The mhealth Revolution: A Clash of Innovation & the Law. Intellectual Property Protection, Licensing, and Security for mhealth Applications

Size: px
Start display at page:

Download "The mhealth Revolution: A Clash of Innovation & the Law. Intellectual Property Protection, Licensing, and Security for mhealth Applications"

Transcription

1 The mhealth Revolution: A Clash of Innovation & the Law Intellectual Property Protection, Licensing, and Security for mhealth Applications By Kimberly Bullock Gatling The health care industry s mobile health ( mhealth ) revolution has been on a fast-paced trajectory in recent years. All the while, health care providers, patients, and software application developers have been left to ponder on questions regarding patent protection, licensing, and security for these latest innovations. The Food and Drug Administration s ( FDA ) recently issued guidance on Mobile Medical Applications 1 provided some long-awaited clarity on how it regulates mobile medical applications, including mobile phone applications; however, the FDA s guidance is appropriately void of guidance on protection and licensing of this rapidly-evolving technology. This article explores the current state of intellectual property protection for mhealth applications, as well as licensing considerations that should be important to any health care provider or end-user. This article will also highlight some security concerns with mhealth applications, particularly in the case where end-users are executing financial transactions via the mhealth application. I. mhealth Devices and Software as a Service mhealth devices and applications are used for the collection, storage, and transmission of patient medical information, and include mobile applications which, in essence, turn a smartphone into a medical device. These devices and applications do not target just the health care professional user: one count estimated that in 2013, there were 97,000 mhealth applications 1 Guidance for Industry and Food and Drug Administration Staff; Mobile Medical Applications, (September 25, 2013).

2 available across major application download services, with 59 percent of patients in emerging markets using mhealth applications and services. 2 Forecasters predict that the number of mhealth apps will continue to grow at a rate of 25 percent annually for the near future such that 500 million consumers and health care providers will use a mhealth app by The range of mhealth software applications currently in use runs the gamut from applications that allow patients to communicate and receive information from their providers, to applications that enable providers to monitor patients in real-time, to applications that enable end-users to track their own medical conditions separate from their providers. Additionally, these devices and applications are providing secure communication channels that enable health care providers to discuss patient treatment with other medical professionals. There is also the role that smart devices enabled with mhealth applications play in the retrieval of electronic medical records ( EMRs ). From a technical perspective, essentially all of the above-described mhealth software applications are delivered over the Internet (a/k/a the cloud ) to the respective smart devices. In simplest terms, this means that the software is stored on and runs from a remote server. This is commonly referred to as software as a service or SaaS because at least some portion of the software program is not stored on the end-user s device. For example, a health care provider may access a mhealth software application via the Internet from a desktop or laptop computer. Additionally, both the health care provider and the patient may access the software application from a mobile device, wherein the mobile device has downloaded an interface (commonly 2 McLoughlin, P. and Crespo, M. (2013). The Proliferation of Mobile Devices and Apps for Health Care: The Promises and Risks. Retrieved from (accessed March 15, 2014). 3 Jacob, S. (2014). Mobile Health Reaches Its Tipping Point. Retrieved from (accessed March 16, 2014). 2

3 referred to as the app ) that facilitates transmission of information to and from the software stored on the back-end server. In general, all of the data storage and processing is performed on the back-end server. II. Patent Protection for mhealth Applications As everyone now knows, health care is a very lucrative industry, and the mhealth revolution certainly seems to be setting its own trends. As one industry analyst noted, there are more industries involved in the development of wireless medical devices than there are for other medical devices. 4 This leaves many health care providers asking themselves: Can I develop an app for that? After reckoning with all the technical complexities of mhealth app development and server architecture (that any experienced software developer would understand), the mhealth app developer must also reckon with the infamous Health Information Portability and Accountability Act ( HIPAA ). HIPAA requires covered entities, such as hospitals and physicians, to comply with security and privacy regulations designed to protect patients protected health information ( PHI ). 5 PHI is defined as individually identifiable health information that is transmitted or maintained in electronic media or in any other form. 6 The HIPAA security standards establish the measures a covered entity must take to ensure the confidentiality, integrity, and availability of all electronic PHI created, received, maintained, or transmitted by the covered entity. 7 After sifting through software source code, server architecture, and HIPAA, any developer would naturally want to know how it can protect its investment and know-how in its 4 Nerac Analyst (February 2014). The Role of Patents and the Wireless Medical Device Market. Nerac Blogs, retrieved at (accessed March 20, 2014) C.F.R Id C.F.R , et seq. 3

4 unique mhealth application. It is ironic that the recent boom in development of mhealth applications coincides with a period of flux and uncertainty surrounding patentability of software applications and business methods under the United States Patent Act. 8 Software patent claims are often written in the form of method claims for instructing a processor to perform certain enumerated steps. In the landmark case of Bilski v. Kappos 9 pertaining to patent eligible subject-matter, the Supreme Court noted that Patent Act contemplates broad categories of patent-eligible subject matter: processes, machines, manufactures, and compositions of matter. The Court noted, however, that judicial exceptions to patent eligibility exist for laws of nature, physical phenomena, and abstract ideas. In life following Bilski, cases such as Alice Corp v CLS Bank 10 emerged that tested the bounds of Bilski, particularly relating to software and business method patents. The U.S. Supreme Court will hear oral arguments in the Alice Corp. case on March 31, 2014, and a decision is expected by the end of June 2014, with the fundamental question being whether software and business methods are patentable under 35 U.S.C The patent bar is particularly hopeful that the Court will provide a more detailed explanation of what is a nonpatent eligible abstract idea. This Supreme Court decision will provide critical guidance on the patentability of computer-implemented inventions, including software such as mhealth software applications. In the meantime, the U.S. Patent and Trademark Office is busy with prosecution of patent applications for mhealth devices and applications. Even after getting past the hurdle of whether a mhealth application is patent-eligible in light of Bilski and Alice Corp., the application must 8 35 U.S.C. 101 et seq U.S. (2010); 130 S.Ct (2010). 10 Alice Corp. v. CLS Bank, 768 F. Supp. 2d 221 (D.D.C. 2011); 717 F.3d 1269 (Fed. Cir. 2013). 4

5 still satisfy the other requirements for patentability for being new and nonobvious. As with all types of patent applications, mhealth software applications are closely examined to make sure the claimed technology has not been previously used, publicly disclosed, patented, or described in a printed publication. 11 The applications are further analyzed by the Patent Office to determine whether the claimed technology is more than an obvious combination of prior uses, publications, and/or patents. 12 Another matter worthy of nothing is that the United States recently moved from a firstto-invent patent system to a first-to file patent system. Therefore, any health care provider or developer should be vigilant about seeking patent protection for its innovative mhealth technology. III. Licensing mhealth Apps As noted above, most mhealth applications are technically SaaS applications. For those health care providers that are more interested in using mhealth apps than developing them, licensing becomes a key issue. Unlike traditional software licenses, when the software fully resides on the customer or licensee s computer or server, SaaS remains in the cloud and is typically accessed via a web browser or app (interface) that is downloaded onto the user s mobile device. Thus, rather than the user being concerned about integration of the software application with his local computer environment as with typical licensing, the user is more concerned with performance, availability, and security of the SaaS. This is particularly important in the health care context wherein providers and patients are depending on the mhealth application for timely and accurate data processing, and are expecting such data processing and storage to be highly secure U.S.C Id. 5

6 In addition to all of the obvious reasons why a health care provider must be very careful about implementing the use of mhealth apps with patient care, the provider should also be wary of unknowingly exposing himself to liability because of a failure to closely review the SaaS license terms. The following is a summary of some of the terms that should be closely examined by any health care provider or end-user (licensee) that is licensing a mhealth software application from a vendor (licensor). A. Availability and Service Levels. Depending on how critical the application is to patient care, the health care provider should demand that the licensor of the mhealth application guarantee a certain percentage of uptime, such as 99.99%, excluding scheduled downtimes. The provider may demand that the scheduled downtimes occur only on weekends or on weekdays in the middle of the night. Similarly, the health care provider should demand that the vendor respond to software failures within predetermined periods of time. It is typical for software failures to be categorized into severity levels, with the most severe failures demanding the quickest response and resolutions time periods. B. Ownership of Data. As previously referenced, all of the data transmitted through SaaS is stored on the vendor s remote server. This makes it vitally important that the license agreement specify that (i) the licensee solely owns the underlying data, such as all the PHI and other confidential and proprietary information, and (ii) the vendor will maintain the data in strict confidence. The license agreement may grant the vendor a limited license to use the data only for purposes of hosting the relevant software and performing its obligations under the agreement. The license agreement should further specify how often and the manner in which the licensee has a right to export the data from the vendor s server. For example, the agreement may provide that the licensee is entitled to periodic copies of all data, as well as data upon request at any time. 6

7 Because the licensee has no control over storage of the data in SaaS, the licensee should demand that the vendor perform regular backups of the data to an off-site storage facility (e.g, daily or monthly). C. Data Security and Breach. In light of the HIPAA provisions regarding data breaches, as well as general data security concerns, the license agreement should further require the vendor to comply with specific security measures. These measures can range from the specifications of the data center housing the server (e.g., limited physical access requiring personnel authentication, monitored security system, and appropriate HVAC system), to data encryption (e.g., firewall protection and encrypted connections), to breach notification procedures. The health care provider should demand control over the timing and method of notification to its patients in the instance of any breach. D. Indemnification and Limitation of Liability. Without hesitation, the licensee should demand that the agreement provide for indemnification of the licensee in the case of the vendor s breach of its confidentiality and security obligations. Additionally, in this era of patent trolls, health care providers should demand indemnification for claims brought against them or their patients for infringement of third party intellectual property rights. The licensee should ensure that the vendor s indemnification obligations are not subject to any limitation of liability provisions. E. Insurance. Of course, the indemnification clauses may be only as good as the vendor is solvent, which is why appropriate insurance obligations are key. The vendor should be required to procure and maintain insurance with appropriate limits to cover the vendor s activities under the agreement. As an aside, the health care provider should also proactively obtain insurance, including coverage for security breaches and patent infringement claims. 7

8 F. Warranties. The licensee should expect the vendor to warrant that (i) the mhealth application will perform in accordance with the specifications provided by the vendor, (ii) the application won t infringe any third party intellectual property rights, and (iii) the vendor will comply with all applicable laws and regulations, expressly including HIPAA. IV. Financial Security There may be cases where health care providers are using mhealth apps with patients wherein the patients may opt in to additional features on a pay-as-you-go basis. Similarly, there are many consumers paying for mhealth apps separate and apart from the direction of their respective health care providers. In these instances, it is common for the consumer to pay for the service via the application, such as with a credit card or PayPal account. This implicates additional security concerns regarding financial transactions. In light of recent, highly publicized cyber-security attacks, all licensees should be especially concerned about proper processing and storage of credit and debit card information. At a minimum, the mhealth application license agreement should provide for the vendor s compliance with the Payment Card Industry Data Security Standard ( PCI DSS ). PCI DSS is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards. The PCI DSS requirements cover maintenance of a secure network, protection of cardholder data, maintenance of a vulnerability management program, implementation of access control measures, regular network testing, and maintenance of an information security policy. 13 Ideally, licensees should insist that the mhealth vendor use a tokenization method for credit and debit card payments, which is a best practice in PCI DSS compliance. Tokenization is 13 PCI Security Standards Council. Retrieved from (accessed March 15, 2014). 8

9 a method of protecting card data by substituting a card s primary account number ( PAN ) with a unique, randomly generated sequence of numbers, alphanumeric characters, or combination of a truncated PAN and a random alphanumeric sequence, known as a token. 14 Tokens have no meaning without the proper detokenization function to extract the original PAN. When tokenization is used in the context of a SaaS, the software vendor accepts the credit or debit card information, encrypts it (converts it to a token), and sends the token to the vendor s payment processor where the data is then decrypted and the transaction is authorized. The payment processor then sends a token representing the transaction back to the software vendor. The software vendor never stores the actual credit or debit card number. Therefore, if the software vendor suffers a data breach, only the meaningless tokens are misappropriated. This is one of the most secure methods for processing credit and debit card payments. Health care providers should inquire about this method, particularly when their patients are using mhealth apps under the direction of the health care providers and are provided with the option to self-pay for additional features. V. Conclusion mhealth devices and apps are inevitably becoming a way of life in the health care industry. Health care providers are uniquely positioned to provide input on development of new apps to suit their practice needs and to license apps already in the marketplace. In both instances, the wise health care provider should become knowledgeable about the forms of protection for mhealth apps as well as considerations that should be given to mhealth app 14 Vijayan, J. (February 12, 2012). Banks push for tokenization standard to secure credit card payments, retrieved from ecure_credit_card_payments (accessed March 15, 2014). 9

10 license provisions. Hopefully, integration of mhealth devices and apps will be mutually beneficial to both health care providers and their patients. 10

Kaiser Permanente Affiliate Link Provider Web Site Application

Kaiser Permanente Affiliate Link Provider Web Site Application Kaiser Foundation Health Plan of Colorado Kaiser Permanente Affiliate Link Provider Web Site Application FOR PROVIDERS CONTRACTED WITH KAISER IN THE COLORADO REGION ONLY Page 1 of 7 Kaiser Permanente Affiliate

More information

ENROLLMENT AGREEMENT FOR QUALIANCE

ENROLLMENT AGREEMENT FOR QUALIANCE ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

How To Deal With Cloud Computing

How To Deal With Cloud Computing A LEGAL GUIDE TO CLOUD COMPUTING INTRODUCTION Many companies are considering implementation of cloud computing services to decrease IT costs while providing the flexibility to scale usage on demand. The

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Accelerating PCI Compliance

Accelerating PCI Compliance Accelerating PCI Compliance PCI Compliance for B2B Managed Services March 8, 2016 What s the Issue? Credit Card Data Breaches are Expensive for Everyone The Wall Street Journal OpenText Confidential. 2016

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER

Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING TABLE OF CONTENTS Data Protection Challenges Across Application Lifecycles... 3 Delphix Service-Based

More information

Mobile Banking and Mobile Deposit Terms & Conditions

Mobile Banking and Mobile Deposit Terms & Conditions Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations Inside ü Tips for deploying or expanding BYOD programs while remaining

More information

MOBILE BANKING SERVICES INCLUDING TEXT MESSAGING AND REMOTE DEPOSIT SERVICE ENROLLMENT TERMS AND CONDITIONS ( END USER TERMS )

MOBILE BANKING SERVICES INCLUDING TEXT MESSAGING AND REMOTE DEPOSIT SERVICE ENROLLMENT TERMS AND CONDITIONS ( END USER TERMS ) MOBILE BANKING SERVICES INCLUDING TEXT MESSAGING AND REMOTE DEPOSIT SERVICE ENROLLMENT TERMS AND CONDITIONS ( END USER TERMS ) The Mobile Banking Services including Text Messaging and Remote Deposit Service

More information

Page 1 of 15. VISC Third Party Guideline

Page 1 of 15. VISC Third Party Guideline Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision

More information

Dartmouth College Merchant Credit Card Policy for Processors

Dartmouth College Merchant Credit Card Policy for Processors Mission Statement Dartmouth College Merchant Credit Card Policy for Processors Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance with the

More information

Securing Your Customer Data Simple Steps, Tips, and Resources

Securing Your Customer Data Simple Steps, Tips, and Resources Securing Your Customer Data This document is intended to provide simple and quick information security steps for small to mid-size merchants that accept credit and/or debit cards as a form of payment for

More information

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Mission Statement Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance

More information

NBT Bank Personal and Business Mobile Banking Terms and Conditions

NBT Bank Personal and Business Mobile Banking Terms and Conditions This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service.

By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service. 1/9 CLOUD SERVICE AGREEMENT (hereinafter Agreement ) 1. THIS AGREEMENT This Cloud Service Agreement ("Agreement") is a binding legal document between Deveo and you, which explains your rights and obligations

More information

Provider secure web portal & Member Care Information portal Registration Form

Provider secure web portal & Member Care Information portal Registration Form Provider secure web portal & Member Care Information portal Registration Form Thank you for your interest in registering for the Aetna Better Health Provider Secure Web Portal and the Aetna Better Health

More information

15 questions to ask before signing an electronic medical record or electronic health record agreement

15 questions to ask before signing an electronic medical record or electronic health record agreement 15 questions to ask before signing an electronic medical record or electronic health record agreement Many definitions exist for electronic medical record (EMR) and electronic health record (EHR). Although

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery

More information

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that

More information

User Agreement. Quality. Value. Efficiency.

User Agreement. Quality. Value. Efficiency. User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series

More information

Introduction to PCI DSS

Introduction to PCI DSS Month-Year Introduction to PCI DSS March 2015 Agenda PCI DSS History What is PCI DSS? / PCI DSS Requirements What is Cardholder Data? What does PCI DSS apply to? Payment Ecosystem How is PCI DSS Enforced?

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

Technical Help Desk Terms of Service

Technical Help Desk Terms of Service Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

The silver lining: Getting value and mitigating risk in cloud computing

The silver lining: Getting value and mitigating risk in cloud computing The silver lining: Getting value and mitigating risk in cloud computing Frequently asked questions The cloud is here to stay. And given its decreased costs and increased business agility, organizations

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Information for Agents and Brokers Regarding the HIPAA Business Associate Agreement

Information for Agents and Brokers Regarding the HIPAA Business Associate Agreement Information for Agents and Brokers Regarding the HIPAA Business Associate Agreement You may be aware that the Health Insurance Portability and Accountability Act of 1996 ( HIPAA ) requires health plans

More information

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT Last Updated: 10 June 2015 This Hosting Services Addendum to the Master Software Licence Agreement ( Addendum ) will only apply to the extent

More information

TeamViewer APP Developer Agreement

TeamViewer APP Developer Agreement TeamViewer APP Developer Agreement 1 Preamble PLEASE CAREFULLY REVIEW THE FOLLOWING TERMS AND CONDITIONS OF THIS APP DEVELOPER AGREEMENT ( Agreement ). This Agreement is a legal agreement between TeamViewer

More information

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT YOU ARE ABOUT TO ENTER INTO A LEGAL AGREEMENT WITH MEDICAL- OBJECTS PTY LTD ( MEDICAL-OBJECTS ). BY USING ALL OR ANY PORTION OF THE SOFTWARE IN ANY WAY YOU ACCEPT

More information

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism Tokenization Amplified XiIntercept The ultimate PCI DSS cost & scope reduction mechanism Paymetric White Paper Tokenization Amplified XiIntercept 2 Table of Contents Executive Summary 3 PCI DSS 3 The PCI

More information

United States Court of Appeals for the Federal Circuit

United States Court of Appeals for the Federal Circuit NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit PLANET BINGO, LLC, Plaintiff-Appellant, v. VKGS LLC (doing business as Video King), Defendant-Appellee.

More information

Service Agreement Hosted Dynamics GP

Service Agreement Hosted Dynamics GP Service Agreement Hosted Dynamics GP This is a Contract between you ( Company ) and WebSan Solutions Inc. ( WebSan ) of 245 Fairview Mall Drive, Suite 508, Toronto, ON M2J 4T1, Canada. This contract applies

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Service Agreement: January 2008

Service Agreement: January 2008 International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these

More information

What s New with HIPAA? Policy and Enforcement Update

What s New with HIPAA? Policy and Enforcement Update What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final

More information

Schedule 14 CDS Data Center Hosting Agreement

Schedule 14 CDS Data Center Hosting Agreement Schedule 14 This Hosting Agreement ( Agreement ) for the Central Data System is made as of, 2012 (the Effective Date ) by and between the Washington Metropolitan Area Transit Authority (the "Authority"

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA:

1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA: END-USER LICENSE AGREEMENT FOR FORMDOCS SOFTWARE IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and Formdocs

More information

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key

More information

Paychex Accounting Online Terms of Use

Paychex Accounting Online Terms of Use Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with

More information

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

ALM Works End-User License Agreement for Structure Plugin

ALM Works End-User License Agreement for Structure Plugin ALM Works End-User License Agreement for Structure Plugin IMPORTANT - READ CAREFULLY: This End-User License Agreement (EULA) is a legal agreement between you (either an individual or a single legal entity)

More information

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Brochure Achieving security with cloud data protection. Autonomy LiveVault Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS IMPORTANT: PLEASE READ BEFORE DOWNLOADING, INSTALLING OR USING THE XANGATI, INC. ("LICENSOR") SOFTWARE YOU HAVE LICENSED ("SOFTWARE"). BY EXECUTING

More information

Terms of Use for the REDCap Non Profit End User License Agreement

Terms of Use for the REDCap Non Profit End User License Agreement Close print view Please note that displayed below is *not* the license agreement but only the terms of use for the agreement. Terms of Use for the REDCap Non Profit End User License Agreement This non

More information

Schedule 15 CSA Web Hosting Agreement

Schedule 15 CSA Web Hosting Agreement Schedule 15 This Hosting Agreement ( Agreement ) for the Customer Service Application is made as of, 2012 (the Effective Date ) by and between the Washington Metropolitan Area Transit Authority (the "Authority"

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Is the PCI Data Security Standard Enough?

Is the PCI Data Security Standard Enough? Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard

More information

5/4/2011. Overview. Claim Drafting. Patent Claims: Example. Patent Claims. Patent Claims 1. Patent Claims 2

5/4/2011. Overview. Claim Drafting. Patent Claims: Example. Patent Claims. Patent Claims 1. Patent Claims 2 Overview Claim Drafting Claim types in computing arts context System/device claims Method claims Computer-readable media claims Claiming to hit the target Joint infringement issues End-user claims and

More information

CAL POLY POMONA FOUNDATION. Policy for Accepting Payment (Credit) Card and Ecommerce Payments

CAL POLY POMONA FOUNDATION. Policy for Accepting Payment (Credit) Card and Ecommerce Payments CAL POLY POMONA FOUNDATION Policy for Accepting Payment (Credit) Card and Ecommerce Payments 1 PURPOSE The purpose of this policy is to establish business processes and procedures for accepting payment

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT Business Online Enrollment Fax, mail, or email completed form to: 910-576-5023 First Bank Business Support PO Box 600 Wilmington, NC 28401 BusinessSupport@LocalFirstBank.com For questions: 866-435-7208

More information

The Relationship Between PCI, Encryption and Tokenization: What you need to know

The Relationship Between PCI, Encryption and Tokenization: What you need to know October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,

More information

Accepting Payment Cards and ecommerce Payments

Accepting Payment Cards and ecommerce Payments Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont

More information

Insights into Cloud Computing

Insights into Cloud Computing This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid

More information

ELLIPTICS, LTD. TERMS OF SERVICE. For Elliptics branded products: Webcrossing Core, Webcrossing Community, Webcrossing Neighbors 1.

ELLIPTICS, LTD. TERMS OF SERVICE. For Elliptics branded products: Webcrossing Core, Webcrossing Community, Webcrossing Neighbors 1. ELLIPTICS, LTD. TERMS OF SERVICE For Elliptics branded products: Webcrossing Core, Webcrossing Community, Webcrossing Neighbors By using Elliptics products, software, services and hosted websites (referred

More information

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

APPENDIX A that is not acceptable. Arbitration settled by arbitration arbitration shall be held in New Jersey substantive law of New Jersey

APPENDIX A that is not acceptable. Arbitration settled by arbitration arbitration shall be held in New Jersey substantive law of New Jersey APPENDIX A The attorneys in the Office of University Counsel at the University of Colorado Denver Anschutz Medical Campus review many different types of contracts on behalf of the University. Legal review

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS: Effective Date: August 2008 Approval: December 17, 2015 PCI General Policy Maintenance of Policy: Office of Student Accounts PURPOSE: To protect against the exposure and possible theft of account and personal

More information

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name : Data Security & PCI Compliance Securing Your Contact Center Session Name : Title Introducing Trevor Horwitz Pi Principal, i TrustNet t trevor.horwitz@trustnetinc.com John Simpson CIO, Noble Systems Corporation

More information

Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization?

Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization? FAQ Tokenization: FAQs & General Information BACKGROUND As technology evolves, consumers are increasingly making their purchases online or through mobile devices and digital wallet applications and their

More information

BOLT Software Technology Terms of Use Last Updated: November 4, 2015

BOLT Software Technology Terms of Use Last Updated: November 4, 2015 BOLT Software Technology Terms of Use Last Updated: November 4, 2015 1. Introduction; License Thank you for using the Bolt Software Technology ( we, our or Bolt ) Software As A Service ( SaaS ) available

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered

More information

License Agreement Software as a Service (SaaS)

License Agreement Software as a Service (SaaS) License Agreement Software as a Service (SaaS) Please read the following terms and conditions carefully. By clicking the accept option, downloading or installing the Software, paying for or using the Service,

More information

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT

SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT SOFTWARE SUBSCRIPTION SERVICE (SaaS) AGREEMENT This Software Subscription Service (SaaS) Agreement (the Agreement ) sets forth the obligations and conditions between you ( Client ) and mysalesman, LLC,

More information

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM This Addendum ( Addendum ) to the Citizens State Bank of Paola Online Banking Agreement between you and Citizens State Bank of

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

Mobile Banking, Text Messaging and Remote Deposit Service

Mobile Banking, Text Messaging and Remote Deposit Service Mobile Banking, Text Messaging and Remote Deposit Service Enrollment Terms and Conditions Effective as of October 9, 2012 ("END USER TERMS") This service is provided to you by BMO Harris Bank N.A. (("BMO

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Novell ZENworks Mobile Management Novell ZENworks Mobile Management Enterprise App Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE,

More information

Software as a Service (SaaS) Requirements

Software as a Service (SaaS) Requirements Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By

More information

MCC TERMS AND CONITIONS

MCC TERMS AND CONITIONS MCC TERMS AND CONITIONS Welcome to MNCred.org, which is owned by Minnesota Credentialing Collaborative, LLC ( we, us or MCC ) a joint effort of the Minnesota Council of Health Plans (MCHP), Minnesota Hospital

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

Single SaaS/OEM License Developer End User Agreement Last updated January 5th, 2016

Single SaaS/OEM License Developer End User Agreement Last updated January 5th, 2016 Single SaaS/OEM License Developer End User Agreement Last updated January 5th, 2016 Handsoncode Sp. z o.o. with its registered seat in Gdynia, Aleja Zwycięstwa 96/98 (81-451 Gdynia) Poland, entered into

More information

Rhea Help Desk Software End User License Agreement

Rhea Help Desk Software End User License Agreement Rhea Help Desk Software End User License Agreement THIS "END USER LICENSE AGREEMENT" (THE "EULA") IS A LEGAL AGREEMENT BETWEEN THE INDIVIDUAL OR LEGAL ENTITY OR ASSOCIATION INTENDING TO USE THE SOFTWARE

More information

Checklist for a Watertight Cloud Computing Contract

Checklist for a Watertight Cloud Computing Contract Checklist for a Watertight Cloud Computing Contract Companies of all industries are recognizing the need and benefit of moving some if not all of their IT infrastructure to a Cloud whether public or private.

More information

Information Technology

Information Technology Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

NetSuite End User License Agreement for Mobile Applications

NetSuite End User License Agreement for Mobile Applications Last Revision: October 30, 2015 NetSuite End User License Agreement for Mobile Applications This NetSuite End User License Agreement for Mobile Applications, including without limitation, all attachments

More information

ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014

ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014 ELITEPAY TERMS AND CONDITIONS OF SERVICE EFFECTIVE: November 15, 2014 These terms and conditions of service ("Terms of Service") apply to your use of this ElitePay payment website (the "Website") and all

More information