Blogs

 

IBM’s Standard Audit Clause is a Time Bomb

Comments (0)
It is standard practice for software vendors to include clauses in their license agreements giving the vendors the right to invoke audits or some other mechanisms to ensure that the licensed products are used in...

Be Wary of Audit Tools Promoted by Software Auditors

Comments (0)
Most companies with more than a handful of computers in their IT environments rely on the results of network-inventory tools to gather the deployment data needed for accurate software audits. Without the tools, a business...

Articles

 

How MSPs Can Limit Legal Liability

Comments (0)
MSPAlliance, 1/16/20 Managed services providers today need protection more than ever. That’s because MSPs face more risks—not only cybersecurity and data privacy challenges, but compliance, profitability, technology and vendor issues, along with increased competition.

Presentations

 

Limitations of Liability in AI Contracts

Comments (0)
Thomson Reuters and Celesq Webinar May 19, 2020 Adoption of AI technology within a business carry’s unique risks not present on premises software or non-AI based cloud solutions. It is common for technology vendors to...

Podcasts



Listen to Our Latest Podcasts

Videos

 

5 IP Protections for AI Contracts

Comments (0)
Speaker: Robert J. Scott Date: March 4, 2020 Time: 11:00 am – 12:00 pm Central Artificial intelligence (“AI”) is reshaping the business of IT from the farms to the trading desks on Wall Street. Gartner...

News

 

Products Liability and Kaseya’s Ransomware Attack

Comments (0)
The recent ransomware attack involving Kaseya’s VSA product has left managed service providers (“MSPs”) and end users evaluating what, if any, legal recourse they may have against Kaseya. The onerous limitations of liability provisions and...

Kaseya Ransomware Attack: Does Negligence in Security Affect Liability?

Comments (0)
Kaseya, a large technology solutions company, recently reported that its on-premises VSA product was the “victim of a sophisticated cyberattack.” (See generally, Kaseya’s announcements here). Specifically, third-parties were able to access computer endpoints using Kaseya’s...