Talking SMAC: Contracting for Social, Mobile, Analytics and Computing

Size: px
Start display at page:

Download "Talking SMAC: Contracting for Social, Mobile, Analytics and Computing"

Transcription

1 Talking SMAC: Contracting for Social, Mobile, Analytics and Computing Brad Peterson and Paul Roy, Partners, Mayer Brown LLP

2 Today s Topics Today s technology revolution: social, mobile, analytics and cloud. How do you contract for SMAC services? Who gets the benefits of insights created through SMAC? What traditional contracting assumptions fail with SMAC? Which risks increase? Which diminish? How do you comply with privacy and other regulations that aren t keeping up with changing technology?

3 The SMAC Revolution Mobile phones, cars and other devices capturing data constantly Analytical tools allow analysis of data with staggering volume, variety and velocity Social media as primary way for humans to communicate with humans Big Data Cloud platforms allowing low-cost testing and use of algorithms to generate insight

4 Society is Unprepared Privacy laws assume that users know how data is collected and used. Few understand how much companies know and how well they use what they know. Americans were shocked at the NSA s big data project. Big data companies are growing at unprecedented rates.

5 Your Company Can Lose Big For example, in Amazon s early days it signed a deal with AOL to run the technology behind AOL s e-commerce site. To most people, it looked like an ordinary outsourcing deal. But what really interested Amazon, explains Andreas Weigend, Amazon s former chief scientist, was getting hold of data on what AOL users were looking at and buying, which would improve the performance of [Amazon s] recommendation engine. Poor AOL never realized this. It only saw the data s value in terms of its primary purpose sales. Clever Amazon knew it could reap benefits by putting the data to a secondary use. From Big Data: A Revolution That Will Transform How We Live, Work, and Think, Viktor Mayer-Schonberger and Kenneth Cukier (Houghton Mifflin Harcourt 013), p. 105.

6 Or Your Company Can Win Big New insights into your customers, competitors and costs Provider s data trove Provider s data scientists Provider s data gathering capability Royalties on new uses of your data Governance that s built on better data and more immediate

7 Your Data Strategy Can Make the Difference What data will drive the value of your business? What data must you collect, own and protect? What data must you acquire?

8 The SMAC Services Value Chain Providing software and devices collecting social, mobile, Internet of Things, web and other data Collecting or acquiring data Pre-processing to reduce duplication and error Integrating data into a data warehouse with connections between various databases Identifying correlations using data analysis tools Interpreting to identify meaningful results Creating models and algorithms to generate meaningful results on new data at high velocity Production of insights and recommendations

9 Five Key Contracting Risks For Buyers of SMAC Services While you re focused on costs and service levels, SMAC providers waltz away with free use, or even exclusive free use, of data collected through your business activities. Activities of SMAC providers place you in breach of laws and contracts. SMAC providers interfere with your relationships with your customers and suppliers. The service that you receive is the SMAC provider s shifting standard, designed for its benefit not yours. You come to depend on data or output that may be incomplete, wrong, misleading or discontinued.

10 Don t Rely on Standard Intellectual Property Clauses IP clauses in outsourcing contracts allocate rights under intellectual property laws US intellectual property laws generally don t protect the rights you want in your data You generally are not the author or inventor of the data that you gather The sweat of the brow in collecting data is generally not protected under US IP rights Europe and other jurisdictions do have database protection laws, but those likely do not protect your US business

11 Don t Assume that SMAC Business Models Comply With Laws Informed consent Access / participation Anonymization / de-identification Do Not Target Legitimate business purposes Data minimization Profiling

12 Don t Assume That NDAs Protect You from SMAC Risks Non-disclosure is not non-use, and non-use may not be non-analysis NDAs commonly exclude: Available from other sources Required to be disclosed under law Value in direct vs. derived information Exceptions for use to improve our services

13 Don t Even Assume That Your Data Clause Protects You Data ownership clauses generally protect rights in data related to your business, not the digital exhaust that may be of primary value Data ownership clauses rarely offer rights in co-mingled data or the provider s data

14 Do Retain and Obtain Data Rights Learn: What data your company sees now and will see in the future What data you provide to other companies What data you need from other companies Obtain: Rights to continued use of data that you need, including right to provide that data to outsiders for data analysis, license fees, etc. Rights to prevent use of data by others, either for competitive advantage or to obtain license fees to permit use Rights to prevent uses that would be disturbing to your customers and suppliers Rights to other data in provider s possession Rights to findings from analysis of aggregated data

15 Do Use Incentives to Drive Results Key challenges in contracting for data services: Difficulty in specifying outcomes Difficulty in specifying skills Difficulty in specifying activities Rapidly evolving technology and laws Sourcing solutions: Ongoing multi-supplier competitive model Gain share or other outcome-based model

16 Do Allocate Liability Collection in violation of law or contract Illegal retention of data Improper or unwanted disclosure Inaccurate, incomplete or misleading data Incorrect analysis or recommendations Use of analysis and recommendations

17 Do Protect Against Change Get a long-term commitment to provide the data you expect Require consent for harmful changes in services Obtain options to rights to new data streams or analytical tools as they become available.

18 Summary Today, the big winners are those with big data skills and mindsets. Long term, those will become common skills and the big winners will be those who control data that allows them to predict and shape the future. Inventory your data assets and which providers have access to those data assets. Get legal protections in your contracts now, before you lose to counterparties who get smart about big data and SMAC.

Big Data. How it is Transforming Learning and Talent Development

Big Data. How it is Transforming Learning and Talent Development Big Data How it is Transforming Learning and Talent Development Agenda 1. Big Data Background 2. Big Data in Talent and Learning Analytics 3. Examples and Getting Started Big Data Defined Big Data.. The

More information

Evolving Technology Issues: Cloud Computing

Evolving Technology Issues: Cloud Computing Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Cloud Computing Does compliance with applicable laws fall to

More information

The Future of Customer Experience

The Future of Customer Experience The Future of Customer Experience The Evolution of CRM across multiple touch points and channels in a consistent manner. The past 20 years have seen an evolution in how we view, analyse and manage our

More information

Data Security and Breach in Outsourcing Agreements

Data Security and Breach in Outsourcing Agreements Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel Digital, Technology, ecommerce & Privacy Practice Group November 19, 2015 Akiba Stern Partner,

More information

The Promise of Industrial Big Data

The Promise of Industrial Big Data The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B

More information

Contracting for International Outsourcing

Contracting for International Outsourcing Legal Voice: Contracting for International Outsourcing by Brad Peterson and Mark Prinsley; Mayer, Brown, Rowe & Maw International outsourcing occurs where a customer turns over responsibility for a function

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY

CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY 1. About this Policy Corporate Travel Management Group Pty Ltd (ABN 52 005 000 895) (CTM) ('we', 'us', 'our') understands the importance of, and is committed

More information

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,

More information

Chicagoland Burger Build Off Privacy Policy

Chicagoland Burger Build Off Privacy Policy Chicagoland Burger Build Off Privacy Policy Purpose of Privacy Policy McDonald s Owners of Chicagoland and Northwest Indiana [MOCNI] ( Company, we or us ) is a franchisee Co-Op of McDonald s Corporation.

More information

A Unified Ethical Frame for Big Data Analysis

A Unified Ethical Frame for Big Data Analysis A Unified Ethical Frame for Big Data Analysis Big Data Ethics Project Version 1.0 7 October 2014 Introduction Big data provides unprecedented opportunities to drive information-based innovation in economies,

More information

Learn How to Defend Your Online Marketplace from Unwanted Traffic

Learn How to Defend Your Online Marketplace from Unwanted Traffic Learn How to Defend Your Online Marketplace from Unwanted Traffic Speakers Rami Essaid CEO & Co-founder Distil in Classifieds The Basics of Bots A Bot is an automated program that runs on the internet

More information

HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer

HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer HIPAA and Big Data Twenty Third National HIPAA Summit March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer Overview HIPAA and Big Data Big Data Definitions Big Data and Health Care Benefits

More information

Contract Compliance Services

Contract Compliance Services Contract Compliance Services Deriving greater value from your third-party relationships kpmg.com 1 / KPMG s Evolving World of Risk Management Managing the risk and enhancing the value of commercial relationships

More information

Adding Value In Finance And Accounting Outsourcing

Adding Value In Finance And Accounting Outsourcing Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Adding Value In Finance And Accounting Outsourcing

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Social Media Marketing Best Practices

Social Media Marketing Best Practices Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert

More information

Big Data & Analytics @ Netflix. Paul Ellwood February 9th, 2015

Big Data & Analytics @ Netflix. Paul Ellwood February 9th, 2015 Big Data & Analytics @ Netflix Paul Ellwood February 9th, 2015 Who Am I? Director, Data Science & Engineering Also Leader, DataKind San Francisco chapter Formerly: Director, Product Analytics @ Netflix

More information

Contracting for Cloud Computing

Contracting for Cloud Computing Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 geofrey.master@mayerbrownjsm.com April 5th 2011 Mayer Brown is a global legal services organization comprising legal

More information

Intellectual Property

Intellectual Property Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must

More information

The Cloud Computing Revolution: Beyond the Hype

The Cloud Computing Revolution: Beyond the Hype The Cloud Computing Revolution: Beyond the Hype KEN ADLER Partner and Chair, Technology and Outsourcing Practice Group Loeb & Loeb LLP Outsourcing in Financial Services Program October 19, 2010 Overview

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Hyatt Hotels Corporation. Code of Business Conduct and Ethics

Hyatt Hotels Corporation. Code of Business Conduct and Ethics INTRODUCTION This (this Code ) is designed to reaffirm and promote Hyatt Hotels Corporation s compliance with laws and ethical standards applicable in all jurisdictions in which Hyatt Hotels Corporation

More information

Current Critical Issues When Outsourcing

Current Critical Issues When Outsourcing Current Critical Issues When Outsourcing Brad Peterson Partner +1 312 701 8568 bpeterson@mayerbrown.com Paul Roy Partner +1 312 701 7370 proy@mayerbrown.com Speakers Paul Roy is a partner in the Business

More information

Global Code of Conduct

Global Code of Conduct Global Code of Conduct 2011. 3 Samsung Electronics Co., Ltd. IMPORTANT NOTICE THE GLOBAL CODE OF CONDUCT DESCRIBES THE STANDARDS OF INTEGRITY SAMSUNG ELECTRONICS EXPECTS FROM ITS SUBSIDIARIES AND THEIR

More information

2016 VANCOUVER WELLNESS SHOW CONTEST RULES

2016 VANCOUVER WELLNESS SHOW CONTEST RULES 2016 VANCOUVER WELLNESS SHOW CONTEST RULES The BCAK Wellness Show contest (the Contest ) is administered by the British Columbia Association of Kinesiologists BCAK, a not-for-profit Society registered

More information

The New World of Data. Don Strickland President, Strickland & Associates

The New World of Data. Don Strickland President, Strickland & Associates The New World of Data Don Strickland President, Strickland & Associates THE NEW WORLD OF DATA 1900 1950 2000 Physical Infrastructure Labor Capital Physical Infrastructure Labor Capital Physical Infrastructure

More information

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction

More information

Technology or Solution?

Technology or Solution? Technology or Solution? Dean Walters CIO Liberty Global Privacy and security are important and pervasive concerns while dealing with Big Data and Liberty Global is committed to protecting privacy and treat

More information

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE.

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE. JAN-MAR 2014 R E P R I N T RC & risk compliance & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS REPRINTED FROM: RISK & COMPLIANCE MAGAZINE JAN-MAR 2015 2014 ISSUE RC & risk

More information

FISHER & PAYKEL PRIVACY POLICY

FISHER & PAYKEL PRIVACY POLICY FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed

More information

1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to:

1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to: SPECIAL TERMS AND CONDITIONS FOR DOMAIN NAME MANAGEMENT SERVICES (DOMAIN PORTFOLIO MANAGEMENT SERVICE, LOCAL PRESENCE SERVICES AND ANONYMOUS REGISTRATION SERVICES) 1. Services 1.1 These Special Terms and

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

Unibet Tipping Competition Terms and Conditions

Unibet Tipping Competition Terms and Conditions Unibet Tipping Competition Terms and Conditions 1. Conditions of Entry (a) By entering this competition entrants accept these Terms and Conditions. (b) Entry is open to Australian residents aged 18 years

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS Effective: 1 st April 2015 Table of Contents 1. PURPOSE... 3 2. SCOPE... 3 3. OWNERSHIP... 3 4. DEFINITIONS... 3 5. CONFLICTS OF INTEREST... 3 6. CORPORATE OPPORTUNITIES... 4 7. CONFIDENTIALITY AND PRIVACY...

More information

MEMBI PRIVACY POLICY

MEMBI PRIVACY POLICY MEMBI 1 PURPOSE OF OUR POLICY 1.1 Membi Limited (Company Number 09775238) of 396a Kingston Road, Kingston Road, London SW20 8LL, United Kingdom (Membi, we, us or our) provides the services offered on the

More information

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the

More information

Ur-Energy Inc. Code of Business Conduct and Ethics

Ur-Energy Inc. Code of Business Conduct and Ethics Ur-Energy Inc. Code of Business Conduct and Ethics As Amended Effective February 5, 2014 2957409.2 TABLE OF CONTENTS INTRODUCTION... 3 CONFLICTS OF INTEREST... 3 GIFTS, INVITATIONS AND ENTERTAINMENT GUIDELINES...

More information

1. ELIGIBILITY. To be eligible for this Contest, an individual must

1. ELIGIBILITY. To be eligible for this Contest, an individual must EDMONTON REGIONAL AIRPORTS AUTHORITY S SHOP TO WIN AT DESTINATION EIA CONTEST ( THE CONTEST ) SHALL BE CONSTRUED AND EVALUATED ACCORDING TO APPLICABLE CANADIAN LAW. NO PURCHASE NECESSARY. VOID IN WHOLE

More information

Big Data for Law Firms DAMIAN BLACKBURN

Big Data for Law Firms DAMIAN BLACKBURN Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Contents Executive summary VII About the author XI Chapter 1: Introduction to big data 1 Factors leading to big data 2 The three

More information

SAP Splash Privacy Statement

SAP Splash Privacy Statement SAP Splash Privacy Statement The SAP Splash Privacy Statement (this Privacy Statement ) applies to the use of this website, http://www.experiencesplash.com (the Website ) and any other subdomains or webpages

More information

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not

More information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Liability Insurance (D&O) Presented by Caroline Yeo

Liability Insurance (D&O) Presented by Caroline Yeo Directors Beyond Insurance & Officers Liability Insurance (D&O) Presented by Caroline Yeo The Structure of D&O Insurance Covered claim against directors and officers Covered securities claim against the

More information

Directors & Officers Liability Insurance. Presented by Caroline Yeo

Directors & Officers Liability Insurance. Presented by Caroline Yeo Directors & Officers Liability Insurance Presented by Caroline Yeo The Structure of D&O Insurance Covered claim against directors and officers Covered securities claim against the company itself Indemnification?

More information

INDEX PRIVACY POLICY...2

INDEX PRIVACY POLICY...2 INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3

More information

DISCLAIMER. Any fact, assessment, analysis, forecasts, opinion and other information (collectively Information ) released by:

DISCLAIMER. Any fact, assessment, analysis, forecasts, opinion and other information (collectively Information ) released by: DISCLAIMER General This website can be accessed worldwide however the information on the website is related to Saxo Capital Markets CY Limited and is not specific to any other country. All clients will

More information

How To Choose The Right Form Of Joint Venture

How To Choose The Right Form Of Joint Venture Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How To Choose The Right Form Of Joint Venture Law360,

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with

More information

Privacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems

Privacy Engineering Objectives and Risk Model - Discussion Deck. Objective-Based Design for Improving Privacy in Information Systems Privacy Engineering Objectives and Risk Model - Discussion Deck Objective-Based Design for Improving Privacy in Information Systems Purpose and Scope This discussion deck describes initial draft components

More information

Products Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012

Products Liability: Putting a Product on the U.S. Market. Natalia R. Medley Crowell & Moring LLP 14 November 2012 Products Liability: Putting a Product on the U.S. Market Natalia R. Medley Crowell & Moring LLP 14 November 2012 Overview Regulation of Products» Federal agencies» State laws Product Liability Lawsuits»

More information

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite

More information

Intellectual Property in M&A

Intellectual Property in M&A Intellectual Property in M&A October 23, 2015 Dallas Bar Association IP Section Steve Stein, Jesse Betts, Craig Carpenter Thompson & Knight LLP Today s Topics Steps in M&A Transactions Drivers in M&A Transactions

More information

GLAUKOS CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

GLAUKOS CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS GLAUKOS CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS This Code of Business Conduct and Ethics (the Code ) contains general guidelines for conducting the business of Glaukos Corporation (the Company

More information

M&T BANK CANADIAN PRIVACY POLICY

M&T BANK CANADIAN PRIVACY POLICY M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (

More information

DLI CODE OF BUSINESS CONDUCT & ETHICS

DLI CODE OF BUSINESS CONDUCT & ETHICS DLI CODE OF BUSINESS CONDUCT & ETHICS All DLI employees, regardless of where they are located, must conduct their affairs with uncompromising honesty and integrity. Business ethics are no different from

More information

EDMONTON JOURNAL READER S CHOICE CONTEST

EDMONTON JOURNAL READER S CHOICE CONTEST EDMONTON JOURNAL READER S CHOICE CONTEST THE EDMONTON JOURNAL READER S CHOICE CONTEST (THE CONTEST ) IS INTENDED TO BE CONDUCTED IN CANADA ONLY AND SHALL BE CONSTRUED AND EVALUATED ACCORDING TO APPLICABLE

More information

INSIDER TRADING POLICY

INSIDER TRADING POLICY 1.0 POLICY STATEMENT INSIDER TRADING POLICY This Policy provides guidelines to officers, directors and employees of Dominion Diamond Corporation (the Company ) and other insiders of the Company with respect

More information

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2. 1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes

More information

Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest

Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest Edmonton Public Library ( EPL ) Win Entry to Make With Mark School Contest Rules & Regulations EDMONTON PUBLIC LIBRARY S ( EPL ) Make With Mark School CONTEST ( THE CONTEST ) SHALL BE CONSTRUED AND EVALUATED

More information

Privacy Policy GetYou

Privacy Policy GetYou Privacy Policy GetYou How We Use and Manage Your Data Key Information GetYou respects your right to privacy in the on-line world when you use our service and communicate electronically with us. We put

More information

MCC TERMS AND CONITIONS

MCC TERMS AND CONITIONS MCC TERMS AND CONITIONS Welcome to MNCred.org, which is owned by Minnesota Credentialing Collaborative, LLC ( we, us or MCC ) a joint effort of the Minnesota Council of Health Plans (MCHP), Minnesota Hospital

More information

Pacific Smiles Group Privacy Policy

Pacific Smiles Group Privacy Policy Pacific Smiles Group Privacy Policy Pacific Smiles Group Limited and its related bodies corporate (PSG, we, our, us) recognise the importance of protecting the privacy and the rights of individuals in

More information

Is Your Data Cloud Ready?

Is Your Data Cloud Ready? WHITE PAPER Is Your Data Cloud Ready? Of all the questions to be answered before taking advantage of the cloud, this one is the most pertinent; is my data cloud ready? The question is especially important

More information

The Importance of Analytics

The Importance of Analytics CIPHER Briefing The Importance of Analytics July 2014 Renting 1 machine for 1,000 hours will be nearly equivalent to renting 1,000 machines for 1 hour in the cloud. This will enable users and organizations

More information

Connected car, big data, big brother?

Connected car, big data, big brother? Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,

More information

CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1

CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 THIS AGREEMENT is entered into on ( Effective Date ) by and between LaSalle County Health Department, hereinafter called Covered Entity and, hereinafter

More information

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi

Big Data, Big Risk? Data Management and Privacy. Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Big Data, Big Risk? Data Management and Privacy Presented by: Timothy Banks, Heather Innes, and Colonel Vihar Joshi Data Management & Privacy Compliance Heather Innes Chief Privacy Officer, General Motors

More information

CUBIC ENERGY, INC. Code of Business Conduct and Ethics

CUBIC ENERGY, INC. Code of Business Conduct and Ethics CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To

More information

Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers

Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,

More information

DailyMailz may collect and process the following personal information about you:

DailyMailz may collect and process the following personal information about you: Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and

More information

Special Edition. I. What is "Big Data"? April 2013

Special Edition. I. What is Big Data? April 2013 Special Edition April 2013 For further information please contact: Brian Hengesbaugh Partner, Chicago Tel +1 312 861 3077 brian.hengesbaugh @bakermckenzie.com Amy de La Lama Associate, Chicago Tel +1 312

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,

More information

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors

More information

BRANDLOGIK. an Introduction to. BIG data. the future is now

BRANDLOGIK. an Introduction to. BIG data. the future is now BRANDLOGIK an Introduction to BIG data the future is now 1 BIG data Many of our clients and contacts ask what Big Data can do for their business. This is an introduction an overview of what Big Data can

More information

Securing Big Data Learning and Differences from Cloud Security

Securing Big Data Learning and Differences from Cloud Security Securing Big Data Learning and Differences from Cloud Security Samir Saklikar RSA, The Security Division of EMC Session ID: DAS-108 Session Classification: Advanced Agenda Cloud Computing & Big Data Similarities

More information

Terms & Conditions Governing UOB Income Builder Dreams Promotion (6 July 2015 2 August 2015) ( Promotion )

Terms & Conditions Governing UOB Income Builder Dreams Promotion (6 July 2015 2 August 2015) ( Promotion ) Terms & Conditions Governing UOB Income Builder Dreams Promotion (6 July 2015 2 August 2015) ( Promotion ) 1. Introduction 1.1 The Promotion shall commence from 06 July 2015 to 02 August 2015 (both dates

More information

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

SELECTING AN ENTERPRISE-READY CLOUD SERVICE 21 Point Checklist for SELECTING AN ENTERPRISE-READY CLOUD SERVICE Brought to you by Introduction The journey to the cloud is well underway, and it s easy to see why when 84% of CIOs report cutting application

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT THIS IS A TEMPLATE ONLY. CERTAIN STATES MAY NOT PERMIT THE TYPES OF ACTIVITIES ALLOWED HEREUNDER RELATING TO PROTECTED HEALTH INFORMATION. THUS THIS AGREEMENT MAY NEED TO BE MODIFIED IN ORDER TO COMPLY

More information

Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information

Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Website Terms and Conditions

Website Terms and Conditions Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..

More information

Computing and Communication Policy on Acceptable Use of Electronic Resources

Computing and Communication Policy on Acceptable Use of Electronic Resources Computing and Communication Policy on Acceptable Use of Electronic Resources Summary This policy defines the boundaries of "acceptable use" of electronic resources, including computers, networks, electronic

More information

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting

More information

The Sourcing Canvas: A Strategic Approach to Sourcing Decisions. By Ralph Loftin, Richard Lynch and Jack Calhoun

The Sourcing Canvas: A Strategic Approach to Sourcing Decisions. By Ralph Loftin, Richard Lynch and Jack Calhoun The Sourcing Canvas: A Strategic Approach to Sourcing Decisions By Ralph Loftin, Richard Lynch and Jack Calhoun Contents Abstract... 3 Role of Business Capabilities in Sourcing... 4 Decision Logic for

More information

The Use of Patient Records (EHR) for Research

The Use of Patient Records (EHR) for Research The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The

More information

Personal Information Protection and Electronic Documents Act

Personal Information Protection and Electronic Documents Act PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle

More information

DOING BUSINESS IN INDONESIA E-Commerce

DOING BUSINESS IN INDONESIA E-Commerce DOING BUSINESS IN INDONESIA E-Commerce http://blog.ssek.com company/ssek-legal-consultants @ssek_lawfirm INTRODUCTION E-commerce in Indonesia is growing by leaps and bounds and this is expected to continue

More information

CONFESSIONS OF A SHOPAHOLIC CONTEST

CONFESSIONS OF A SHOPAHOLIC CONTEST Precedent last updated:january 12, 2009 CONFESSIONS OF A SHOPAHOLIC CONTEST THE CONFESSIONS OF A SHOPAHOLIC CONTEST (THE CONTEST ) IS INTENDED TO BE CONDUCTED IN CANADA ONLY AND SHALL BE CONSTRUED AND

More information

The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company

The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company The Hidden Risks: Managing Risks in Outsourcing Relationships Brian O Connor Chief Security & Privacy Officer Eastman Kodak Company Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak

More information

Privacy Policy Australian Construction Products Pty Limited

Privacy Policy Australian Construction Products Pty Limited Privacy Policy Australian Construction Products Pty Limited What is this privacy policy about? This Privacy Policy describes how Australian Construction Products 63 091 618 781 (we or us) will treat the

More information

BEHAVIORAL ONLINE MARKET RESEARCH: BEST PRACTICES

BEHAVIORAL ONLINE MARKET RESEARCH: BEST PRACTICES BEHAVIORAL ONLINE MARKET RESEARCH: BEST PRACTICES October 2010 Beginning in November 2009, the Center for Democracy & Technology (CDT) hosted a series of meeting of its Internet Privacy Working Group (IPWG)

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

BIG DATA: IT MAY BE BIG BUT IS IT SMART?

BIG DATA: IT MAY BE BIG BUT IS IT SMART? BIG DATA: IT MAY BE BIG BUT IS IT SMART? Turning Big Data into winning strategies A GfK Point-of-view 1 Big Data is complex Typical Big Data characteristics?#! %& Variety (data in many forms) Data in different

More information

merchant application form

merchant application form merchant application form standard & Point Of Sale (POS) Version 3.1 revised 28 February 2011 copyright mhits Limited 2004-2011 ABN 82 107 753 613 Instructions: 1. Fill in the Application Form 2. Sign

More information

Competitive Intelligence Acquisition and Reverse Engineering

Competitive Intelligence Acquisition and Reverse Engineering Competitive Intelligence Acquisition and Reverse Engineering Pitfalls and Best Practices in the US, the UK and Germany Richard M. Assmus Andrea C. Hutchison Dr. Ulrich Worm May 20, 2010 Sangeeta Puran

More information

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading

More information

2. What personal information do we collect and hold?

2. What personal information do we collect and hold? PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying

More information