Overview

The members of Butzel's Technology Practice have the experience and broad knowledge base to handle a wide range of technology issues -- from the unique to the commonplace -- enabling its clients to focus on their core businesses and feel secure about technology-related legal matters.

Our clients include Fortune 500 companies and smaller owner-operated businesses, and count among them an array of technology and non-technology businesses, such as healthcare, manufacturing and educational entities. The members of this group also work closely with Butzel lawyers in various other practice areas to ensure a sophisticated breadth of legal analysis.

From data and records management retention to the drafting of IT outsourcing agreements, software and hardware contracts and PCI compliance issues, our attorneys have the industry insight and understanding to address technology matters on every level. We also provide clients with a variety of on-site and off-site support and work with vendors and existing IT professionals to implement comprehensive technology programs that best meet our clients' needs.

People

Areas of Concentration

Alerts & Publications

Publications

News & Events

News

Experience

  • Pursuant to break-in of a client’s facilities, provided data breach assessment services and analysis of data loss and legal risk exposure for a national firm that served as a custodian for personally identifiable information.
  • Serves as outside general counsel to two Northern Virginia high technology companies
  • Represented a technology and management consultant company that primarily provided services to health care providers
  • Represent corporate purchasers of software and technology in performance disputes with vendors.
  • Develop E-mail and Internet use, Data Privacy and Social Networking policies for corporations and universities.
  • Represented several companies in Business Software Alliance audits regarding claims of unlicensed or improperly licensed software use.
  • Regularly represents large India based IT company in employment disputes including discrimination, overtime claims, breach of contract and breach of confidentiality agreements
  • Develop and draft client based web site development agreements, including online terms of use, online service agreements, acceptable use policies and privacy policies.
  • As a result of a technical network mis-configuration of access and permission rights to Protected Health Information (“PHI”), provided legal evaluation of data breach notification responsibilities.
  • Retained by corporations and universities to review and/or create data and record retetion policies, and assist with compliance and corporate process.
  • Lead negotiator for information technology outsourcing relationship on behalf of a large hospital system.
  • Represented trademark owner (automotive supplier) in domain name dispute; client gained possession of infringing domain name
  • Negotiated extensive laboratory information system for major hospital system.
  • Led investigation of unauthorized ACH transactions for client, and successfully negotiated a resolution between the ODFI and the Originator.
  • Negotiated technology transactions with many providers of technology products and services including Sun, Microsoft, Oracle and others.
  • Draft and develop policies and train corporations and university personnel on HIPAA policies and procedures, including the HITECH amendments and compliance procedures for securitizing PHI and the data breach notification requirements.
  • Led due diligence and negotiation efforts for the Information Technology aspects of the purchase of a major hospital.
  • Retained by global corporation to work with German counsel and assist in navigating cross-border data issues involving the European Data Privacy Directives and providing solutions for data privacy, access and transfer in U.S. based litigation.
  • Represented a software developer with government contracts against former managers in action for injunctive relief for misappropriation of trade secrets and tortuous interference
Jump to Page

By using this site, you agree to our updated Privacy Policy and our Terms of Use.