An open source software project that enables the distributed processing of very large data sets across multiple servers Basically:
|
|
- Ruby Ramsey
- 8 years ago
- Views:
Transcription
1 Big Data, Fine Print Business and Legal Considerations for Companies Dealing in Data Rachel Tarko Hudson, Technology Transactions Team & Privacy Team Sheppard Mullin Richter & Hampton LLP 2015
2 What is Big Data? Datasets whose size is beyond the ability of typical data base software tools to capture, store, manage, and analyze. --McKinsey & Co. A new attitude by businesses, non-profits, government agencies, and individuals that combining data from multiple sources could lead to better decisions. --Forbes
3 What is Hadoop? An open source software project that enables the distributed processing of very large data sets across multiple servers Basically: Hadoop lets you store bigger and more files than you would be able to store on one particular server Hadoop also lets you process and move these large amounts of data much faster
4 Why does this matter?
5 Why does this matter? 2.5 quintillion bytes of data are produced every day (that is 25,000,000,000,000,000,000!) Google, the largest big data Company in the world, processes 3.5 billion requests per day and stores 10 billion gigabytes. Facebook has over 2.5 billion pieces of content, 2.7 billion likes and 300 million photos (this adds up to more than 500 terabytes of data.)
6 Why does this matter? In 2007, 94% of data was stored in digital format. Fast forward to now: 90% of ALL data ever produced by humans has been made in the last two years (2014-now). Experts predict that by 2020, there will be 400 billion gigabytes of data in existence.
7 What types of data are there? Personal Data Names Addresses Birthdays Credit Cards Health data Aggregated Data Internet browser Web behavior Purchase history Time spent Power used
8 How are these types of data used? By analyzing and using large sets of data, companies can: Predict what customers want Provide customers with their own meaningful data Identify inefficiencies in manufacturing and logistics Improve hiring processes Improve health outcomes
9 How are these types of data used?
10 What YOU should be thinking about: 1. Protecting your ownership rights 2. Restrictions on use of your data 3. Protecting your customers 4. Commercializing your data 5. Securing your data
11 How can you protect your ownership rights in your big data assets? Copyright Law Individual pieces of data are NOT protected. Unique compilations of data ARE protected. Compilations must be selected and arranged in an original way in order to receive copyright protection. Trade Secret Law Offers broader protection; uniqueness or originality does not matter. If the database can be used as a competitive advantage over those who do not know or have access to its information, it is a trade secret.
12 Limitations on Your Rights Depending on how you obtained your data, your rights to that data are limited. If you obtained it on your own, all of the rights to the data are yours BUT, if you obtain it through an API or vendor, there may be contractual restrictions (i.e., restrictions on your ability to buy, sell, or transfer the data.)
13 You must also protect your customers! Comply with all applicable privacy laws Comply with your own privacy statements, including your privacy policy Clearly disclose what types of information you collect and how it is used
14 Commercializing Your Data Licenses Copyright Grants the rights to reproduce, modify, distribute, display, and use Trade secret Grants the rights of access and use Vendor Transactions Outbound: Be aware of rights you give to the vendor Inbound: Be aware of restrictions from the vendor Be explicit
15 Securing Your Data Address the security of your vendors: 1. Include a contractual data security provision 2. Detail specific data security requirements (physical and technical measures) This is NOT the same as a confidentiality clause! (but a confidentiality clause is important too!)
16 Due Diligence Considerations Consider the following when you sell or acquire data assets: 1. Perform a risk analysis of the company and the data it keeps (e.g., security, any compromises) 2. Examine how the company has been collecting its data (e.g., privacy policy, compliance with applicable laws like HIPPA, GLBA, COPPA) 3. If you see any problems: a) Mitigate the damage contractually (i.e., warranties, indemnity provisions) b) OR negotiate a price reduction or holdback/escrow fund to compensate for potential liability
17 Questions? Rachel Tarko Hudson
14724 Ventura Blvd., Suite 1205 Sherman Oaks, CA 91403. Firm Contact: Matt Stadelman Chief Compliance Officer
Privacy Policy September 2015 14724 Ventura Blvd., Suite 1205 Sherman Oaks, CA 91403 Firm Contact: Matt Stadelman Chief Compliance Officer Firm Website Address: www.1080financial.com This Privacy Policy
More informationA buyer can buy either the shares of the company that owns the target business or simply buy the assets which make up that business:
Buying a business This briefing highlights the main legal risks to consider when buying another business or enterprise. A buyer should always take legal advice at the outset of any acquisition. Structuring
More informationHow To Protect Your Data In The Cloud
Cloud Computing Hot topics in relation to security, liability and privacy Steven De Schrijver Cloud Computing : who and what is involved? Data Cloud Service Provider (e.g. SaaS, PaaS, IaaS) Sub-contractor
More informationAdding Cloud Solutions to Customer Contracts Robert J. Scott
Adding Cloud Solutions to Customer Contracts Robert J. Scott MSP vs. Cloud Who owns the hardware? Where does the data reside? Dedicated vs. Multi tenant? Who contracts with 3 rd parties? How are services
More informationChecklist for Buying a Business
Checklist for Buying a Business Buying a business can sometimes be a daunting and confusing process. This checklist highlights the main legal risks you need to consider when undertaking the process. It
More informationWHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?
M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationHow To Deal With Cloud Computing
A LEGAL GUIDE TO CLOUD COMPUTING INTRODUCTION Many companies are considering implementation of cloud computing services to decrease IT costs while providing the flexibility to scale usage on demand. The
More informationPrivacy Policy. log in to the Services with social networking credentials;
Privacy Policy Effective Date: November 20, 2015 This Privacy Policy is incorporated by this reference into the Mobli Media Inc. Terms of Use located at https://www.mobli.com/tou.html (the Terms of Use
More informationPrivacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
More informationIP Considerations in Outsourcing Agreements
IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,
More informationPrivacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
More informationPwC. Photo Sources: http://www.flickr.com/photos/serenitbee/6678578203/sizes/m/in/photostream/ http://www.flickr.com/photos/hutchike/3880462147/
The Stock Market Photo Sources: http://www.flickr.com/photos/serenitbee/6678578203/sizes/m/in/photostream/ http://www.flickr.com/photos/hutchike/3880462147/ 2013 PricewaterhouseCoopers LLP. All rights
More informationSocial Media Marketing Best Practices
Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert
More informationYour Open Source Investment Know. Manage. Protect.
Using open source software provides a compelling business case, but if companies violate the software s licenses, the consequences can be more severe than they think. Open Source Risk Management s services
More informationThank you for visiting this website, which is owned by Essendant Co.
Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationProfound Outdoors Privacy Policy
Profound Outdoors Privacy Policy Our Commitment to Privacy Our Privacy Policy has been developed as an extension of our commitment to combine quality products and services with integrity in dealing with
More informationLegal issues in the Cloud
Legal issues in the Cloud Renzo Marchini, Dechert LLP, London, UK Gene K. Landy, Ruberto, Israel & Weiner, PC Boston, MA, USA Portions 2010 Dechert LLP. Portions 2010 Ruberto, Israel & Weiner, PC. Attorneys
More informationwww.shipmangoodwin.com Shipman & Goodwin LLP 2015. All rights reserved. @SGHealthLaw HARTFORD STAMFORD GREENWICH WASHINGTON, DC
HIPAA Compliance and Non-Business Associate Vendors: Strategies and Best Practices July 14, 2015 William J. Roberts, Esq. Shipman & Goodwin LLP 2015. All rights reserved. HARTFORD STAMFORD GREENWICH WASHINGTON,
More informationOnline and Mobile Privacy Notice ( Privacy Notice )
Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy
More informationPRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
More informationTop Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities
Top Issues for Safeguarding Brand Reputation When Engaging In Social Media By: Alan L. Friel, Akash Sachdeva, Jesse Brody and Jatinder Bahra Social media has changed the way people communicate, and enabled
More informationAll copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.
LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated
More informationTERMS OF USE & GENERAL PRIVACY POLICY
TERMS OF USE & GENERAL PRIVACY POLICY BETWEEN: MEDICAL ANSWERING SERVICES, LLC AND COMPANY NAME Medical Answering Services, LLC values your trust and our relationships with our clientele - so we take great
More informationDISCLAIMER, TERMS & CONDITIONS OF USE
DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following
More informationWeb Site Development Agreement
Web Site Development Agreement 1. Parties; Effective Date. This Web Site Development Agreement ( Agreement ) is between Plug-N-Run, its affiliates, (including but not limited to USA Financial, USA Financial
More informationPrivacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2
Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have
More informationTERMS AND CONDTIONS Action Web Design Limited
TERMS AND CONDTIONS Action Web Design Limited 1. General This Agreement details the terms and conditions governing your use of the products and services made available to you by Action Web Design Ltd,
More informationPrivacy Statement. What Personal Information We Collect. Australia
Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect
More informationProposed Principles to be addressed in APES GN 20 Outsourced Accounting Services
Proposed Principles to be addressed in APES GN 20 Outsourced Accounting Services Roles and Responsibilities The proposed Guidance Note 20 Outsourced Accounting Services (GN 20) will set out the various
More informationOutsourcing Contracts Insights
Outsourcing Contracts Insights This paper is intended to raise the awareness of law firms and legal departments of the issues they need to address while writing an outsourcing contract. These contracts
More information"Owner" "Designer" 1. Description of the Services. "Website" Schedule A "Services" 2. Design Team. "Design Team" 3. Term / Scheduling.
The following outlines the terms of service by and between the CLIENT (the "Owner") and Made Right Media (the "Designer"), of 720 W. Idaho St. #32, Boise, Idaho 83702. 1. Description of the Services. The
More informationAbilities Centre collects personal information for the following purposes:
Privacy Policy Accountability Abilities Centre is responsible for your personal information under its control. We have appointed a Privacy Officer who is accountable for our compliance with this Privacy
More informationHow To Understand A Software License Agreement
SOFTWARE LICENSE AGREEMENTS A PRACTICAL GUIDE By Bradley J. Freedman SOFTWARE LICENSE AGREEMENTS A PRACTICAL GUIDE By Bradley J. Freedman Table of Contents Introduction...1 The Software License...2 Software
More informationThe Designer estimates reaching satisfactory completion of the Services within six weeks of the Effective Date.
Website Design Agreement 1. Description of the Services The Designer will design a website (the "Website") for the Owner by providing the design and programming services listed on Schedule A (the "Services")
More informationUnderstanding the Legal Risks of Cloud Computing. Navigating the Network Security and Data Privacy Issues Associated with Cloud Services
Understanding the Legal Risks of Cloud Computing Navigating the Network Security and Data Privacy Issues Associated with Cloud Services 2012 Thomson Reuters/Aspatore All rights reserved. Printed in the
More informationMEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT
MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT YOU ARE ABOUT TO ENTER INTO A LEGAL AGREEMENT WITH MEDICAL- OBJECTS PTY LTD ( MEDICAL-OBJECTS ). BY USING ALL OR ANY PORTION OF THE SOFTWARE IN ANY WAY YOU ACCEPT
More informationWhat personal information do we collect from the people that visit our blog, website or app?
Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy
More informationWhat s the Path? Information Life-cycle part of Vendor Management
Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered
More informationLegal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
More informationA Privacy and Data Security Checklist for All
July 2015 Many companies know they have to follow privacy and data security rules. Companies in the health care industry know about Health Insurance Portability and Accountability Act (HIPAA). Financial
More informationOutsourcing Technology Services A Management Decision
Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships
More informationThe Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP
The Big Deal about Big Data Mike Skinner, CPA CISA CITP HORNE LLP Mike Skinner, CPA CISA CITP Senior Manager, IT Assurance & Risk Services HORNE LLP Focus areas: IT security & risk assessment IT governance,
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationDARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
More informationPrivacy and Outsourcing
Privacy and Outsourcing Doron Rotman, National Privacy Service Leader August 2007 ADVISORY You can outsource liability you can t outsource responsibility and accountability! 1 1 Introduction Sourcing defined
More informationReplicated Website & Back-Office Privacy Policy
Replicated Website & Back-Office Privacy Policy EFFECTIVE DECEMBER 1, 2015 WEALTH GENERATORS LLC 12 SOUTH 400 WEST SALT LAKE CITY UT 84101 801.939.3580 WWW.WEALTHGENERATORS.COM Wealth Generators LLC Replicated
More informationPrivacy Policy Last Modified: April 3, 2015 1
Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationWhat Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.
What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model
More informationAIG INSURANCE COMPANY OF CANADA Privacy Principles
AIG and Individual Privacy We at AIG Insurance Company of Canada (referred to as AIG, we, our, or us ) abide by these and want you, our applicants, policyholders, insureds, claimants, and any other individuals
More informationBig Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
More informationFLASH DELIVERY SERVICE
Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong
More informationIntellectual Property& Technology Law Journal
Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open
More information8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
More informationChecklist. davies.com.au
IP Checklist davies.com.au Introduction Commercialising ideas and developing a business requires consideration of intellectual property laws. If you don t you might be wasting money or risking the very
More informationUnderstanding the Software Contracts Process
Understanding the Software Contracts Process By John Seidl, Partner Tompkins Associates More and more often, companies are purchasing supply chain software from commercial software vendors rather than
More informationCYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
More informationCONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1
CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 THIS AGREEMENT is entered into on ( Effective Date ) by and between LaSalle County Health Department, hereinafter called Covered Entity and, hereinafter
More informationOpen Source Code: Understanding and Managing the Risks. May 8, 2006. Renee L. Jackson. Christopher K. Larus. When You Think IP,
Open Source Code: Understanding and Managing the Risks May 8, 2006 Renee L. Jackson Christopher K. Larus When You Think IP, When You Think Think Fulbright. IP, TM Think Fulbright. TM What is Open Source
More informationApplication to access Chesters Trade
Application to access Chesters Trade Please fill in all details below: Account Number Company Name Company Phone Number Fax Number Contact Name Mobile Number Email Address Please review the Terms of Use
More informationData Privacy & Security: Essential Questions Every Business Must Ask
Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business
More informationDanny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank
Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank Agenda» Overview» What is Big Data?» Accelerates advances in computer & technologies» Revolutionizes data measurement»
More informationHow To Use Open Source Software
Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and
More informationMobile App Developer Agreements
Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed
More informationThird Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
More informationDistributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015
Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk
More informationOutsourcing IT The Legal Aspects
Outsourcing IT The Legal Aspects Planning, Contracting, Managing and the Law Second Edition Rachel Burnett Business Assets: Premises and Equipment Chapter 5 Special considerations arise in those outsourcing
More informationWeTransfer Terms of Service
WeTransfer Terms of Service To make sure we know exactly what to expect from each other, WeTransfer has written down the conditions that apply whenever it provides services to its users. By using the website
More informationPrivacy Policy. Definitions
Privacy Policy Effective Date: This Private Policy was last revised January 22, 2014. This document governs the privacy policy of our Website, www.gbexllc.com. Any capitalized terms not defined herein
More informationComeet Privacy Policy
Comeet Privacy Policy Comeet Technologies Inc. ( Comeet or us, our, we ) provides a solution for the management of the information and interviewing of candidates for employment (the Solution ). Comeet
More informationInsurance Coverage: The Commercial General Liability Policy
Insurance Coverage: The Commercial General Liability Policy An overview of the backbone of avionics business protection. What is available and how you can control the cost of it. Please understand what
More informationPrudential Practice Guide
Prudential Practice Guide PPG 231 Outsourcing October 2006 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice and users
More informationKalispell Social Media Use Policy
This policy approved by Council as an amendment to the City of Kalispell Personnel Handbook on April 20, 2015 (Resolution 5716). Purpose The purpose of this policy is to guide city employees in the proper,
More informationHIT/EHR Vendor Contracting Checklist
HIT/EHR Vendor Contracting Checklist Dear Members: You are likely coming to the end of an intense process of vetting one or more electronic health record (EHR) products and related vendor proposals. As
More informationPRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
More informationHow Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
More informationData protection issues on an EU outsourcing
Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process
More informationBank Independent Bank to Bank Transfer Addendum (Consumers Only)
Bank Independent Bank to Bank Transfer Addendum (Consumers Only) This Bank to Bank Transfer Addendum (this Addendum ) is an addendum to your Online Banking Agreement and Electronic Funds Transfer Act Notice,
More informationThe Process of Selling a Brokerage
The Process of Selling a Brokerage 0 THE PROCESS OF SELLING A BROKERAGE Introduction A business owner needs to be aware that the sale of a business is a complex process. It is a process that requires detailed,
More informationACA is committed to protecting your privacy. ACA ( we, us or our ) safeguards your personal information to maintain member trust.
Privacy Policy Introduction Your access to the ACA site is subject to the privacy policy as well as all applicable laws. By accessing and using the ACA site, you accept and agree to this Privacy Policy
More informationSocial Media, Informa1on Systems and Interna1onal Educa1on: A Strategic Approach
Social Media, Informa1on Systems and Interna1onal Educa1on: A Strategic Approach CBIE Annual Conference Nov. 17-20, 2013 Randy Zadra Carleton University AGENDA 1. Social Media and Internet trends 2. Harnessing
More informationENGLISH FOR LAW STUDENTS
ENGLISH FOR LAW STUDENTS Legal Due Diligence 8 February2012 By Helen Michelle Jørgensen LEGAL DUE DILIGENCE Pre the event Post the event LEGAL DUE DILIGENCE Pre the event: buying an asset buying a business
More informationCloud Computing. A Practical Framework for Managing Cloud Computing Risk. Prepared by the Information Technology & Outsourcing Practice
Cloud Computing A Practical Framework for Managing Cloud Computing Risk Prepared by the Information Technology & Outsourcing Practice Cloud Computing A Practical Framework for Managing Cloud Computing
More informationProcurement Capability Standards
IPAA PROFESSIONAL CAPABILITIES PROJECT Procurement Capability Standards Definition Professional Role Procurement is the process of acquiring goods and/or services. It can include: identifying a procurement
More informationProject: Marion Public Library Drupal 7 Website. Project Proposal Terms and Conditions. Prepared On: March 27, 2013
Project: Marion Public Library Drupal 7 Website Project Proposal Terms and Conditions Prepared On: March 27, 2013 Prepared For: Marion Public Library 1095 6th Ave Marion, IA 52302 Prepared By: Droplet,
More information15 questions to ask before signing an electronic medical record or electronic health record agreement
15 questions to ask before signing an electronic medical record or electronic health record agreement Many definitions exist for electronic medical record (EMR) and electronic health record (EHR). Although
More informationThe Intersection of 21st Century Risk Management and Data: Risk Allocation and Mitigation for Customer Data Breaches
The Intersection of 21st Century Risk Management and Data: Risk Allocation and Mitigation for Customer Data Breaches Ethan D. Lenz, CPCU, and Christopher C. Cain, Foley & Lardner LLP Data. It has always
More informationImprove your Customer Experience with High Quality Information
An Oracle White Paper April 2014 Improve your Customer Experience with High Quality Information Executive Overview Businesses are better leveraging their key CX asset customer data - by building MDM foundations
More informationTERMS and CONDITIONS OF USE - NextSTEPS TM
TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/
More informationData Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records
CMA POLICY Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records I. INTRODUCTION This document is intended to provide some interim guidance with respect to the main
More informationBUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
More informationViva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:
SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a
More informationModernizing the Infrastructure: Cloud Computing, Green IT Mickey Zandi, Ph.D. Managing Director
Modernizing the Infrastructure: Cloud Computing, Green IT Mickey Zandi, Ph.D. Managing Director www.sungardas.com Agenda Issues Motivations Market Trends Starting Point 2010 SunGard. www.sungardas.com
More informationCloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
More informationColumbia University Service Provider Agreement
Columbia University Agreement Agreement ( Agreement ) dated as of, 20 (the Effective Date ) between The Trustees of Columbia University in the City of New York ( Columbia ) and ( Service Provider ). 1.
More information1.1.1. Comply with these Terms of Use at all times while using the Site;
These Terms of Use set out the terms and conditions of a contract between you and Orange Base Hospital Chronic Pain Telehealth clinic governing your access to, and use of, the Site (defined below). By
More information1/23/2015. MSBO Technology Committee January 22, 2015. Examples of Online Educational Services
MSBO Technology Committee January 22, 2015 Technology Policies Online Educational Services 2015 Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A. Puplava Mika Meyers Beckett
More informationHadoop. http://hadoop.apache.org/ Sunday, November 25, 12
Hadoop http://hadoop.apache.org/ What Is Apache Hadoop? The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using
More information