of the law, where the applicable statutes have yet to be interpreted by the courts and e-discovery concerns abound. This article provides a legal framework in this area of the law and explores ethical considerations arising when an attorney represents a client that has suffered a data-security breach.

Read Article

Complying with the GLBA Privacy and Safeguards Rules

In 2006 an estimated 9 million American adults were the victims of identity fraud at a total cost of $56.6 billion.2 There are a number of legislative efforts designed to protect the privacy, security, and confidentiality of customer data. One such law, the Gramm-Leach-Bliley Act (the “GLBA”), also known as the Financial Services Modernization Act of 1999, effectively repealed the Banking Act of 1933 and amended the Bank Holding Company Act of 1956.

Read Article

Choosing and Challenging Venue in a Patent Case

Properly selected, the litigation forum can set the tone for an entire patent infringement case. There are many positives and negatives attached to every venue forum, and they differ depending on the party and perspective. For the individual inventor, a “rocket-docket” forum, like the Eastern District of Virginia or the Eastern District of Texas, or the newly available federal pilot program districts that are trying to duplicate the rocket-docket formula, can mean imposing early and strict case discipline, reigning in the paper chase, and placing David and Goliath on equal footing

Read Article

Check Those Credit Card Receipts: A FACTA Primer

A once fairly obscure law regarding credit card receipts has recently become a serious issue for numerous businesses. Consumers are becoming more aware of their data privacy rights, and attorneys have filed numerous lawsuits across the country based on alleged violations of Fair and Accurate Transaction Act of 2003 (“FACTA”). Attorneys representing any company that accepts credit cards should learn about FACTA, their clients’ potential exposure, and ways in which liability can be avoided. Businesses that handle a wide range of consumer information should also be advised regarding the effects of the FACTA Disposal Rule, another provision intended to lessen the possibility of identity theft.

Read Article

Attorney Malpractice Claims Regarding Patents

Patent infringement litigation article.  According to the Federal Circuit, a state-law claim that an attorney committed legal malpractice in connection with patent prosecution or patent litigation must be heard in federal court even when there is no diversity jurisdiction and all the claims are based on state law. The decision may impact malpractice claims in other areas as well, given the court’s pronouncement that “a federal court ought to be able to hear claims recognized under state law that nonetheless turn on substantial questions of federal law.

Read Article

Managed Services Legal Guide

If you offer or are planning to offer managed services, it is important to select the right entity structure and work with experienced counsel to construct agreements with your employees, customers, and partners. This document identifies the legal issues facing MSPs from their inception, outlines strategic objectives, and provides sample contractual provisions used to achieve those objectives. 

Read Article

Some Software Police Tactics are Questionable

Over the past several years, software trade associations like the Business Software Alliance and the Software & Information Industry Association have aggressively pursued businesses around the nation, accusing them of software piracy. The outcome of this pursuit for many enterprises is significant fine money, the need to purchase additional software licenses at inflated prices and meaningful damage to their brands.

Read Article

Software Licensing: A Legal, Not Technology Issue

The Business Software Alliance is aggressively going after small and mid-size businesses, accusing them of software piracy. Many businesses are already under investigation, and facing potentially steep fines and bad publicity that could hurt their reputation with customers and business partners.

Read Article

Understanding the Connection Between Software Compliance and Sarbanes-Oxley

Most public companies treat SOX compliance and Software License Compliance as separate initiatives and rarely understand that compliance with SOX Section 404 is impossible without the tools, processes, and expertise necessary to achieve and maintain software compliance.

Read Article

Successfully Defending Software Audits

Shrinking IT budgets and fierce competition among software publishers have created explosive growth in the incidence and frequency of software audits—a mechanism by which software publishers investigate their customers to determine if they are in compliance with software licenses and copyright laws. In addition to developing internal enforcement operations, many publishers have engaged trade associations to perform enforcement activity under power of attorney.

Read Article

Jurisdictional Issues on the Frontiers of Cyberspace

While companies and individuals around the globe struggle to identify and understand the various regulations and laws that can be brought into play due to the international nature of the internet, courts are also struggling with new and complex issues of personal jurisdiction raised by internet activity.

Read Article

Avoiding Spoliation Sanctions Under the New Federal Rules of Civil Procedure

While the new federal rules governing electronic discovery appear on the surface to offer parties a relatively simple means of avoiding discovery sanctions should discoverable electronic information be destroyed, the new rules, in reality, are not so simple.

Read Article

Does the Constitution Protect the Privacy of E-mails?

A government investigation of the company responsible for those ubiquitous “Enzyte” commercials and an indictment of individuals operating a lab manufacturing Ecstasy have given two federal appellate courts the opportunity to consider the privacy of e-mail communications.

Read Article

Beware of the License Police

Shrinking IT budgets, fierce competition and a mature software market have increased the motivation for software publishers (such as Microsoft Corp., Adobe Systems Inc., Oracle) to conduct software licensing audits -- investigating their customers to determine if they have purchased enough licenses.

Read Article