Tech & Sourcing @ Morgan Lewis

TECHNOLOGY TRANSACTIONS, OUTSOURCING, AND COMMERCIAL CONTRACTS NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
The Intellectual Property Office (IPO) in the United Kingdom just closed a consultation on policy options for changes to patent and copyright legislation to better protect technology created by artificial intelligence (AI).
Spotlight

As we start 2022, as part of our Spotlight series, we connect with Reece Hirsch, the co-head of Morgan Lewis’s privacy and cybersecurity practice, to discuss the recent policy statement issued by the US Federal Trade Commission regarding the Health Breach Notification Rule and how it applies to health app developers that handle consumers’ sensitive health information. Our Tech & Sourcing @ Morgan Lewis blog also published a summary of the policy statement.

Many organizations have longstanding sustainability initiatives for reducing waste through efforts such as recycling or reductions in printing. However, organizations are now also looking to their use of technology to help improve the sustainability of their operations.
From all of us on the technology, outsourcing, and commercial transactions team at Morgan Lewis, we’d like to wish you and your loved ones happy holidays and a wonderful new year.
Contract Corner
As 2021 comes to a close, we have once again compiled all the links to our Contract Corner blog posts, a regular feature of Tech & Sourcing @ Morgan Lewis. In these posts, members of our global technology, outsourcing, and commercial transactions practice highlight particular contract provisions, review the issues, and propose negotiating and drafting tips.
Morgan Lewis's website, morganlewis.com, has been redesigned with a new look and tools to make it easier to access and leverage information about the firm.  One-click navigation takes users directly to landing pages for Our Practice, Our Thinking, and Our Firm, where you can explore events and webinars, blogs and other publications, trending topics, and more. You can also learn more about our commitment to Diversity & Inclusion, community engagement, and pro bono services.
Broad awareness has been made about cyberattacks in the form of phishing that typically use email messages to lure victims into divulging sensitive information or opening a link that allows malware to infiltrate their device. Companies have learned how to combat phishing by training employees to recognize such scam attempts and report them as phishing to protect their organizations. “Vishing” is another tactic used by scammers that, while less familiar, is no less invasive and dangerous.
Contract Corner
With the exponential growth of cyber threats, cloud computing and remote working, contract provisions regarding data security requirements have also expanded in size and frequency. It has become common practice to prepare schedules to detail (and limit) security requirements. Customers and vendors both have a vested interest in clearly identifying expectations and obligations for such requirements. In this week’s Contract Corner, we explore considerations when it comes to drafting security schedules.
As part of our Digital Disruption and Innovation webinar series, please join us on Tuesday, December 7, 2021 at 12:00 pm ET as Morgan Lewis partner Doneld G. Shelkey and associate Eric J. Pennesi discuss the future of the growing esports industry.

The Court of Justice of the European Union (CJEU) has held in Case C-410/19 The Software Incubator Ltd v Computer Associates (UK) Ltd that the supply of software by electronic means, where accompanied by the grant of a perpetual user license in return for a fee, could constitute a “sale of goods” for the purpose of defining a commercial agent under the EU Commercial Agents Directive (the Directive).