Guidance for key emerging technologies, such as AI, NFTs, the Metaverse and autonomous vehicles, explaining both how the technologies work and the key legal regimes (existing and new) that apply to their operation.
Core content for all TMT lawyers, this topic contains key 'go-to' precedents and practice notes at the route of most TMT related issues. Some of most popular areas are the software and cloud computing topics.
Our content covers simple outsourcing transactions as well as those with a more complex structure, and the impact of hyperscalers and recognised market practice relating to the negotiation and drafting of affected terms.
Whether you're advising on adtech, cookies or NFTs, Lexis+® TMT has the know-how and tools to help you succeed.
MLex: Google is taking the European Commission to court over how users are counted for its Google Shopping service under the EU’s Digital Services Act...
Four complaints were received by the Advertising Standards Authority (ASA) concerning whether advertisements and websites falsely implied independence...
The European Union Agency for Cybersecurity (ENISA) has published version 2.0 of its national capabilities assessment framework (NCAF), designed to...
Ofcom has launched enforcement investigations into Telegram, Teen Chat and Chat Avenue to assess their compliance with the Online Safety Act 2023....
MLex: Online platforms on Wednesday saw the European Commission positioning its age-verification app as a key tool to protect children online, but...
This Practice Note considers the law and practice applicable to food advertising to consumers, including:•Regulatory regime overview•General...
In briefData protection laws in the UK seek to ensure information about living individuals (within the definition of ‘personal data’) is used fairly...
This Practice Note introduces the requirements of the United Kingdom General Data Protection Regulation, Assimilated Regulation (EU) 2016/679 (UK...
This Practice Note provides practical guidance when drafting a jurisdiction clause in a commercial, business-to-business (B2B) contract. It considers...
This Practice Note explains what is meant by applicable law, also referred to in differing circumstances as governing law, proper law or the choice of...
1Definitions[Customer’s Representatives•means the individual (or individuals) identified as such in [insert schedule];]Key Personnel•means the...
This Agreement is made on [insert date]Parties1[insert name of company], a company registered in England and Wales, whose registered company number is...
This Agreement is made on [insert date] (the Commencement Date) between the following:Parties1[insert supplier name], a company incorporated in...
This Agreement is made on [insert date] (the Commencement Date) between the following:Parties1[insert supplier name] a company incorporated in England...
Software escrowEscrow is the process of two or more parties placing property or instruments in the hands of a trusted third party (an ‘escrow agent’)....
Reputational damage claims—alternative causes of actionThis Practice Note considers the relationship between causes of action for reputational damage...
DefamationThe tort of defamation is governed by a mixture of statute and common law. The relevant statutory law is contained in:•the Defamation Act...
Software escrowIntroductionEscrow is the process of two or more parties placing property or instruments in the hands of a trusted third party (an...
Defamation—limitationThe ordinary time limit for defamation and malicious falsehood claimsA claimant must commence a claim for defamation within one...
Defamation and malicious falsehood—publicationThis Practice Note examines the role of publication in an action for defamation or malicious falsehood....
Defamation—defencesDefencesThere are a number of substantive defences to a defamation claim, the majority of which are now, since the Defamation Act...
Malicious falsehoodThis Practice Note provides an introduction to the tort of malicious falsehood. Unlike a claim for defamation, there is no...
Defamation and social mediaThe internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs,...
Websites—compliance requirementsConsideration of electronic data interchange (EDI) arrangements, blockchain, smart contracts or sector-specific laws...
DeepfakesThis Practice Note considers the following legal issues, technical information and applications of deepfakes:•What is a deepfake?•How...
Notice and take-down letter—defamationAddress of Website OperatorDear [insert organisation name]Notice and take-down letterWe act for [insert client...
Using framework agreements for servicesFramework agreements (sometimes referred to as master services agreements) are essentially umbrella agreements...
Copyright in films and television programmesFor the purposes of copyright law the term 'film' means a recording, on any medium, from which a moving...
Television format rightsWhat is a television format?A television format is a concept or idea for a television programme or series of programmes...
A source-code based software interface or intermediary that allows applications or software components to communicate with each other and defines the way in which an application will interact with other software and share data.
The use of additional cloud resources, such as extra memory, processing power, storage or network bandwidth, to handle a spike in demand and to maintain services for users. Typically used between private and public clouds, in particular when the private cloud is fully utilising all of its physical resources.
The repositioning of non-cloud services to the cloud. Sometimes used pejoratively where the repositioned service is not truly a cloud–based product but has been labelled as such for marketing purposes.