Microsoft EA Legal Advisory

Microsoft EA Contract Guide for Legal Teams — Key Terms and How to Negotiate Them

Microsoft Enterprise Agreements are among the most commercially significant contracts an organisation signs — yet the legal terms are routinely under-reviewed. The EA's layered document structure, quarterly-updating Product Terms, and Microsoft-favourable default positions on liability, audit rights, and termination create risks that IT procurement negotiations alone cannot address. This guide provides the clause-by-clause legal review framework, redline priorities, and negotiation strategies that in-house counsel need to protect the organisation.

By Redress Compliance February 2026 22 min read
Microsoft Knowledge Hub Microsoft Advisory Services EA Contract Guide for Legal Teams
📖 This article is part of our Microsoft EA negotiation series. For pricing and commercial strategy, see Negotiating Azure Enterprise Agreements. For audit defence, see Microsoft Audit Defense Service. For AI data terms, see AI Data Usage & Privacy Terms.
7+ DocumentsThe layered EA structure — Enrollment, MBSA, Product Terms, DPA, SLA, Use Rights, OST
QuarterlyFrequency of Microsoft Product Terms updates that automatically flow into your EA
$0 DefaultMicrosoft's standard liability cap for most direct damages — effectively uncapped for you, capped for them
30 DaysStandard cure period before Microsoft can suspend services for non-compliance

The EA Document Stack — Understanding What You Are Actually Signing

The first challenge for legal teams is that a Microsoft Enterprise Agreement is not a single contract — it is a layered stack of interconnected documents, each with its own update cadence, governing terms, and negotiability. Signing the EA Enrollment without reviewing the full stack is equivalent to signing a lease without reading the building regulations it incorporates by reference.

DocumentPurposeUpdate FrequencyNegotiabilityLegal Priority
Enterprise EnrollmentThe commercial terms — products, quantities, pricing, discounts, payment scheduleFixed at signing for the 3-year termHigh — this is where most commercial negotiation occursMedium — primarily commercial, but contains key definitions and scope provisions
Microsoft Business and Services Agreement (MBSA)Master legal framework — liability, indemnification, governing law, dispute resolutionFixed at signing (unless amended)Moderate — Microsoft will negotiate key clauses for large dealsCritical — contains the core legal protections (or lack thereof)
Product TermsProduct-specific licensing rules, use rights, restrictions, and definitionsQuarterly — Microsoft updates every January, April, July, OctoberVery low — these are standard terms that apply to all customersHigh — defines what you can and cannot do with every Microsoft product
Data Protection Addendum (DPA)Data processing terms, GDPR compliance, sub-processor commitments, breach notificationUpdated periodically (typically annually)Moderate — enhanced terms available for regulated industriesCritical — governs all personal data processing across Microsoft services
Online Services Terms (OST)Cloud-specific terms for Azure, M365, Dynamics 365Monthly (incorporated by reference from Product Terms)Low — standard terms with limited negotiation scopeHigh — governs cloud service availability, data handling, and SLAs
Service Level Agreements (SLAs)Uptime commitments and service credit remedies for Azure, M365, DynamicsUpdated periodicallyLow — standard credits are rarely enhanced through negotiationMedium — credits are typically modest; focus on operational impact clauses instead
Side Letters / AmendmentsCustom terms that modify or supplement the standard documentsFixed at signingHigh — this is where non-standard legal protections are documentedCritical — your primary vehicle for enhanced legal protections beyond Microsoft's standard positions

The critical legal risk in this structure is the "as updated" incorporation. The Product Terms, OST, and SLAs are incorporated by reference and updated regularly — meaning Microsoft can change the terms governing your use of its products without your explicit consent. The terms that applied when you signed the EA may not be the terms that apply in Year 2 or Year 3. For most commercial provisions, this is manageable. For data handling, AI data usage, and product use rights, it creates a moving target that legal teams must monitor throughout the EA term.

"The most common legal mistake in EA negotiations is focusing exclusively on the Enrollment — the commercial document — while rubber-stamping the MBSA. The Enrollment determines how much you pay. The MBSA determines what happens when things go wrong: data breaches, service outages, compliance disputes, and contract termination. Legal teams should invest as much review time in the MBSA as procurement invests in the Enrollment pricing."

Liability and Indemnification — Microsoft's Most One-Sided Provisions

Microsoft's standard MBSA contains liability provisions that are heavily favourable to Microsoft. Understanding these provisions — and knowing which ones are negotiable — is essential for any legal review.

⚠️

Liability Cap — Microsoft's Position

Microsoft's standard MBSA caps Microsoft's aggregate liability for direct damages at the amount the customer paid for the applicable product or service during the 12 months preceding the claim. For a $5M EA, this means Microsoft's maximum exposure is $5M — regardless of the actual damages caused by a breach, outage, or data loss. For Azure services billed on consumption, the cap may be calculated on a per-service basis, creating even lower individual caps. Consequential, incidental, and special damages are mutually excluded.

💰

What to Negotiate

Push for: (a) a higher liability cap — at minimum, the total EA value over the full term rather than a trailing 12-month calculation; (b) carve-outs from the cap for specific high-risk scenarios — data breaches, IP infringement, confidentiality violations, and wilful misconduct should not be subject to the general cap; (c) a floor on Microsoft's liability for data breaches — the standard cap is inadequate when a breach exposes millions of records. Microsoft will negotiate enhanced caps for deals above $5M annually, particularly when competitive pressure exists.

🛡️

IP Indemnification

Microsoft's standard MBSA includes a mutual IP indemnification clause — Microsoft indemnifies you against third-party IP infringement claims arising from Microsoft products, and you indemnify Microsoft against claims arising from your content and data. The IP indemnification is one of Microsoft's stronger standard protections. However, verify that it extends to all products in your EA — including Azure OpenAI, Copilot, and third-party marketplace offerings. Microsoft's Copilot Copyright Commitment provides additional AI-specific IP indemnification but has conditions worth reviewing.

📝

Limitation of Remedies

Beyond the liability cap, Microsoft's standard terms limit your remedies for service failures to service credits under the applicable SLA. For Azure, M365, and Dynamics, SLA credits are typically 10–100% of the monthly service fee for the affected service — not total contract value. For mission-critical workloads, SLA credits are inadequate compensation for a major outage. Negotiate enhanced remedies: early termination rights triggered by repeated SLA failures, and direct damage claims for outages exceeding defined duration thresholds.

Data Privacy and the DPA — What the Standard Terms Cover (and What They Miss)

Microsoft's Data Protection Addendum (DPA) is one of the more comprehensive vendor DPAs in enterprise technology. It establishes Microsoft as a data processor, commits to GDPR compliance, provides sub-processor transparency, and includes breach notification obligations. For many organisations, the standard DPA is adequate for general M365 and Azure usage.

However, the DPA has gaps that become significant in specific regulatory contexts. The DPA was written primarily for traditional cloud services — email, file storage, compute — and has been extended to cover AI services like Copilot and Azure OpenAI through updates rather than purpose-built provisions. For organisations in regulated industries (financial services, healthcare, government) or jurisdictions with strict data localisation requirements (EU, UAE, certain APAC markets), the standard DPA leaves critical questions unaddressed.

1

Verify Sub-Processor Transparency and Notification

Microsoft maintains a list of sub-processors for each online service. The standard DPA commits Microsoft to providing notice of new sub-processors — but the notice mechanism and your ability to object vary by service. Negotiate: (a) a minimum 30-day advance notice before a new sub-processor is engaged, (b) a contractual right to object to specific sub-processors that present compliance risks, and (c) confirmation that all sub-processors are bound by data protection obligations equivalent to those in your DPA.

2

Address Cross-Border Data Transfer Mechanisms

Microsoft relies on Standard Contractual Clauses (SCCs), the EU-US Data Privacy Framework, and supplementary measures for cross-border transfers. For organisations subject to Schrems II scrutiny, verify: (a) that the SCCs incorporated in the DPA are the current EU Commission-approved versions, (b) that Microsoft's supplementary measures (encryption, access controls, legal challenge commitments) are documented and contractually binding, and (c) that you have the right to restrict data processing to specific regions if regulatory requirements change during the EA term.

3

Negotiate Enhanced Breach Notification Terms

Microsoft's standard breach notification is 72 hours — aligned with GDPR Article 33. For organisations requiring faster notification (financial services regulators often expect 24–48 hours), negotiate: accelerated notification timelines (24 hours for initial notification, detailed report within 5 business days), a specific definition of "personal data breach" that aligns with your regulatory requirements, and root cause analysis obligations within 30 days. These enhanced terms are increasingly standard for financial services and healthcare customers.

Audit Rights and Compliance — Protecting Against Microsoft's Verification Process

Microsoft reserves the right to audit your compliance with EA licensing terms — a right that can result in significant financial exposure if the audit reveals under-licensing. Understanding the audit clause and negotiating reasonable protections is essential for legal teams.

Audit ProvisionMicrosoft's Standard PositionWhat to NegotiateTypical Outcome
Audit TriggerMicrosoft may request a self-audit at any time with 30 days' notice; can escalate to an independent third-party auditLimit audits to once per 12-month period; require 60 days' notice; no audit in the final 6 months of the EA termMicrosoft typically agrees to 12-month frequency limits; 60-day notice is achievable for large deals
Audit ScopeBroad — covers all Microsoft products deployed across all enrolled entitiesLimit scope to products specifically identified in the audit notice; exclude products with cloud-based licence management (M365, Azure) where deployment data is already visible to MicrosoftModerate success — Microsoft may agree to targeted scope but reserves the right to expand if initial findings warrant
Audit CostCustomer bears the cost of the self-audit; Microsoft bears third-party audit cost unless material non-compliance is foundDefine "material non-compliance" threshold (e.g., greater than 5% under-licensing by value); require Microsoft to bear all audit costs regardless of findingsDefining the materiality threshold is achievable; shifting all costs to Microsoft is difficult except for very large deals
Remediation Period30 days to cure identified non-compliance by purchasing additional licences at then-current list priceExtend to 90 days; require that remediation purchases are at EA discount rates (not list price); allow operational changes (decommissioning) as valid remediation60–90 day cure periods are commonly negotiated; EA pricing for remediation is achievable with persistence
Dispute ResolutionLimited — Microsoft's audit findings are typically presented as finalInclude a right to challenge audit findings through an independent technical review; define an escalation process before any financial settlementAchievable — Microsoft's audit process allows for discussion, but contractual dispute rights provide stronger protection

⚠️ The True-Up Trap — A Legal Risk Disguised as a Commercial Process

The EA's annual true-up process requires you to report any additional Microsoft products deployed during the year and pay for them at EA rates. What many legal teams overlook is that the true-up is effectively a self-audit with financial consequences. Under-reporting in a true-up — whether through error, incomplete inventory, or misunderstanding of licensing rules — creates a compliance gap that Microsoft can later identify in a formal audit. Ensure the EA includes: (a) a good-faith standard for true-up reporting (not strict liability), (b) the ability to correct true-up errors within 60 days of discovery without penalty, and (c) confirmation that true-up reporting does not constitute an admission of additional licensing obligations beyond what is actually deployed. See our guide on common Microsoft audit findings for the compliance issues most frequently identified.

Renewal and Termination — Avoiding the Auto-Pilot Trap

EA renewal and termination terms are among the most commercially significant provisions in the agreement — yet they receive disproportionately little legal attention until the renewal date is imminent.

High Risk

Auto-Renewal Provisions

Microsoft's standard EA includes an auto-renewal mechanism that extends the agreement for an additional year if you do not provide written notice of non-renewal within a specified window (typically 30–90 days before expiry). Auto-renewal locks you into another year at existing terms — potentially without the updated pricing, flexibility provisions, or product changes you would negotiate in a formal renewal. Negotiate: extend the non-renewal notice period to 180 days, and require Microsoft to provide a written renewal proposal 12 months before expiry to allow adequate evaluation time.

Medium Risk

Termination for Convenience

Microsoft's standard EA does not include a customer termination-for-convenience right. You are committed for the full 3-year term. Early termination typically requires paying out the remaining commitment. Negotiate: a termination-for-convenience right with reasonable wind-down provisions (e.g., 180 days' notice plus completion of the current annual period), or at minimum, a right to reduce the commitment by a defined percentage annually without termination. This is particularly important for organisations undergoing M&A, restructuring, or cloud strategy changes.

Manageable

Post-Termination Rights

When an EA expires or terminates, what happens to your data, your licences, and your ability to continue using Microsoft services during transition? Microsoft's standard terms provide a limited wind-down period. Negotiate: (a) a minimum 12-month data extraction period after termination, (b) the right to continue using on-premises licences purchased (not subscribed) during the EA term in perpetuity, (c) confirmation that transition to CSP or MCA does not trigger loss of accumulated licence entitlements, and (d) data return or deletion obligations within 90 days of the extraction period.

Price Lock and Product Changes — Protecting Against Mid-Term Erosion

The EA is designed to provide pricing predictability over a 3-year term. But Microsoft's standard terms include mechanisms that can erode this predictability — product retirements, SKU changes, and the quarterly-updating Product Terms that may alter use rights mid-contract.

Microsoft typically provides price protection for the products and quantities in the initial Enrollment — your negotiated rates are locked for the EA term. However, this protection has important limitations. New products added during the term (through true-ups or amendments) may be priced at then-current rates, not at the rates negotiated at signing. Product retirements may force migration to replacement products with different pricing structures. And the Product Terms updates may change what constitutes compliant usage of a product you are already paying for.

🎯 Price and Product Protection Checklist

Governing Law, Jurisdiction, and Dispute Resolution

Microsoft's standard MBSA specifies Washington State law as the governing law and Washington State courts (or the Western District of Washington for federal claims) as the exclusive jurisdiction. For US-based organisations, this is generally acceptable — Washington commercial law is well-developed and predictable. For organisations headquartered outside the US, particularly those in the EU, Middle East, or Asia-Pacific, the default governing law and jurisdiction may be inappropriate and should be negotiated.

Microsoft is willing to negotiate governing law for large international deals. EU customers have successfully negotiated Irish law (where Microsoft's European subsidiary is based), English law, or the law of the customer's home jurisdiction. The key is requesting the change early — governing law is a legal decision that requires approval from Microsoft's Corporate, External, and Legal Affairs (CELA) team, and late-stage requests are often declined due to the internal review timeline.

Dispute resolution mechanisms in the standard MBSA default to litigation. For international customers, arbitration may be preferable — it avoids the complexities of cross-border litigation and offers more predictable enforcement. Negotiate an arbitration clause specifying: a recognised institution (ICC, LCIA, or AAA), a neutral seat (e.g., London, Singapore, or the customer's home jurisdiction), and English as the language of proceedings. Microsoft accepts arbitration clauses in international EAs more readily than many enterprises assume.

Mini Case Study

Global Manufacturer: Comprehensive EA Legal Review Prevents $4.2M Exposure

Situation: A global manufacturer with $18M annual Microsoft spend was renewing its 3-year EA. The IT procurement team had negotiated a 22% discount on M365 and Azure. Legal was asked to "review and approve" the agreement in the final two weeks before signing. The legal team's review identified five significant issues in the MBSA and Enrollment.

What we found: (1) The liability cap was limited to 12 months of fees for the affected service — for a $2M/year Azure subscription, Microsoft's maximum liability for an Azure data breach was capped at $2M regardless of actual damages. (2) The audit clause allowed unlimited audits with 30 days' notice and remediation at list price (not EA rates). (3) Auto-renewal triggered after 60 days' non-renewal notice — a window the manufacturer had missed in a previous EA cycle. (4) No Product Terms change notification — Microsoft could alter use rights mid-term without notice. (5) No AI data terms — the manufacturer planned to deploy Copilot to 8,000 users but had no contractual protections for AI data handling.

Result: Over a 6-week negotiation, we secured: liability cap increased to total 3-year EA value ($54M) with unlimited liability for data breach and confidentiality violations; audit frequency limited to once per 18 months with 90-day notice and remediation at EA rates; auto-renewal notice extended to 180 days with mandatory Microsoft renewal proposal 12 months before expiry; 90-day advance notice of material Product Terms changes; and a comprehensive AI Data Addendum covering Copilot deployment. Estimated risk reduction: $4.2M in avoided exposure.
Takeaway: The procurement team's 22% discount saved $3.9M annually. The legal team's 6-week review reduced risk exposure by $4.2M. Both are essential — but the legal review is frequently deprioritised because its value is in risk prevention rather than visible cost savings. Legal should be engaged at the start of EA negotiations, not asked to approve terms at the end.

Negotiation Strategy for Legal Teams — Process and Timing

Effective legal negotiation of EA terms requires a different approach than commercial pricing negotiation. Microsoft's legal stakeholders (the CELA team) operate on different timelines, authority structures, and priorities than the commercial sales team. Understanding this dynamic allows legal teams to secure better outcomes.

1

Engage Legal from Day One — Not at the Finish Line

The most common pattern — legal receives the draft agreement 2–3 weeks before the planned signing date and is asked to "review and approve" — produces the worst outcomes. Microsoft's CELA team requires 4–6 weeks minimum to review, approve, and process non-standard legal terms. If legal raises issues late in the process, either the signing is delayed (frustrating all parties) or the legal issues are deferred (creating unaddressed risk). Legal should receive the MBSA and DPA at the same time procurement receives the initial pricing proposal.

2

Submit a Consolidated Redline — Not Piecemeal Comments

Microsoft's CELA team processes legal requests more efficiently when they receive a single, consolidated redline document covering all requested changes to the MBSA, DPA, and any addenda. Piecemeal comments sent over multiple emails create tracking problems and delays. Prepare your complete redline, prioritise issues as "must-have" versus "nice-to-have," and submit it as a single package with a cover memo explaining the rationale for each requested change.

3

Frame Legal Requests as Risk-Based — Not Preference-Based

Microsoft's CELA team approves non-standard terms based on risk assessment, not customer preference. Framing requests as regulatory requirements or risk-mitigation obligations — "GDPR requires us to have sub-processor notification rights" or "our board mandates unlimited liability for data breaches in all vendor contracts" — triggers a different review process than "we would prefer a higher liability cap." Provide the regulatory or governance basis for each request in your cover memo.

4

Use Side Letters for Non-Standard Provisions

Microsoft is more willing to agree to non-standard terms in a side letter (a separate document that supplements or modifies the standard MBSA) than to redline the MBSA itself. Side letters allow Microsoft to maintain its standard template for other customers while accommodating your specific requirements. Common side letter provisions include: enhanced liability caps, specific audit limitations, AI data terms, governing law changes, and custom termination rights. Request that side letters survive EA renewal and transition to MCA to avoid renegotiating the same protections at each renewal.

"The single most valuable clause legal teams can negotiate into a Microsoft EA is the side letter survival provision — a confirmation that all non-standard terms negotiated in the current EA carry forward into the renewal or transition agreement. Without this, every EA renewal or MCA migration requires renegotiating the same liability caps, audit protections, and data terms from scratch. A survival provision converts a one-time negotiation win into a permanent contractual protection."
Mini Case Study

Financial Services Group: Side Letter Strategy Across Three EA Cycles

Situation: A financial services group with $25M annual Microsoft spend had negotiated a comprehensive side letter during its 2019 EA covering enhanced liability, audit protections, and data handling terms. During the 2022 EA renewal, Microsoft's new account team was unfamiliar with the side letter and proposed standard MBSA terms.

What happened: Because the original side letter did not include a survival provision, the financial services group's legal team had to renegotiate every enhanced provision from scratch — a process that took 10 weeks, delayed the renewal by 6 weeks beyond the planned signing date, and required re-engagement with Microsoft's CELA team. After successfully re-securing the same protections, we added a survival clause: "All provisions in this Side Letter shall survive the expiration or non-renewal of the current Enrollment and shall apply to any successor Enterprise Enrollment, Microsoft Customer Agreement, or equivalent licensing agreement between the parties."

Result: When the 2025 EA renewal commenced, the side letter provisions carried forward automatically. The legal review that had taken 10 weeks in 2022 took 2 weeks in 2025 — focused only on new requirements (AI data terms and EU AI Act compliance) rather than re-litigating settled protections. The survival provision saved an estimated $150K in legal fees and 8 weeks of delay over the two subsequent renewal cycles.
Takeaway: Every non-standard provision negotiated into a Microsoft EA should include a survival clause. The effort to negotiate enhanced terms is significant — legal teams should ensure that effort compounds over time rather than resetting to zero at each renewal. This is the single highest-ROI clause in any EA side letter.

Frequently Asked Questions — Microsoft EA Legal Terms

Can we negotiate Microsoft's standard MBSA terms?
Yes — for deals above approximately $3M–$5M annually, Microsoft will negotiate key MBSA provisions. The most commonly negotiated terms are liability caps, audit provisions, governing law, and termination rights. Microsoft is more receptive to changes documented in side letters (separate supplemental agreements) than to redlining the MBSA template directly. Engage Microsoft's CELA team early and present a consolidated redline with regulatory or governance rationale for each requested change. Smaller deals have less leverage, but even mid-market customers can negotiate specific provisions when requests are framed as regulatory requirements.
What is the biggest legal risk in a Microsoft EA?
The quarterly-updating Product Terms incorporated by reference. Unlike the MBSA and Enrollment (which are fixed at signing), the Product Terms change every quarter — and those changes flow automatically into your EA. Microsoft can alter use rights, add restrictions, or change licensing rules for products you are already paying for. The risk is that compliant usage under January's Product Terms becomes non-compliant under April's Product Terms, creating audit exposure through no action of your own. Negotiate a Product Terms change notification clause requiring 90 days' advance notice of material changes, and a right to maintain existing use rights for enrolled products if changes are adverse.
How do we protect against audit exposure in the EA?
Negotiate five specific provisions: (1) audit frequency limit — no more than once per 12–18 months; (2) extended notice period — 60–90 days rather than 30; (3) remediation at EA rates — any shortfall identified in an audit is purchased at your negotiated EA discount, not list price; (4) right to cure through operational changes — decommissioning non-compliant usage should be a valid remediation alternative to purchasing additional licences; (5) dispute resolution mechanism — a right to challenge audit findings through independent technical review before financial settlement. See our Microsoft Audit Defense Service for comprehensive audit protection guidance.
Should we negotiate AI and Copilot terms in the EA?
Absolutely — and the EA renewal is the best time to do it. AI data terms are most negotiable when tied to a commercial commitment (Copilot deployment, Azure OpenAI adoption). Include in your EA negotiation: explicit data residency guarantees for AI processing, abuse monitoring opt-out rights for sensitive workloads, AI output IP assignment, terms freeze provisions preventing unilateral AI data handling changes, and enhanced breach notification for AI-related incidents. See our detailed guide on AI Data Usage & Privacy Terms.
What happens to our licences if we do not renew the EA?
This depends on whether your licences are perpetual (purchased) or subscription-based. Perpetual licences (e.g., Windows Server, SQL Server purchased under the EA with Software Assurance) remain yours after the EA expires — you retain the right to use the software version current at the time SA expired. Subscription licences (M365, Dynamics 365, Azure) terminate when the EA expires — you lose access unless you transition to another agreement (MCA, CSP, or a new EA). Negotiate: a minimum 12-month data extraction period after termination, continuation of subscription services during transition at existing rates, and written confirmation of perpetual licence entitlements that survive the EA.
How should we handle governing law for international EAs?
Microsoft defaults to Washington State law and jurisdiction. For international organisations, negotiate governing law that aligns with your primary jurisdiction — Irish law for EU entities, English law for UK entities, or local law for Middle East and APAC organisations. Include an arbitration clause (ICC, LCIA, or regional equivalent) with a neutral seat for cross-border disputes. Submit the governing law change request early — Microsoft's CELA team requires 4–6 weeks to approve jurisdiction changes. Late-stage requests are often declined due to the internal review timeline.
What is a side letter and why should we request one?
A side letter is a separate agreement that supplements or modifies the standard MBSA, DPA, or Enrollment terms. Microsoft prefers side letters over direct MBSA redlines because they allow Microsoft to maintain its standard template while accommodating customer-specific requirements. Side letters are the primary vehicle for enhanced legal protections: higher liability caps, audit limitations, AI data terms, governing law changes, and custom termination rights. Critically, include a survival clause in every side letter confirming that all provisions carry forward to future Enrollments, MCAs, or equivalent agreements — otherwise you must renegotiate from scratch at each renewal.

Need Legal Support for Your Microsoft EA Negotiation?

Redress Compliance provides independent Microsoft EA contract advisory — from MBSA redline review and DPA negotiation to AI data addenda and side letter strategy. We help legal teams secure enhanced protections that procurement negotiations alone cannot achieve.

Book a Free Consultation → Microsoft Contract Negotiation Service

📚 Microsoft EA Negotiation — Article Series

Related Resources

FF

Fredrik Filipsson

Co-Founder, Redress Compliance

Fredrik Filipsson brings over 20 years of enterprise software licensing expertise, having worked directly for IBM, SAP, and Oracle before co-founding Redress Compliance. With extensive experience supporting in-house legal teams through Microsoft EA negotiations, MBSA redline reviews, and DPA negotiations, Fredrik leads the firm's multi-vendor advisory practice from offices in Fort Lauderdale, Dublin, and Dubai.

← Back to Microsoft Knowledge Hub