Contracting Challenges and Negotiation Principles Presented by: Dana L. Hollingsworth The University of Texas System Office of General Counsel September.

Slides:



Advertisements
Similar presentations
A GIA is a contract between a surety company and a contractor (or subcontractor)/principal. A GIA is a standard, typical document in the construction.
Advertisements

U.T. System Administration Delegation of Authority to Sign Contracts Dana Hollingsworth, Attorney The University of Texas System Office of General Counsel.
© 2012 McNees Wallace & Nurick LLC CONTRACT ESSENTIALS Diane M. Tokarsky Chair, Construction Law 100 Pine Street, PO Box 1166 Harrisburg, PA
Chapter 39: Agency.
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
IIT Office of General Counsel Education Program Non-Disclosure/Confidentiality Agreements.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
CARLIN LAW GROUP, APC (619) Know Your Indemnity Obligation Know Your Risk Know Your Insurance Company by KEVIN R. CARLIN, ESQ.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
The Data Protection (Jersey) Law 2005.
CONTRACTS: Before You Sign a University Contract...
Using Prevent Defense: Mitigating Legal Risk in Procurements Presented by Richard Pennington John Westrick.
The Public Information Act Rights and Responsibilities of a Governmental Body Local Government Seminar January 29, 2015 Presented by: Barry Gaines.
Conversation on the Chemical Facility Anti-Terrorism Standards (CFATS) and Critical Infrastructure Protection Chemical-Terrorism Vulnerability Information.
PA/FOIA INTERFACE OSD/JS Privacy Office (703)
Or Is He / She an Employee or a Contractor?.  According to Jackson Lewis  International Tax Avoidance  Wage Issues  Misclassification – Employee or.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 37 Agency Twomey Jennings Anderson’s Business Law and the Legal.
National Contract Management Association – Norfolk Chapter Contracting Ground Rules.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
© 2003 Rule 1.9. Duties to Former Clients (a) A lawyer who has formerly represented a client in a matter shall not thereafter represent another person.
Managing your client risks in difficult times Peter Scott PETER SCOTT CONSULTING.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 AGENCY FORMATION AND TERMINATION © 2010 Pearson Education, Inc., publishing as Prentice-Hall.
Outsourcing: The Ethical Issues Steven M. Richman November 2014.
Data Protection Overview
INTERNATIONAL LAW PARMA UNIVERSITY International Business and Development International Market and Organization Laws Prof. Gabriele Catalini.
Middleware Promises Warranties that Don’t Indemnities that Won’t Stephen Rubin, Esquire
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Local Government Forum, 15 September 2010 Tender Negotiations, Indemnity and Exclusion of Liability Kathryn Walker Senior Associate (08)
Agency Formation and Termination. FOCUS Do you need an agent? List situations that you would want an agent to deal for you.
Agency Law. “If you want something done right, do it yourself.” “Many hands make light work.” Anonymous folk sayings.
Dispute Settlement: ALTERNATIVE DISPUTE RESOLUTION Chapter 3.
Dino Tsibouris (614) Vendor Contracts: What You Need and What You May Be Missing.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Chapter 19: Ethical Responsibilities Chapter 19 Ethical Responsibilities.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Unit 5 Review. A subagent is an agent A) who can hire and fire employees. B) who serves as a discretionary agent. C) who has authority to perform any.
OPEN MEETINGS ACT General Provisions Article, Sections through 3-501, Annotated Code of Maryland 1.
Diploma of Financial Services (Banking) FNSACCT404B Make Decisions in a Legal Context Lecture 2.
ETHICS: CONFIDENTIALITY OF IFTA DATA IFTA ATTORNEYS’ SECTION MEETING October 7, :30-10:00 a.m. Jim Clark Motor Carrier Services Attorney Indiana.
Is Your Background Check Process Compliant?. 2 © Copyright 2015 ADP, LLC. Proprietary and Confidential Information. Agenda Privileged & Confidential.
Agency Relationships Section Understanding Business and Personal Law Agency Relationships Section 18.1 Creation of an Agency Section 18.1 Agency.
Chapter 18 Agency Law. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.18-2 The Agency Relationship Agency relationships are formed.
Chapter 38 Agency Twomey, Business Law and the Regulatory Environment (14th Ed.)
Change Orders, Extras and Claims Presented by Geoffrey Cantello, City of Ottawa.
Key Legal Considerations for Agencies Wake Forest Business School Charlotte Campus June 12, 2013.
Introduction to Procurement for Public Housing Authorities Getting Started: Basic Administrative Requirements Unit 1.
HOW TO PROTECT YOUR INTEREST IN A SALE CONTRACT Focus on what you “get” when you sign!
The Law Offices of Sheila Deselich Cohen. Generally subject to the Employee Retirement Income Security Act of 1974 (“ERISA”). Two main types of plans:
1 Ethical Lawyering Spring 2006 Class 8. 2 Rest. 68 Except as otherwise provided in this Restatement, the attorney-client privilege may be invoked as.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
U.T. System Administration Delegation of Authority to Sign Contracts Dana Hollingsworth, Attorney The University of Texas System Office of General Counsel.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
INDEMNITY The University of Texas System Office of General Counsel Dana Hollingsworth, Attorney.
GUKEYEH GUK’EH GU’SANI Kaska Dena Good Governance Act
Alternative Dispute Resolution Systems
Privacy principles Individual written policies
General Data Protection Regulation
Data protection issues in regulatory investigations
AGENCY FORMATION AND TERMINATION
Chapter 3: IRS and FTC Data Security Rules
PERSONAL DATA PROTECTION ACT 2010
Speaker: Sarah Chambers, Esq. Claims Counsel| Professional Liability
Law, the Courts, and Contracts
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
© 2013 Sri U-Thong Limited. All rights reserved
Presentation transcript:

Contracting Challenges and Negotiation Principles Presented by: Dana L. Hollingsworth The University of Texas System Office of General Counsel September 29, 2005

Contracting Challenges Indemnity Provisions Indemnity Provisions Confidentiality Provisions Confidentiality Provisions Social Security Numbers Social Security Numbers Limitation of Liability Provision Limitation of Liability Provision Choice of Law/Venue Provision Choice of Law/Venue Provision Criminal Background Checks Criminal Background Checks Delegation of Authority to Execute Contracts Delegation of Authority to Execute Contracts

Indemnity Provisions Definition: insurance or other security against possible loss or damage Definition: insurance or other security against possible loss or damage Provides Breach-of-Contract Claim in addition to Common Law Cause of Action Provides Breach-of-Contract Claim in addition to Common Law Cause of Action May Cover Claims that are Excluded by Insurance Policy or are otherwise Not Covered by Insurance May Cover Claims that are Excluded by Insurance Policy or are otherwise Not Covered by Insurance May Expand Scope of Indemnifying Party’s Liability (i.e., liability for acts of unrelated third parties) May Expand Scope of Indemnifying Party’s Liability (i.e., liability for acts of unrelated third parties)

Indemnity Provisions Who? Who? Limit indemnity to losses caused by indemnifying party, its agents, or its employees Limit indemnity to losses caused by indemnifying party, its agents, or its employees What? What? Limit indemnity to losses caused by negligence and willful misconduct of indemnifying party, its agents, or its employees Limit indemnity to losses caused by negligence and willful misconduct of indemnifying party, its agents, or its employees When? When? Limit indemnity to losses incurred during performance of indemnifying party’s contractual duties Limit indemnity to losses incurred during performance of indemnifying party’s contractual duties

When UT Gives an Indemnity: Always qualify the indemnity with the phrase “to the extent authorized by the laws and Constitution of the State of Texas” (ref. AG Opinion MW-475) Always qualify the indemnity with the phrase “to the extent authorized by the laws and Constitution of the State of Texas” (ref. AG Opinion MW-475) Never indemnify Contractor for its own negligence or the negligence of its employees, agents, or subcontractors Never indemnify Contractor for its own negligence or the negligence of its employees, agents, or subcontractors

Confidentiality Provisions UT Institutions must comply with the Texas Public Information Act (Ch. 552, Gov. Code) UT Institutions must comply with the Texas Public Information Act (Ch. 552, Gov. Code) Always qualify confidentiality provisions with the phrase “subject to the Texas Public Information Act and other applicable law” Always qualify confidentiality provisions with the phrase “subject to the Texas Public Information Act and other applicable law”

Confidentiality Provisions General Rule = All Information is Public General Rule = All Information is Public Exceptions to the General Rule Exceptions to the General Rule Information Confidential by Law Information Confidential by Law Information Confidential by Judicial Decision Information Confidential by Judicial Decision Certain Personal Information Certain Personal Information Information Relating to Competition or Bidding Information Relating to Competition or Bidding Certain Law Enforcement Records Certain Law Enforcement Records Information within Attorney-Client Privilege Information within Attorney-Client Privilege

Confidentiality Provisions Determination regarding whether an exception applies is fact specific Determination regarding whether an exception applies is fact specific Texas Attorney General’s Office (not the UT institution) makes the determination regarding whether an exception applies Texas Attorney General’s Office (not the UT institution) makes the determination regarding whether an exception applies

Social Security Numbers Business Procedures Memorandum (BPM) 66: Protecting the Confidentiality of Social Security Numbers Business Procedures Memorandum (BPM) 66: Protecting the Confidentiality of Social Security Numbers Provides requirements and guidelines for the protection of the confidentiality of social security numbers Provides requirements and guidelines for the protection of the confidentiality of social security numbers Does not prohibit or restrict the collection, use, and maintenance of social security numbers as required by applicable law Does not prohibit or restrict the collection, use, and maintenance of social security numbers as required by applicable law Best Practice = Do not include Social Security Numbers in UT contracts Best Practice = Do not include Social Security Numbers in UT contracts

Social Security Numbers Section 3.2 of BPM 66 requires compliance with the following: Section 3.2 of BPM 66 requires compliance with the following: Each time a UT institution requests that an individual disclose his or her social security number, the institution shall provide the notice required by Section 7 of the Federal Privacy Act of 1974 (5 U.S.C. § 552a), that requires the institution to inform the individual whether the disclosure is mandatory or voluntary, by what statutory or other authority the number is solicited, and what uses will be made of the number Each time a UT institution requests that an individual disclose his or her social security number, the institution shall provide the notice required by Section 7 of the Federal Privacy Act of 1974 (5 U.S.C. § 552a), that requires the institution to inform the individual whether the disclosure is mandatory or voluntary, by what statutory or other authority the number is solicited, and what uses will be made of the number The notice shall use the applicable text from Appendix 3 of BPM 66 or such other text as may be approved by the SSN Coordinator or the Office of General Counsel The notice shall use the applicable text from Appendix 3 of BPM 66 or such other text as may be approved by the SSN Coordinator or the Office of General Counsel

Social Security Numbers Appendix 3 of BPM 66 includes: Appendix 3 of BPM 66 includes: Disclosure for the employment process Disclosure for the employment process Disclosure for the student application process Disclosure for the student application process General mandatory disclosure General mandatory disclosure General voluntary disclosure General voluntary disclosure

Social Security Numbers General mandatory disclosure: General mandatory disclosure: Disclosure of your Social Security Number (“SSN”) is required of you in order for The University of Texas at _________ to __[state intended use of SSN]_________, as mandated by [Federal] [State] law. Further disclosure of your SSN is governed by the Public Information Act (Chapter 552 of the Texas Government Code) and other applicable law.

Limitation of Liability Provision Typical Limitation of Liability provision: Typical Limitation of Liability provision: Contractor shall not be liable under any circumstances for any special, indirect, incidental, consequential or other damages resulting from any loss of use of the Software or any loss of revenues or profits related to the Software.

Limitation of Liability Provision Make every effort to delete limitation of liability provisions Make every effort to delete limitation of liability provisions If the provision is not deleted If the provision is not deleted Qualify the limitation with the phrase “to the extent authorized by the laws and Constitution of the State of Texas” Qualify the limitation with the phrase “to the extent authorized by the laws and Constitution of the State of Texas” Make the limitation mutual Make the limitation mutual

Limitations of Liability Provision Example of properly qualified, mutual limitation of liability provision Example of properly qualified, mutual limitation of liability provision To the extent authorized by the laws and Constitution of the State of Texas, Contractor shall not be liable under any circumstances for any special, indirect, incidental, consequential or other damages resulting from either any loss of use of the Software or any loss of revenues or profits related to the Software. Customer shall not be liable under any circumstances for any special, indirect, incidental, consequential or other damages resulting from Customer’s performance under this Agreement or any related agreements.

Choice of Law/Venue Best Practice = include a choice of law/venue provision in every contract that: Best Practice = include a choice of law/venue provision in every contract that: Specifies Texas law as the law that will govern the contract Specifies Texas law as the law that will govern the contract Specifies the Texas county in which the UT institution is located or Travis County as the proper location for venue Specifies the Texas county in which the UT institution is located or Travis County as the proper location for venue

Choice of Law/Venue Venue; Governing Law. Travis County, Texas, shall be the proper place of venue for suit on or in respect of the Agreement. The Agreement and all of the rights and obligations of the parties hereto and all of the terms and conditions hereof shall be construed, interpreted and applied in accordance with and governed by and enforced under the laws of the State of Texas.

Choice of Law/Venue OGC does not recommend expressly agreeing to the law of another state or nation as the law that will govern the contract OGC does not recommend expressly agreeing to the law of another state or nation as the law that will govern the contract Likewise, OGC does not recommend expressly agreeing to venue in a another county, state, or nation Likewise, OGC does not recommend expressly agreeing to venue in a another county, state, or nation

Choice of Law/Venue If a UT institution excludes the choice of law/venue provision from the contract (“going silent”) then: a court will decide which law applies to a dispute under the contract a court will decide which law applies to a dispute under the contract the UT institution may incur additional costs, delay, and other difficulties the UT institution may incur additional costs, delay, and other difficulties the UT institution may need to hire local counsel the UT institution may need to hire local counsel in the event the court finds that Texas law does not apply, the outcome of the dispute may not be the same as the result would have been under Texas law in the event the court finds that Texas law does not apply, the outcome of the dispute may not be the same as the result would have been under Texas law

Choice of Law/Venue If a contract is governed by laws of a jurisdiction outside the United States, local counsel should be consulted If a contract is governed by laws of a jurisdiction outside the United States, local counsel should be consulted Beware: Some foreign countries retain formalistic contract requirements Beware: Some foreign countries retain formalistic contract requirements Contract must be read aloud from beginning to end by a notary Contract must be read aloud from beginning to end by a notary Contract must be bound by a ribbon which is affixed to both the cover page and the back page with a wax seal Contract must be bound by a ribbon which is affixed to both the cover page and the back page with a wax seal

Criminal Background Checks BPM 29 Criminal Background Checks for Security-Sensitive Positions BPM 29 Criminal Background Checks for Security-Sensitive Positions

Criminal Background Checks According to Section of BPM 29, a UT institution should not automatically disqualify from employment all individuals with conviction records. The institution’s procedures should provide that, in the event the investigation reveals criminal convictions or other relevant information, the hiring official will determine on a case-by-case basis whether the individual is qualified based on factors such as: According to Section of BPM 29, a UT institution should not automatically disqualify from employment all individuals with conviction records. The institution’s procedures should provide that, in the event the investigation reveals criminal convictions or other relevant information, the hiring official will determine on a case-by-case basis whether the individual is qualified based on factors such as: Specific duties of the position; Specific duties of the position; Number of offenses; Number of offenses; Nature of each offense; Nature of each offense; Length of time intervening between the offense and the employment decision; Length of time intervening between the offense and the employment decision; Employment history; Employment history; Efforts at rehabilitation; and Efforts at rehabilitation; and Accuracy of the information that the individual provided on the employment application. Accuracy of the information that the individual provided on the employment application.

Criminal Background Checks When contracting for security-sensitive services, UT institutions should consider requiring that When contracting for security-sensitive services, UT institutions should consider requiring that the contractor perform background checks on its employees and agents, as well as the employees of subcontractors the contractor perform background checks on its employees and agents, as well as the employees of subcontractors the contractor notify the institution of felony convictions the contractor notify the institution of felony convictions UT institutions should analyze convictions in accordance with Section of BPM 29 to determine if the conviction poses an unacceptable business risk UT institutions should analyze convictions in accordance with Section of BPM 29 to determine if the conviction poses an unacceptable business risk

Delegation of Authority to Execute Contracts Legal Authority for Delegation Legal Authority for Delegation Sections and 65.34, Education Code Sections and 65.34, Education Code Series of the Regents’ Rules and Regulations Series of the Regents’ Rules and Regulations

Delegation of Authority to Execute Contracts Two Types of Delegates Two Types of Delegates Primary Delegates receive authority to sign contracts directly from the Board Primary Delegates receive authority to sign contracts directly from the Board Primary delegates may further delegate their authority to sign contracts in writing unless otherwise specified in the Rules Primary delegates may further delegate their authority to sign contracts in writing unless otherwise specified in the Rules Primary delegates must permanently maintain, or cause to be maintained, evidence of all such delegations Primary delegates must permanently maintain, or cause to be maintained, evidence of all such delegations Secondary Delegates receive authority to sign contracts from a primary delegate (not from the Board) Secondary Delegates receive authority to sign contracts from a primary delegate (not from the Board) Secondary delegates may not further delegate their authority to sign contracts Secondary delegates may not further delegate their authority to sign contracts

Delegation of Authority to Execute Contracts Primary delegates must maintain, or cause to be maintained, necessary and proper records of all contracts, agreements and documents executed and delivered pursuant to his or her delegated authority in accordance with any applicable record retention schedule or policy adopted by the Board or the U.T. institution Primary delegates must maintain, or cause to be maintained, necessary and proper records of all contracts, agreements and documents executed and delivered pursuant to his or her delegated authority in accordance with any applicable record retention schedule or policy adopted by the Board or the U.T. institution (Section 6.1, Series of the Regents’ Rules)

Delegation of Authority to Execute Contracts Delegates executing documents on behalf of the Board are responsible for assuring that they have authority to act on behalf of the Board and that such authority is exercised in compliance with applicable conditions and restrictions Delegates executing documents on behalf of the Board are responsible for assuring that they have authority to act on behalf of the Board and that such authority is exercised in compliance with applicable conditions and restrictions (Section 5.7, Series of the Regents’ Rules)

Negotiation Principles Negotiation Definition Negotiation Definition Role of Negotiation in Texas Procurement Process Role of Negotiation in Texas Procurement Process Negotiator’s Challenge Negotiator’s Challenge Roles Negotiators Play Roles Negotiators Play Preparing for Negotiation Preparing for Negotiation Tools of Persuasion Tools of Persuasion Negotiation Tips Negotiation Tips Negotiation Resources Negotiation Resources

Negotiation Definition The exchange of information and ideas with the intent to change the relationship of the parties

Role of Negotiation in Texas Procurement Texas law permits negotiation in the following procurement situations: Texas law permits negotiation in the following procurement situations: Catalogue Purchase through an Information Systems Vendor Catalogue Purchase through an Information Systems Vendor Emergency Purchase Emergency Purchase Sole Source Purchase Sole Source Purchase Competitive Sealed Proposal Purchase Competitive Sealed Proposal Purchase Texas law does not permit negotiation when the procurement is based on competitive bids Texas law does not permit negotiation when the procurement is based on competitive bids

Negotiator’s Challenge To create a process likely to produce a mutually acceptable balance of interests

Roles Negotiators Play Competitive Sportsman Competitive Sportsman Objective = Winning Objective = Winning Defender Defender Objective = Protecting Against Loss Objective = Protecting Against Loss Problem-Solver Problem-Solver Objective = Working Together to Find a Solution Objective = Working Together to Find a Solution

Negotiation Preparation Rule of Thumb: 4 hours of preparation for every 1 hour of negotiation (4:1) Rule of Thumb: 4 hours of preparation for every 1 hour of negotiation (4:1) The party that is most prepared is typically the most successful The party that is most prepared is typically the most successful

Negotiation Preparation Know the alternatives to negotiation Know the alternatives to negotiation Your alternatives Your alternatives Ways to improve your alternatives Ways to improve your alternatives Their alternatives Their alternatives Ways to test and, if appropriate, worsen their alternatives Ways to test and, if appropriate, worsen their alternatives

Negotiation Preparation Look beyond the “position” of a party to that party’s underlying interest or need Look beyond the “position” of a party to that party’s underlying interest or need Ours Ours Theirs Theirs Others Others Learn to invent many options for mutual gain, before committing to any one option Learn to invent many options for mutual gain, before committing to any one option

Negotiation Preparation Search for standards of legitimacy by which to evaluate the options Search for standards of legitimacy by which to evaluate the options Make clear, careful commitments at the end of the process Make clear, careful commitments at the end of the process Maintain clear, effective two-way communication Maintain clear, effective two-way communication Focus on: What will they hear? Focus on: What will they hear? Not: What do we intend? Not: What do we intend?

Negotiation Preparation Build a good working relationship Build a good working relationship Trusting Them: Trusting Them: Assess risk/reward Assess risk/reward Absent good reason, deal independently of trust Absent good reason, deal independently of trust Being Trustworthy Ourselves: Being Trustworthy Ourselves: Being trustworthy is an investment in our relationship power Being trustworthy is an investment in our relationship power A reputation for reliability is powerful A reputation for reliability is powerful Building trust is more difficult that losing it Building trust is more difficult that losing it Do not react in kind without thinking Do not react in kind without thinking

Persuasion Tools Logic – use of facts and proof by reasoning Logic – use of facts and proof by reasoning Power – use of direct or implied threat Power – use of direct or implied threat Emotion – use of feelings Emotion – use of feelings Bargaining – use of trading Bargaining – use of trading Compromise – acceptance of a different, often lesser, position Compromise – acceptance of a different, often lesser, position

Negotiation Tips Before you start negotiating, understand why you are there Before you start negotiating, understand why you are there Make sure you are negotiating with the decision maker Make sure you are negotiating with the decision maker If you want people to listen to you, you must listen to them If you want people to listen to you, you must listen to them Use confidence-building measures to get the negotiation going (resolve easy issues first) Use confidence-building measures to get the negotiation going (resolve easy issues first)

Negotiation Tips Look at the situation from the other party’s point of view Look at the situation from the other party’s point of view Do not let a deadline force you into a bad decision Do not let a deadline force you into a bad decision Don’t agree to something if it is not fair Don’t agree to something if it is not fair

Negotiation Resources The Fine Art of Negotiating (1995) by Steven P. Cohen The Fine Art of Negotiating (1995) by Steven P. Cohen Texas Negotiations (2000), Texas Building and Procurement Commission Training Presentation, William D. Agee & Associates, Inc. and Lallatin & Associates Texas Negotiations (2000), Texas Building and Procurement Commission Training Presentation, William D. Agee & Associates, Inc. and Lallatin & Associates Negotiation Workshop, Harvard Law School, Program of Instruction for Lawyers Negotiation Workshop, Harvard Law School, Program of Instruction for Lawyers Getting to YES: Negotiating Agreement Without Giving In [Second Edition], Roger Fisher, William Ury, and Bruce Patton (1991) Getting to YES: Negotiating Agreement Without Giving In [Second Edition], Roger Fisher, William Ury, and Bruce Patton (1991) Getting Together: Building Relationships As We Negotiate, Roger Fisher and Scott Brown (1989) Getting Together: Building Relationships As We Negotiate, Roger Fisher and Scott Brown (1989)