TECHNOLOGY, OUTSOURCING, AND COMMERCIAL TRANSACTIONS
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
Welcome to the conclusion of our two-part Spotlight post with Lee Harding in which we discuss key employment/labor and employment law issues in relation to UK and EU outsourcing transactions. In Part 1, we talked about key initial considerations and specific timescales involved.
In this two-part edition of our Spotlight series, we welcome Lee Harding to discuss key labor and employment law issues in relation to outsourcing transactions, predominantly in the United Kingdom and European Union.
In late 2021, the Luxembourg Commission de Surveillance du Secteur Financier (CSSF) published Circular CSSF 21/785 (the Circular), which introduced a more relaxed approach on the communication requirements in relation to material IT outsourcing (including to cloud-based infrastructures).
The unfolding conflict in Eastern Europe is likely going to cause a wide-ranging impact to companies with business operations or personnel in the region. For technology and commercial contracting professionals, this means potential contract disputes, force majeure issues, business continuity implications, and cybersecurity concerns.
Many organizations have longstanding sustainability initiatives for reducing waste through efforts such as recycling or reductions in printing. However, organizations are now also looking to their use of technology to help improve the sustainability of their operations.
From all of us on the technology, outsourcing, and commercial transactions team at Morgan Lewis, we’d like to wish you and your loved ones happy holidays and a wonderful new year.
As 2021 comes to a close, we have once again compiled all the links to our Contract Corner blog posts, a regular feature of Tech & Sourcing @ Morgan Lewis. In these posts, members of our global technology, outsourcing, and commercial transactions practice highlight particular contract provisions, review the issues, and propose negotiating and drafting tips.
With the exponential growth of cyber threats, cloud computing and remote working, contract provisions regarding data security requirements have also expanded in size and frequency. It has become common practice to prepare schedules to detail (and limit) security requirements. Customers and vendors both have a vested interest in clearly identifying expectations and obligations for such requirements. In this week’s Contract Corner, we explore considerations when it comes to drafting security schedules.
Companies are transforming legacy systems, implementing automation and artificial intelligence tools, embedding digital capabilities into their products, shifting to cloud solutions and leveraging technology to better connect to their customers, personnel, and third parties, all at an unprecedented pace. The focus on businesses to get to market faster, reach a broader audience and provide real-time interaction has in turn put pressure on legal and sourcing documents to keep up. The complexity and volume of the numbers of projects (and contracts) can be daunting — especially for companies that have not yet elevated the importance of the technology law function within their organizations.