SlideShare a Scribd company logo
1 of 10
The Law
Technology, Copyright, and Intellectual Property
• What Is Technology Law?
• Some Copyright Law Mechanics
• Intellectual Property Due Diligence
Contracts and Contracting
Laws, Issues, and Tips
 Working With Requests For Proposals
 Exit Strategies
 Forming Contracts Online
 Letters Of Intent: Proceed With Caution
 Confidentiality Agreements
 The Norms Of It Contracting
 Don’t Accept Limits On Another Party’s Liability
 Contract Management Software
 Analyze Contracts Before Calling Your Lawyer
 Plan For The End Of Your Contracts
The Internet: E-Commerce,
Legalities, and Getting Paid
 Everything You Need To Know When Doing Business Online
 Click-wrap And Browse-wrap Agreements
 Make Sure Your Sla Is Ok
 Fine Print Needs Careful Review
 One-Size-Fits-All Approach To Tech Contracts Will Fail
 Legal Implications For Domain Names: Disputes And Resolutions
 Domain-Name Poaching
 Online Dispute Resolution
 Gripe Sites
Managing IT and Software
 Joint Application
Development
 Project Scope Creep
 Source Code Escrow
 Document Retention Policies
 Electronic Evidence
 Creating A Data Retention
Policy
 Enron And Data Destruction
 Disaster Planning
 Preventing Disaster Liability
Websites
Development and
Upkeep, Laws,
Issues, and
Solutions
• Website Owners
• Custom Software
• Bad Tech Support: How To
Manage And Enforce It
• Website Hosting
Agreements
• Website Audits
• Website Legal Compliance
• Create A Web-wrap
Agreement
• International Business On
The Web
Employees’ Rights,
Obligations, and
Pitfalls in
Litigation
• Rules In The Office
• Email Etiquette Is
Important
• Instant Messenger In The
Office
• Employees And
Technology
• Employee Surfing
Strategies
• Social Networks In The
Office
• Blogging Risks
• Your Blog And Your Job
• Corporate Blogging
Piracy and Crime
 Hefty Penalty For Using
Unlicensed Software
 Defending Yourself From
The Business Software
Alliance
 Software Audits
 Preventing Computer Crime
 Economic Espionage
 Cyberstalking And
Cyberterrorism: Terror And
Minimizing Its Risks
Privacy, Policy, and Encryption
It’s All About Privacy
Privacy Policy Online
And Offline
Negotiations
Policies, Procedures, and
Suggestions
 The Art Of Negotiation: Improving Negotiating Skills Online And Beyond
 More On The Art Of Negotiation
 More Negotiating Power
 Negotiating Tech Deals
 Tips On Negotiating Tech Deals
 Negotiating As A Team
 Outsourcing Business Technology
 Tips For Tech Purchases
 Keep Tech Lawyer On The Company Team
History,
Background,
Thoughts, and
Legal
Considerations
• Voting Over The Internet
• Nanotechnology
• Starting A Business
• Money For Start-Ups:
Raising Venture Capital
• Business Plans
• Clients Beware

More Related Content

What's hot

Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
mcgilla
 
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law PracticeShift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Clio - Cloud-Based Legal Technology
 

What's hot (20)

Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Cyber security and fl data breach
Cyber security and fl data breachCyber security and fl data breach
Cyber security and fl data breach
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal Environment
 
Build your own virtual law firm
Build your own virtual law firmBuild your own virtual law firm
Build your own virtual law firm
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law PracticeShift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
Shift to Mobile Legal Services: Building Mobile Solutions Into Your Law Practice
 
Security Basics for Law Firms
Security Basics for Law FirmsSecurity Basics for Law Firms
Security Basics for Law Firms
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Game changing legislation
Game changing legislationGame changing legislation
Game changing legislation
 

Viewers also liked

Viewers also liked (6)

Introduction to Legal Technology, lecture 1 (2015)
Introduction to Legal Technology, lecture 1 (2015)Introduction to Legal Technology, lecture 1 (2015)
Introduction to Legal Technology, lecture 1 (2015)
 
Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)Introduction to Legal Technology, lecture 2 (2015)
Introduction to Legal Technology, lecture 2 (2015)
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
Formação 3 - Escola Teresa Francescuti
Formação 3 - Escola Teresa FrancescutiFormação 3 - Escola Teresa Francescuti
Formação 3 - Escola Teresa Francescuti
 
Tutorial para ingresar al planificdor de proyectos en @prender
Tutorial para ingresar al planificdor de proyectos en @prenderTutorial para ingresar al planificdor de proyectos en @prender
Tutorial para ingresar al planificdor de proyectos en @prender
 
Terry Dunlap Interview On How A Hacker Makes Over $88,312 With Email
Terry Dunlap Interview On How A Hacker Makes Over $88,312 With EmailTerry Dunlap Interview On How A Hacker Makes Over $88,312 With Email
Terry Dunlap Interview On How A Hacker Makes Over $88,312 With Email
 

Similar to Sakitha hall slideshare

Similar to Sakitha hall slideshare (20)

Everything you should know about cyber Lawyer
Everything you should know about cyber Lawyer Everything you should know about cyber Lawyer
Everything you should know about cyber Lawyer
 
CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBA
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
Sakitha hall chapter 5 websites
Sakitha hall chapter 5 websitesSakitha hall chapter 5 websites
Sakitha hall chapter 5 websites
 
Systemising advice
Systemising adviceSystemising advice
Systemising advice
 
Designing GDPR compliant services in AWS
Designing GDPR compliant services in AWSDesigning GDPR compliant services in AWS
Designing GDPR compliant services in AWS
 
GDPR for WordPress - Impacts & Solutions
GDPR for WordPress - Impacts & SolutionsGDPR for WordPress - Impacts & Solutions
GDPR for WordPress - Impacts & Solutions
 
SmartLaw - The future of law
SmartLaw - The future of lawSmartLaw - The future of law
SmartLaw - The future of law
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Ed Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital worldEd Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital world
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
LPO- all in one legitimate service Providers
LPO- all in one legitimate service ProvidersLPO- all in one legitimate service Providers
LPO- all in one legitimate service Providers
 
Andy Hepburn Value Proposition
Andy Hepburn Value PropositionAndy Hepburn Value Proposition
Andy Hepburn Value Proposition
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Casl 2012 Final
Casl 2012 FinalCasl 2012 Final
Casl 2012 Final
 
CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?CAN SPAM Legislation: Is your organization ready?
CAN SPAM Legislation: Is your organization ready?
 

More from SAKITHA HALL (10)

Chapter 8 Handouts, Study Guides, and Visuals
Chapter 8 Handouts, Study Guides, and VisualsChapter 8 Handouts, Study Guides, and Visuals
Chapter 8 Handouts, Study Guides, and Visuals
 
Chapter 6 SlideShare
Chapter 6 SlideShareChapter 6 SlideShare
Chapter 6 SlideShare
 
Chapter 4 TECHNOLOGIES FOR DISTANCE EDUCATION
Chapter 4 TECHNOLOGIES FOR DISTANCE EDUCATIONChapter 4 TECHNOLOGIES FOR DISTANCE EDUCATION
Chapter 4 TECHNOLOGIES FOR DISTANCE EDUCATION
 
Sakitha Hall Chapter 1 Foundations of Distance Education
Sakitha Hall Chapter 1 Foundations of Distance EducationSakitha Hall Chapter 1 Foundations of Distance Education
Sakitha Hall Chapter 1 Foundations of Distance Education
 
Chapter 1 Foundations of Distance Education
 Chapter 1 Foundations of Distance Education Chapter 1 Foundations of Distance Education
Chapter 1 Foundations of Distance Education
 
Developing Assessment Instruments
Developing Assessment InstrumentsDeveloping Assessment Instruments
Developing Assessment Instruments
 
Sakitha hall module 4
Sakitha hall module 4Sakitha hall module 4
Sakitha hall module 4
 
Sakitha hall module 4
Sakitha hall module 4Sakitha hall module 4
Sakitha hall module 4
 
Sakitha Hall Slideshare
Sakitha Hall Slideshare Sakitha Hall Slideshare
Sakitha Hall Slideshare
 
Sakitha hall slideshare
Sakitha hall slideshareSakitha hall slideshare
Sakitha hall slideshare
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Sakitha hall slideshare

  • 1. The Law Technology, Copyright, and Intellectual Property • What Is Technology Law? • Some Copyright Law Mechanics • Intellectual Property Due Diligence
  • 2. Contracts and Contracting Laws, Issues, and Tips  Working With Requests For Proposals  Exit Strategies  Forming Contracts Online  Letters Of Intent: Proceed With Caution  Confidentiality Agreements  The Norms Of It Contracting  Don’t Accept Limits On Another Party’s Liability  Contract Management Software  Analyze Contracts Before Calling Your Lawyer  Plan For The End Of Your Contracts
  • 3. The Internet: E-Commerce, Legalities, and Getting Paid  Everything You Need To Know When Doing Business Online  Click-wrap And Browse-wrap Agreements  Make Sure Your Sla Is Ok  Fine Print Needs Careful Review  One-Size-Fits-All Approach To Tech Contracts Will Fail  Legal Implications For Domain Names: Disputes And Resolutions  Domain-Name Poaching  Online Dispute Resolution  Gripe Sites
  • 4. Managing IT and Software  Joint Application Development  Project Scope Creep  Source Code Escrow  Document Retention Policies  Electronic Evidence  Creating A Data Retention Policy  Enron And Data Destruction  Disaster Planning  Preventing Disaster Liability
  • 5. Websites Development and Upkeep, Laws, Issues, and Solutions • Website Owners • Custom Software • Bad Tech Support: How To Manage And Enforce It • Website Hosting Agreements • Website Audits • Website Legal Compliance • Create A Web-wrap Agreement • International Business On The Web
  • 6. Employees’ Rights, Obligations, and Pitfalls in Litigation • Rules In The Office • Email Etiquette Is Important • Instant Messenger In The Office • Employees And Technology • Employee Surfing Strategies • Social Networks In The Office • Blogging Risks • Your Blog And Your Job • Corporate Blogging
  • 7. Piracy and Crime  Hefty Penalty For Using Unlicensed Software  Defending Yourself From The Business Software Alliance  Software Audits  Preventing Computer Crime  Economic Espionage  Cyberstalking And Cyberterrorism: Terror And Minimizing Its Risks
  • 8. Privacy, Policy, and Encryption It’s All About Privacy Privacy Policy Online And Offline
  • 9. Negotiations Policies, Procedures, and Suggestions  The Art Of Negotiation: Improving Negotiating Skills Online And Beyond  More On The Art Of Negotiation  More Negotiating Power  Negotiating Tech Deals  Tips On Negotiating Tech Deals  Negotiating As A Team  Outsourcing Business Technology  Tips For Tech Purchases  Keep Tech Lawyer On The Company Team
  • 10. History, Background, Thoughts, and Legal Considerations • Voting Over The Internet • Nanotechnology • Starting A Business • Money For Start-Ups: Raising Venture Capital • Business Plans • Clients Beware