An open source software project that enables the distributed processing of very large data sets across multiple servers Basically:

Size: px
Start display at page:

Download "An open source software project that enables the distributed processing of very large data sets across multiple servers Basically:"

Transcription

1 Big Data, Fine Print Business and Legal Considerations for Companies Dealing in Data Rachel Tarko Hudson, Technology Transactions Team & Privacy Team Sheppard Mullin Richter & Hampton LLP 2015

2 What is Big Data? Datasets whose size is beyond the ability of typical data base software tools to capture, store, manage, and analyze. --McKinsey & Co. A new attitude by businesses, non-profits, government agencies, and individuals that combining data from multiple sources could lead to better decisions. --Forbes

3 What is Hadoop? An open source software project that enables the distributed processing of very large data sets across multiple servers Basically: Hadoop lets you store bigger and more files than you would be able to store on one particular server Hadoop also lets you process and move these large amounts of data much faster

4 Why does this matter?

5 Why does this matter? 2.5 quintillion bytes of data are produced every day (that is 25,000,000,000,000,000,000!) Google, the largest big data Company in the world, processes 3.5 billion requests per day and stores 10 billion gigabytes. Facebook has over 2.5 billion pieces of content, 2.7 billion likes and 300 million photos (this adds up to more than 500 terabytes of data.)

6 Why does this matter? In 2007, 94% of data was stored in digital format. Fast forward to now: 90% of ALL data ever produced by humans has been made in the last two years (2014-now). Experts predict that by 2020, there will be 400 billion gigabytes of data in existence.

7 What types of data are there? Personal Data Names Addresses Birthdays Credit Cards Health data Aggregated Data Internet browser Web behavior Purchase history Time spent Power used

8 How are these types of data used? By analyzing and using large sets of data, companies can: Predict what customers want Provide customers with their own meaningful data Identify inefficiencies in manufacturing and logistics Improve hiring processes Improve health outcomes

9 How are these types of data used?

10 What YOU should be thinking about: 1. Protecting your ownership rights 2. Restrictions on use of your data 3. Protecting your customers 4. Commercializing your data 5. Securing your data

11 How can you protect your ownership rights in your big data assets? Copyright Law Individual pieces of data are NOT protected. Unique compilations of data ARE protected. Compilations must be selected and arranged in an original way in order to receive copyright protection. Trade Secret Law Offers broader protection; uniqueness or originality does not matter. If the database can be used as a competitive advantage over those who do not know or have access to its information, it is a trade secret.

12 Limitations on Your Rights Depending on how you obtained your data, your rights to that data are limited. If you obtained it on your own, all of the rights to the data are yours BUT, if you obtain it through an API or vendor, there may be contractual restrictions (i.e., restrictions on your ability to buy, sell, or transfer the data.)

13 You must also protect your customers! Comply with all applicable privacy laws Comply with your own privacy statements, including your privacy policy Clearly disclose what types of information you collect and how it is used

14 Commercializing Your Data Licenses Copyright Grants the rights to reproduce, modify, distribute, display, and use Trade secret Grants the rights of access and use Vendor Transactions Outbound: Be aware of rights you give to the vendor Inbound: Be aware of restrictions from the vendor Be explicit

15 Securing Your Data Address the security of your vendors: 1. Include a contractual data security provision 2. Detail specific data security requirements (physical and technical measures) This is NOT the same as a confidentiality clause! (but a confidentiality clause is important too!)

16 Due Diligence Considerations Consider the following when you sell or acquire data assets: 1. Perform a risk analysis of the company and the data it keeps (e.g., security, any compromises) 2. Examine how the company has been collecting its data (e.g., privacy policy, compliance with applicable laws like HIPPA, GLBA, COPPA) 3. If you see any problems: a) Mitigate the damage contractually (i.e., warranties, indemnity provisions) b) OR negotiate a price reduction or holdback/escrow fund to compensate for potential liability

17 Questions? Rachel Tarko Hudson

14724 Ventura Blvd., Suite 1205 Sherman Oaks, CA 91403. Firm Contact: Matt Stadelman Chief Compliance Officer

14724 Ventura Blvd., Suite 1205 Sherman Oaks, CA 91403. Firm Contact: Matt Stadelman Chief Compliance Officer Privacy Policy September 2015 14724 Ventura Blvd., Suite 1205 Sherman Oaks, CA 91403 Firm Contact: Matt Stadelman Chief Compliance Officer Firm Website Address: www.1080financial.com This Privacy Policy

More information

A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business:

A buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business: Buying a business This briefing highlights the main legal risks to consider when buying another business or enterprise. A buyer should always take legal advice at the outset of any acquisition. Structuring

More information

How To Protect Your Data In The Cloud

How To Protect Your Data In The Cloud Cloud Computing Hot topics in relation to security, liability and privacy Steven De Schrijver Cloud Computing : who and what is involved? Data Cloud Service Provider (e.g. SaaS, PaaS, IaaS) Sub-contractor

More information

Adding Cloud Solutions to Customer Contracts Robert J. Scott

Adding Cloud Solutions to Customer Contracts Robert J. Scott Adding Cloud Solutions to Customer Contracts Robert J. Scott MSP vs. Cloud Who owns the hardware? Where does the data reside? Dedicated vs. Multi tenant? Who contracts with 3 rd parties? How are services

More information

Checklist for Buying a Business

Checklist for Buying a Business Checklist for Buying a Business Buying a business can sometimes be a daunting and confusing process. This checklist highlights the main legal risks you need to consider when undertaking the process. It

More information

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

How To Deal With Cloud Computing

How To Deal With Cloud Computing A LEGAL GUIDE TO CLOUD COMPUTING INTRODUCTION Many companies are considering implementation of cloud computing services to decrease IT costs while providing the flexibility to scale usage on demand. The

More information

Privacy Policy. log in to the Services with social networking credentials;

Privacy Policy. log in to the Services with social networking credentials; Privacy Policy Effective Date: November 20, 2015 This Privacy Policy is incorporated by this reference into the Mobli Media Inc. Terms of Use located at https://www.mobli.com/tou.html (the Terms of Use

More information

Privacy Policy and Notice of Information Practices

Privacy Policy and Notice of Information Practices Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values

More information

IP Considerations in Outsourcing Agreements

IP Considerations in Outsourcing Agreements IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

PwC. Photo Sources: http://www.flickr.com/photos/serenitbee/6678578203/sizes/m/in/photostream/ http://www.flickr.com/photos/hutchike/3880462147/

PwC. Photo Sources: http://www.flickr.com/photos/serenitbee/6678578203/sizes/m/in/photostream/ http://www.flickr.com/photos/hutchike/3880462147/ The Stock Market Photo Sources: http://www.flickr.com/photos/serenitbee/6678578203/sizes/m/in/photostream/ http://www.flickr.com/photos/hutchike/3880462147/ 2013 PricewaterhouseCoopers LLP. All rights

More information

Social Media Marketing Best Practices

Social Media Marketing Best Practices Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert

More information

Your Open Source Investment Know. Manage. Protect.

Your Open Source Investment Know. Manage. Protect. Using open source software provides a compelling business case, but if companies violate the software s licenses, the consequences can be more severe than they think. Open Source Risk Management s services

More information

Thank you for visiting this website, which is owned by Essendant Co.

Thank you for visiting this website, which is owned by Essendant Co. Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Profound Outdoors Privacy Policy

Profound Outdoors Privacy Policy Profound Outdoors Privacy Policy Our Commitment to Privacy Our Privacy Policy has been developed as an extension of our commitment to combine quality products and services with integrity in dealing with

More information

Legal issues in the Cloud

Legal issues in the Cloud Legal issues in the Cloud Renzo Marchini, Dechert LLP, London, UK Gene K. Landy, Ruberto, Israel & Weiner, PC Boston, MA, USA Portions 2010 Dechert LLP. Portions 2010 Ruberto, Israel & Weiner, PC. Attorneys

More information

www.shipmangoodwin.com Shipman & Goodwin LLP 2015. All rights reserved. @SGHealthLaw HARTFORD STAMFORD GREENWICH WASHINGTON, DC

www.shipmangoodwin.com Shipman & Goodwin LLP 2015. All rights reserved. @SGHealthLaw HARTFORD STAMFORD GREENWICH WASHINGTON, DC HIPAA Compliance and Non-Business Associate Vendors: Strategies and Best Practices July 14, 2015 William J. Roberts, Esq. Shipman & Goodwin LLP 2015. All rights reserved. HARTFORD STAMFORD GREENWICH WASHINGTON,

More information

Online and Mobile Privacy Notice ( Privacy Notice )

Online and Mobile Privacy Notice ( Privacy Notice ) Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy

More information

PRIVACY NOTICE. Last Updated: March 24, 2015

PRIVACY NOTICE. Last Updated: March 24, 2015 PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement

More information

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities Top Issues for Safeguarding Brand Reputation When Engaging In Social Media By: Alan L. Friel, Akash Sachdeva, Jesse Brody and Jatinder Bahra Social media has changed the way people communicate, and enabled

More information

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us. LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated

More information

TERMS OF USE & GENERAL PRIVACY POLICY

TERMS OF USE & GENERAL PRIVACY POLICY TERMS OF USE & GENERAL PRIVACY POLICY BETWEEN: MEDICAL ANSWERING SERVICES, LLC AND COMPANY NAME Medical Answering Services, LLC values your trust and our relationships with our clientele - so we take great

More information

DISCLAIMER, TERMS & CONDITIONS OF USE

DISCLAIMER, TERMS & CONDITIONS OF USE DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following

More information

Web Site Development Agreement

Web Site Development Agreement Web Site Development Agreement 1. Parties; Effective Date. This Web Site Development Agreement ( Agreement ) is between Plug-N-Run, its affiliates, (including but not limited to USA Financial, USA Financial

More information

Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2

Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2 Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have

More information

TERMS AND CONDTIONS Action Web Design Limited

TERMS AND CONDTIONS Action Web Design Limited TERMS AND CONDTIONS Action Web Design Limited 1. General This Agreement details the terms and conditions governing your use of the products and services made available to you by Action Web Design Ltd,

More information

Privacy Statement. What Personal Information We Collect. Australia

Privacy Statement. What Personal Information We Collect. Australia Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect

More information

Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services

Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services Roles and Responsibilities The proposed Guidance Note 20 Outsourced Accounting Services (GN 20) will set out the various

More information

Outsourcing Contracts Insights

Outsourcing Contracts Insights Outsourcing Contracts Insights This paper is intended to raise the awareness of law firms and legal departments of the issues they need to address while writing an outsourcing contract. These contracts

More information

"Owner" "Designer" 1. Description of the Services. "Website" Schedule A "Services" 2. Design Team. "Design Team" 3. Term / Scheduling.

Owner Designer 1. Description of the Services. Website Schedule A Services 2. Design Team. Design Team 3. Term / Scheduling. The following outlines the terms of service by and between the CLIENT (the "Owner") and Made Right Media (the "Designer"), of 720 W. Idaho St. #32, Boise, Idaho 83702. 1. Description of the Services. The

More information

Abilities Centre collects personal information for the following purposes:

Abilities Centre collects personal information for the following purposes: Privacy Policy Accountability Abilities Centre is responsible for your personal information under its control. We have appointed a Privacy Officer who is accountable for our compliance with this Privacy

More information

How To Understand A Software License Agreement

How To Understand A Software License Agreement SOFTWARE LICENSE AGREEMENTS A PRACTICAL GUIDE By Bradley J. Freedman SOFTWARE LICENSE AGREEMENTS A PRACTICAL GUIDE By Bradley J. Freedman Table of Contents Introduction...1 The Software License...2 Software

More information

The Designer estimates reaching satisfactory completion of the Services within six weeks of the Effective Date.

The Designer estimates reaching satisfactory completion of the Services within six weeks of the Effective Date. Website Design Agreement 1. Description of the Services The Designer will design a website (the "Website") for the Owner by providing the design and programming services listed on Schedule A (the "Services")

More information

Understanding the Legal Risks of Cloud Computing. Navigating the Network Security and Data Privacy Issues Associated with Cloud Services

Understanding the Legal Risks of Cloud Computing. Navigating the Network Security and Data Privacy Issues Associated with Cloud Services Understanding the Legal Risks of Cloud Computing Navigating the Network Security and Data Privacy Issues Associated with Cloud Services 2012 Thomson Reuters/Aspatore All rights reserved. Printed in the

More information

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT YOU ARE ABOUT TO ENTER INTO A LEGAL AGREEMENT WITH MEDICAL- OBJECTS PTY LTD ( MEDICAL-OBJECTS ). BY USING ALL OR ANY PORTION OF THE SOFTWARE IN ANY WAY YOU ACCEPT

More information

What personal information do we collect from the people that visit our blog, website or app?

What personal information do we collect from the people that visit our blog, website or app? Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy

More information

What s the Path? Information Life-cycle part of Vendor Management

What s the Path? Information Life-cycle part of Vendor Management Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

A Privacy and Data Security Checklist for All

A Privacy and Data Security Checklist for All July 2015 Many companies know they have to follow privacy and data security rules. Companies in the health care industry know about Health Insurance Portability and Accountability Act (HIPAA). Financial

More information

Outsourcing Technology Services A Management Decision

Outsourcing Technology Services A Management Decision Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships

More information

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP The Big Deal about Big Data Mike Skinner, CPA CISA CITP HORNE LLP Mike Skinner, CPA CISA CITP Senior Manager, IT Assurance & Risk Services HORNE LLP Focus areas: IT security & risk assessment IT governance,

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

DARTFISH PRIVACY POLICY

DARTFISH PRIVACY POLICY OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity

More information

Privacy and Outsourcing

Privacy and Outsourcing Privacy and Outsourcing Doron Rotman, National Privacy Service Leader August 2007 ADVISORY You can outsource liability you can t outsource responsibility and accountability! 1 1 Introduction Sourcing defined

More information

Replicated Website & Back-Office Privacy Policy

Replicated Website & Back-Office Privacy Policy Replicated Website & Back-Office Privacy Policy EFFECTIVE DECEMBER 1, 2015 WEALTH GENERATORS LLC 12 SOUTH 400 WEST SALT LAKE CITY UT 84101 801.939.3580 WWW.WEALTHGENERATORS.COM Wealth Generators LLC Replicated

More information

Privacy Policy Last Modified: April 3, 2015 1

Privacy Policy Last Modified: April 3, 2015 1 Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model

More information

AIG INSURANCE COMPANY OF CANADA Privacy Principles

AIG INSURANCE COMPANY OF CANADA Privacy Principles AIG and Individual Privacy We at AIG Insurance Company of Canada (referred to as AIG, we, our, or us ) abide by these and want you, our applicants, policyholders, insureds, claimants, and any other individuals

More information

Big Data for Mutuals. Marc Dautlich 25 November 2013

Big Data for Mutuals. Marc Dautlich 25 November 2013 Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?

More information

FLASH DELIVERY SERVICE

FLASH DELIVERY SERVICE Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong

More information

Intellectual Property& Technology Law Journal

Intellectual Property& Technology Law Journal Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open

More information

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.

8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you. 1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors

More information

Checklist. davies.com.au

Checklist. davies.com.au IP Checklist davies.com.au Introduction Commercialising ideas and developing a business requires consideration of intellectual property laws. If you don t you might be wasting money or risking the very

More information

Understanding the Software Contracts Process

Understanding the Software Contracts Process Understanding the Software Contracts Process By John Seidl, Partner Tompkins Associates More and more often, companies are purchasing supply chain software from commercial software vendors rather than

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1

CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 THIS AGREEMENT is entered into on ( Effective Date ) by and between LaSalle County Health Department, hereinafter called Covered Entity and, hereinafter

More information

Open Source Code: Understanding and Managing the Risks. May 8, 2006. Renee L. Jackson. Christopher K. Larus. When You Think IP,

Open Source Code: Understanding and Managing the Risks. May 8, 2006. Renee L. Jackson. Christopher K. Larus. When You Think IP, Open Source Code: Understanding and Managing the Risks May 8, 2006 Renee L. Jackson Christopher K. Larus When You Think IP, When You Think Think Fulbright. IP, TM Think Fulbright. TM What is Open Source

More information

Application to access Chesters Trade

Application to access Chesters Trade Application to access Chesters Trade Please fill in all details below: Account Number Company Name Company Phone Number Fax Number Contact Name Mobile Number Email Address Please review the Terms of Use

More information

Data Privacy & Security: Essential Questions Every Business Must Ask

Data Privacy & Security: Essential Questions Every Business Must Ask Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business

More information

Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank

Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank Agenda» Overview» What is Big Data?» Accelerates advances in computer & technologies» Revolutionizes data measurement»

More information

How To Use Open Source Software

How To Use Open Source Software Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and

More information

Mobile App Developer Agreements

Mobile App Developer Agreements Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed

More information

Third Party Security: Are your vendors compromising the security of your Agency?

Third Party Security: Are your vendors compromising the security of your Agency? Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda

More information

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk

More information

Outsourcing IT The Legal Aspects

Outsourcing IT The Legal Aspects Outsourcing IT The Legal Aspects Planning, Contracting, Managing and the Law Second Edition Rachel Burnett Business Assets: Premises and Equipment Chapter 5 Special considerations arise in those outsourcing

More information

WeTransfer Terms of Service

WeTransfer Terms of Service WeTransfer Terms of Service To make sure we know exactly what to expect from each other, WeTransfer has written down the conditions that apply whenever it provides services to its users. By using the website

More information

Privacy Policy. Definitions

Privacy Policy. Definitions Privacy Policy Effective Date: This Private Policy was last revised January 22, 2014. This document governs the privacy policy of our Website, www.gbexllc.com. Any capitalized terms not defined herein

More information

Comeet Privacy Policy

Comeet Privacy Policy Comeet Privacy Policy Comeet Technologies Inc. ( Comeet or us, our, we ) provides a solution for the management of the information and interviewing of candidates for employment (the Solution ). Comeet

More information

Insurance Coverage: The Commercial General Liability Policy

Insurance Coverage: The Commercial General Liability Policy Insurance Coverage: The Commercial General Liability Policy An overview of the backbone of avionics business protection. What is available and how you can control the cost of it. Please understand what

More information

Prudential Practice Guide

Prudential Practice Guide Prudential Practice Guide PPG 231 Outsourcing October 2006 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice and users

More information

Kalispell Social Media Use Policy

Kalispell Social Media Use Policy This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,

More information

HIT/EHR Vendor Contracting Checklist

HIT/EHR Vendor Contracting Checklist HIT/EHR Vendor Contracting Checklist Dear Members: You are likely coming to the end of an intense process of vetting one or more electronic health record (EHR) products and related vendor proposals. As

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy

More information

Data protection issues on an EU outsourcing

Data protection issues on an EU outsourcing Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process

More information

Bank Independent Bank to Bank Transfer Addendum (Consumers Only)

Bank Independent Bank to Bank Transfer Addendum (Consumers Only) Bank Independent Bank to Bank Transfer Addendum (Consumers Only) This Bank to Bank Transfer Addendum (this Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice,

More information

The Process of Selling a Brokerage

The Process of Selling a Brokerage The Process of Selling a Brokerage 0 THE PROCESS OF SELLING A BROKERAGE Introduction A business owner needs to be aware that the sale of a business is a complex process. It is a process that requires detailed,

More information

ACA is committed to protecting your privacy. ACA ( we, us or our ) safeguards your personal information to maintain member trust.

ACA is committed to protecting your privacy. ACA ( we, us or our ) safeguards your personal information to maintain member trust. Privacy Policy Introduction Your access to the ACA site is subject to the privacy policy as well as all applicable laws. By accessing and using the ACA site, you accept and agree to this Privacy Policy

More information

Social Media, Informa1on Systems and Interna1onal Educa1on: A Strategic Approach

Social Media, Informa1on Systems and Interna1onal Educa1on: A Strategic Approach Social Media, Informa1on Systems and Interna1onal Educa1on: A Strategic Approach CBIE Annual Conference Nov. 17-20, 2013 Randy Zadra Carleton University AGENDA 1. Social Media and Internet trends 2. Harnessing

More information

ENGLISH FOR LAW STUDENTS

ENGLISH FOR LAW STUDENTS ENGLISH FOR LAW STUDENTS Legal Due Diligence 8 February2012 By Helen Michelle Jørgensen LEGAL DUE DILIGENCE Pre the event Post the event LEGAL DUE DILIGENCE Pre the event: buying an asset buying a business

More information

Cloud Computing. A Practical Framework for Managing Cloud Computing Risk. Prepared by the Information Technology & Outsourcing Practice

Cloud Computing. A Practical Framework for Managing Cloud Computing Risk. Prepared by the Information Technology & Outsourcing Practice Cloud Computing A Practical Framework for Managing Cloud Computing Risk Prepared by the Information Technology & Outsourcing Practice Cloud Computing A Practical Framework for Managing Cloud Computing

More information

Procurement Capability Standards

Procurement Capability Standards IPAA PROFESSIONAL CAPABILITIES PROJECT Procurement Capability Standards Definition Professional Role Procurement is the process of acquiring goods and/or services. It can include: identifying a procurement

More information

Project: Marion Public Library Drupal 7 Website. Project Proposal Terms and Conditions. Prepared On: March 27, 2013

Project: Marion Public Library Drupal 7 Website. Project Proposal Terms and Conditions. Prepared On: March 27, 2013 Project: Marion Public Library Drupal 7 Website Project Proposal Terms and Conditions Prepared On: March 27, 2013 Prepared For: Marion Public Library 1095 6th Ave Marion, IA 52302 Prepared By: Droplet,

More information

15 questions to ask before signing an electronic medical record or electronic health record agreement

15 questions to ask before signing an electronic medical record or electronic health record agreement 15 questions to ask before signing an electronic medical record or electronic health record agreement Many definitions exist for electronic medical record (EMR) and electronic health record (EHR). Although

More information

The Intersection of 21st Century Risk Management and Data: Risk Allocation and Mitigation for Customer Data Breaches

The Intersection of 21st Century Risk Management and Data: Risk Allocation and Mitigation for Customer Data Breaches The Intersection of 21st Century Risk Management and Data: Risk Allocation and Mitigation for Customer Data Breaches Ethan D. Lenz, CPCU, and Christopher C. Cain, Foley & Lardner LLP Data. It has always

More information

Improve your Customer Experience with High Quality Information

Improve your Customer Experience with High Quality Information An Oracle White Paper April 2014 Improve your Customer Experience with High Quality Information Executive Overview Businesses are better leveraging their key CX asset customer data - by building MDM foundations

More information

TERMS and CONDITIONS OF USE - NextSTEPS TM

TERMS and CONDITIONS OF USE - NextSTEPS TM TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/

More information

Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records

Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records CMA POLICY Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records I. INTRODUCTION This document is intended to provide some interim guidance with respect to the main

More information

BUSINESS CHICKS, INC. Privacy Policy

BUSINESS CHICKS, INC. Privacy Policy BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,

More information

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of: SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a

More information

Modernizing the Infrastructure: Cloud Computing, Green IT Mickey Zandi, Ph.D. Managing Director

Modernizing the Infrastructure: Cloud Computing, Green IT Mickey Zandi, Ph.D. Managing Director Modernizing the Infrastructure: Cloud Computing, Green IT Mickey Zandi, Ph.D. Managing Director www.sungardas.com Agenda Issues Motivations Market Trends Starting Point 2010 SunGard. www.sungardas.com

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

Columbia University Service Provider Agreement

Columbia University Service Provider Agreement Columbia University Agreement Agreement ( Agreement ) dated as of, 20 (the Effective Date ) between The Trustees of Columbia University in the City of New York ( Columbia ) and ( Service Provider ). 1.

More information

1.1.1. Comply with these Terms of Use at all times while using the Site;

1.1.1. Comply with these Terms of Use at all times while using the Site; These Terms of Use set out the terms and conditions of a contract between you and Orange Base Hospital Chronic Pain Telehealth clinic governing your access to, and use of, the Site (defined below). By

More information

1/23/2015. MSBO Technology Committee January 22, 2015. Examples of Online Educational Services

1/23/2015. MSBO Technology Committee January 22, 2015. Examples of Online Educational Services MSBO Technology Committee January 22, 2015 Technology Policies Online Educational Services 2015 Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A. Puplava Mika Meyers Beckett

More information

Hadoop. http://hadoop.apache.org/ Sunday, November 25, 12

Hadoop. http://hadoop.apache.org/ Sunday, November 25, 12 Hadoop http://hadoop.apache.org/ What Is Apache Hadoop? The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using

More information