Our Training Courses

SilentWave offers a series of training courses on topics that sometimes are not well known, such as IT Law and Legal BIM, but which have now become critical to master in the process of digitizing work and collaboration.

Education1

Our Professional Trainer:
Diego Ganeo, Chief Legal Officer

Consultant specialized in IP/IT law with specific focus on cybersecurity, BIM, software copyright protection, employees’ digital supervision, IT licensing and procurement agreements.

Diego Ganeo LinkedIn

IT Law, Legal BIM and much more

Main topics that will be covered during the courses

Onsite Formula

Lectures and in-person workshops with final practical test at our Treviso (Italy) office

Online Formula

Video lessons and self-assessment tests with remote final meeting with the teacher for an open Q&A session

1st module: SOFTWARE AND INTELLECTUAL PROPERTY

  • the sources;
  • intellectual property under copyright law;
  • software as an intellectual work;
  • the object of protection;
  • the graphical interface;
  • form and idea in copyright;
  • the study of software principles;
  • the study of software principles: chance;
  • the acquisition of the right;
  • any formal registration;
  • trade secrets.
2nd module: RIGHTS OF ECONOMIC EXPLOITATION
  • the independence of exclusive rights of economic use;
  • the right of reproduction;
  • the right of reproduction without authorization: backup copy;
  • the right of modification;
  • the right of reproduction/modification without authorization: use and correction of errors;
  • the right of reproduction/modification without authorization: interoperability;
  • the right of reproduction/modification without authorization: interoperability: the case of Microsoft Corp.;
  • the right of distribution.
3rd module: THE SOFTWARE ON THE MARKET: THE CIRCULATION OF EXCLUSIVE RIGHTS
  • assignment and license;
  • assignment and principle of exhaustion;
  • assignment and assigned rights;
  • sales and licensing: the Autodesk case;
  • sales and licensing: the Oracle case - insights;
  • Creative Commons Public Licences.
4th module: THE SOFTWARE DEVELOPMENT AGREEMENT
  • contract and work contract;
  • ownership of the rights in the contract;
  • the practice of "body rental";
  • ownership of rights in the practice of "body rental";
  • collective work and work in communion;
  • the author, employee and/or self-employed.
5th module: THE DRAFTING OF LICENSING AGREEMENTS
  • subject of the contract;
  • license specifications;
  • payment methods;
  • sub-licenses and royalties.
6th module: THE PATENTABILITY OF THE SOFTWARE
  • patent: definition;
  • patent and software;
  • the IBM I case;
  • the 1st patentability requirement;
  • the VICOM case;
  • control of operation;
  • the X-ray Apparatus case;
  • the direct and potential effect;
  • the programming activity;
  • the Hitachi/Autction case.

1st module: GENERAL PRINCIPLES AND RIGHTS OF THE INTERESTED PARTY

  • sources;
  • definitions;
  • scope;
  • principles of application of the treatment;
  • special categories;
  • access to data;
  • modification and deletion of data;
  • profiling.
2nd module: HYPOTHESIS OF PERSONAL DATA PROCESSING
  • contract and data processor;
  • pseudonymization;
  • data processing and anonymization;
  • personal data breach;
  • data protection impact assessment;
  • DPO.

1st module: PUBLISHING OF ILLEGAL CONTENT

  • the facts;
  • the right to compensation for damage;
  • the responsibility of the ISP;
  • the duty to remove illegal content;
  • reporting tools.

1st module: CONTRACT FOR SOFTWARE DEVELOPMENT AND MAINTENANCE

  • Agile method;
  • AMS;
  • DTC.
2nd module: HOSTING
  • the subject of the contract;
  • framework of the atypical contract.
3rd module: PROCUREMENT WITH BIM METHOD
  • sources;
  • Information Specifications, oGI and pGI;
  • CDE (Common Data Environment);
  • ownership of the intellectual property conferred in CDE between the client and the designer/contractor;
  • Irrevocability of the BIM contract use license;
  • protection of intellectual property conferred in CDE between designers;
  • sublicense of use by the client in favor of the designers of the intellectual property conferred in CDE;
  • accessibility to the post-procurement CDE;
  • accessibility to the post-procurement CDE: the It's case;
  • CDE guarded by the contractor;
  • CDE guarded by the contractor: typical cases;
  • Host Contractor;
  • Host contractor: implications;
  • Host contractor: GDPR compliancy;
  • Host contractor and right of retention;
  • Host contractor: the Trant case.

1st module:

  • incident and breach;
  • accidental subtraction: portable device;
  • accidental subtraction: cases;
  • accidental subtraction: unintended disclosure;
  • voluntary abduction: insider;
  • voluntary abduction: cases and Italian jurisprudence;
  • security policy;
  • BIM contract security policy;
  • account management;
  • personal data breach: pseudonymisation and encryption;
  • personal data breach: security measures;
  • access management: segregation;
  • access management: credentials;
  • credentials recovery: cases;
  • strong authentication;
  • phishing;
  • key loggers;
  • long term data retention;
  • data deletion: cases.

Request your customized solution

Choose one or more lectures of your interest and the onsite or online formula and we will send you an offer tailored to your needs.

Watch the IT Law videoblog on YouTube

Listen to the IT Law podcast on Spotify