IT & tech disputes: SaaS, outsourcing, software development, escrow (delivery conflicts and IP)
This service is for companies in software, SaaS and outsourcing projects where delivery, acceptance, change requests and IP rights become contested. We build the case around documents and technical proof, identify the contractual leverage points, and choose the proportional route: negotiation, escalation notices, interim measures, arbitration or court litigation. Your first step is to send the contract package and the timeline.
When you need this
- Your SaaS does not meet agreed uptime, performance or security parameters and you need a defensible exit or remediation plan.
- A software delivery is delayed, incomplete or rejected at acceptance.
- There is a dispute over scope, change requests and what is “included” in the price.
- You suspect the other side is using your code, data or IP beyond the agreed license.
- Source code escrow is requested (or triggered) and you need a controlled process.
- Key evidence is digital (tickets, logs, repos, emails) and must be preserved correctly.
- You need to quantify damages and manage expert involvement without losing procedural credibility.
- The contract is cross-border and forum selection (court vs arbitration) matters for enforceability.
What we do in practice (step by step)
- Collect and review the contract stack: MSA, SOWs, SLAs, DPAs, annexes, change orders, licensing terms.
- Build a technical and legal timeline: scope, milestones, acceptance, defects, notices, remediation attempts.
- Preserve digital evidence defensibly: tickets, logs, repositories, audit trails and communications.
- Clarify IP positioning: ownership, licensing, assignment, third-party components, open-source obligations.
- Draft escalation notices and reservation of rights, aligned with termination and penalty mechanics.
- Assess interim options: evidence preservation and asset protection where necessary.
- Choose the dispute route: negotiation/ADR, arbitration or court, with cost and enforcement planning.
- Manage experts and quantum: define questions, ensure traceable methodology, and align with procedural rules.
Documents and information helpful for the first assessment
| Document | Why it matters | Notes |
|---|---|---|
| Contract package (MSA/SOW/SLA/DPA) | Defines scope, acceptance, remedies, IP and confidentiality | Include all versions and annexes |
| Project documentation | Shows what was agreed operationally | Specs, user stories, backlog, roadmap |
| Acceptance and defect evidence | Key for breach and cure analysis | Acceptance reports, UAT notes, ticket exports |
| Technical logs and repositories | Supports causation and authenticity | Preserve metadata and access logs where possible |
| Escrow arrangements (if any) | Controls source-code release triggers | Escrow agreement, deposit confirmations |
| Commercial impact data | Needed for damages and settlement framing | Invoices, churn, downtime impact, mitigation costs |
Risks and common mistakes
- Relying on verbal scope while the written SOW/SLA says otherwise.
- Not preserving digital evidence early (tickets, logs, repos), leading to proof gaps later.
- Sending escalation emails that inadvertently admit facts or waive contractual rights.
- Terminating without following notice and cure mechanics, creating counterclaims exposure.
- Ignoring IP chain-of-title and open-source obligations until the dispute escalates.
- Using experts late, without a clear methodology tied to the contract and timeline.
- Escrow handled informally, without controlled triggers and documented deposits/releases.
FAQ
What usually decides a software delivery dispute: contract or technical reality?
Both: the contract sets acceptance and remedies, while technical evidence (logs, tickets, repositories) shows what actually happened; winning strategies align the two with a coherent timeline.
How do we preserve digital evidence defensibly?
We identify the relevant systems, export records with metadata where possible, keep chain-of-custody notes, and avoid altering the original sources; the exact method depends on the platforms involved.
When does IP ownership become the main battlefield?
IP becomes central when code reuse, licensing scope, assignment gaps or subcontractor contributions are disputed; early chain-of-title mapping often prevents strategic surprises.
What is source code escrow and when is it triggered?
Escrow is a contractual mechanism to deposit source code with a neutral party and release it upon defined triggers (for example, provider failure); triggers and verification must be handled strictly as written.
Should we go to court or arbitration for an IT dispute?
The choice depends on the contract clause, cross-border enforceability, confidentiality needs, urgency measures and costs; we map the decision using your facts and the enforceability target.
Information is general and does not replace legal advice. Facts, documents and chronology matter.
Relevant internal links
- Legal strategy for IT businesses in Romania (contractual foundations)
- International contracts with Romanian partners: clauses that decide the dispute
- Legal fees – how we structure billing
- Contact lawyer in Bucharest
Sources
- Law no. 8/1996 on copyright and related rights (Portal Legislativ)
- Directive 2009/24/EC on the legal protection of computer programs (EUR-Lex)
- Directive (EU) 2016/943 on the protection of trade secrets (EUR-Lex)
- Regulation (EU) 2016/679 (GDPR) (EUR-Lex)
- Directive (EU) 2019/770 on contracts for the supply of digital content and digital services (EUR-Lex)
- Regulation (EU) No 910/2014 (eIDAS) (EUR-Lex)
- Romanian Data Protection Authority (ANSPDCP) – official site
- Romanian Copyright Office (ORDA) – official site
