Friday, 11 October 2024
Home
News
Regions
Africa
Asia
Canada
Caribbean
Europe
Latin America
Oceania
United Kingdom
United States
Select a Country
Finance
Top 10s
Calendar
Archives
Authors
Associations
Subscribe
Search:
Friday, 11 October 2024
Mark Grossman Article Archive
Mark Grossman has contributed 191 articles published on the iGaming News site.
Source Code Escrow
(
12 June 2008
)
Here's a nightmare you'll wish would end with you waking up. Your company spends $500,000 to license some software. Then the company you paid half a million dollars to goes bankrupt. Now you have $500,000 worth of orphaned software. I'll take a rain check on being you while you're explaining this one to the board.
Letters of Intent
(
15 April 2008
)
After almost two decades of practicing law, I'm still amazed at the number of legal fallacies that even sophisticated business people have about doing deals and properly documenting them. A prominent fallacy is that Letters of Intent (LOI) are always nonbinding.
More on the Art and Science of Negotiation
(
1 February 2008
)
Over the years I've offered occasional columns on the art and science of negotiation, and I thought it was time for another installment of my negotiations tips.
Web Site Hosting Agreements
(
13 April 2007
)
Once you've built your company's Web site, you have to deal with hosting it. You could have your in-house IT folks handle it, but many companies will choose to outsource hosting.
Contract Negotiation Crucial Before Website Development
(
2 April 2007
)
It's a nightmare scenario. You're in charge of your company's major Web site redesign project and the site is horrendous. Even your mother hates it. As you consider where to mail your resume, you might want to consider what you'd do differently next time.
One-Size-Fits-All Approach to Tech Contracts Will Fail
(
16 March 2007
)
Horribly written contracts for tech deals cross my desk every day. They are lawsuits waiting to happen.
Consider Letters of Intent Carefully
(
15 February 2007
)
Letters of Intent are always non-binding documents. My clients are always telling me this. Apparently, it's what their Uncle Charlie told them. I have nothing against Uncle Charlie, but he's wrong. A Letter of Intent (LOI) could be the beginning of the end.
The 'Norms' of IT Contracting
(
19 December 2006
)
The world of computers and information technology (IT) has developed some unusual norms in warranties and allocating risk. In other industries, they might seem absurd, but not in IT. As long as you understand the significance of the way IT contracts are done, you can come to a fair deal.
Disaster Recovery
(
29 September 2006
)
Fire, earthquake, hurricane, flood, terrorism and sabotage are just a few of the ways that you could lose your entire computer operation almost instantly. Is your business prepared for these possibilities?
Preventing Computer Crime
(
29 August 2006
)
Hollywood and newspapers love computer crime. It sells tickets and newspapers. For movies, it's an area that's ripe for artistic license since so few people understand the realities surrounding computer crime. Words like "password sniffers," "Trojan horses," "denial of service," and "salami attacks" attract attention. This column will define some of the terms that people use in the computer crime area and make some suggestions that will reduce the possibility of you becoming a victim.
Negotiating Computer Contracts
(
2 June 2006
)
Custom Software - Part II
(
19 May 2006
)
Custom Software
(
28 April 2006
)
A Scarlet Letter for Your Company
(
15 April 2006
)
Computer Law 101 and Four Rules for Effective E-mai
(
29 December 2005
)
More on Hidden Information on your Computer (Part II)
(
21 October 2005
)
Did Katrina Destroy Your Disaster Plan?
(
27 September 2005
)
Searching a Computer System
(
2 September 2005
)
Internet Access Policies
(
28 July 2005
)
Software Audits
(
13 May 2005
)
Too Quick to Sign
(
4 February 2005
)
Letters of Intent
(
7 January 2005
)
Software Licensing
(
17 December 2004
)
Computer Law 101
(
26 November 2004
)
Tech Vocabulary
(
5 November 2004
)
Contract Management Software
(
22 October 2004
)
Spyware
(
11 October 2004
)
Outsourcing
(
17 September 2004
)
Document/Data Retention Policy
(
27 August 2004
)
Clickwrap and Browsewrap Agreements
(
13 August 2004
)
Disaster Recovery
(
2 July 2004
)
Evaluating a Possible Lawsuit
(
18 June 2004
)
Digital Record Keeping
(
7 May 2004
)
Project Scope Creep
(
2 April 2004
)
Hack Attacks
(
20 February 2004
)
Legalized 'Spam'
(
6 February 2004
)
Spyware
(
30 January 2004
)
Poachers Capture Old Domain Names
(
23 January 2004
)
Tech Matters and Employees
(
16 January 2004
)
Predicting Trends for the New Year
(
26 December 2002
)
Digital Broadcast Flags
(
5 December 2002
)
Instant Messenger in the Office
(
14 November 2002
)
Working with RFPs
(
31 October 2002
)
The Art of Writing E-mail, Part I
(
24 October 2002
)
The Time is Right for Your Startup
(
26 September 2002
)
Online Privacy Is a Business Issue
(
19 September 2002
)
Implementation Phase
(
5 September 2002
)
Web Bugs
(
25 July 2002
)
Domain Name Disputes
(
4 July 2002
)
Negotiating Tech Deals
(
20 June 2002
)
Starting a Business
(
30 May 2002
)
Privacy Policy Online and Offline
(
23 May 2002
)
Metadata
(
16 May 2002
)
Disaster Planning
(
2 May 2002
)
Web Site Development Agreements
(
11 April 2002
)
Invisible Trademarks?
(
4 April 2002
)
Fine Print Needs Careful Review
(
28 March 2002
)
Custom Software Development
(
21 March 2002
)
Software Development Agreements
(
14 March 2002
)
Enron and Data Destruction
(
7 March 2002
)
New Anti-Terrorism Law
(
28 February 2002
)
Planning for the End of Your Contracts
(
21 February 2002
)
Contract Management Software
(
14 February 2002
)
Clients Beware: Lawyers Tell Jokes Too
(
3 January 2002
)
Common Misconceptions about Tech Law
(
27 December 2001
)
Forming Contracts Online
(
20 December 2001
)
Make Sure Your SLA Is A-OK
(
13 December 2001
)
Pretexting Breaks Laws
(
6 December 2001
)
It's All About Privacy Laws
(
29 November 2001
)
More Negotiating Power
(
22 November 2001
)
E-mail Etiquette Is Important
(
25 October 2001
)
Analyze Contract Before Calling Lawyer
(
18 October 2001
)
Internet Gambling and the Law
(
4 October 2001
)
Thwart CyberTerrorism with Planning
(
27 September 2001
)
Source Code Escrow
(
20 September 2001
)
Nondisclosure Agreements Are Tricky
(
30 August 2001
)
Negotiation as a Team
(
23 August 2001
)
Digital Copyright Issues
(
16 August 2001
)
Letters of Intent
(
9 August 2001
)
Outsourcing Business Technology
(
26 July 2001
)
Hefty Penalty for Using Unlicensed Software
(
19 July 2001
)
More on the Art of Negotiation
(
21 June 2001
)
Dot-biz: The Next Big Thing in Web Names?
(
14 June 2001
)
International Business on the Web
(
7 June 2001
)
The First Amendment and Internet Broadcasting
(
31 May 2001
)
Audits Can Evaluate ASP's Security Measures
(
24 May 2001
)
Improve Your Negotiating Skills
(
17 May 2001
)
Don't Accept Limits on the Other Party's Liability
(
3 May 2001
)
Electronic Evidence Never Dies
(
26 April 2001
)
Employee Surfing Strategies
(
12 April 2001
)
Slow Economy Will Increase Litigation
(
5 April 2001
)
Regulating E-Business Breeds Confidence
(
29 March 2001
)
Exit Strategies
(
15 March 2001
)
e-Signatures Are Safe
(
8 March 2001
)
Internet Micropayments
(
22 February 2001
)
Money for Start-ups
(
8 February 2001
)
Document Retention Policy
(
1 February 2001
)
Joint Application Development
(
18 January 2001
)
Copyright Laws on the Internet
(
11 January 2001
)
Legal Implications of Domain Names
(
28 December 2000
)
Web Hosting Agreements
(
21 December 2000
)
Carnivore Fights Online Crime
(
7 December 2000
)
Benefits Lure Top-Notch Employees
(
30 November 2000
)
Contract Negotiation Crucial before Website Development
(
23 November 2000
)
Staying out of Trouble Online
(
16 November 2000
)
Apps on Tap
(
9 November 2000
)
Hacker Kid
(
2 November 2000
)
Amazon and Privacy
(
26 October 2000
)
Business Plans
(
19 October 2000
)
What is 'Tech Law' Anyway?
(
12 October 2000
)
One-Size-Fits-All Approach to Tech Contracts Will Fail
(
5 October 2000
)
Project Scope Creep
(
28 September 2000
)
Consider Letters of Intent Carefully
(
21 September 2000
)
The 'Norms' of IT Contracting
(
12 September 2000
)
Cybertips -- A Domain Name Scam
(
6 September 2000
)
Foreign Domains
(
1 September 2000
)
Online Profiling
(
22 August 2000
)
A Privacy Update
(
18 August 2000
)
Cybertips--Liability for Poor Computer Security
(
15 August 2000
)
Accepting Credit Card Payments Online
(
3 August 2000
)
Electronic Signatures
(
21 July 2000
)
Liability for You if You're Hacked
(
30 June 2000
)
Technology Insurance
(
20 June 2000
)
Linking to Other Websites - the Ticketmaster Case
(
13 June 2000
)
Incubators and Venture Capita
(
30 May 2000
)
Trade Secrets in a Dot Com World
(
23 May 2000
)
Software and Intellectual Property
(
11 May 2000
)
Encryption Regulation
(
5 May 2000
)
Negotiating for Tech Goods & Services
(
27 April 2000
)
Getting to the VCs with Money
(
20 April 2000
)
Venture Capital and Business Plans
(
13 April 2000
)
Time to Ban the Spam from Inboxes
(
6 April 2000
)
Valuation and Venture Capita
(
23 March 2000
)
Raising Venture Capita
(
9 March 2000
)
Contracting via the Click
(
3 March 2000
)
Net Jurisdiction
(
31 January 2000
)
Cybersquatting
(
21 January 2000
)
Protecting Your Intellectual Property
(
22 December 1999
)
Safe from Copyright Law
(
15 December 1999
)
Bad Contracts; A Lawyer's Lament
(
11 December 1999
)
Encryption and E-Commerce
(
5 November 1999
)
Digital Documents and Lawsuits
(
28 October 1999
)
CyberTips - Copyright Registration
(
25 October 1999
)
Privacy Policies Online
(
21 October 1999
)
Online Sweepstakes
(
16 October 1999
)
The Achilles Heal of E-Commerce
(
12 October 1999
)
Government Monitoring of Computers
(
17 September 1999
)
What is Cyberlaw?
(
8 September 1999
)
Staying out of Trouble Online
(
1 September 1999
)
New Federal Y2K Act
(
17 August 1999
)
Contracting for an E-Commerce Website
(
11 August 1999
)
Protecting Your Company from Hackers
(
5 August 1999
)
Linux and Open Source Software
(
29 July 1999
)
Cybertip: A Review of LapLink Professiona
(
20 July 1999
)
CyberTip: A Review of Timeslips
(
28 June 1999
)
Credit Cards Online
(
24 June 1999
)
Defamation and Copyright Infringement Online
(
16 June 1999
)
New Y2K Law in Florida
(
8 June 1999
)
Spam and Privacy
(
27 May 1999
)
Employees, the Net, and Trouble
(
24 May 1999
)
Y2K and PCs
(
21 May 1999
)
Disaster Recovery
(
17 May 1999
)
Competition in the Domain Game Is on the Horizon
(
15 April 1999
)
Legal Issues Regarding Defective Software
(
3 April 1999
)
An Overview of Y2K Concerns
(
27 March 1999
)
Will the Pentium III Rob You of Your Privacy?
(
2 March 1999
)
'Cyberterrorism' is Here to Stay
(
17 February 1999
)
Insurance For Technology Contracts
(
2 February 1999
)
Many Options Available for Online Commerce
(
29 January 1999
)
Preparing Your Operation to Prevent Computer Crime
(
26 January 1999
)
Website Legal Audits
(
4 January 1999
)
Copyright Law Mechanics
(
13 December 1998
)
Internet Jurisdiction
(
13 December 1998
)
Legal Discovery Should Focus on Electronic Evidence
(
26 November 1998
)
If I have a Subpoena Giving Me Access to an Adversary's Computer, Where Do I Look for Hidden Information?
(
24 November 1998
)
Intellectual Property Issues
(
5 November 1998
)
Spam - The Bane of the Internet
(
3 November 1998
)
Source Code Escrow
(
1 October 1998
)
Addressing Economic Espionage
(
30 September 1998
)
Tricks and Tips of the Trade
(
9 September 1998
)
Concerns over Internet Investment Fraud
(
26 August 1998
)
Domain Name Disputes
(
26 August 1998
)
What is Cyber Law?
(
20 July 1998
)
So, You're ready for Year 2000...what about the other guy?
(
30 June 1998
)
Net Gambling Update
(
25 June 1998
)
The Law of Domain Names
(
26 May 1998
)
Custom Software Development (Part II)
(
22 May 1998
)
Custom Software Development
(
14 May 1998
)
How To Create A Contract Using Email And Digital Signatures
(
6 May 1998
)
Trade Secrets and the Internet
(
6 May 1998
)
Internet Gambling--Computer Law Tip
(
21 April 1998
)
Please enter your email address below and press the subscribe button.
Email:
Confirm
Search Articles: