{"version":"1.0","provider_name":"Ulys","provider_url":"https:\/\/www.ulys.net\/nl\/","author_name":"chris@akimedia.be","author_url":"https:\/\/www.ulys.net\/nl\/author\/chrisakimedia-be\/","title":"Computerrecht, IT-Overeenkomsten - Ulys","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MiZG20r942\"><a href=\"https:\/\/www.ulys.net\/nl\/onze-bekwaamheden\/veiligheid-computerrecht-it-overeenkomsten\/\">Computerrecht, IT-Overeenkomsten<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ulys.net\/nl\/onze-bekwaamheden\/veiligheid-computerrecht-it-overeenkomsten\/embed\/#?secret=MiZG20r942\" width=\"600\" height=\"338\" title=\"&#8220;Computerrecht, IT-Overeenkomsten&#8221; &#8212; Ulys\" data-secret=\"MiZG20r942\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ulys.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ulys.net\/wp-content\/uploads\/2017\/06\/student-849825_1920.jpg","thumbnail_width":1920,"thumbnail_height":1280,"description":"Informatica-overeenkomsten Of het nu gaat over de onderhandeling van de overeenkomst aan de zijde van de cli\u00ebnt, dan wel de opstelling ervan volgens diens instructies, het kantoor kan dankzij de perfecte beheersing van het recht en van de informatica een tekst op maat afleveren (uitbestedingsovereenkomst, onderhoudsovereenkomst, cloud computing, SAAS-IAAS-PAAS, softwarelicentie), welke de nodige bescherming biedt... Bekijk Artikel"}