Drafting Technology Services Statements of Work: Avoiding Contracting Pitfalls
Structuring Terms and Conditions, Anticipating Common Areas of Dispute, and Streamlining Negotiations
Recording of a 90-minute CLE video webinar with Q&A
This CLE course will provide business counsel with a roadmap for drafting statements of work (SOWs) for the purchase of technology services. The panel will discuss terms and conditions to include in an SOW and strategies to avoid common contracting pitfalls and resolve disputes.
Outline
- Recent trends in contracting for the purchase of technology services
- Key terms and conditions in statements of work for technology services
- Description of services and deliverables and when they are expected
- Tasks that support deliverables and who will perform them
- The commencement date for the project
- The initial draft of the project plan
- A detailed description of vendor materials
- Detailed information regarding vendor personnel
- Governance process for the project
- Fees: who will pay which costs and by when
- Expenses
- Service levels and corresponding performance credits and incentives
- Reporting obligations and frequency
- Facilities and equipment to be used
- Any testing requirements
- Anticipating common areas of dispute and streamlining negotiations
Benefits
The panel will review these and other key issues:
- What are the key questions corporate counsel must first consider before undertaking the negotiation and drafting of a technology services SOW?
- What are the terms and conditions to always include in SOWs?
- What are the most commonly disputed issues with SOWs, and what are best practices to resolve them?
Faculty
Mike Dettorre
Principal Consultant
MD & Co.
Mr. Dettorre has over 25 years of complex technology acquisition experience and has been the lead negotiator on over... | Read More
Mr. Dettorre has over 25 years of complex technology acquisition experience and has been the lead negotiator on over 500 transactions. His specialties include SLAs and SOWs for both outsourcing and complex systems integration work. Mr. Dettorre holds a Master of Science in Management of Technology which he received under an educational fellowship from Bell Laboratories and Bachelor of Science in Business Administration (Marketing) his work experience includes senior positions at a Big 4 Consulting firm and in the Fortune 100 companies.
CloseMichael R. Overly
Partner
Foley & Lardner
Mr. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware... | Read More
Mr. Overly focuses his practice on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and on-line law. He is the co-author of A Guide to IT Contracting: Checklists, Tools and Techniques (CRC Press, 2012).
CloseAaron K. Tantleff
Partner
Foley & Lardner
Mr. Tantleff focuses on providing legal and strategic guidance regarding information technology, outsourcing,... | Read More
Mr. Tantleff focuses on providing legal and strategic guidance regarding information technology, outsourcing, licensing, consulting, professional services, e-commerce, manufacturing, supply, and distribution agreements, as well as product acquisitions, strategic alliances, mergers and acquisitions, and private equity investments where technology and intellectual property are of significant importance. Mr. Tantleff is a frequent speaker on technology, security, privacy and outsourcing matters and is regularly quoted in The Wall Street Journal, Reuters, Politico, Fortune, and other top-tier publications on topics such as cyberattacks, privacy law developments, and data protection, including regarding the General Data Protection Regulation and Asia Pacific Cross Border Privacy Rules. Mr. Tantleff has been retained for data protection, cybersecurity, monetization of big data/IoT programs, and data breach response, remediation and simulations by companies across all industries and sizes, domestically and abroad.
Close