IT Law

We know the IT industry at all stages of their value chain. In addition, our has now been 15 Years active in the field of IT law Attorney Dipl.-Ing. Michael Horak graduated alongside his jurisprudential studies such electrical engineering with appropriate emphasis in the areas of information technology / telecommunications. Thus, we speak your language.

IT-Praxis

The entire right of information technologies and telecommunications, including the message processing, Soft- and hardware technology and networks form from our legal practice. Online, offline, ASIC to ob oder PPC.

Good legal advice and representation costs a fee; bad fortune - horak . Lawyers

IT Law

We know the IT industry at all stages of their value chain. In addition, our has now been 15 Years active in the field of IT law Attorney Dipl.-Ing. Michael Horak graduated alongside his jurisprudential studies such electrical engineering with appropriate emphasis in the areas of information technology / telecommunications. Thus, we speak your language.

More

IT-Praxis

The entire right of information technologies and telecommunications, including the message processing, Soft- and hardware technology and networks form from our legal practice. Online, offline, ASIC to ob oder PPC.

More

Internet Law

Internet law and online law brings together a variety of legal areas (u.a. Domain Law, IT Law, Telecommunications Law, Copyright, Computerrecht, Media Law, Civil Law). We know each other "the network" and his German and European regulations for.

More

IT-by design

The legally secure as possible implementation of Web- and IT projects with the creation of the necessary contracts in the field of computer law, Copyright and domain law, and the development of customized general terms and conditions with constraints (Conditions, Privacy Statement, Declarations of Conformity, etc.) part of our daily practice.

More
27th Nov 2023
Outsource to external service providers through IT outsourcing

Outsource to external service providers through IT outsourcing

IT outsourcing is a process, where companies or organizations outsource their IT tasks to external service providers. This can include a variety of IT tasks, such as the development of software, the management of networks, maintaining hardware and supporting end users. There are many reasons, why companies consider IT outsourcing. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. One of the main reasons is cost savings. By outsourcing IT tasks, companies can reduce the costs of hiring and training IT staff. In addition, they can benefit from economies of scale, that arise through collaboration with an IT service provider. Another advantage of IT outsourcing....

14th Aug,en 2023
IT law as an important area of ​​law

IT law as an important area of ​​law

IT law is an important area of ​​law, dealing with the legal regulation of information technology and the use of computers and the Internet. It covers a variety of topics, including data protection, Copyright, Trademark, Contract law, liability issues and cybercrime. In today's digital world, IT law is of crucial importance for companies and individuals, use the technology. Businesses need to make sure, that they comply with applicable laws and regulations, to avoid legal problems and financial losses. Individuals also need to be aware, how to protect your personal data and what rights you have, when their data is collected and used by companies or government agencies. An important aspect of IT law is data protection....

27th Jun 2023
Warranty conditions are part of the purchase contract

Warranty conditions are part of the purchase contract

Warranty conditions are an important part of every sales contract. They give the buyer security, that the product purchased or the service provided meets the agreed requirements and, in the event of defects or defects, will be repaired or replaced. Typically, warranty terms are set by the manufacturer or seller of the product or service. These terms may vary by product or service and should be reviewed carefully prior to purchase. One of the most important aspects of warranty terms is the length of the warranty, the type of guarantee (z.B. repair or replacement), the conditions for claiming the guarantee (z.B. Proof of purchase or registration of the product) and warranty exclusions..

13th Feb 2023
Purpose of IT security

Purpose of IT security

The purpose is to protect basic information such as company assets, company know-how, all personal data and sales. Without an appropriate solution for IT security, Does your company have inadequate risk management?. You, the management, are also legally obliged to do so, to take appropriate safety precautions. IT security means the protection of information and, above all, the processing of it. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. Information security should prevent the manipulation of data and systems by unauthorized persons. IT security measures Access controls, Cryptography, rights management, Firewalls, Proxies, virus scanner, Vulnerability management – ​​these are the measures, to ensure IT security. IT security includes all technical and organizational....

12th Dec 2022
The legal side of IT compliance

The legal side of IT compliance

horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. In the area of ​​the IT landscape, legal regulations prevail, internal and contractual regulations. In corporate management, we can use the term IT compliance to describe compliance with regulations. Compliance means only in itself, that the applicable legal rules and recognized social values ​​and norms are always observed in the context of all corporate activities. Already in the light of the existing regulation density for companies and entrepreneurs, cross-border activities, Due to the increasing regulation and in particular the special liability for the management bodies, every company today has to operate a compliance management system. Lawyer Dipl.-Ing. Michael Horak, LL.M. Risky areas of IT compliance In particular, the...

03rd Jan 2022
E-mail advertisements represent persistent and undesirable addressing of the users of the e-mail services

E-mail advertisements represent persistent and undesirable addressing of the users of the e-mail services

1. Art. 13 Abs. 1 Directive 2002/58 / EC of the European Parliament and of the Council of 12. July 2002 on the processing of personal data and the protection of privacy in electronic communication (Privacy policy for electronic communications) in the by Directive 2009/136 / EC of the European Parliament and of the Council of 25. November 2009 the amended version is to be interpreted accordingly, that the display of advertising messages in the inbox of a user of an e-mail service in a form, which is similar to that of an actual email, and in the same place as such an email, a "use of ... electronic mail for the purposes of direct mail" within the meaning of this provision, without determining the recipient of these messages ...

01st Mar 2021
The use of the image of a prominent person on the Internet as a “Clickbait” violates the right to one's own image

The use of the image of a prominent person on the Internet as a “Clickbait” violates the right to one's own image

b) The use of the image of a prominent person on the Internet as a “Clickbait” (“Click queues”) without editorial reference to this intervenes in the property-law allocation content of your right to your own image. c) A celebrity doesn't have to accept, that your portrait is used by the press free of charge to advertise editorial contributions, that do not concern them. Urteil BGH I ZR 120/19 – Clickbaiting KUG § 22 Set 1, § 23 Abs. 1 No.. 1, Abs. 2; BGB § 812 Abs. 1 Set 1 Fall 2, § 818 Abs. 2; ZPO § 538 Abs. 2 Set 1 No.. 4

Pages:1234»