Legal Project Management: A Tool for Corporate Counsel Topic #1
|
|
- Abigayle Lynch
- 8 years ago
- Views:
Transcription
1 Legal Project Management: A Tool for Corporate Counsel Topic #1 Ann Marie McDonald, PMP CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012
2 Definitions Project : A temporary endeavour undertaken to create a unique product, service or result * Legal terms: a matter or a case Project Management : The application of knowledge, skills, tools and techniques to project activities to meet the project requirements * * Project Management Institute A Guide to The Project Management Body of Knowledge
3 PM in Action: PM divides projects into phases: Define scope of work what are the objectives Project plan defines tasks, team, stakeholders, milestones, deliverables, deadlines, communications, risks Budget / Cost Executing in accordance with project plan Monitoring and Control review against scope, budget, deadlines throughout Close post project review with client
4 PM Considerations: Key Project considerations: Scope, time, cost, quality, risk, communication, human resources Project plans : outline project blueprint Work breakdown structures: outline who will do the work & when
5 Application of PM to Legal Work Why? The economy Most legal projects have processes/steps A proven business approach to managing work LPM: applies structured format of PM to legal work Achieves better alignment between price & value of legal services Greater predictability on legal costs & results
6 LPM & Corporate Counsel Better budgeting More certainty on external legal spending Enhanced risk management Better RFP discipline Clarifies desired outcome at beginning Enhanced communication / collaboration between corporate counsel & outside counsel
7 Questions? Ann Marie McDonald McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.
8
9 Risk Management: Identifying and Reducing Legal Liability Risks Topic #2 Matthew T. Hayes CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012
10 Risk Management Risk exposure to the chance of injury or loss; a hazard or dangerous chance effect of uncertainty on objectives (CSA-ISO31000) Risk Management identification, assessment, and prioritization of risks coordinated activities to direct and control an organization with regard to risk (CSA-ISO31000)
11 Risk Process
12 Risk Identification Legal Risks Unrewarded Regulatory, Tax, Environmental, Health & Safety Rewarded Contract, Acquisitions, Business Activity
13 Risk Identification Identification of the Legal Risk Business Operations Regulatory Historical (claims history) Financial statements Experts Acts and regulations Permit inventory
14 Risk Identification Example Environmental Phase I Report - Inventory of hazardous substance - History of releases - Business operations - Property ownership - Inventory of contaminated property
15 Risk Analysis Causes and sources of risk Internal and external Positive and negative consequences Who bears the risk? Likelihood that those consequences can occur
16 Risk Evaluation Considers the results of the risk analysis What are significant risks? High probability - High Cost Low probability - Low Cost Select risk
17 Risk Treatment Take the risk to pursue the opportunity Avoid the risk Change the probability Change the consequence Share the risk
18 Risk Treatment Example - Insurance - Coverage Analysis does the coverage cover the risk? - Examples Typical exclusions for faulty workmanship, pollution, territorial limits, Errors & Omission - Reduce coverage duplication - Speciality policy Boiler & Machinery, E&O, Contractors E&O, D&O - Business Interruption insurance - Builders Risk
19 Risk Treatment Example - Contract - Indemnities Counter-party risk assessment - Agreements to insure Certificate of insurance, policy wording, and deductible(sir) Additional insured, waiver of subrogation, cross-liability, cancellation - Limitation of liability clauses - Liquidated Damages (New Brunswick) - Audit clauses - Protection of intellectual property - Control
20 Risk Treatment Internal Controls Team of experts approach Audit and outside experts Reporting structure Training Recognizing the risk
21 Questions? Matthew Hayes
22 McInnes Cooper s presentation s are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.
23 Cloud Computing & BYOD: Issues for Corporate Counsel Nick Whalen (in coordination with David Fraser) CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012
24 Cloud computing Distributed computing architecture in which data & applications reside on servers separate from the user & accessed via the Internet Applications & data generally accessible from anywhere, provided you are connected Numerous intended benefits + some downsides Several Cloud models
25 Back to the beginning? Personal Corporate
26 Legal Issues In Cloud Computing 1. Privacy 2. Contracting 3. HR
27 1. Privacy: Issues & Benefits Issues: - Loss of direct custody / control of information - Jurisdictional movement - Take it or leave it service agreements - Loss of portability Benefits: - Professional management - Data is not easily lost in Cloud
28 Forbidden Due to Privacy Issues? Risk Management: accountability & security - Understand where you stand now - Understand increased or decreased risks associated with cloud computing - Can increase in risk (if any) be managed? - Are you currently managing risk/will cloud computing help you better manage risk?
29 Managing Privacy Issues PIPEDA: - original custodian remains responsible for personal information regardless of management - cannot outsource or delegate (s ) : An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party
30 Jurisdiction Provincial Variances: MB, SK, ON, NB, NL, PE: do not limit public sector outsourcing NS, BC, ALTA: Public sector only QC: not prohibited; notification may be required No private sector laws prohibit using cloud computing OSFI Guideline B-10 regulates it as an outsourcing
31 USA Patriot Act Realities Canadian law mirrors most USA Patriot Act provisions (Anti-Terror, CSIS) Canada has a secret court allowing ex parte applications for warrants Canada has warrantless wiretap powers for international communications Significant Canada US cooperation
32 Privacy Diligence in the Cloud Original custodian should take a risk-based approach to fulfilling responsibilities to protect & safeguard personal information: - sensitivity of the information? risk to the data? role of jurisdiction in that risk?
33 2. Contracting Match diligence level to importance of what is being outsourced Ease of migration on / off the service Realistic assessment: Current situation vs. service being offered Benchmark against status quo vs. nirvana Improvements to costs/ privacy/ security/ service levels? Increased risks to privacy/ security/ control/ internal expertise/ IT morale? Mitigation?
34 Contracts Wish List
35 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service
36 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent
37 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security
38 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation
39 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms
40 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms 6. Migration of your information at the end of term; no retention of your information
41 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms 6. Migration of your information at the end of term; no retention of your information 7. Disaster recovery plans
42 3. HR Issues Does Cloud require updated policies re: use of the company IT infrastructure? How do employee privacy expectations apply to a cloud resource? Employees may circumvent processes which are hard to learn, or decrease their ability to do perform tasks can this process be successfully ported to the cloud?
43 BYOD: Bring Your Own Device Use of personal devices for company business / connected to company IT infrastructure Some level of BYOD is inevitable Not just fanboys Increases costs: $170k per 1000 devices* * Aberdeen Group, CIO magazine, April 2012
44 BYOD: Legal Issues Discoverability Employee forfeiture of certain rights Rights to destroy data on device Rights to copy data on device Recent case law re: employee privacy expectation: R. v. Cole, 2012 SCC 53
45 BYOD: Policy Considerations Employees typically responsible for technical support, warranties & repairs to BYOD hardware Employer may manage data plans to leverage group discounts IT s right to wipe the device Impact of sharing BYOD or sale of BYOD by employee Devices meet specified technical standards & requirements to enforce password & encryption rules Scope: Smartphones, tablets, all personal computing devices? IT s right to access all data on the device Reasonable expectations of loyalty & good faith service vs. employee s reasonable expectation of privacy & ownership in data on own device.
46 R. v Cole, 2012 SCC 53 Teacher with work-issued laptop computer; policy allowed incidental personal use of laptop computer During routine maintenance tech found hidden folder with nude / partially nude photographs of underage female student Notified principal & copied photos to a CD; principal seized laptop & copied temporary Internet files onto a second disc, then handed laptop & 2 discs over to police Police - without a warrant reviewed contents, created a mirror image of the hard drive for forensic purposes & charged teacher with possession of child pornography & unauthorized use of a computer Defence: searches violated Charter s.8
47 R. v Cole: Police search Computers reasonably used for personal purposes whether found in the workplace or the home contain information that is meaningful, intimate, & touching on the user s biographical core Canadians reasonably expect privacy in information contained on work computers, at least if personal use is permitted / reasonably expected Workplace policies & ownership are relevant but not determinative Court must consider the totality of the circumstances to determine whether privacy is a reasonable expectation in the particular situation A reasonable though diminished expectation of privacy is still a reasonable expectation of privacy protected by Charter s. 8 thus is subject to state intrusion only under the authority of a reasonable law
48 R. v Cole Statutory duty to maintain a safe school environment & by necessary implication a reasonable power to seize & search school-board issued laptop Police could not rely on same power Court did not consider intricacies of employer search & seizure; could imply commercial workplaces without a statutory duty involving vulnerable groups may not enjoy blanket search & seizure power OK for school to report findings to police BUT police could & should have obtained a warrant Information remained subject to accused s reasonable and subsisting expectation of privacy
49 R. v Cole: BYOD Lessons Heightened privacy expectation in BYOD s vs. workplace device Government employers: Policy permitting unreasonable search & seizure will offend employee s Section 8 rights Non-government employers: collection, use & disclosure of private internet search histories & non-work related information on BYOD hardware may not be reasonable & doing so would violate PIPEDA If no duty akin to maintain a safe school environment, may be no corresponding right to intrude on workplace privacy of employees, even in workplace owned computers Policies explicitly addressing balance risk of information theft vs. employee rights more likely to be upheld
50 Questions? Nick Whalen David Fraser
51 McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.
52 Avoiding & Managing Disputes: Tools for Corporate Counsel Eric LeDrew CCCA, NB Chapter, Law Firm Series, Part II November 30, 2012
53
54
55
56 Managing Disputes
57 Managing Disputes While Working DRB Model Board Mandatory referral Likely NOT binding
58 Managing Disputes After Work Finished Comprehensive Dispute Resolution System in every contract
59
60
61
62 Questions? Eric LeDrew
63 McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com
More informationData Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationThe cloud thing: Privacy and cloud computing
The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author
More informationCloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
More informationMEDIATECH APPLICATION
MEDIATECH APPLICATION FOR PURPOSES OF THE INSURANCE COMPANIES ACT (CANADA), THIS DOCUMENT WAS ISSUED IN THE COURSE OF LLOYD S UNDERWRITERS AND LIBERTY MUTUAL INSURANCE COMPANY S INSURANCE BUSINESSES IN
More informationPRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationThe Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More informationCloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
More informationINDEX. bonded contract, 289 insureds, 243. misrepresentation, 291 obtaining, 242
INDEX B non-conforming tender, 284 boiler and machinery insurance, performance bond 241 default by the obligee, 288 coverage, 243 failure to notify, 289 definition of the accident, 245 material variation
More informationCalifornia State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
More informationMobile App Developer Agreements
Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationData Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records
CMA POLICY Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records I. INTRODUCTION This document is intended to provide some interim guidance with respect to the main
More informationPRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES A CONSULTATION REPORT OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS STANDING COMMITTEE 3 ON MARKET INTERMEDIARIES
More informationINDEPENDENT CONTRACTOR AGREEMENT THE UNIVERSITY OF MANITOBA. (the University ) - and - (the Contractor )
CAR Form No. I ICA Contract No. INDEPENDENT CONTRACTOR AGREEMENT AGREEMENT made as of the most recent date set out on page 6 hereof. BETWEEN: THE UNIVERSITY OF MANITOBA (the University ) - and - (the Contractor
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationSUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
More informationHow To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
More informationProtecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
More informationDoing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
More informationCredit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
More informationSierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
More informationComputer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
More informationLAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
More informationA Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
More informationInternal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity
Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University
More informationACL Training and Consulting Services Terms
ACL Training and Consulting Services Terms These ACL Training and Consulting Services Terms (the Services Terms ) apply to the training courses and/or consulting services provided by ACL Services Ltd.
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationAnatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault
Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing
More informationPractical Legal Aspects of BYOD
Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise
More informationConsiderations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
More informationCoverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More informationRISK MANAGEMENT IN CONTRACTS
RISK MANAGEMENT IN CONTRACTS There are many circumstances in which an Institution will contract with another party including service contracts, sales agreements, leases, practicum placement and affiliation
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationCHARITY LAW BULLETIN NO. 302
CHARITY LAW BULLETIN NO. 302 FEBRUARY 27, 2013 EDITOR: TERRANCE S. CARTER GOING MOBILE: LEGAL CONSIDERATIONS FOR MOBILE APP DEVELOPMENT By Colin J. Thurston * A. INTRODUCTION Canadian charities and not-for-profit
More informationCredit Union Code for the Protection of Personal Information
Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve
More informationGeneral Terms and Conditions
Cloud Computing and Internet Services General Terms and Conditions 1 Definitions In this agreement: "The company" Triple C Cloud Computing Ltd.; "The customer" the receiver of services from the company;
More informationBOLT Software Technology Terms of Use Last Updated: November 4, 2015
BOLT Software Technology Terms of Use Last Updated: November 4, 2015 1. Introduction; License Thank you for using the Bolt Software Technology ( we, our or Bolt ) Software As A Service ( SaaS ) available
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationHIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
More informationVOLVO CONSTRUCTION EQUIPMENT. CARETRACK LICENCE (Version 3 April 2010)
CARETRACK LICENCE () This licence is issued by VOLVO CONSTRUCTION EQUIPMENT DIVISION, VOLVO GROUP UK LTD incorporated and registered in England and Wales with company number 2190944, whose registered office
More informationROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.
ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands
More informationCANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
More informationData Privacy, Security, and Risk Management in the Cloud
Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,
More informationSOFTWARE LICENSE AGREEMENT
SOFTWARE LICENSE AGREEMENT This Software License Agreement (the "Agreement") is made as of the day of, 2015 ( Effective Date ), by and between ("Company"), located at and ("Subscriber"), located at. Both
More informationCENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT
CENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT This Business Internet Banking Agreement ( Agreement ) contains the terms and conditions governing your use of Central Savings Bank s ( Bank ) Business
More informationAnnex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
More informationSouthern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
More information3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
More informationCloud Computing: Trust But Verify
Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet
More informationLegal Cloud Computing: Concepts and Ramifications
Legal Cloud Computing: Concepts and Ramifications April 27, 2010 Sébastien Lapointe, Holmested & Associés s.e.n.c. Legal Aspects of Cloud Computing Normal businesses using cloud computing ( CC ) face a
More informationAccountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
More informationZurich Public Sector Solution
Zurich Public Sector Solution Solutions for an Evolving Public Sector Managing risk for a Public Sector entity has taken on an unprecedented level of complexity. Consider for a moment the evolving risks
More informationManaging Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
More informationmicros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
More informationTO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
More informationOverview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
More informationREPAIR SERVICES AND PROCESSING FEES.
BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT ) FORM A LEGAL AGREEMENT BETWEEN YOU INDIVIDUALLY, OR IF YOU ARE AUTHORIZED
More informationElectronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
More informationCITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
More informationThe Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
More informationCyberEdge Insurance Proposal Form
Note to the Proposer Signing or completing this proposal does not bind the Proposer, or any individual or entity he or she is representing to complete this insurance. Please provide by addendum any supplementary
More informationCreating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work
Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,
More informationInsights and Commentary from Dentons
dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more
More informationSmartBizLoans.com Terms and Conditions of Service
SmartBizLoans.com Terms and Conditions of Service PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS OF USE BEFORE USING THIS WEB SITE. BY ACCESSING THIS WEBSITE YOU AGREE TO BE BOUND BY THE TERMS AND
More informationCONSULTING SERVICES AGREEMENT THE CORPORATION OF THE CITY OF GUELPH, an Ontario municipality. ( City ) and. an Ontario. ( Consultant").
Page 1 of 13 CONSULTING SERVICES AGREEMENT This consulting services agreement is between: THE CORPORATION OF THE CITY OF GUELPH, an Ontario municipality ( City ) and, an Ontario ( Consultant"). The parties
More informationIn the Agreement, "we", us" and "our" refer to Computerisms. "you" or "your" refers to the Client.
Web Hosting Agreement! This Agreement covers the terms and conditions under which Computerisms provides web-hosting services to the agreeing party. As an organization or individual applying for web-hosting
More informationPrivacy Management Program Toolkit Health Custodians Personal Health Information Act
Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationService Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
More informationMontclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
More informationDrawing Lines in the Cloud: Jurisdictional Access to Data. Nancy Libin Mary Ellen Callahan
Drawing Lines in the Cloud: Jurisdictional Access to Data Nancy Libin Mary Ellen Callahan OVERVIEW Introduction to Cloud Computing Definition Benefits and Risks How does the physical location of data or
More informationR345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
More informationThe HR Skinny: Effectively managing international employee data flows
The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study
More informationINSURANCE REQUIREMENTS (A) This insert applies to the following State Contracts:
INSURANCE REQUIREMENTS (A) This insert applies to the following State Contracts: General Conditions of the Construction Contract Design/Bid/Build (SC-6.23), or Contractors Agreement Design/Bid/Build (SC-6.21),
More informationManaging Outsourcing Arrangements
Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS
More informationMISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION
MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION 1. APPLICANT INFORMATION 1. Name of Organization or Legal Entity (Applicant) including any subsidiaries: (please show complete name as you
More informationRogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com
More informationManaging General Agents (MGAs) Guideline
Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission
More informationBLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS
BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT
More informationSupplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
More informationTelstra Corporation Limited ABN 33 051 775 556 Standard Terms and Conditions of Purchase Order
Telstra Corporation Limited ABN 33 051 775 556 Standard Terms and Conditions of Purchase Order APPLICATION These Terms and Conditions apply to the Purchase Order unless the Purchase Order refers to a formal
More informationTEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE
TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE Welcome to the Textura Construction Payment Management ( CPM ) System. By clicking
More informationPRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B.
PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. Privacy The focus of my presentation will be on two thing that have made marketing and contacting clients
More informationTaking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
More informationREQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationGUIDANCE NOTE ON OUTSOURCING
GN 14 GUIDANCE NOTE ON OUTSOURCING Office of the Commissioner of Insurance Contents Page I. Introduction.. 1 II. Application...... 1 III. Interpretation.... 2 IV. Legal and Regulatory Obligations... 3
More informationCOMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
More informationEvolving Issues for Healthcare IT Contracting
Evolving Issues for Healthcare IT Contracting By: Alan L. Friel This client advisory is based in part on an article appearing in FierceHealthIT. The emergence of mega-suite vendors, more use of the cloud,
More informationSpeakers. Michael R. Overly, Partner, Yusuf Cassim, Senior Corporate Counsel & VP,Charles Schwab & Co., Inc. Foley & Lardner LLP
1 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago, IL 60654 312.832.4500
More informationCOMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
More informationSouthwest Airlines 2013 Terms of Use Portable Devices Feb 2013
1 TERMS OF USE As of February 3, 2013 The following terms and conditions of use ( Terms of Use ) form a legally binding agreement between you (an entity or person) and Southwest Airlines Co. ( Southwest
More informationTable of Contents. Acknowledgement
OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...
More information