Lawyers in the field of IT law deal with all legal issues associated with the processing of data and information at the company. Internet law is the area of IT law that addresses online trade as well as legal security on the Internet and social media. IT law is scarcely possible without data protection and the GDPR. Which means that it must be approached in an interdisciplinary way.
Today, IT issues crop up in almost all areas of our business and private lives. No sooner do you click on a website than a cookie banner pops up. No wonder IT and Internet law are developing and changing so rapidly. You can rely on a partner who has its finger on the pulse of the times, but who also has the necessary command of the subject. A partner with an eye for the essentials who also thinks outside the box.
In IT and Internet law, it all boils down to good networking. No matter what legal questions you may have: we always have the right contact person for you somewhere in our partner network Nexia International.
Would you like to get together for a personal meeting to obtain advice? We would be happy to schedule a non-binding appointment with you so that we can get to know each other. We look forward to your call or e-mail and to meeting you.
Unfortunately, there is no such thing as a typical IT contract. As much as services, hardware and software and their provision and use differ in IT contracts for these areas, so it goes with the contracts. With IT contracts, it is therefore particularly important to look closely at the specifics and practical challenges of each individual IT project. Numerous constellations are conceivable, from software development contracts that are arranged agilely or as a so-called waterfall model, to the creation of software transfer and licence contracts that can be designed for the long term or for limited periods of time, all the way down to provider and hosting contracts. But the most important thing is that they are often based on complex projects and considerable investments. It is therefore all the more important to rely on good advice and not on an "off-the-shelf" set of contracts that can be found online. The following topics must be included in a contract to avoid surprises (such as liability) and disputes:
For many companies, the distribution channel via their own webshop appears to be cost-effective and lucrative. The operator of the webshop has to observe a large number of legal requirements in order to minimise the risk of receiving reprimands and warnings from competitors, however:
Outsourcing means shifting services to an external service provider. In essence, outsourcing is about working together as partners, which is of course laid down in a set of contracts. Don’t be too hasty in choosing service providers. Often the advantages and disadvantages of the various offers only become apparent through a comparison with other providers. In any case, you should spell out the rights and obligations of a service provider in a precise outsourcing contract. In addition to this contract, a data protection agreement on commissioned processing (ADV) must generally be concluded with service providers in accordance with the GDPR. From a data protection perspective, you need to pay particularly close attention to technical and organisational measures to ensure data security as well as the location where the data processing takes place. Especially if a service provider from a non-EU country is involved, further precautions need to be taken. Pay particular attention to this point. Because when you commission a provider in connection with outsourcing, important tasks and thus data and information of the company are transferred to them. An outsourcing contract therefore always affects the areas of data security and IT security. Advice from a specialised lawyer is a sound investment in such cases.
Following a spate of reprimands and warnings, the imprints of many companies have improved in recent years. However, due to changes in the law, new obligations have to be met from time to time. In addition, numerous particular obligations apply to special providers (e.g. professionals, the medical sector, the financial sector) that are occasionally overlooked. Or are not even requested by online generators used to create an imprint. Companies are often unaware that the creation of an imprint is also legally required for their social media sites and apps - a popular starting point for competitors to send out a warning. But even if a company is aware of the need to provide an imprint in all its telemedia, social networks or apps sometimes confront companies with graphic or technical challenges.
Many SMEs believe they are unattractive to a hacker attack. But in 2020, a representative study of 1,000 SME entrepreneurs revealed that almost half had already been victims of a hacker attack. What can you do if you have already been hacked?
75% of the companies that were hacked suffered significant damage. Therefore: You need to create a comprehensive security strategy and an emergency plan working together with an expert. To make sure that your company is well prepared for any attack, which hopefully will not happen in the first place.