Guidance for key emerging technologies, such as AI, NFTs, the Metaverse and autonomous vehicles, explaining both how the technologies work and the key legal regimes (existing and new) that apply to their operation.
Core content for all TMT lawyers, this topic contains key 'go-to' precedents and practice notes at the route of most TMT related issues. Some of most popular areas are the software and cloud computing topics.
Our content covers simple outsourcing transactions as well as those with a more complex structure, and the impact of hyperscalers and recognised market practice relating to the negotiation and drafting of affected terms.
Whether you're advising on adtech, cookies or NFTs, Lexis+® TMT has the know-how and tools to help you succeed.
Law360, London: Trade unions representing more than 230,000 US singers and performers cannot overturn secondary legislation that restricts their right...
Ofcom has collaborated with international online safety regulators through the Global Online Safety Regulators Network (GOSRN), which has published a...
Ofcom has launched an investigation into Meta Platforms Inc (Meta) to examine whether it failed to meet its obligations when responding to information...
MLex: The European Commission has proposed binding rules under a revised Cybersecurity Act to force telecom operators and other priority sectors to...
Welcome to this week’s edition of the TMT weekly highlights: a hand-picked summary of news analysis, updates and new content from across the...
Expert determinationExpert determination is a form of alternative dispute resolution (ADR). This Practice Note explains expert determination for...
How to manage consent—personal dataThis Practice Note is intended for private-sector commercial organisations in the UK. It sets out expectations of...
Copyright infringementThe Copyright, Designs and Patents Act 1988 (CDPA 1988) gives the copyright owner exclusive rights in the UK to carry out...
Standard terms and conditions—advantages and disadvantagesThis Practice Note considers why businesses use standard terms and conditions (T&C, Ts&Cs,...
UK media content regulationThis Practice Note provides an overview of media content regulation in the UK. The main media regulators are as...
Consumer reviews policyThis Policy provides information on what is and is not allowed when you submit a review for publication on our Site. If you do...
Consent to process personal data—sample wording1Consent to terms and conditions—not data processing consent[Insert Terms and conditions you are...
Service Level Agreement (hardware/software fault resolution support services)Service Level Agreement1Definitions1.1In this Schedule:24x7x365•means 24...
Standard contractual clauses for international transfers—2010—controller to processor—ICO templates [Archived]ARCHIVED: This Precedent has been...
Personal data sharing schedule—controller to controller—pro-disclosing partyDefined terms: This precedent schedule uses the additional defined terms...
Reputational damage claims—alternative causes of actionThis Practice Note considers the relationship between causes of action for reputational damage...
DefamationThe tort of defamation is governed by a mixture of statute and common law. The relevant statutory law is contained in:•the Defamation Act...
Software escrowIntroductionEscrow is the process of two or more parties placing property or instruments in the hands of a trusted third party (an...
Defamation—limitationThe ordinary time limit for defamation and malicious falsehood claimsA claimant must commence a claim for defamation within one...
Defamation and malicious falsehood—publicationThis Practice Note examines the role of publication in an action for defamation or malicious falsehood....
Defamation—defencesDefencesThere are a number of substantive defences to a defamation claim, the majority of which are now, since the Defamation Act...
Malicious falsehoodThis Practice Note provides an introduction to the tort of malicious falsehood. Unlike a claim for defamation, there is no...
Defamation and social mediaThe internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs,...
Websites—compliance requirementsConsideration of electronic data interchange (EDI) arrangements, blockchain, smart contracts or sector-specific laws...
DeepfakesThis Practice Note considers the following legal issues, technical information and applications of deepfakes:•What is a deepfake?•How...
Notice and take-down letter—defamationAddress of Website OperatorDear [insert organisation name]Notice and take-down letterWe act for [insert client...
Using framework agreements for servicesFramework agreements (sometimes referred to as master services agreements) are essentially umbrella agreements...
Copyright in films and television programmesFor the purposes of copyright law the term 'film' means a recording, on any medium, from which a moving...
Television format rightsWhat is a television format?A television format is a concept or idea for a television programme or series of programmes...
A cloud computing service under which a customer subscribes for access only to underlying infrastructure (such storage capacity, processing power and networking. The customer must deploy its own platform and software on the infrastructure. Abbreviated to ‘IaaS’.
A defamatory statement made or conveyed by spoken words, sounds, looks, signs, gestures or in some other non-permanent form, and relating to someone other than the person to whom its relates.
Social media content usually in the form of text, testimonials, tweets, blog posts, images, video and audio uploaded to websites by users of the site.