IT Law

We know the IT industry at all stages of their value chain. In addition, our has now been 15 Years active in the field of IT law Attorney Dipl.-Ing. Michael Horak graduated alongside his jurisprudential studies such electrical engineering with appropriate emphasis in the areas of information technology / telecommunications. Thus, we speak your language.

IT-Praxis

The entire right of information technologies and telecommunications, including the message processing, Soft- and hardware technology and networks form from our legal practice. Online, offline, ASIC to ob oder PPC.

Good legal advice and representation costs a fee; bad fortune - horak . Lawyers

IT Law

We know the IT industry at all stages of their value chain. In addition, our has now been 15 Years active in the field of IT law Attorney Dipl.-Ing. Michael Horak graduated alongside his jurisprudential studies such electrical engineering with appropriate emphasis in the areas of information technology / telecommunications. Thus, we speak your language.

More

IT-Praxis

The entire right of information technologies and telecommunications, including the message processing, Soft- and hardware technology and networks form from our legal practice. Online, offline, ASIC to ob oder PPC.

More

Internet Law

Internet law and online law brings together a variety of legal areas (u.a. Domain Law, IT Law, Telecommunications Law, Copyright, Computerrecht, Media Law, Civil Law). We know each other "the network" and his German and European regulations for.

More

IT-by design

The legally secure as possible implementation of Web- and IT projects with the creation of the necessary contracts in the field of computer law, Copyright and domain law, and the development of customized general terms and conditions with constraints (Conditions, Privacy Statement, Declarations of Conformity, etc.) part of our daily practice.

More

Future-oriented types of contracts in IT law

In IT law there are a number of new and future-oriented types of contract, who meet the constantly changing requirements of the digital world. These contracts take into account the developments in the areas of cloud computing in particular, Artificial intelligence (Of), Big Data, Internet of Things (IoT) and blockchain. Some of these types of contracts are explained comprehensively below: 1. Cloud Computing Treaty Cloud Computing Treaties regulate the provision and use of IT resources via the Internet. They are particularly relevant, Since more and more companies are relying on cloud services, To ensure flexibility and scalability. 2. Of- and algorithm contracts with the increasing use of AI and algorithm-based systems are created new forms of contract, The specific challenges such as liability, Add transparency and intellectual property to address. 3....

14th Jan 2025
AI law in IT law

AI law in IT law

AI law brings with it a number of new legal challenges for IT law. These arise from the specific properties of AI systems, like autonomy, Complexity and data dependency. The following are the main legal challenges, practical examples and the role of lawyers in this context are presented: 1. Liability issues with AI systems 2. Data protection and data processing 3. Bias and discrimination 4. Copyright and Intellectual Property 5. Transparency and traceability 6. Regulation and compliance 7. Contract drafting and liability clauses IT law and AI law Lawyers in the field of IT- and AI law play a key role, to minimize legal risks and provide clients with legal advice in an increasingly technological world. Your tasks range from contract drafting and compliance advice to....

07th May 2024
Data protection in online trading

Data protection in online trading

It's crucial, that users’ personal data is protected, to protect their privacy. Many online retailers therefore rely on encryption technologies and strict security measures, to protect their customers’ data. Still, it's important to note, that absolute security cannot be guaranteed. It is also the responsibility of the users, to protect your data carefully, by using strong passwords and being careful with your personal information. Data protection in online trading is an extremely important issue. Lawyer Dipl.-Ing. Michael Horak, LL.M. Privacy policies should be transparent and provide users with clear information about them, how your data is used. It is also important, that users have control over their....

02nd Apr 2024
Lawyer IT law

IT tender as a formal process

An IT tender is a formal process, where companies or organizations obtain offers from IT service providers or providers, about specific IT projects, to procure products or services. The call for tenders is usually published and is aimed at potential providers, who can submit their offers. The purpose of an IT tender is this, to ensure a transparent and fair selection of the best provider for the respective IT project. Competition between different providers allows clients to compare the quality of the solutions offered and choose the most suitable option for them. An IT tender typically includes the following steps: Definition of requirements: The client defines the specific requirements for the IT project, product or service, which procures....

27th Nov 2023
Outsource to external service providers through IT outsourcing

Outsource to external service providers through IT outsourcing

IT outsourcing is a process, where companies or organizations outsource their IT tasks to external service providers. This can include a variety of IT tasks, such as the development of software, the management of networks, maintaining hardware and supporting end users. There are many reasons, why companies consider IT outsourcing. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. One of the main reasons is cost savings. By outsourcing IT tasks, companies can reduce the costs of hiring and training IT staff. In addition, they can benefit from economies of scale, that arise through collaboration with an IT service provider. Another advantage of IT outsourcing....

14th Aug,en 2023
IT law as an important area of ​​law

IT law as an important area of ​​law

IT law is an important area of ​​law, dealing with the legal regulation of information technology and the use of computers and the Internet. It covers a variety of topics, including data protection, Copyright, Trademark, Contract law, liability issues and cybercrime. In today's digital world, IT law is of crucial importance for companies and individuals, use the technology. Businesses need to make sure, that they comply with applicable laws and regulations, to avoid legal problems and financial losses. Individuals also need to be aware, how to protect your personal data and what rights you have, when their data is collected and used by companies or government agencies. An important aspect of IT law is data protection....

27th Jun 2023
Warranty conditions are part of the purchase contract

Warranty conditions are part of the purchase contract

Warranty conditions are an important part of every sales contract. They give the buyer security, that the product purchased or the service provided meets the agreed requirements and, in the event of defects or defects, will be repaired or replaced. Typically, warranty terms are set by the manufacturer or seller of the product or service. These terms may vary by product or service and should be reviewed carefully prior to purchase. One of the most important aspects of warranty terms is the length of the warranty, the type of guarantee (z.B. repair or replacement), the conditions for claiming the guarantee (z.B. Proof of purchase or registration of the product) and warranty exclusions..

13th Feb 2023
Purpose of IT security

Purpose of IT security

The purpose is to protect basic information such as company assets, company know-how, all personal data and sales. Without an appropriate solution for IT security, Does your company have inadequate risk management?. You, the management, are also legally obliged to do so, to take appropriate safety precautions. IT security means the protection of information and, above all, the processing of it. horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. Information security should prevent the manipulation of data and systems by unauthorized persons. IT security measures Access controls, Cryptography, rights management, Firewalls, Proxies, virus scanner, Vulnerability management – ​​these are the measures, to ensure IT security. IT security includes all technical and organizational....

12th Dec 2022
The legal side of IT compliance

The legal side of IT compliance

horak. LAWYERS/ LAWYERS / PATENT ATTORNEYS Just give us a call. We are happy to help. In the area of ​​the IT landscape, legal regulations prevail, internal and contractual regulations. In corporate management, we can use the term IT compliance to describe compliance with regulations. Compliance means only in itself, that the applicable legal rules and recognized social values ​​and norms are always observed in the context of all corporate activities. Already in the light of the existing regulation density for companies and entrepreneurs, cross-border activities, Due to the increasing regulation and in particular the special liability for the management bodies, every company today has to operate a compliance management system. Lawyer Dipl.-Ing. Michael Horak, LL.M. Risky areas of IT compliance In particular, the...

Pages:1234»