Browse Definitions :
Definition

limitation of liability clause

Contributor(s): Ivy Wigmore

A limitation of liability clause (sometimes referred to simply as a liability clause) is the section in a contracted agreement that specifies the damages that one party will be obligated to provide to the other under terms and conditions stipulated in the contract.

In a legal context, a liability is generally a responsibility to compensate for some failure to perform according to an established or agreed-upon stipulation. Because there is an element of risk inherent in most business agreements, limitation of liability clauses are common in all areas of contract law.

In IT, limits of liability clauses are typically written into contracts between any two parties, including distribution agreements,  software license agreements and service-level agreements. In a software license agreement, for example, the limitation of liability is one of the most important clauses because it limits the amount and types of damages one party can recover from the other party. For example, if the software doesn't work and the company suffers damages as a result, the limitation of liability will restrict the company's ability to recoup its loss.

Because a limitation of liability clause typically favors whichever party drafted the agreement -- usually the vendor -- it's particularly important to negotiate that part of the contract after careful consideration. 

 

This was last updated in June 2014

Continue Reading About limitation of liability clause

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close