Guidance for key emerging technologies, such as AI, NFTs, the Metaverse and autonomous vehicles, explaining both how the technologies work and the key legal regimes (existing and new) that apply to their operation.
Core content for all TMT lawyers, this topic contains key 'go-to' precedents and practice notes at the route of most TMT related issues. Some of most popular areas are the software and cloud computing topics.
Our content covers simple outsourcing transactions as well as those with a more complex structure, and the impact of hyperscalers and recognised market practice relating to the negotiation and drafting of affected terms.
Whether you're advising on adtech, cookies or NFTs, Lexis+® TMT has the know-how and tools to help you succeed.
The Competition and Markets Authority (CMA) has announced the results of its latest compliance review into online consumer reviews, following a...
The Competition and Markets Authority (CMA) has published proposed decisions to designate Apple and Google with strategic market status (SMS) under...
The European Parliament’s Policy Department for Justice, Civil Liberties and Institutional Affairs has published a study examining the EU’s regulatory...
Welcome to this week’s edition of the TMT weekly highlights: a hand-picked summary of news analysis, updates and new content from across the...
The European Financial Reporting Advisory Group (EFRAG) has launched its 'EFRAG 2025 State of Play' portal, providing analysis of the first 656...
UK Rome II—application and interpretationThis Practice Note is for use when determining applicable law in the courts of England and Wales respect of...
Intellectual property in outsourcingIntellectual property rights (IPR) can often become points of contention during outsourcing contract negotiations....
UK artificial intelligence—trackerThis tracker sets out key dates and information relating to legal issues surrounding the development of artificial...
Key issues in SaaS and hardware/software maintenance SLAsOverviewThis Practice Note covers some of the key issues arising in software as a service...
Legacy IT systemsThis Practice Note explores projects which involve legacy IT systems, the background to such legacy IT refresh projects (focusing...
Interconnection agreementThis Agreement is made on [insert date].Parties1[insert name] a company incorporated in [England and Wales] under number...
Private sector outsourcing contract—template pensions schedule1Interpretation1.1The following definitions and rules of interpretation apply in this...
Central government outsourcing contract—template pensions schedule1Interpretation1.1The following definitions and rules of interpretation apply in...
Declaration of a director’s interests in an existing transaction or arrangement—general noticeThe Directors[Insert name of company][(Company)][Insert...
Declaration of a director’s interests in a proposed transaction or arrangement—general noticeThe directors[Insert name of company] ([Company])[Insert...
Reputational damage claims—alternative causes of actionThis Practice Note considers the relationship between causes of action for reputational damage...
DefamationThe tort of defamation is governed by a mixture of statute and common law. The relevant statutory law is contained in:•the Defamation Act...
Software escrowIntroductionEscrow is the process of two or more parties placing property or instruments in the hands of a trusted third party (an...
Defamation—limitationThe ordinary time limit for defamation and malicious falsehood claimsA claimant must commence a claim for defamation within one...
Defamation and malicious falsehood—publicationThis Practice Note examines the role of publication in an action for defamation or malicious falsehood....
Defamation—defencesDefencesThere are a number of substantive defences to a defamation claim, the majority of which are now, since the Defamation Act...
Malicious falsehoodThis Practice Note provides an introduction to the tort of malicious falsehood. Unlike a claim for defamation, there is no...
Defamation and social mediaThe internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs,...
Websites—compliance requirementsConsideration of electronic data interchange (EDI) arrangements, blockchain, smart contracts or sector-specific laws...
DeepfakesThis Practice Note considers the following legal issues, technical information and applications of deepfakes:•What is a deepfake?•How...
Notice and take-down letter—defamationAddress of Website OperatorDear [insert organisation name]Notice and take-down letterWe act for [insert client...
Using framework agreements for servicesFramework agreements (sometimes referred to as master services agreements) are essentially umbrella agreements...
Copyright in films and television programmesFor the purposes of copyright law the term 'film' means a recording, on any medium, from which a moving...
Television format rightsWhat is a television format?A television format is a concept or idea for a television programme or series of programmes...
Typically used to refer to the processing resources (speed, capacity) of a computer device.
A software process or device (physical or virtual) providing services to other applications (clients).
An application supporting a single group of users only. Contrast with ‘multi-tenancy’ above.