Close-up program source code on LCD display

Technology

  • Overview
  • Who To Contact
  • Representative Matters
  • Recent Developments

We are focused on supporting emerging and established technology companies, businesses that have technology opportunities and organizations that use technology to make money. The Aird & Berlis LLP Technology Group works with a broad range of clients, from startup companies to well-established industry leaders. Big or small, our clients appreciate that our services are tailored to suit their specific needs. We assist clients by providing solutions to most effectively achieve their business goals through the development, exploitation, protection or harnessing of technology.

Specialized Expertise

Technology outsourcing and procurement

  • Technology development agreements
  • Confidentiality agreements
  • Technology purchasing and/or licensing agreements
  • Technology service, support and maintenance agreements
  • Technology supply and distribution agreements
  • Web hosting agreements
  • Telecom agreements
  • Strategic partnership agreements
  • Consulting agreements
  • Escrow arrangements

Internet strategy

  • Site and content development matters
  • Site content issues (infringement, libel, slander, misrepresentation, Competition Act)
  • Links
  • Legal notices/disclaimers
  • Language laws compliance
  • Domain name protection (including proactive protective registrations)
  • Moral rights, meta tags, business method patents
  • Foreign jurisdiction issues

Privacy and information management

  • Information management policy design
  • Information gathering and database storage, use and access
  • Privacy and personal information regulatory compliance
  • Contract compliance
  • Privacy methodologies

Employee-related matters

  • Policies regarding internal and external e-mail communications
  • Policies regarding web access/usage
  • Proprietary rights agreements
  • Employee surveillance policies
  • Security policies and procedure
    • Password policies
    • Encryption use
    • Data back-up procedures
    • Disaster recovery arrangements
    • Escrow services arrangements
    • Anti-virus capabilities
  • Employee training
  • Termination of employment
  • Transformation workflow