ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب A Guide to IT Contracting Checklists,Tools, and Techniques : Checklists, Tools, and Techniques.

دانلود کتاب راهنمای چک لیست ها، ابزارها و تکنیک های پیمانکاری فناوری اطلاعات: چک لیست ها، ابزارها و تکنیک ها.

A Guide to IT Contracting Checklists,Tools, and Techniques : Checklists, Tools, and Techniques.

مشخصات کتاب

A Guide to IT Contracting Checklists,Tools, and Techniques : Checklists, Tools, and Techniques.

ویرایش: [2 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 9780367489021, 1000380998 
ناشر: Auerbach Publishers, Incorporated 
سال نشر: 2021 
تعداد صفحات: [405] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 5 Mb 

قیمت کتاب (تومان) : 32,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب A Guide to IT Contracting Checklists,Tools, and Techniques : Checklists, Tools, and Techniques. به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای چک لیست ها، ابزارها و تکنیک های پیمانکاری فناوری اطلاعات: چک لیست ها، ابزارها و تکنیک ها. نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب راهنمای چک لیست ها، ابزارها و تکنیک های پیمانکاری فناوری اطلاعات: چک لیست ها، ابزارها و تکنیک ها.

از زمانی که راهنمای قراردادهای فناوری اطلاعات: فهرست‌های چک، ابزارها و تکنیک‌ها برای اولین بار منتشر شد، چندین روند هشداردهنده در صنعت پیمانکاری فناوری ایجاد شده است. این روندها عبارتند از: طلوع محصول فناوری "همانطور که هست" محصول در حال تغییر در کجای جهان داده های من است؟ برای رویارویی با این چالش‌ها، نسخه دوم به مدیران کسب‌وکار و وکلا کمک می‌کند تا راه‌حل‌های جایگزین از سایر فروشندگان را بررسی کنند، مذاکرات همزمان با سایر فروشندگان را انجام دهند، و به طور کلی اطمینان حاصل کنند که فروشندگان آینده نگر می‌دانند در صورت امتناع از اقدام معقول، می‌توانند «معامله را از دست بدهند». این مجلد تکی با استخراج حیاتی‌ترین درس‌های تجاری و حقوقی آموخته‌شده از چندین دهه تجربه حقوقی نویسنده در تهیه پیش‌نویس و مذاکره در مورد توافق‌نامه‌های مرتبط با فناوری اطلاعات، به خوانندگان اجازه می‌دهد به سرعت به اطلاعات تقریباً هر نوع قرارداد فناوری دسترسی پیدا کنند. ساختاری برای تمرکز بر نوع خاصی از قراردادهای فناوری اطلاعات، هر فصل شامل چک لیستی از شرایط ضروری، خلاصه مختصری از آنچه قرار است انجام دهد، و بررسی کاملی از مسائل حقوقی و تجاری است که در آن قرارداد خاص به آن پرداخته شده است. این کتاب با ارائه ابزارهای حرفه‌ای غیرحقوقی برای پرداختن به مسائل قراردادهای فناوری اطلاعات: حاوی چک‌لیست‌هایی است که به خوانندگان کمک می‌کند تا مفاهیم کلیدی را برای مرجع آماده سازماندهی کنند. شرایط قرارداد فناوری روز به روز دشوارتر می شود. این کتاب مملو از توصیه هایی برای کاهش ریسک بالقوه است و اهمیت حفظ اهرم مذاکره با فروشندگان بالقوه را روشن می کند.


توضیحاتی درمورد کتاب به خارجی

Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the "As-Is" Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges, the Second Edition helps business managers and lawyers explore alternate solutions from other vendors, conduct simultaneous negotiations with other vendors, and, generally, ensure prospective vendors understand they can "lose the deal" if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author's decades of legal experience drafting and negotiating IT-related agreements, this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal, business, and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors.



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Acknowledgments
About the Author
Preface to the First Edition
Preface to the Second Edition
1 Collecting Basic Deal Information
	Checklist
	Overview
	Key Considerations
	Performance
	Intellectual Property Issues
	Personal Information Privacy and Security
	Information Security
	Other Unique Issues
	Summary
2 Software License Agreements
	Checklist
	Introduction
	Four Critical Questions
	License and Restrictions
	Acceptance Testing
	Third-Party Software
	Fees
	Warranties
	Indemnification
	Limitation of Liability
	Specifications
	Confidentiality and Security
	Maintenance and Support
	Announcements and Publicity
	Term and Termination
	Additional Contract Terms
	Summary
3 Nondisclosure Agreements
	Checklist
	Overview
	Key Considerations
	Essential Terms
	Additional Considerations
	Summary
4 Professional Services Agreements
	Checklist
	Overview
	Key Considerations
	Essential Terms
		Term and Termination
		Acceptance Testing
		Personnel
		Subcontracting
		Warranties
		Indemnification
		Limitation of Liability
		Intellectual Property Ownership
		Change Order
		Confidentiality and Information Security
		Force Majeure
		Nonsolicitation
		Insurance
		Fees and Costs
		Relationship to Other Agreements
	Summary
5 Statements of Work
	Checklist
	Overview
	Essential Terms
		Scope of Work and Business Requirements
		Technical Environment
		Acceptance Testing
		Deliverables
		Documentation
		Roles and Responsibilities of the Parties
		Project Management Processes
		Issue Resolution and Escalation Procedures
		Risks
		Pricing and Cost
		Service Level Agreements
		Change Orders
	Summary
6 Cloud Computing Agreements
	Checklist
	Key Considerations and Essential Terms
		Service Levels
			Uptime Service Level
			Response Time Service Level
			Problem Resolution Service Level
			Remedies for Service Level Failure
		Data
			Data Security
			Disaster Recovery and Business Continuity
			Data Redundancy
			Use of Customer Information, Data Conversion, and Transition
		Insurance
		Indemnification
		Limitation of Liability
			The Limitation of Liability Should Apply to Both Parties
		License/Access Grant and Fees
		Term
		Warranties
		Publicity and Use of the Customer Trademarks
		Notification for Security Issues
		Assignment
	Pre-Agreement Vendor Due Diligence
	Summary
7 Click-Wrap, Shrink-Wrap, and Web-Wrap Agreements
	Checklist
	Overview
	What Is a “Shrink-Wrap” License?
	Products Purchased under Shrink-Wrap Agreements—Common Elements
	Methods of Purchasing Shrink-Wrap Products
	Typical Shrink-Wrap Terms and Conditions
	Key Risks of Shrink-Wrap Products
	Mitigating Risk
	Summary
8 Maintenance and Support Agreements
	Checklist
	Overview
	Scope of Support and Maintenance
	Predictability of Fees
	Support Not to Be Withheld
	Term
	Partial Termination/Termination and Resumption of Support
	Specifications
	Availability
	Support Escalation
	Service Levels
	Summary
9 Service Level Agreements
	Checklist
	Overview
	Service Level Provisions Commonly Found in the Terms and Conditions
	Root Cause Analysis, Corrective Action Plans, and Resolution
	Cost and Efficiency Reviews
	Continuous Improvements to Service Levels
	Termination for Failure to Meet Service Levels
	Cooperation
	Service Level Provisions Commonly Found in a Service Level Agreement or Attachment
	Measurement Window and Reporting Requirements
	Maximum Monthly At-Risk Amount
	Performance Credits
	Presumptive Service Levels
	Exceptions to Service Levels
	Supplier Responsibilities with Respect to Service Levels
	Additions, Deletions, and Modifications to Service Levels
	Earn-Back
	Form of Service Levels
	Summary
10 Idea Submission Agreements
	Checklist
	Overview
	Key Risks of Submissions
	Essential Terms
	Beware of Reverse Submissions
	Summary
11 Joint Marketing Agreements
	Checklist
	Overview
	Key Considerations and Essential Terms
		Determine the Scope of the Engagement
		Marketing Obligations
		Referral Arrangements
		Confidentiality
		Intellectual Property Issues
		Warranties and Disclaimers
	Term and Termination
	Summary
12 Software Development Kit (SDK) Agreements
	Checklist
	Overview
	Key Considerations and Essential Terms
		Scope of License
		Ownership
		Confidentiality
		Compatibility Testing
		Support
		Warranty Disclaimers
		Limitations on Liability
		Indemnification
		Export/Import
		Acquisition by Federal Government
		Term and Termination
	Summary
13 Key Issues and Guiding Principles for Negotiating a Software License or OEM Agreement
	Checklist
	Key Issues and Guiding Principles
	Initial Matters
	Scope of License/Ownership
	Pricing
	Audit Rights
	Limitations of Liability
	Warranties
	Support and Maintenance; Professional Service Rates
	Payment
	Term and Termination
	Infringement Indemnification
	Summary
14 Drafting OEM Agreements (When the Company Is the OEM)
	Checklist
	Key Issues and Guiding Principles
	Determine the Scope of the Engagement
	Customer Terms
	Territory
	Hardware Products
	Exclusivity
	Supplier Product Changes
	Support and Training
	Confidentiality
	Intellectual Property Issues
	Warranties and Disclaimers
	Limitations of Liability
	Indemnification
	Term and Termination
	Summary
15 Original Equipment Manufacturer (OEM) Agreements
	Checklist
	Overview
	Key Contracting Concerns from the Perspectives of Both Parties
	Summary
16 Health Insurance Portability and Accountability Act (HIPAA) Compliance
	Checklist
	Overview
		Key Issues and Guiding Principles
	Who Are BAs?
	What Can Happen to BAs That Fail to Comply with HIPAA?
	BA Requirements under the Security Breach Notification Requirements
	BA Requirements for Compliance with HIPAA Security Rule
	Statutory Liability for Business Associate Agreement Terms
	BAA Compliance with HITECH Act Requirements
	Other HIPAA Requirements
	Steps for Compliance for Breach Notification
	Steps for Compliance with HIPAA Security Rule
	Additional BAA Terms
	Considerations for Inventory HIPAA-Related Policies
	Summary
17 Reducing Security Risks in Information Technology Contracts
	Checklist
	Best Practices and Guiding Principles
	Trade Secret Considerations
	Copyright Considerations
	Joint IP Considerations
	Policy on Embedded Open Source
	Internal Procedures
	Policies Following Infringement
	Employees
		Employee Training and Communication
		Contractual Protections
		Nonemployees and Subcontractors
	Software Distribution
		Object Code vs. Source Code
		Language for License Agreements
		Nondisclosure Agreements
		Audit Rights
		Foreign Jurisdictions
	Source Code Licenses
		Escrow the Source Code
		Language for Source Code License Agreements
	Summary
18 Website Assessment Audits
	Checklist
	Overview
	Key Issues and Guiding Principles
		Evaluate Your Website
		Domain Names
		Use of Third-Party Trademarks
		Hyperlinks
		Content
		Visitor Uploads
		Applicable Internet-Specific Laws
		Terms and Conditions
		Data Security and Privacy
		Insurance
		General Considerations
	Summary
19 Critical Considerations for Protecting IP in a Software Development Environment
	Checklist
	Overview
	Key Issues and Guiding Principles
		Vendor Due Diligence
		Treatment of Data
		Physical Security
		Administrative Security
		Technical Security
		Personnel Security
		Subcontractors
		Scan for Threats
		Backup and Disaster Recovery
		Confidentiality
		Security Audits
		Warranties
		Limitation of Liability
		Termination
		Security Breach Notification
		Insurance
		Destruction of Data
		Additional Considerations
	Summary
20 Transactions Involving Financial Services Companies as the Customer
	Checklist
	Overview
	Three Tools for Better Contracts
	Key Considerations
	Summary
21 Source Code Escrow Agreements
	Checklist
	Overview
	What Does It Mean to Escrow Source Code?
	Types of Escrow Agreements
	Release Conditions
	Key Issues for Escrow Agreements
	Summary
22 Integrating Information Security into the Contracting Life Cycle
	Checklist
	Overview
	Due Diligence: The First Tool
	Key Contractual Protections: The Second Tool
	Information Security Requirements Exhibit: The Third Tool
	Summary
		Example Information Security Requirements Exhibit
23 Distribution Agreements
	Checklist
	Overview
	Key Issues for Distribution Agreements
		License Grant
		End-User License Agreement
		Development of the Product
		End-User Data
		Obligations of the Parties
		Product Pricing
		Additional Considerations
	Summary
24 Data Agreements
	Checklist
	Overview
	Key Contractual Protections
	Summary
25 Website Development Agreements
	Checklist
	Overview
	Initial Issues to Think About
	What are the Basic Objectives of the Website and the Development Agreement?
	Intellectual Property Ownership
	Software Requirements
	Schedules and Timetables
	Term and Termination
	Fees and Charges
	Project Management
	Acceptance Testing
	Warranties
	Indemnifications
	Content of the Website
	Linking Issues
	Insurance
	Reports, Records, and Audits
	Training/Education/Troubleshooting
	Additional Provisions to Consider
	Summary
26 Social Media Policies
	Checklist
	Introduction
	Policy Scope and Disclaimers
	No Expectation of Privacy
	Right, But No Duty, To Monitor
	Conduct in Social Media
	Social Networking and Weblogs
	Employee Questions and Signature
	Summary
27 Critical Considerations for Records Management and Retention
	Checklist
	Overview
	Avoiding Spoliation Claims
	Impact on Litigation/Discovery Costs
	Developing the Policy
	Litigation Discovery Procedures
	Developing the Retention Schedule
	The E-Mail Problem
	Authorized Storage Locations
	Confidentiality and Security
	Third-Party Vendors
	Proper Destruction
	Summary
Glossary
FFIEC Booklet
	Table of Contents
		INTRODUCTION
		BOARD AND MANAGEMENT RESPONSIBILITIES
		RISK MANAGEMENT
			Risk Assessment and Requirements
				Quantity of Risk Considerations
				Requirements Definition
			Service Provider Selection
				Request for Proposal
				Due Diligence
			Contract Issues
				Service Level Agreements (SLAs)
				Pricing Methods
				Bundling
				Contract Inducement Concerns
			Ongoing Monitoring
				Key Service Level Agreements and Contract Provisions
				Financial Condition of Service Providers
				General Control Environment of the Service Provider
				Potential Changes due to the External Environment
		RELATED TOPICS
			Business Continuity Planning
			Outsourcing the Business Continuity Function
			Information Security/Safeguarding
			Multiple Service Provider Relationships
			Outsourcing to Foreign Service Providers
		APPENDIX A: EXAM PROCEDURES
		APPENDIX B: LAWS, REGULATIONS, AND GUIDANCE
		APPENDIX C: FOREIGN-BASED THIRD-PARTY SERVICE PROVIDERS
Index




نظرات کاربران