you are here: Telco / internet

Categories
Commercial Complex disputes ICT Telco / internet

“So what! The contract just goes in the bottom drawer.”

So-what-The-contract-just-goes-in-the-bottom-drawer
Categories
ICT Media Telco / internet Trade regulation

The new European spin on net neutrality

The-new-European-spin-on-net-neutrality2
Categories
Commercial Complex disputes ICT Telco / internet

Optimising and attacking ICT and online contract terms: Part 6- What is important in ICT B2B contracts?

Optimising-and-attacking-ICT-and-online-contract-terms-Part-11
Categories
Commercial ICT Telco / internet Trade regulation

Optimising and attacking ICT and online contract terms: Part 4- B2C issues around the new unfair contract terms regime in the FTA

Optimising-and-attacking-ICT-and-online-contract-terms-Part-9
Categories
Commercial ICT Telco / internet

Optimising and attacking ICT and online contract terms: Part 3- Unsubstantiated representations in ICT and online contracts and marketing

Optimising-and-attacking-ICT-and-online-contract-terms-Part-3
Categories
Commercial Complex disputes ICT Telco / internet

Optimising and attacking ICT and online contract terms: Part 2- The new Fair Trading Act and Consumer Guarantees Act provisions and their implications for B2B

Optimisng-and-attacking-ICT-and-online-contract-terms-Part-2
Categories
Commercial Complex disputes ICT Telco / internet

Optimising and attacking ICT and online contract terms: Part 1- Why getting B2B ICT contracts right is important

Optimising-and-attacking-ICT-online-contract-terms-Part-1
Categories
Commercial ICT Telco / internet

Early termination charges – big for Telco and IT

Early-termination-charges-big-for-Telco-and-IT2
Categories
Commercial ICT Media Telco / internet

Harvard Business Review: Cyber security is a bigger GC, board, CEO, and CFO issue

HBR-Cyber-security-is-a-bigger-board-CEO-CFO-and-GC-issue
Categories
Commercial ICT Telco / internet

Companies’ external lawyers a cyber security weak point?

Companies-external-lawyers-a-cyber-security-weak-point