John K. Halvey

Updated at: May 21, 2007, 2:21 a.m.

John K. Halvey is a partner in the New York office of the international law firm of Milbank, Tweed, Hadley & McCloy and the founder of the Technology Finance & Outsourcing Group.

Mr. Halvey practices in all areas of technology law, with particular emphasis on information technology and business process outsourcing and venture capital transactions. His work includes information technology, telecommunications and business process outsourcing, electronic commerce, venture capital, technology joint ventures, strategic alliances, software licensing and technology acquisitions and financing. Mr. Halvey has represented companies in many of the largest technology, telecommunications and business process outsourcing transactions, including Deutsche Bank, BellSouth, General Motors, DuPont, AT&T, Cendant, Alcatel, Xerox, Boeing, Hughes, Bombardier and the Commonwealth Bank of Australia. His work in this area has been the subject of articles in Forbes, Information Week, Computer World, CIO Magazine, The Daily Deal and Venture Capital Journal.

In 1995, Crain's named Mr. Halvey on its list of the 40 most successful people under 40 in New York City. His latest book, Business Process Outsourcing Transactions: Process, Strategies and Contracts was published in 2000. Other books by Mr. Halvey are: Information Technology Outsourcing Transactions: Process, Strategies and Contracts, published in March, 1996 by John Wiley & Sons; Data Processing Contracts published by Van Nostrand Reinhold in 1989 and Computer Law and Related Transactions, published in 1994 by The Michie Company.

In addition, Mr. Halvey served for two years as an Executive Vice President of Safeguard Scientifics, Inc., a technology operating and holding company. While at Safeguard, Mr. Halvey was the head of Software and eServices Group.

Mr. Halvey is a graduate of Tufts University, Emory University School of Business and Emory University School of Law.


Related Books

Implementing Internet Security: Survey Your Own Security Requirements, Risks, and Advantages