Guidance for key emerging technologies, such as AI, NFTs, the Metaverse and autonomous vehicles, explaining both how the technologies work and the key legal regimes (existing and new) that apply to their operation.
Core content for all TMT lawyers, this topic contains key 'go-to' precedents and practice notes at the route of most TMT related issues. Some of most popular areas are the software and cloud computing topics.
Our content covers simple outsourcing transactions as well as those with a more complex structure, and the impact of hyperscalers and recognised market practice relating to the negotiation and drafting of affected terms.
Whether you're advising on adtech, cookies or NFTs, Lexis+® TMT has the know-how and tools to help you succeed.
Welcome to this week’s edition of the TMT weekly highlights: a hand-picked summary of news analysis, updates and new content from across the...
The European Parliament has announced a provisional agreement with the Council of the EU on amendments to the EU Artificial Intelligence (AI) Act...
As part of its ongoing regulation of alcohol advertising, the Advertising Standards Authority (ASA) upheld a complaint against Bestway Retail Ltd t/a...
Law360, London: The High Court ruled on 28 April 2026 that Sony Music Entertainment UK has not infringed any IP rights belonging to, and therefore...
The EU, represented by the European Commission, has become the first strategic partner of the Global Coalition on Telecommunications (GCOT), an...
Digital health developers, manufacturers and distributors of mHealth apps, and any connected Software as Medical Device (SaMD), artificial...
This Practice Note provides a summary of how the application of the United Kingdom General Data Protection Regulation, Assimilated Regulation (EU)...
In briefData protection laws in the UK seek to ensure information about living individuals (within the definition of ‘personal data’) is used fairly...
This Practice Note introduces the requirements of the United Kingdom General Data Protection Regulation, Assimilated Regulation (EU) 2016/679 (UK...
This Practice Note explores issues and best practice relating to the sharing of personal data between controllers (including joint controllers and...
Policy version: [insert date of this policy][—for previous versions of this policy see here].[Insert website] (our website) is provided by [insert...
Background to this thought leadership PrecedentThis Precedent was produced as part of a thought leadership project by Lexis+® UK in February 2022....
We take your privacy very seriously. Please read this privacy policy carefully as it contains important information on who we are and how and why we...
Background to this thought leadership PrecedentThis Precedent was produced as part of a thought leadership project by the Data Protection Intelligence...
This Precedent is drafted in contemplation of arrangements where the parties wish to insert data processing provisions within a Schedule rather than...
Reputational damage claims—alternative causes of actionThis Practice Note considers the relationship between causes of action for reputational damage...
DefamationThe tort of defamation is governed by a mixture of statute and common law. The relevant statutory law is contained in:•the Defamation Act...
Software escrowIntroductionEscrow is the process of two or more parties placing property or instruments in the hands of a trusted third party (an...
Defamation—limitationThe ordinary time limit for defamation and malicious falsehood claimsA claimant must commence a claim for defamation within one...
Defamation and malicious falsehood—publicationThis Practice Note examines the role of publication in an action for defamation or malicious falsehood....
Defamation—defencesDefencesThere are a number of substantive defences to a defamation claim, the majority of which are now, since the Defamation Act...
Malicious falsehoodThis Practice Note provides an introduction to the tort of malicious falsehood. Unlike a claim for defamation, there is no...
Defamation and social mediaThe internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs,...
Websites—compliance requirementsConsideration of electronic data interchange (EDI) arrangements, blockchain, smart contracts or sector-specific laws...
DeepfakesThis Practice Note considers the following legal issues, technical information and applications of deepfakes:•What is a deepfake?•How...
Notice and take-down letter—defamationAddress of Website OperatorDear [insert organisation name]Notice and take-down letterWe act for [insert client...
Using framework agreements for servicesFramework agreements (sometimes referred to as master services agreements) are essentially umbrella agreements...
Copyright in films and television programmesFor the purposes of copyright law the term 'film' means a recording, on any medium, from which a moving...
Television format rightsWhat is a television format?A television format is a concept or idea for a television programme or series of programmes...
Technology with the ability to perform tasks that would otherwise require human intelligence and which, usually, have the capacity to learn or adapt to new experiences or stimuli, including machine learning, speech and natural language processing, robotics and autonomous systems.
A cloud computing service under which a customer subscribes for access only to underlying infrastructure (such storage capacity, processing power and networking. The customer must deploy its own platform and software on the infrastructure. Abbreviated to ‘IaaS’.
SaaS is a service under which multiple customers gain access, usually through the internet, to what is typically the same software application. The application itself is physically deployed on servers owned or controlled by the supplier. This can be contrasted to ‘on-premise’ or ‘deployed’ software under which the application is installed on the customer’s own computer or infrastructure. The US National Institute of Standards and Technology (NIST) provides some basic descriptions of the cloud services. NIST describes SaaS as follows: ‘The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (eg, web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings.’ Examples of SaaS in the consumer market include: • webmail (eg Gmail) • social media (eg Facebook, Twitter and Instagram) • online gaming (eg Steam) The range of SaaS provided for use by organisations is vast, and includes: • customer relationship management (eg SalesForce) • productivity tools (eg Microsoft Office 365) • expense management (eg Concur) • payroll management (eg ADP) • collaboration (eg Asana) Many SaaS products usually permit a limited amount of customisation as part of the in-built functionality of the service. Anything beyond this, such as source code modification for a particular customer, is rare (other than in relation to private cloud) as it negates the benefits of a one-size-fits-all solution.