facebook twitter linkedin google gplus pinterest mail share search arrow-right arrow-left arrow print vcard

Supporting a Driving Force in the Economy

Data-driven technologies present complex issues involving intellectual property rights, privacy, and data security, creating both enormous value as well as potential risks for businesses of all sizes. From data breaches to technology acquisition, licensing, and cybersecurity, Felhaber Larson has significant experience in the most important—and challenging—aspects of computer and technology law. Our attorneys have worked across multiple industries to help clients anticipate, avoid, and remedy problems and take advantage of the opportunities available in today’s ongoing and evolving digital realty.

Our attorneys have earned recognition for Computer and Technology law expertise from multiple independent organizations. Felhaber attorneys have been certified in Cybersecurity and Privacy law, elected as President of the Minnesota State Bar Association’s Computer and Technology Section, and have been recognized by SuperLawyers® for their expertise in computer and technology issues.

Felhaber Computer & Technology Law Experience

If you are dealing with a potential data breach from unauthorized intrusion into your network from a hacker, seeking to protect your data and trade secrets from others, trying to understand national and/or international privacy laws, developing a new application or piece of software, or working on a complex business technology transaction, Felhaber has experienced attorneys who can assist you. Our specific experience includes:

CONTRACTING & LICENSING

  • Draft, revise, and negotiate technology agreement and disclosures, including:
    • Master Services agreements
    • Software-as-a-service (SaaS) agreements
    • Licensing agreements
    • Source code escrow agreements
    • Technology staffing agreement
    • Terms of Use
    • Terms of Service
    • Acceptable Use Policies

CYBERSECURITY & PRIVACY

  • Cyber squatter pursuit
  • Data breach prevention and response
  • National and international privacy laws
  • Privacy policy creation

EDISCOVERY

  • Forensics
  • Production management and best practices

TECHONOLOGY DEVELOPMENT & MONETIZATION

Share

Click the icon to share this on social media