What are audit provisions in a technology contract?

audit provision

An audit provision in a technology contract is a clause that allows for one party to inspect and perhaps copy certain business records and other information of the other party. Often an audit provision authorizes a party that owns licensed technology or software (the provider or licensor) to periodically inspect and audit the customer’s use of the technology or software. These types of provisions help ensure that the customer is using the technology or software in accordance with the terms of the agreement and that it is not infringing or otherwise misusing the technology or software. They can also be used to ensure that the customer is paying the appropriate license fees or royalties.

One often sees audit provisions in reseller agreements and revenue sharing agreements, to give the right of one party to inspect records that confirm it is being paid in accordance with the terms of the agreement. Since commissions are often calculated as a percentage of revenue, a referral partner may want to see the underlying records supporting the amounts the referral partner is being paid.

The audit provision typically outlines the procedures for the audit, such as the frequency of the audits (often expressed as “no more often than x times per calendar year”), who may conduct the audits (e.g., designees of the auditing party), and what information must be made available for review during the audit. It may also outline the rights and responsibilities of both parties during the audit process, including any limitations on the scope of the audit and the handling of any confidential information that is revealed during the audit.

An audit provision in a technology contract may provide that if the audit uncovers underpayment by the audited party (perhaps by at least a certain percentage) then the audited party will be responsible not only for the amount of the underpayment, but also for the costs incurred by the auditing party in conducting the audit.

Overall, audit provisions are an important aspect of technology agreements and play a vital role in protecting the interests of both parties involved. It is important for both parties to understand the audit provisions in the agreement and to comply with them fully in order to avoid any potential legal disputes.

See also: “Right to audit” provisions in technology services agreements can benefit both parties

Evan Brown is a Chicago attorney helping businesses negotiate and draft technology services and development contracts. He also handles many other issues involving the internet, copyright and trademarks, domain names and new media. Call him at (630) 362-7237 or email ebrown@internetcases.com. Follow him on Twitter: @internetcases

 

Why are indemnification provisions important in technology contracts?

vicarious liability copyright

Indemnification provisions in technology agreements play a crucial role in protecting the parties involved in a technology transaction. These provisions are often included in agreements among technology vendors, customers, software developers, and other related parties to shift the risk of losses and legal liabilities from one party to another.

Picking up the tab

Indemnification is a legal concept that involves one party (the indemnitor) agreeing to compensate the other party (the indemnitee) for any losses or damages that may occur as a result of a specific event or occurrence. Similarly, a provision of this sort may provide that one party will “defend” the other party by retaining counsel and paying the costs of defense in court, as those costs are incurred. In technology agreements, indemnification provisions are often used to shift the risk of losses or damages that may result from a party’s breach of contract or negligence. Customers will often seek to insist that the vendor indemnify the customer in the event a third party files a lawsuit against the customer because the technology infringes that third party’s intellectual property rights.

The main purpose of indemnification provisions in technology agreements is to protect the parties involved from potential financial losses, legal liabilities, and other costs associated with legal disputes. For example, a contract may provide that if a software developer breaches a contract and causes a loss to the client, the indemnification provision would require the developer to compensate the client for any damages.

Key elements

Indemnification provisions in technology agreements typically contain several key elements, including the types of losses or damages that will be covered, the parties that are responsible for indemnifying the other party, and the time frame for indemnification to take place. It also often covers the notification requirements, the documentation and information that should be provided in case of losses or damages, and the limitation of liability.

Another key aspect of indemnification provisions is that they are often mutual, meaning that both parties are responsible for indemnifying each other in certain situations. This can help to ensure that both parties are protected in the event of a legal dispute, and it also helps to create a balance of risk between the parties.

Why bother?

Indemnification provisions in technology agreements play a vital role in protecting the parties involved from financial losses, legal liabilities, and other costs associated with legal disputes. It’s important for both parties to understand the concept of indemnification, the purpose of these provisions, and how they are typically used in technology agreements.

Evan Brown is a technology and intellectual property attorney in Chicago. Follow him on Twitter at @internetcases.

Company successfully defends against trade dress and copyright infringement claims over online software tool

trade dress

A federal court in Delaware dismissed most of the intellectual property infringement claims concerning a competing online room-planning software tool. The court held that plaintiff’s trade dress infringement and breach of contract claims failed, and that its copyright infringement claims failed, except for those allegations relating to the copying of computer code.

No trade dress protection where look and feel was functional

On the trade dress claim, plaintiff had identified fifteen elements that formed a cohesive “look and feel” of its software. And the court found – based on extensive use, wide advertisement and appearance in industry publications – that the trade dress had acquired secondary meaning. But the court found that the look and feel was merely functional and not subject to trade dress protection.

Copyright infringement – mixed bag

Similarly, the court dismissed the copyright infringement claim regarding the selection, arrangement and coordination of visual elements of the program. In the court’s view, these elements were merely functional and thus not subject to copyright protection. The court dismissed the copyright infringement claim as well concerning the tool’s graphics. On this point the court was even more bold – it found after a visual comparison of the works that they simply were not similar.

The court allowed the copyright infringement claim concerning the program’s code to move forward. It found that plaintiff had alleged both access and similarity. Plaintiff had also alleged that defendant repeatedly accessed the program to stress test the design, and that there were extensive similarities in the tools’ mechanics. These allegations were enough to survive a motion to dismiss.

Browsewrap not enough

Finally, the breach of contract claim failed, not on the basis of preemption as one might expect, but because the court found plaintiff had not sufficiently alleged that a contract had been formed. Plaintiff asserted that its website’s terms of service prohibited copying of the software, and that defendant’s employees should have been aware of those terms on a browsewrap theory – there was a link to the terms at the bottom of the page. But the court would not find that plaintiff alleged enough facts to plausibly allege that  defendant’s employees manifested assent to those browsewrap terms.

Design With Friends, Inc. v. Target Corporation, 2022 WL 4448197 (D. Delaware, September 23, 2022)

See also:

Restraining order issued against domain name seller who refused to transfer

restraining order domain name

Defendant listed a domain name for sale using DomainAgents. After a couple rounds of negotiation, plaintiff accepted defendant’s counteroffer to sell the domain name. But when the time came to put the domain name in escrow to enable transfer, defendant backed out of the deal, saying he had changed his mind. Plaintiff sued for breach of contract and sought a temporary restraining order that would prohibit defendant from transferring the domain name.

The court granted the motion. It agreed with plaintiff that it was appropriate to determine the motion ex parte (that is, without giving notice to the defendant) because the defendant could transfer the domain name in the meantime, thereby depriving plaintiff of the ability to procure an irreplaceable asset.

It found plaintiff would likely succeed on the merits of the breach of contract claim, because plaintiff had shown that a valid contract likely existed, that plaintiff was willing to perform its end of the bargain, that defendant had breached by refusing to go through with the transaction, and that plaintiff had been damaged due to the loss of the ability to procure the domain name from defendant.

The court further found a likelihood of irreparable harm to plaintiff, in that defendant’s communicated belief that he was not bound by the purchase agreement indicated he would sell the domain name to another interested party. If that were to happen, plaintiff would have no recourse against that purchaser, who was not in privity of contract with plaintiff.

Moreover, the court found the balance of equities favored plaintiff. The temporary restraining order would only be in place until a further hearing on injunctive relief could be had, and defendant would not otherwise be restricted from using the domain name in the meantime.

Finally, the court held that the public interest favored granting injunctive relief. The public interest strongly favors enforcing contracts.

Jump Operations, LLC v. Merryman, 2022 WL 1082641 (D. Nev., April 8, 2022)

See also:

Uber’s signup process did not create enforceable arbitration provision

After plaintiff Uber user was denied a ride because of her guide dog, she sued Uber for discrimination under Maine law. Uber sought to have the matter sent to arbitration and the court denied that motion. So Uber sought appeal with the Maine supreme court. That court affirmed the denial of the arbitration motion, finding that Uber’s terms of service were not binding on plaintiff.

First, plaintiff was not placed on reasonable notice that the terms existed. The hyperlink was not underlined and was muted by gray coloring. Its placement on the screen was “relatively inconspicuous.” There was a greater focus on entering payment information.

Second, the court found that even if the registration process had provided reasonable notice that the terms existed, the process was insufficient to place plaintiff on notice that her registration would constitute her assent to those terms. Merely clicking the “DONE” button in the signup process, in the court’s view, could merely have meant that plaintiff thought she was done entering her information, not signing up for an account. And that button appeared on the screen “as far as possible” from the notice and hyperlink to the terms, which were at the bottom of the screen.

Sarchi v. Uber Technologies, Inc., — A.3d —, 2022 WL 244113 (Maine, January 27, 2022)

Court refuses to enjoin use of fake accounts to access DRM-protected information

Plaintiff manufacturer of medical equipment sued a company that services such equipment for hospitals and clinics. Plaintiff claimed, among other things, that defendant violated the Computer Fraud and Abuse Act and the anticircumvention provisions of the Digital Millennium Copyright Act by using fake accounts to access proprietary documents, information and software that plaintiff had protected with digital rights management (DRM) technology.

The court denied plaintiff’s motion for preliminary injunction – which sought to bar defendant from accessing the computer systems or circumventing the DRM. It held that plaintiff had not met an essential element required for injunctive relief, namely, that plaintiff would suffer irreparable harm if the injunction was not granted.

There were two main reasons for the court’s decision. First, the court found that the assertions of irreparable harm were mere conclusions not supported by concrete facts. Second, the court found that the obligations on the defendant imposed by the contracts it had with its hospital and clinic customers would constrain defendant from engaging in the harmful activity that plaintiff sought to stop. For example, plaintiff claimed that defendant would access patient data without authorization. But the court noted that defendant was bound by confidentiality agreements and the obligation to abide by applicable data protection law. And plaintiff was worried that continued unauthorized access would increase the chances that defendant would modify the equipment. But again, the court looked to the contracts between defendant and its customers, which obligated defendant to properly maintain the equipment (thus removing any incentive to do what plaintiff was seeking to prevent).

Philips North America LLC v. Advanced Imaging Services, Inc., 2021 WL 6052285 (E.D. Cal., December 21, 2021)

Exploiting blockchain software defect supports unjust enrichment claim

blockchain unjust enrichment
Most court cases involving blockchain have to do with securities regulation or some other business aspect of what the parties are doing. The case of Shin v. ICON Foundation, however, deals with the technology side of blockchain. The U.S. District Court for the Northern District of California recently issued an opinion having to do with how the law should handle a person who exploits a software flaw to quickly (and, as other members of the community claim, unfairly) generate tokens.

Exploiting software flaw to generate tokens

Mark Shin was a member of the ICON Community – a group that includes users who create and transact in the ICX cryptocurrency. The ICON Network hosts the delegated proof of stake blockchain protocol. The process by which delegates are selected for the environment’s governance involves ICX users “staking” tokens. As an incentive to participate in the process, ICX holders receive rewards that can be redeemed for more ICX. The system does not give rewards, however, when a user “unstakes” his or her tokens.

When a new version of the ICON Network software was released, Shin discovered that he was immediately awarded one ICX token each time he would unstake a token. Exploiting this software defect, he staked and unstaked tokens until he generated new ICX valued at the time at approximately $9 million.

Bring in the lawyers

Other members of the community did not take kindly to Shin’s conduct, and took steps to mitigate the effect. Shin filed suit for conversion and trespass to chattel. And the members of the cryptocurrency community filed a counterclaim, asserting a number of theories against Shin, including a claim for unjust enrichment. Shin moved to dismiss the unjust enrichment claim, arguing that the community’s claim failed to state a claim upon which relief could be granted. In general, unjust enrichment occurs when a person has been unjustly conferred a benefit, including through fraud or mistake. Under California law (which applied in this case), the elements of unjust enrichment are (1) receipt of a benefit, and (2) unjust retention of the benefit at the expense of another.

Moving toward trial

In this case, the court disagreed with Shin’s arguments. It held that the members of the community had sufficiently pled a claim for unjust enrichment. It’s important to note that this opinion does not mean that Shin is liable for unjust enrichment – it only means that the facts as alleged, if they are proven true, support a viable legal claim. In other words, the opinion confirms that the law recognizes that Shin’s alleged conduct would be unjust enrichment. We will have to see whether Shin is actually found liable for unjust enrichment, either at the summary judgment stage or at trial.

Examining the elements of unjust enrichment, the court found that the alleged benefit to Shin was clear, and that the community members had adequately pled that Shin unjustly retained this benefit. The allegations supported the theory that Shin materially diluted the value of the tokens held by other members of the community, and that he “arrogated value to himself from the other members.” According to the members of the community, if Shin had not engaged in the alleged conduct, the present-day value of ICX would be even higher. (It will be interesting to see how that will be proven – perhaps one more knowledgeable than this author in crypto can weigh in.)

Shin v. ICON Foundation, 2021 WL 6117508 (N.D. Cal., December 27, 2021)

Copyright ownership transfers must be in writing

copyright

If you are hiring an independent contractor to create copyrightable subject matter, and you want to own the copyright in the resulting work product, be sure to have that contractor sign a written contract that specifically states that copyright ownership is being transferred. Even if you have paid the contractor for the work, and you both intend that ownership be transferred, the contractor will still own the copyright in the deliverables unless there is a writing, signed by the contractor, to the contrary. This is a key concern if your contractor has created subject matter that will be critical to your business – software, graphics, text, photos, any kind of protectable digital asset. If you do not secure ownership, the contractor may later object to how you are using the works differently than intended at the time of the contract, and claim infringement. Or the contractor could grant a license in the same work to another party, even one of your competitors.

The Copyright Act contains a couple of provisions that relate to this issue. The first one pertains to the definition of “work made for hire”. If an employee creates copyrightable subject matter within the scope of his or her employment, that is a work made for hire, and the employer owns the copyright. But note how that relates to employers and employees. Contractors are in a different category. There are other kinds of works that are “ordered or commissioned” that can be considered works made for hire, even if created by an independent contractor. But in any event, the Copyright Act says that these are works made for hire only “if the parties expressly agree in a written instrument signed by them that the work shall be considered a work made for hire.”

Let’s say you have not established that the contractor’s work is a “work made for hire”. You could still have the contractor assign his or her rights in the deliverables. Again, the Copyright Act requires this to be in writing. You cannot just agree on a handshake that ownership of copyright has been transferred. The statute provides that “[a] transfer of copyright ownership, other than by operation of law, is not valid unless an instrument of conveyance, or a note or memorandum of the transfer, is in writing and signed by the owner of the rights conveyed or such owner’s duly authorized agent.” Note that the contractor – the one making the assignment – has to sign the written document.

Paying attention to these issues on the front end of hiring an independent contractor will help ensure clear rights in the future, avoid future tangles and disagreements, and ultimately save time and money by avoiding costly dispute resolution.

Evan Brown is a technology and intellectual property attorney in Chicago. Twitter: @internetcases

No contract formed via URL to terms and conditions in hard copy advertisement

Online terms of service found at URL in hard copy advertisement were not enforceable.

terms of service

Plaintiff visited a Subway restaurant. One of the Subway employees referred plaintiff to an in-store, hard-copy advertisement. On the advertisement, Subway offered to send special offers to plaintiff if she texted a keyword to a short code. Plaintiff sent the text message to Subway, and Subway began responding, including by sending her, via text message, a hyperlink to an electronic coupon.

Later, plaintiff wanted to stop receiving the messages, so she requested that the messages cease. But they kept arriving. Plaintiff then sued under the Telephone Consumer Protection Act (“TCPA”). Subway moved to compel arbitration, arguing that a contract was formed because the printed in-store advertisement that contained the keyword and short code to text included a reference to and URL for “terms and conditions”. Those terms and conditions required plaintiff to settle the dispute by arbitration.

The lower court denied the motion to compel arbitration. Subway sought review with the Second Circuit Court of Appeals. On appeal, the court affirmed the denial of a motion to dismiss, finding that plaintiff was not bound by the terms and conditions.

The appellate court held that plaintiff was not on notice of the terms and conditions, which contained the arbitration clause, because Subway failed to demonstrate that such terms and conditions would be clear and conspicuous to a reasonable person in plaintiff’s position. More specifically, the court held that the following facts showed plaintiff did not know what the terms said:

  • Subway failed to provide evidence regarding the size of the advertisement at issue, or the print size contained within that advertisement;
  • the reference to “terms and conditions” was buried on the advertisement in a paragraph that was printed in significantly smaller font relative to the other text on the advertisement, and the reference itself was surrounded by a substantial amount of unrelated information;
  • the advertisement only vaguely referenced “terms and conditions,” and did not state that a consumer would be agreeing to those terms if she sent a text message to Subway’s short code, nor did it otherwise direct the consumer to such terms;
  • access to the terms and conditions on the Subway website required plaintiff to type in the URL text provided on the hard-copy print advertisement into an internet browser on her cell phone or some other device with internet browsing capabilities; and
  • once linked to the Subway website, the heading stated that it contained “terms of use for this website,” thus potentially suggesting to a reasonable person (searching for conditions of the promotional offer) that the website did not contain any terms or conditions beyond those relevant to the use of the website.

This combination of barriers led the court to conclude that the terms and conditions were not reasonably conspicuous under the totality of the circumstances and, thus, a reasonable person would not realize she was being bound to such terms and conditions by texting Subway in order to begin receiving promotional offers.

Soliman v. Subway Franchisee Advertising Fund Trust, Ltd., — F.3d —, 2021 WL 2324549 (2nd Cir. June 8, 2021)

Related: Court finds clickwrap independent contractor agreement enforceable

Murdered Uber passenger’s mom can keep her case in court and out of arbitration

An Uber driver murdered plaintiff’s son. So plaintiff – the Uber user’s mom – sued Uber for wrongful death. The lower court threw out the case, saying that the Uber terms and conditions required the matter to go to arbitration. Plaintiff sought review with the Georgia Court of Appeals. On review, the court reversed and sent the case back to the lower court.

The appellate court found that it was improper to dismiss the case because it was not clear that plaintiff’s son – the one killed by the Uber driver – actually agreed to the Uber terms and conditions that contained the provision requiring arbitration.

First, there was a dispute as to whether he even saw the link to the terms and conditions when he signed up for Uber in 2016. That’s because he was using an Android phone, and plaintiff alleged the on-screen keyboard within the app may have covered up the link to the terms and conditions.

Second, the court noted that even though Uber submitted evidence it emailed updated terms and conditions to plaintiff’s son, and that he continued using Uber thereafter (thereby binding him to the terms), it was unclear that the email was ever sent to plaintiff’s son. If the customer never saw those terms, they would not apply, and therefore arbitration would not be proper.

Thornton v. Uber Technologies, Inc., 2021 WL 1960199 (Ct. App. Ga. May 17, 2021)

Scroll to top