Technology Contracting Training Course Part 2: Contractual Provisions, Drafting Descriptions and Specifications, Support Obligations, Warranties, Indemnities, and More

Michael R. Overly
Michael R. Overly
Foley & Lardner LLP

Michael R. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and online law.

Steven M. Millendorf
Steven M. Millendorf
Foley & Lardner LLP

Steve Millendorf is a seasoned privacy and cybersecurity attorney with over two decades of experience as an engineer. Steve’s practice focuses on counseling a broad range of clients on privacy, cybersecurity, and intellectual property matters. He is a partner in the firm’s Technology Transactions, Cybersecurity, and Privacy Practice and is recognized by the International Association of Privacy Professionals (IAPP) as a Fellow of Information Privacy.

Live Video-Broadcast: May 9, 2025

2 hour CLE

This program is only available to All-Access Pass Members.
Subscribe to Miami-Dade Bar + myLawCLEs All-Access Pass...
Get this course, plus over 1,000+ live webinars.
Learn More

Program Summary

This session will cover key contractual provisions that define rights, responsibilities, and risk allocation. Topics include drafting clear descriptions and specifications, outlining support obligations, and structuring warranties to ensure product or service quality. Participants will also explore indemnities, limitations of liability, confidentiality clauses, and information security requirements to protect both parties and mitigate potential legal and financial risks.

This course is co-sponsored with myLawCLE. 

Key topics to be discussed:

  • Description/specifications
  • Support obligations
  • Warranties
  • Indemnities
  • Limitation of liability
  • Confidentiality
  • Information security

Date / Time: May 9, 2025

  • 1:00 pm – 3:10 pm Eastern
  • 12:00 pm – 2:10 pm Central
  • 11:00 am – 1:10 pm Mountain
  • 10:00 am – 12:10 pm Pacific

Closed-captioning available

Speakers

Michael R. Overly | Foley & Lardner LLP

Michael R. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and online law. Michael is a partner in the firm’s Technology Transactions, Cybersecurity, and Privacy and Privacy, Security & Information Management Practices.

Michael is one of the few practicing lawyers who has satisfied the rigorous requirements necessary to obtain the Certified Information System Auditor (CISA), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP), Certified Risk and Information System Controls (CRISC), and Certified Outsourcing Professional (COP) certifications.

 

Speaker_Steven M. Millendorf_MDBSteven M. Millendorf | Foley & Lardner LLP

Steve Millendorf is a seasoned privacy and cybersecurity attorney with over two decades of experience as an engineer. Steve’s practice focuses on counseling a broad range of clients on privacy, cybersecurity, and intellectual property matters. He is a partner in the firm’s Technology Transactions, Cybersecurity, and Privacy Practice and is recognized by the International Association of Privacy Professionals (IAPP) as a Fellow of Information Privacy. He holds certifications from the IAPP as a Certified Information Privacy Professional in the United States and European privacy laws (CIPP/US and CIPP/E), as well as a Certified Information Privacy Manager (CIPM).

Privacy and Cybersecurity Steve is a privacy and cybersecurity lawyer with a broad range of experience assisting clients with their privacy and cybersecurity issues, including data mapping activities, data ownership and monetization, data incident management, breach response and recovery, data subject request policies and form responses, privacy notices, and the development and maintenance of various privacy and cybersecurity policies and procedures that include industry best practices and guidance together with evolving legal requirements.

Steve’s experience includes all aspects of developing and maintaining compliance programs for many U.S. and international general privacy and security laws, including:

  • EU General Data Privacy Rights Act (GDPR)
  • UK General Data Protection Regulation and the Data Protection Act of 2018 (UK-GDPR)
  • California Consumer Privacy Act of 2018 (CCPA) and California Privacy Rights Act (CPRA)
  • Virginia Consumer Data Privacy Act (Virginia CDPA)
  • Colorado Consumer Privacy Act (Colorado CPA)
  • Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) and Canada’s Anti-SPAM Law (CASL)
  • Other state legal requirements to privacy, data security, data breach notification, and consumer protection. In addition, Steve also has expertise in other U.S. sectoral privacy laws, such as CAN-SPAM, COPPA, TCPA, and the New York Cybersecurity Regulation.

Technology Transactions and Intellectual Property Counselling Technology Transactions and intellectual property counseling are also a major focus of Steve’s practice. He regularly advises clients on open source software license issues, and prepares and negotiates data processing agreements, data sharing agreements, open source policies and procedures, protection of intellectual property policies and procedures, professional service agreements, software license agreements, software as a service agreements, development agreements, website and application terms of use and end user license agreements (EULA), cloud agreements, artificial intelligence & machine learning development and use agreements, patent license agreements, and many other types of technology agreements, policies, and procedures.

Steve regularly leverages his breadth and depth in these areas to address the complexities of privacy and cybersecurity issues that are present in almost every technology transaction, as well as to support various M&A activities in the areas of privacy, cybersecurity, intellectual property, and information technology.

Trusted, Practical, and Actionable Advice With more than two decades of engineering experience on the cutting edge of technology, Steve is regularly viewed as a “trusted advisor” to his clients and regularly collaborates with R&D, IT, risk, forensics, dark web, communications, and other professionals together with senior management, c-suite, and board members to bring a practical, multidisciplinary approach help his clients navigate today’s complex legal framework and solve our client’s complex technology and business problems.

Prior Experience Steve’s engineering experience prior to his legal career spans over two decades. While attending law school, Steve was a senior staff hardware security engineer at Qualcomm, where he led the design and development activities for the security features for most of Qualcomm’s chip devices used in smartphones, tablets, cellular modems, and other personal computing devices. He was also recognized as a Subject Matter Expert (SME) by Qualcomm’s Government Technologies Division, where he previously held U.S. security clearance and supported the company’s federal, state, and local government partners in understanding the security of mobile devices.

Before his employment at Qualcomm, Steve worked as an ASIC design engineer in various ground-breaking technologies, such as network security processors for HIFN, some of the first broadband modems for General Instruments (now ARRIS), tape and floppy disk storage as a consultant for iOmega, and text terminals for the Applied Digital Data Systems division of NCR/AT&T. Steve is an inventor on over 10 U.S. and international patents in the areas of cryptography and security.

Agenda

I. Description/specifications | 1:00pm – 1:15pm

II. Support obligations | 1:15pm – 1:30pm

III. Warranties | 1:30pm – 1:45pm

IV. Indemnities | 1:45pm – 2:00pm

Break | 2:00pm – 2:10pm

V. Limitation of liability | 2:10pm – 2:40pm

VI. Confidentiality | 2:40pm – 3:00pm

VII. Information security | 3:00pm – 3:10pm

More CLE Webinars
Upcoming CLE Webinars
Motions That Persuade: Crafting Arguments That Win
Motions That Persuade: Crafting Arguments That Win Wed, April 16, 2025
Live Webcast
The Convergence of the EU AI Act and ISO Requirements
The Convergence of the EU AI Act and ISO Requirements
Rachel V. Rose – Attorney at Law, PLLC
Playing Defense at 30(b)(6) Depositions (2024 Edition)
Playing Defense at 30(b)(6) Depositions (2024 Edition) Fri, April 18, 2025
On-Demand
Live Replay
IRS Enforcement: Tax Liens & Tax Levies (2025 Edition)
IRS Enforcement: Tax Liens & Tax Levies (2025 Edition) Fri, April 18, 2025
On-Demand
Live Replay
Nonbankruptcy Restructuring Alternatives
Nonbankruptcy Restructuring Alternatives Fri, April 18, 2025
Live Webcast
Real Estate LLC Disputes
Real Estate LLC Disputes Wed, April 23, 2025
Live Webcast
Government Contracts 101 (2025 Edition)
Government Contracts 101 (2025 Edition) Thu, April 24, 2025
Live Webcast
Abating Tax Penalties (2025 Edition)
Abating Tax Penalties (2025 Edition) Thu, April 24, 2025
On-Demand
Live Replay