×







We sell 100% Genuine & New Books only!

A Guide to IT Contracting Checklists Tools and Techniques 2013 Edition at Meripustak

A Guide to IT Contracting Checklists Tools and Techniques 2013 Edition by Michael R. Overly, Matthew A. Karlyn , Taylor & Francis

Books from same Author: Michael R. Overly, Matthew A. Karlyn

Books from same Publisher: Taylor & Francis

Related Category: Author List / Publisher List


  • Price: ₹ 13212.00/- [ 13.00% off ]

    Seller Price: ₹ 11494.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Michael R. Overly, Matthew A. Karlyn
    PublisherTaylor & Francis
    ISBN9781439876572
    Pages448
    BindingHardback
    LanguageEnglish
    Publish YearFebruary 2013

    Description

    Taylor & Francis A Guide to IT Contracting Checklists Tools and Techniques 2013 Edition by Michael R. Overly, Matthew A. Karlyn

    Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements.In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready referenceSupplies references to helpful online resources and aids for contract drafting Includes a CD-ROM with reusable checklists and complete glossary that defines key legal, business, and technical termsCostly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation. Table of contents :- Nondisclosure Agreements Checklist Overview Key Considerations Essential Terms Additional Considerations Summary Professional Services Agreements Checklist Overview Preliminary Considerations Key Provision Term and Termination Acceptance Testing Personnel Subcontracting Warranties Indemnification Limitation of Liability Intellectual Property Ownership Change Order Confidentiality and Information Security Force Majeure Nonsolicitation Insurance Fees and Costs Relationship to Other Agreements SummaryStatements of WorkChecklistOverviewScope of Work and Business RequirementsTechnical EnvironmentAcceptance TestingDeliverablesDocumentationRoles and Responsibilities of the PartiesProject Management ProcessesIssue Resolution and Escalation ProceduresRisksPricing and CostService Level AgreementsChange OrdersSummaryIdea Submission AgreementsChecklistOverviewKey Risks of SubmissionsKey Provisions for Idea Submission AgreementsBeware Reverse SubmissionsSummaryCloud Computing AgreementsChecklistKey ConsiderationsService LevelsUptime Service LevelResponse Time Service LevelProblem Resolution Service LevelRemedies for Service Level FailureDataData SecurityDisaster Recovery and Business ContinuityData RedundancyUse of Customer Information, Data Conversion, and TransitionInsuranceIndemnificationLimitation of LiabilityThe Limitation of Liability Should Apply to Both PartiesLicense/Access Grant and FeesTermWarrantiesPublicity and Use of the Customer TrademarksNotification for Security IssuesAssignmentPre-Agreement Vendor Due DiligenceConclusionJoint Marketing AgreementsChecklistOverviewKey Issues and Guiding PrinciplesDetermine the Scope of the EngagementMarketing ObligationsReferral ArrangementsConfidentialityIntellectual Property IssuesWarranties and DisclaimersTerm and TerminationSummarySoftware Development Kit (SDK) AgreementsChecklistOverviewKey Issues and Guiding PrinciplesDetermine What Should Be Included in the SDKScope of LicenseOwnershipConfidentialityCompatibility TestingSupportWarranty DisclaimersLimitations on LiabilityIndemnificationExport/ImportAcquisition by Federal GovernmentTerm and TerminationSummaryOriginal Equipment Manufacturer (OEM) Development AgreementsChecklistOverviewKey Issues and Guiding PrinciplesJoint Development AgreementsDevelopment and Professional Services AgreementsExchange of IPConfidentialityCompensation/Fees/Revenue ShareChange of ControlAssumptions/OEM Customer ObligationsMarketingEnd User License AgreementAudit RightsWarrantiesSupport and MaintenanceLimitations of LiabilityIndemnificationTerminationContract NegotiationsSummaryHealth Insurance Portability and Accountability Act (HIPAA) ComplianceChecklistOverviewKey Issues and Guiding PrinciplesWho Are BAs?What Can Happen to BAs That Fail to Comply with HIPAA?BA Requirements Under the New Security Breach Notification RequirementsBA Requirements for Compliance with HIPAA Security RuleStatutory Liability for Business Associate Agreement TermsBAA Compliance with HITECH Act RequirementsOther New HIPAA RequirementsSteps for Compliance for Breach NotificationSteps for Compliance with HIPAA Security RuleAmendment of BAAsConsiderations for Inventory HIPAA-Related PoliciesSummaryKey Issues and Guiding Principles for Negotiating a Software License or OEM AgreementChecklistKey Issues and Guiding PrinciplesInitial MattersScope of License/OwnershipPricingAudit RightsLimitations of LiabilityWarrantiesSupport and Maintenance; Professional Service RatesPaymentTerm and TerminationInfringement IndemnificationSummaryDrafting OEM Agreements (When the Company is the OEM)ChecklistKey Issues and Guiding PrinciplesDetermine the Scope of the EngagementCustomer TermsTerritoryHardware ProductsExclusivitySupplier Product ChangesSupport and TrainingConfidentialityIntellectual Property IssuesWarranties and DisclaimersLimitations of LiabilityIndemnificationTerm and TerminationSummaryCollecting Basic Deal InformationChecklistOverviewKey ConsiderationsPerformanceIntellectual Property IssuesPersonal Information Privacy and SecurityInformation SecurityOther Unique IssuesSummaryReducing Security Risks in Information Technology ContractsChecklistBest Practices and Guiding PrinciplesTrade Secret ConsiderationsCopyright ConsiderationsJoint IP ConsiderationsPolicy on Embedded Open SourceInternal ProceduresPolicies Following InfringementEmployeesEmployee Training and CommunicationContractual ProtectionsNonemployees and SubcontractorsSoftware DistributionObject Code vs. Source CodeLanguage for License AgreementsNondisclosure AgreementsAudit RightsForeign JurisdictionsSource Code LicensesEscrow the Source CodeLanguage for Source Code License AgreementsSummaryWebsite Assessment AuditsChecklistOverviewKey Issues and Guiding PrinciplesEvaluate Your WebsiteDomain NamesUse of Third Party TrademarksHyperlinksContentVisitor Uploads?Applicable Internet Specific LawsTerms and ConditionsData Security and PrivacyInsuranceGeneral ConsiderationsSummaryCritical Considerations for Protecting IP in a Software Development EnvironmentChecklistOverviewKey Issues and Guiding PrinciplesVendor Due DiligenceTreatment of DataPhysical SecurityAdministrative SecurityTechnical SecurityPersonnel SecuritySubcontractorsScan for ThreatsBack-up and Disaster RecoveryConfidentialitySecurity AuditsWarrantiesLimitation of LiabilityDestruction of DataAdditional ConsiderationsSummaryClick-Wrap, Shrink-Wrap, and Web-Wrap AgreementsChecklistOverviewWhat Is a "Shrink-Wrap" License?Products Purchased Under Shrink-Wrap Agreements-Common ElementsMethods of Purchasing Shrink-Wrap ProductsTypical Shrink-Wrap Terms and ConditionsKey Risks of Shrink-Wrap ProductsMitigating RiskConclusionTransactions Involving Financial Services Companies as the CustomerChecklistOverviewThree Tools for Better ContractsKey ConsiderationsSummaryMaintenance and Support AgreementsChecklistOverviewScope of Support and MaintenancePredictability of FeesSupport Not to be WithheldTermPartial Termination/Termination and Resumption of SupportSpecificationsAvailabilitySupport EscalationService LevelsSummarySource Code Escrow AgreementsChecklistOverviewWhat Does It Mean to Escrow Source Code?Types of Escrow AgreementsRelease ConditionsKey Issues for Escrow AgreementsConclusionIntegrating Information Security into the Contracting Life CycleChecklistOverviewDue Diligence: The First ToolKey Contractual Protections: The Second ToolInformation Security Requirements Exhibit: The Third ToolConclusionSoftware Development Kit (DSDK) AgreementsChecklistOverviewKey Contracting Concerns From the Perspectives of Both PartiesLicensor ConcernsLicensee ConcernsConclusionDistribution AgreementsChecklistOverviewKey Issues for Distribution AgreementsLicense GrantEnd User License AgreementDevelopment of the ProductEnd User DataObligations of the PartiesProduct PricingAdditional ConsiderationsSummaryData AgreementsChecklistOverviewKey Contractual ProtectionsConclusionService Level AgreementsChecklistOverviewService Level Provisions Commonly Found in the Terms and ConditionsRoot Cause Analysis, Corrective Actions Plans, and ResolutionCost and Efficiency ReviewsContinuous Improvements to Service LevelsTermination for Failure to Meet Service LevelsCooperationService Level Provisions Commonly Found in a Service Level Agreement or AttachmentMeasurement Window and Reporting RequirementsMaximum Monthly at-Risk AmountPerformance CreditsPresumptive Service LevelsExceptions to Service LevelsSupplier Responsibilities with Respect to Service LevelsAdditions, Deletions, and Modifications to Service LevelsEarn-backForm of Service LevelsConclusionCritical Considerations for Records Management and Retention ChecklistIntroductionAvoiding Spoliation ClaimsImpact on Litigation/Discovery CostsDeveloping the PolicyLitigation Discovery ProceduresDeveloping The Retention ScheduleThe E-Mail ProblemAuthorized Storage LocationsConfidentiality and SecurityThird-party VendorsProper DestructionWebsite Development AgreementsChecklistOverviewInitial Issues to Think AboutWhat Are the Basic Objectives of the Website and the Development Agreement?Intellectual Property OwnershipSoftware RequirementsSchedules and TimetablesTerm and TerminationFees and ChargesProject ManagementAcceptance TestingWarrantiesIndemnificationsContent of the WebsiteLinking IssuesInsuranceReports, Records, and AuditsTraining/Education/TroubleshootingAdditional Provisions to ConsiderSummarySocial Media PoliciesChecklistIntroductionPolicy Scope and DisclaimersNo Expectation of PrivacyRight, But No Duty, to MonitorConduct in Social MediaSocial Networking and WeblogsEmployee Questions and SignatureConclusionSoftware License AgreementsChecklistIntroductionFour Critical QuestionsLicense and RestrictionsAcceptance TestingThird-party SoftwareFeesWarrantiesIndemnificationLimitation of LiabilitySpecificationsConfidentiality and SecurityMaintenance and SupportAnnouncements and PublicityTerm and TerminationAdditional Contract TermsConclusionGlossaryFFIEC BookletIndexshow more



    Book Successfully Added To Your Cart