Photo of John Chapas

It is commonplace to turn on the television news and hear of a new data breach from a large retailer or someone else. No one wants the legal problems (not to mention the embarrassment and the hit to reputation) from having their systems breached. Consequently, data security is on everyone’s mind.

However, many companies have

Your business may license many different types of software and technology in the ordinary course. These licenses range from software installed on your internal network to use-rights in software-as-a-services (SaaS) models, where the programs reside on the vendor’s host systems and are accessed via the Internet (or in some other manner).

In each case, you are granted use-rights that define how the licensed materials can be used (for example, there may be a limit on the type of business for which the materials can be used), where they can be used (i.e., a territory or facility restriction), and who can use them.

Ensuring that the technology can be used by the appropriate people is one of the most overlooked items in a technology license.
Continue Reading Don’t Forget About Your Affiliates and Customers as Technology License End Users

Many organizations in different markets and industries are outsourcing parts (or all) of their IT functions (including support, development, help desk, data storage and others). Why are they outsourcing? What are the potential benefits of outsourcing?

  1. Helps the company bottom line – saves money. Many companies find lots of savings in outsourcing. The savings may be from better efficiencies pursuant to economies of scale, lower labor costs and other factors.
  2. Improved security. Strong security (for example, around the protection of consumer or health data) is the lifeblood of an outsourcing vendor’s business – and often, this level of security is higher than a customer could realistically achieve when keeping the functions in-house.
    Continue Reading Why Are My Competitors Outsourcing IT? Should I?

Bring Your Own Device (BYOD) is an escalating trend by which employees are using their own portable computing devices, including tablets and smart phones, to access their employer’s system and data. Employers are faced with the challenging question of whether they should permit BYOD or only permit employees to access their system and data through