What s the Path? Information Life-cycle part of Vendor Management

Similar documents
Reference Table of Special Terms & Conditions for IT Contracts

LEGAL ISSUES IN CLOUD COMPUTING

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

How To Manage Cloud Data Safely

Cloud Computing: Legal Risks and Best Practices

Cloud Agreements: Do s, Don ts, and Cautions

Risk Management of Outsourced Technology Services. November 28, 2000

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Adding Cloud Solutions to Customer Contracts Robert J. Scott

HIPAA/HITECH Compliance Using VMware vcloud Air

Legal Challenges for U.S. Healthcare Adopters of Cloud Computing

Contracting Guidelines with EHR Vendors

Information Security Program

How To Deal With Cloud Computing

QUESTIONS TO ASK IN THE DEVELOPMENT OF A SOFTWARE LICENSE

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

CLOUD COMPUTING. 11 December 2013 TOWNSHIP OF KING TATTA 1

SATURDAY, FEBRUARY 28, 2015 CLE 10 (Ethics) 9:30 a.m. 10:30 a.m. Moving to the Cloud - Identifying & Managing Legal, Ethical and Compliance Risks

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Hengtian Information Security White Paper

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Managing cloud services risk throughout a supplier lifecycle relationship

Cloud Security and Managing Use Risks

How not to lose your head in the Cloud: AGIMO guidelines released

SOFTWARE HOSTING AND SERVICES AGREEMENT

Contracting Guidelines with EHR Vendors

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

2/9/2012. The Third International Conference on Technical and Legal Aspects of the e-society CYBERLAWS 2012

Due Diligence Request List: IP and IT

Services Providers. Ivan Soto

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

Overview. What are operational policies? Development, adoption, implementation

Outsourcing Technology Services A Management Decision

Things You Need to Know About Cloud Backup

Evolving Issues for Healthcare IT Contracting

THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS

Negotiating EHR Acquisition Contracts

Intellectual Property in M&A

What you need to know about cloud backup: your guide to cost, security and flexibility.

Paychex Accounting Online Terms of Use

INFORMATION TECHNOLOGY SECURITY STANDARDS

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Cloud Computing Risks in Financial Services Companies: How Attorneys Can Best Help In An Increasingly SaaS-ified World

TEN TIPS FOR NEGOTIATING SOFTWARE LICENSE AGREEMENTS

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Questions to ask about a cloud service. enter

Cloud Services and Business Process Outsourcing

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

SMARSH WEBSITE & HOSTING REPRESENTATIVE TERMS & CONDITIONS

DISCLOSURE STATEMENT PREPARED BY

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

SOFTWARE HOSTING AND SERVICES AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The SuiteCRM website (hereinafter

BUSINESS ASSOCIATE AGREEMENT

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

DATA BACKUP AND STORAGE SERVICE LEVEL AGREEMENT

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Benefits and risks of cloud computing

Cloud Agreements: Ensuring a Sunny Forecast July 28, 2011

HIPAA Security Rule Compliance

CFOs and CIOs: How can you mitigate concerns when moving to the cloud?

Cloud Computing. A Practical Framework for Managing Cloud Computing Risk. Prepared by the Information Technology & Outsourcing Practice

BOLT Software Technology Terms of Use Last Updated: November 4, 2015

Checklist for a Watertight Cloud Computing Contract

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Auditing Software as a Service (SaaS): Balancing Security with Performance

Ohio Supercomputer Center

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015

Benefits and risks of cloud computing

Guideline for Roles & Responsibilities in Information Asset Management

The Business Case for Cloud: Critical Legal, Business & Diligence Considerations

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

Security Issues in Cloud Computing

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Cloud Computing Security Considerations

Service Description: Dell Backup and Recovery Cloud Storage

Insights into Cloud Computing

Negotiating SaaS Contracts: Key Data Management Considerations

How To Write A Software License Agreement

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

How To Protect Your Data From Being Hacked

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Understanding the Software Contracts Process

IT Forum UW-Madison Records Management Program. UW Archives and Records Management

Software as a Service: Guiding Principles

How To Use Etechglobal Online Store

Practice Resource. Cloud computing checklist. Introduction

WHITE PAPER. Mitigate BPO Security Issues

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

STATE MODEL CLOUD COMPUTING SERVICES SPECIAL PROVISIONS (Software as a Service)

Markley Cloud Services Hosting Agreement

Transcription:

Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered legal, accounting or tax advice. Please contact your own attorney, accountant or tax professional with any specific questions you have related to the information provided that are of legal, accounting or tax nature.

Connect the Dots Why vendor management plays a key role: Agreements include data & lifecycle orientation Agreements provide framework for data Agreements protect against risk & provide controls Critical to: Identify what type of data is in scope of the agreement What laws and regulations apply What risk mitigation and contractual provisions are necessary based on technology & business model Partner with Law, IT & Business: Templates for Agreements and provisions Understand business model and IT Align your processes with these groups

What s the Path? Information Life-cycle part of Vendor Management What Type of Data is in Scope for the Agreement? Data Identification/Classification/Ownership Type of Data? Proprietary or Personally Identifiable Information of Individuals? Is health information included? Who owns the data? Is the vendor Creating, or Collecting information? What protections are afforded? Access & Security Controls What is the protection needed for the data? Legal requirements? Just US laws/regs? Do the requirements conform with internal policy? Is a risk assessment/due diligence required?

Importance of Agreement/Due Diligence Things to consider: Privacy & security of data Require the vendor and their service providers to comply with security and privacy requirements. Limit use & access to data- don t forget physical security & structure. Put in applicable Confidentiality requirements, Business Associate Agreements, & Security addendums based on type of data & law. Cloud Provider must provide intrusion detection, data leakage & other protections; Must warrant against malicious code. Audit provisions- have ability to review their controls. Indemnification/Limitation of Liability Indemnification for intellectual property considerations. Make sure provisions provide carve out for breach of data. Understand risk to data being compromised -Provide for third party claims and operational aspects of breach.

Importance of Agreement/Due Diligence Things to consider: Consider ownership of data Intellectual Property, rights if modifications made to code, escrow and interaction with other licensed applications. If custom code is created, who owns such code? Do you want to own? Open source software Agreement? part of delivery? Who is the custodian of the record? Work made for hire? Who is inventor? License or Assignment? Will content become public? Will the vendor receive a license to data? Representations & Warrantee considerations: Where or how the services are performed. Quality of the individuals performing the services. Reliability on technology & ownership of IP.

What s is the Path? Information Life-cycle part of Vendor Management What is the location of the Data? Location of Data/Data Discovery Who is storing or retaining the data? Hosted provider? On-premise or cloud? Who is the hosting service/back-up provider? What is the downtime or interruption of hosting services? How quickly is support provided? Maintenance? Where is the data located physically or in transit? What country?

Importance of Agreement/Due Diligence Things to consider: Location of data Limit geographic location of where data is stored and processed. Restrict location of data based on your company s requirements and risk appetite. Understand legal requirements with location of data. Don t let the vendor move the data at will- have control, get say. Consider what happens if assignment, legal action or bankruptcy. Control the data and modifications Many agreements note they can change provisions at any time without advance notice- don t allow this! Stability of services: Make sure the SLA is clear and consider the hosted provider if applicable.

What s is the Path? Information Life-cycle part of Vendor Management What is the Retention, Back-up and Disaster Recovery plan & process? What is the retention of the data? What is the purge, deletion and return cycle? Business Continuity Management/Risk Mitigation What is the back-up, recovery of the data?

Importance of Agreement/Due Diligence Things to consider: Retention & Retrieval of Data Can you retrieve your data at any time? How long is the data retained prior to deletion? Can you apply company purge and retention requirements? What happens under assignment or bankruptcy? Term & Renewal Based on liability and change in data is the term appropriate? Is there a process to review arrangement prior to renewal? Effect of Termination- Timing How do you retrieve data? What is the form/format? How long do they retain prior to deletion? Do they provide certification of deletion?

Understand & Move with the change Understand the impacts to changes in privacy & technology on Procurement: Know the impacts to CRM, IT, Legal, Procurement, Business and Privacy Alignment is crucial & law must manage information & privacy risks Update disclosures and information collection & use practices Know if there is global influence on requirements Business may become an IT knowledge worker or owner of IT Understand what delivery models are important- the cloud Know the type and path of the data Be transparent and apply privacy at all stages Identify the risks and discuss the risks with business Remember you are an important part of the picture!