TECHNOLOGY, OUTSOURCING, AND COMMERCIAL TRANSACTIONS
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS

The UK government is considering responses to its proposed reforms to auto-subscription rules for consumer contracts, as part of a broader consultation on reforming UK competition and consumer policy.

The Intellectual Property Office (IPO) in the United Kingdom just closed a consultation on policy options for changes to patent and copyright legislation to better protect technology created by artificial intelligence (AI).

As we start 2022, as part of our Spotlight series, we connect with Reece Hirsch, the co-head of Morgan Lewis’s privacy and cybersecurity practice, to discuss the recent policy statement issued by the US Federal Trade Commission regarding the Health Breach Notification Rule and how it applies to health app developers that handle consumers’ sensitive health information. Our Tech & Sourcing @ Morgan Lewis blog also published a summary of the policy statement.

Many organizations have longstanding sustainability initiatives for reducing waste through efforts such as recycling or reductions in printing. However, organizations are now also looking to their use of technology to help improve the sustainability of their operations.
From all of us on the technology, outsourcing, and commercial transactions team at Morgan Lewis, we’d like to wish you and your loved ones happy holidays and a wonderful new year.
Please join us on Wednesday, January 12, 2022 at 12:00 pm ET as Morgan Lewis partners Barbara Murphy Melby and Mike Pierides discuss the outlook for the outsourcing industry in the new year and what opportunities and challenges may lay ahead.
As 2021 comes to a close, we have once again compiled all the links to our Contract Corner blog posts, a regular feature of Tech & Sourcing @ Morgan Lewis. In these posts, members of our global technology, outsourcing, and commercial transactions practice highlight particular contract provisions, review the issues, and propose negotiating and drafting tips.
Morgan Lewis's website, morganlewis.com, has been redesigned with a new look and tools to make it easier to access and leverage information about the firm.  One-click navigation takes users directly to landing pages for Our Practice, Our Thinking, and Our Firm, where you can explore events and webinars, blogs and other publications, trending topics, and more. You can also learn more about our commitment to Diversity & Inclusion, community engagement, and pro bono services.
Broad awareness has been made about cyberattacks in the form of phishing that typically use email messages to lure victims into divulging sensitive information or opening a link that allows malware to infiltrate their device. Companies have learned how to combat phishing by training employees to recognize such scam attempts and report them as phishing to protect their organizations. “Vishing” is another tactic used by scammers that, while less familiar, is no less invasive and dangerous.
With the exponential growth of cyber threats, cloud computing and remote working, contract provisions regarding data security requirements have also expanded in size and frequency. It has become common practice to prepare schedules to detail (and limit) security requirements. Customers and vendors both have a vested interest in clearly identifying expectations and obligations for such requirements. In this week’s Contract Corner, we explore considerations when it comes to drafting security schedules.