Talking SMAC: Contracting for Social, Mobile, Analytics and Computing
|
|
- Colin Gibson
- 8 years ago
- Views:
Transcription
1 Talking SMAC: Contracting for Social, Mobile, Analytics and Computing Brad Peterson and Paul Roy, Partners, Mayer Brown LLP
2 Today s Topics Today s technology revolution: social, mobile, analytics and cloud. How do you contract for SMAC services? Who gets the benefits of insights created through SMAC? What traditional contracting assumptions fail with SMAC? Which risks increase? Which diminish? How do you comply with privacy and other regulations that aren t keeping up with changing technology?
3 The SMAC Revolution Mobile phones, cars and other devices capturing data constantly Analytical tools allow analysis of data with staggering volume, variety and velocity Social media as primary way for humans to communicate with humans Big Data Cloud platforms allowing low-cost testing and use of algorithms to generate insight
4 Society is Unprepared Privacy laws assume that users know how data is collected and used. Few understand how much companies know and how well they use what they know. Americans were shocked at the NSA s big data project. Big data companies are growing at unprecedented rates.
5 Your Company Can Lose Big For example, in Amazon s early days it signed a deal with AOL to run the technology behind AOL s e-commerce site. To most people, it looked like an ordinary outsourcing deal. But what really interested Amazon, explains Andreas Weigend, Amazon s former chief scientist, was getting hold of data on what AOL users were looking at and buying, which would improve the performance of [Amazon s] recommendation engine. Poor AOL never realized this. It only saw the data s value in terms of its primary purpose sales. Clever Amazon knew it could reap benefits by putting the data to a secondary use. From Big Data: A Revolution That Will Transform How We Live, Work, and Think, Viktor Mayer-Schonberger and Kenneth Cukier (Houghton Mifflin Harcourt 013), p. 105.
6 Or Your Company Can Win Big New insights into your customers, competitors and costs Provider s data trove Provider s data scientists Provider s data gathering capability Royalties on new uses of your data Governance that s built on better data and more immediate
7 Your Data Strategy Can Make the Difference What data will drive the value of your business? What data must you collect, own and protect? What data must you acquire?
8 The SMAC Services Value Chain Providing software and devices collecting social, mobile, Internet of Things, web and other data Collecting or acquiring data Pre-processing to reduce duplication and error Integrating data into a data warehouse with connections between various databases Identifying correlations using data analysis tools Interpreting to identify meaningful results Creating models and algorithms to generate meaningful results on new data at high velocity Production of insights and recommendations
9 Five Key Contracting Risks For Buyers of SMAC Services While you re focused on costs and service levels, SMAC providers waltz away with free use, or even exclusive free use, of data collected through your business activities. Activities of SMAC providers place you in breach of laws and contracts. SMAC providers interfere with your relationships with your customers and suppliers. The service that you receive is the SMAC provider s shifting standard, designed for its benefit not yours. You come to depend on data or output that may be incomplete, wrong, misleading or discontinued.
10 Don t Rely on Standard Intellectual Property Clauses IP clauses in outsourcing contracts allocate rights under intellectual property laws US intellectual property laws generally don t protect the rights you want in your data You generally are not the author or inventor of the data that you gather The sweat of the brow in collecting data is generally not protected under US IP rights Europe and other jurisdictions do have database protection laws, but those likely do not protect your US business
11 Don t Assume that SMAC Business Models Comply With Laws Informed consent Access / participation Anonymization / de-identification Do Not Target Legitimate business purposes Data minimization Profiling
12 Don t Assume That NDAs Protect You from SMAC Risks Non-disclosure is not non-use, and non-use may not be non-analysis NDAs commonly exclude: Available from other sources Required to be disclosed under law Value in direct vs. derived information Exceptions for use to improve our services
13 Don t Even Assume That Your Data Clause Protects You Data ownership clauses generally protect rights in data related to your business, not the digital exhaust that may be of primary value Data ownership clauses rarely offer rights in co-mingled data or the provider s data
14 Do Retain and Obtain Data Rights Learn: What data your company sees now and will see in the future What data you provide to other companies What data you need from other companies Obtain: Rights to continued use of data that you need, including right to provide that data to outsiders for data analysis, license fees, etc. Rights to prevent use of data by others, either for competitive advantage or to obtain license fees to permit use Rights to prevent uses that would be disturbing to your customers and suppliers Rights to other data in provider s possession Rights to findings from analysis of aggregated data
15 Do Use Incentives to Drive Results Key challenges in contracting for data services: Difficulty in specifying outcomes Difficulty in specifying skills Difficulty in specifying activities Rapidly evolving technology and laws Sourcing solutions: Ongoing multi-supplier competitive model Gain share or other outcome-based model
16 Do Allocate Liability Collection in violation of law or contract Illegal retention of data Improper or unwanted disclosure Inaccurate, incomplete or misleading data Incorrect analysis or recommendations Use of analysis and recommendations
17 Do Protect Against Change Get a long-term commitment to provide the data you expect Require consent for harmful changes in services Obtain options to rights to new data streams or analytical tools as they become available.
18 Summary Today, the big winners are those with big data skills and mindsets. Long term, those will become common skills and the big winners will be those who control data that allows them to predict and shape the future. Inventory your data assets and which providers have access to those data assets. Get legal protections in your contracts now, before you lose to counterparties who get smart about big data and SMAC.
Big Data. How it is Transforming Learning and Talent Development
Big Data How it is Transforming Learning and Talent Development Agenda 1. Big Data Background 2. Big Data in Talent and Learning Analytics 3. Examples and Getting Started Big Data Defined Big Data.. The
More informationEvolving Technology Issues: Cloud Computing
Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Cloud Computing Does compliance with applicable laws fall to
More informationThe Future of Customer Experience
The Future of Customer Experience The Evolution of CRM across multiple touch points and channels in a consistent manner. The past 20 years have seen an evolution in how we view, analyse and manage our
More informationData Security and Breach in Outsourcing Agreements
Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel Digital, Technology, ecommerce & Privacy Practice Group November 19, 2015 Akiba Stern Partner,
More informationThe Promise of Industrial Big Data
The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B
More informationContracting for International Outsourcing
Legal Voice: Contracting for International Outsourcing by Brad Peterson and Mark Prinsley; Mayer, Brown, Rowe & Maw International outsourcing occurs where a customer turns over responsibility for a function
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationCORPORATE TRAVEL MANAGEMENT PRIVACY POLICY
CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY 1. About this Policy Corporate Travel Management Group Pty Ltd (ABN 52 005 000 895) (CTM) ('we', 'us', 'our') understands the importance of, and is committed
More informationBERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS
BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,
More informationChicagoland Burger Build Off Privacy Policy
Chicagoland Burger Build Off Privacy Policy Purpose of Privacy Policy McDonald s Owners of Chicagoland and Northwest Indiana [MOCNI] ( Company, we or us ) is a franchisee Co-Op of McDonald s Corporation.
More informationA Unified Ethical Frame for Big Data Analysis
A Unified Ethical Frame for Big Data Analysis Big Data Ethics Project Version 1.0 7 October 2014 Introduction Big data provides unprecedented opportunities to drive information-based innovation in economies,
More informationLearn How to Defend Your Online Marketplace from Unwanted Traffic
Learn How to Defend Your Online Marketplace from Unwanted Traffic Speakers Rami Essaid CEO & Co-founder Distil in Classifieds The Basics of Bots A Bot is an automated program that runs on the internet
More informationHIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer
HIPAA and Big Data Twenty Third National HIPAA Summit March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer Overview HIPAA and Big Data Big Data Definitions Big Data and Health Care Benefits
More informationContract Compliance Services
Contract Compliance Services Deriving greater value from your third-party relationships kpmg.com 1 / KPMG s Evolving World of Risk Management Managing the risk and enhancing the value of commercial relationships
More informationAdding Value In Finance And Accounting Outsourcing
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Adding Value In Finance And Accounting Outsourcing
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationSocial Media Marketing Best Practices
Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert
More informationBig Data & Analytics @ Netflix. Paul Ellwood February 9th, 2015
Big Data & Analytics @ Netflix Paul Ellwood February 9th, 2015 Who Am I? Director, Data Science & Engineering Also Leader, DataKind San Francisco chapter Formerly: Director, Product Analytics @ Netflix
More informationContracting for Cloud Computing
Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 geofrey.master@mayerbrownjsm.com April 5th 2011 Mayer Brown is a global legal services organization comprising legal
More informationIntellectual Property
Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must
More informationThe Cloud Computing Revolution: Beyond the Hype
The Cloud Computing Revolution: Beyond the Hype KEN ADLER Partner and Chair, Technology and Outsourcing Practice Group Loeb & Loeb LLP Outsourcing in Financial Services Program October 19, 2010 Overview
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationHyatt Hotels Corporation. Code of Business Conduct and Ethics
INTRODUCTION This (this Code ) is designed to reaffirm and promote Hyatt Hotels Corporation s compliance with laws and ethical standards applicable in all jurisdictions in which Hyatt Hotels Corporation
More informationCurrent Critical Issues When Outsourcing
Current Critical Issues When Outsourcing Brad Peterson Partner +1 312 701 8568 bpeterson@mayerbrown.com Paul Roy Partner +1 312 701 7370 proy@mayerbrown.com Speakers Paul Roy is a partner in the Business
More informationGlobal Code of Conduct
Global Code of Conduct 2011. 3 Samsung Electronics Co., Ltd. IMPORTANT NOTICE THE GLOBAL CODE OF CONDUCT DESCRIBES THE STANDARDS OF INTEGRITY SAMSUNG ELECTRONICS EXPECTS FROM ITS SUBSIDIARIES AND THEIR
More information2016 VANCOUVER WELLNESS SHOW CONTEST RULES
2016 VANCOUVER WELLNESS SHOW CONTEST RULES The BCAK Wellness Show contest (the Contest ) is administered by the British Columbia Association of Kinesiologists BCAK, a not-for-profit Society registered
More informationThe New World of Data. Don Strickland President, Strickland & Associates
The New World of Data Don Strickland President, Strickland & Associates THE NEW WORLD OF DATA 1900 1950 2000 Physical Infrastructure Labor Capital Physical Infrastructure Labor Capital Physical Infrastructure
More informationWe will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there
O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction
More informationTechnology or Solution?
Technology or Solution? Dean Walters CIO Liberty Global Privacy and security are important and pervasive concerns while dealing with Big Data and Liberty Global is committed to protecting privacy and treat
More informationRC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE.
JAN-MAR 2014 R E P R I N T RC & risk compliance & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS REPRINTED FROM: RISK & COMPLIANCE MAGAZINE JAN-MAR 2015 2014 ISSUE RC & risk
More informationFISHER & PAYKEL PRIVACY POLICY
FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed
More information1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to:
SPECIAL TERMS AND CONDITIONS FOR DOMAIN NAME MANAGEMENT SERVICES (DOMAIN PORTFOLIO MANAGEMENT SERVICE, LOCAL PRESENCE SERVICES AND ANONYMOUS REGISTRATION SERVICES) 1. Services 1.1 These Special Terms and
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
More informationUnibet Tipping Competition Terms and Conditions
Unibet Tipping Competition Terms and Conditions 1. Conditions of Entry (a) By entering this competition entrants accept these Terms and Conditions. (b) Entry is open to Australian residents aged 18 years
More informationCODE OF BUSINESS CONDUCT AND ETHICS
Effective: 1 st April 2015 Table of Contents 1. PURPOSE... 3 2. SCOPE... 3 3. OWNERSHIP... 3 4. DEFINITIONS... 3 5. CONFLICTS OF INTEREST... 3 6. CORPORATE OPPORTUNITIES... 4 7. CONFIDENTIALITY AND PRIVACY...
More informationMEMBI PRIVACY POLICY
MEMBI 1 PURPOSE OF OUR POLICY 1.1 Membi Limited (Company Number 09775238) of 396a Kingston Road, Kingston Road, London SW20 8LL, United Kingdom (Membi, we, us or our) provides the services offered on the
More informationTHE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction
THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the
More informationUr-Energy Inc. Code of Business Conduct and Ethics
Ur-Energy Inc. Code of Business Conduct and Ethics As Amended Effective February 5, 2014 2957409.2 TABLE OF CONTENTS INTRODUCTION... 3 CONFLICTS OF INTEREST... 3 GIFTS, INVITATIONS AND ENTERTAINMENT GUIDELINES...
More information1. ELIGIBILITY. To be eligible for this Contest, an individual must
EDMONTON REGIONAL AIRPORTS AUTHORITY S SHOP TO WIN AT DESTINATION EIA CONTEST ( THE CONTEST ) SHALL BE CONSTRUED AND EVALUATED ACCORDING TO APPLICABLE CANADIAN LAW. NO PURCHASE NECESSARY. VOID IN WHOLE
More informationBig Data for Law Firms DAMIAN BLACKBURN
Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Contents Executive summary VII About the author XI Chapter 1: Introduction to big data 1 Factors leading to big data 2 The three
More informationSAP Splash Privacy Statement
SAP Splash Privacy Statement The SAP Splash Privacy Statement (this Privacy Statement ) applies to the use of this website, http://www.experiencesplash.com (the Website ) and any other subdomains or webpages
More informationHelix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
More informationWelcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationLiability Insurance (D&O) Presented by Caroline Yeo
Directors Beyond Insurance & Officers Liability Insurance (D&O) Presented by Caroline Yeo The Structure of D&O Insurance Covered claim against directors and officers Covered securities claim against the
More informationDirectors & Officers Liability Insurance. Presented by Caroline Yeo
Directors & Officers Liability Insurance Presented by Caroline Yeo The Structure of D&O Insurance Covered claim against directors and officers Covered securities claim against the company itself Indemnification?
More informationINDEX PRIVACY POLICY...2
INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3
More informationDISCLAIMER. Any fact, assessment, analysis, forecasts, opinion and other information (collectively Information ) released by:
DISCLAIMER General This website can be accessed worldwide however the information on the website is related to Saxo Capital Markets CY Limited and is not specific to any other country. All clients will
More informationHow To Choose The Right Form Of Joint Venture
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How To Choose The Right Form Of Joint Venture Law360,
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with
More informationPrivacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems
Privacy Engineering Objectives and Risk Model - Discussion Deck Objective-Based Design for Improving Privacy in Information Systems Purpose and Scope This discussion deck describes initial draft components
More informationProducts Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012
Products Liability: Putting a Product on the U.S. Market Natalia R. Medley Crowell & Moring LLP 14 November 2012 Overview Regulation of Products» Federal agencies» State laws Product Liability Lawsuits»
More informationProcon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015
Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite
More informationIntellectual Property in M&A
Intellectual Property in M&A October 23, 2015 Dallas Bar Association IP Section Steve Stein, Jesse Betts, Craig Carpenter Thompson & Knight LLP Today s Topics Steps in M&A Transactions Drivers in M&A Transactions
More informationGLAUKOS CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
GLAUKOS CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS This Code of Business Conduct and Ethics (the Code ) contains general guidelines for conducting the business of Glaukos Corporation (the Company
More informationM&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
More informationDLI CODE OF BUSINESS CONDUCT & ETHICS
DLI CODE OF BUSINESS CONDUCT & ETHICS All DLI employees, regardless of where they are located, must conduct their affairs with uncompromising honesty and integrity. Business ethics are no different from
More informationEDMONTON JOURNAL READER S CHOICE CONTEST
EDMONTON JOURNAL READER S CHOICE CONTEST THE EDMONTON JOURNAL READER S CHOICE CONTEST (THE CONTEST ) IS INTENDED TO BE CONDUCTED IN CANADA ONLY AND SHALL BE CONSTRUED AND EVALUATED ACCORDING TO APPLICABLE
More informationINSIDER TRADING POLICY
1.0 POLICY STATEMENT INSIDER TRADING POLICY This Policy provides guidelines to officers, directors and employees of Dominion Diamond Corporation (the Company ) and other insiders of the Company with respect
More information1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.
1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes
More informationEdmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest
Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest Rules & Regulations EDMONTON PUBLIC LIBRARY S ( EPL ) Make With Mark School CONTEST ( THE CONTEST ) SHALL BE CONSTRUED AND EVALUATED
More informationPrivacy Policy GetYou
Privacy Policy GetYou How We Use and Manage Your Data Key Information GetYou respects your right to privacy in the on-line world when you use our service and communicate electronically with us. We put
More informationMCC TERMS AND CONITIONS
MCC TERMS AND CONITIONS Welcome to MNCred.org, which is owned by Minnesota Credentialing Collaborative, LLC ( we, us or MCC ) a joint effort of the Minnesota Council of Health Plans (MCHP), Minnesota Hospital
More informationPacific Smiles Group Privacy Policy
Pacific Smiles Group Privacy Policy Pacific Smiles Group Limited and its related bodies corporate (PSG, we, our, us) recognise the importance of protecting the privacy and the rights of individuals in
More informationIs Your Data Cloud Ready?
WHITE PAPER Is Your Data Cloud Ready? Of all the questions to be answered before taking advantage of the cloud, this one is the most pertinent; is my data cloud ready? The question is especially important
More informationThe Importance of Analytics
CIPHER Briefing The Importance of Analytics July 2014 Renting 1 machine for 1,000 hours will be nearly equivalent to renting 1,000 machines for 1 hour in the cloud. This will enable users and organizations
More informationConnected car, big data, big brother?
Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,
More informationCONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1
CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 THIS AGREEMENT is entered into on ( Effective Date ) by and between LaSalle County Health Department, hereinafter called Covered Entity and, hereinafter
More informationBig Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi
Big Data, Big Risk? Data Management and Privacy Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Data Management & Privacy Compliance Heather Innes Chief Privacy Officer, General Motors
More informationCUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
More informationBig Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,
More informationDailyMailz may collect and process the following personal information about you:
Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and
More informationSpecial Edition. I. What is "Big Data"? April 2013
Special Edition April 2013 For further information please contact: Brian Hengesbaugh Partner, Chicago Tel +1 312 861 3077 brian.hengesbaugh @bakermckenzie.com Amy de La Lama Associate, Chicago Tel +1 312
More informationBusiness Associate Agreement
Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,
More informationELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
More informationBRANDLOGIK. an Introduction to. BIG data. the future is now
BRANDLOGIK an Introduction to BIG data the future is now 1 BIG data Many of our clients and contacts ask what Big Data can do for their business. This is an introduction an overview of what Big Data can
More informationSecuring Big Data Learning and Differences from Cloud Security
Securing Big Data Learning and Differences from Cloud Security Samir Saklikar RSA, The Security Division of EMC Session ID: DAS-108 Session Classification: Advanced Agenda Cloud Computing & Big Data Similarities
More informationTerms & Conditions Governing UOB Income Builder Dreams Promotion (6 July 2015 2 August 2015) ( Promotion )
Terms & Conditions Governing UOB Income Builder Dreams Promotion (6 July 2015 2 August 2015) ( Promotion ) 1. Introduction 1.1 The Promotion shall commence from 06 July 2015 to 02 August 2015 (both dates
More informationSELECTING AN ENTERPRISE-READY CLOUD SERVICE
21 Point Checklist for SELECTING AN ENTERPRISE-READY CLOUD SERVICE Brought to you by Introduction The journey to the cloud is well underway, and it s easy to see why when 84% of CIOs report cutting application
More informationBUSINESS ASSOCIATE AGREEMENT
THIS IS A TEMPLATE ONLY. CERTAIN STATES MAY NOT PERMIT THE TYPES OF ACTIVITIES ALLOWED HEREUNDER RELATING TO PROTECTED HEALTH INFORMATION. THUS THIS AGREEMENT MAY NEED TO BE MODIFIED IN ORDER TO COMPLY
More informationMega Transparency Report. March 2015. Requests for Removal of Content and for User Information
Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationWebsite Terms and Conditions
Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..
More informationComputing and Communication Policy on Acceptable Use of Electronic Resources
Computing and Communication Policy on Acceptable Use of Electronic Resources Summary This policy defines the boundaries of "acceptable use" of electronic resources, including computers, networks, electronic
More informationUSER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
More informationThe Sourcing Canvas: A Strategic Approach to Sourcing Decisions. By Ralph Loftin, Richard Lynch and Jack Calhoun
The Sourcing Canvas: A Strategic Approach to Sourcing Decisions By Ralph Loftin, Richard Lynch and Jack Calhoun Contents Abstract... 3 Role of Business Capabilities in Sourcing... 4 Decision Logic for
More informationThe Use of Patient Records (EHR) for Research
The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The
More informationPersonal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
More informationDOING BUSINESS IN INDONESIA E-Commerce
DOING BUSINESS IN INDONESIA E-Commerce http://blog.ssek.com company/ssek-legal-consultants @ssek_lawfirm INTRODUCTION E-commerce in Indonesia is growing by leaps and bounds and this is expected to continue
More informationCONFESSIONS OF A SHOPAHOLIC CONTEST
Precedent last updated:january 12, 2009 CONFESSIONS OF A SHOPAHOLIC CONTEST THE CONFESSIONS OF A SHOPAHOLIC CONTEST (THE CONTEST ) IS INTENDED TO BE CONDUCTED IN CANADA ONLY AND SHALL BE CONSTRUED AND
More informationThe Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company
The Hidden Risks: Managing Risks in Outsourcing Relationships Brian O Connor Chief Security & Privacy Officer Eastman Kodak Company Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak
More informationPrivacy Policy Australian Construction Products Pty Limited
Privacy Policy Australian Construction Products Pty Limited What is this privacy policy about? This Privacy Policy describes how Australian Construction Products 63 091 618 781 (we or us) will treat the
More informationBEHAVIORAL ONLINE MARKET RESEARCH: BEST PRACTICES
BEHAVIORAL ONLINE MARKET RESEARCH: BEST PRACTICES October 2010 Beginning in November 2009, the Center for Democracy & Technology (CDT) hosted a series of meeting of its Internet Privacy Working Group (IPWG)
More informationPrivacy Policy. February, 2015 Page: 1
February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationBIG DATA: IT MAY BE BIG BUT IS IT SMART?
BIG DATA: IT MAY BE BIG BUT IS IT SMART? Turning Big Data into winning strategies A GfK Point-of-view 1 Big Data is complex Typical Big Data characteristics?#! %& Variety (data in many forms) Data in different
More informationmerchant application form
merchant application form standard & Point Of Sale (POS) Version 3.1 revised 28 February 2011 copyright mhits Limited 2004-2011 ABN 82 107 753 613 Instructions: 1. Fill in the Application Form 2. Sign
More informationCompetitive Intelligence Acquisition and Reverse Engineering
Competitive Intelligence Acquisition and Reverse Engineering Pitfalls and Best Practices in the US, the UK and Germany Richard M. Assmus Andrea C. Hutchison Dr. Ulrich Worm May 20, 2010 Sangeeta Puran
More information!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by
White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading
More information2. What personal information do we collect and hold?
PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying
More information