Legal Issues in the Cloud: A Case Study. Jason Epstein



Similar documents
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

LEGAL ISSUES IN CLOUD COMPUTING

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Technology & Business Overview of Cloud Computing

Insights into Cloud Computing

Enterprise Governance and Planning


Strategies for Secure Cloud Computing

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

CSO Cloud Computing Study. January 2012

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Managing Cloud Computing Risk

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

IS PRIVATE CLOUD A UNICORN?

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Services Overview

Cloud Computing: Legal Risks and Best Practices

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Evolving Technology Issues: Cloud Computing

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Retention & Disposition in the Cloud Do you really have control?

Cloud Computing Contracts. October 11, 2012

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

The HIPAA Security Rule: Cloudy Skies Ahead?

White Paper on CLOUD COMPUTING

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Cloud Computing Security Issues

How To Protect Your Data In The Cloud

The NIST Definition of Cloud Computing (Draft)

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Security & Trust in the Cloud

Cloud Computing. What is Cloud Computing?

Developing a Risk-Based Cloud Strategy

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Radware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

STATE MODEL CLOUD COMPUTING SERVICES SPECIAL PROVISIONS (Software as a Service)

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Incident Handling in the Cloud and Audit s Role

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Cloud Computing. Introduction

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH

ITIL in the Cloud. Vernon Lloyd.

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Cloud Security and Managing Use Risks

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing An Auditor s Perspective

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Cloud Computing and HIPAA Privacy and Security

Orchestrating the New Paradigm Cloud Assurance

How To Deal With Cloud Computing

Public Cloud Service Agreements: What to Expect & What to Negotiate. April 2013

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

NIST Cloud Computing Reference Architecture

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

(a) the kind of data and the harm that could result if any of those things should occur;

Cloud Computing in a Government Context

How To Understand Cloud Computing

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

The NIST Definition of Cloud Computing

Legal issues in the Cloud

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Contracting for Cloud Computing

Transcription:

Legal Issues in the Cloud: A Case Study Jason Epstein

Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types of organizations using the Cloud In general: Service Model, Deployment Model, vendor and type of organization all impact negotiation and legal issues Case Study: Health care buying direct using public cloud Source: www.nist.gov

Service Models Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Example: Salesforce.com, Google docs, Yahoo! mail. Source: www.nist.gov

Service Models (cont d) Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Example: PaaS is a development platform for developers. Salesforce.com's "Force.com"; Windows Azure Platform. Source: www.nist.gov

Service Models (cont d) Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Example: Fully outsourced managed hosting and development environments. Google, IBM, Amazon.com etc. Source: www.nist.gov

Deployment Models Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Source: www.nist.gov

Deployment Models (cont d) Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for loadbalancing between clouds). Source: www.nist.gov

Source: Gartner

Cisco Systems, Inc. has identified four types of organizations: Small and medium-sized businesses (using the public cloud) Large enterprises (private and hybrid cloud models more common but still use public cloud) Public-sector organizations Service providers Source: Cisco Systems, Inc.

In addition, regulated entities deserve a special category such as in the health care or financial spaces Regulated industries have additional focus on applicable regulation, especially for privacy and security Source: Cisco Systems, Inc.

Case Study Use of public cloud for e-mail, collaboration applications, documentation generation, and data storage and processing by a health care entity. HIPAA/HITECH Act applicable. Mostly buyer s perspective. Cost driven: OpX vs. CapX Direct to the vendor and not through reseller. Other challenges: service offerings and vendor agreements change during negotiations. And here are (some of) the business/legal issues...

Understand the Business Model Understand that the business is still developing and changing over time. Understand the service offerings and options, especially relating to privacy, security and ediscovery. Understand what is not included.

Understand the Vendors The culture of the vendors drives attitudes towards legal agreements. Culture of consumer vs. business (enterprise) deals. What is the culture regarding negotiation? When do you get past the salesforce What is the escalation procedure Use of subcontractors?

Understand the Contract Many public cloud providers use multiple levels of contracts. Those contracts often link to other documents such as privacy policies, acceptable use policies, security policies, service level agreements, technical support obligations, and others that should, if done correctly, become part of the overall contract.

Pick Your Team Due to the nature of cloud computing, at least for now, most major cloud initiatives require the expertise of more than one lawyer or contract negotiator. In this case, the negotiating team is: the business technology lawyer a privacy lawyer; a security lawyer; and an e-discovery lawyer. Some of the above is for due diligence purposes.

Pick Your Team (cont d) During negotiation, it is often beneficial to have an all-hands meeting between the vendors (SMEs), the sales representative, contract negotiator and/or lawyers as well as the legal team representing the buyer.

Service Descriptions Different companies view service descriptions differently. Some vendors do not have service descriptions per se but include some sort of documentation online that is incorporated into the agreement. Other vendors try to avoid including service descriptions in the contract.

Business Associate Agreement Most vendors will generally agree to some sort of business associate agreement. Some vendors still fight taking on that obligation. The Office of Civil Rights (OCR) has jurisdiction (among others). What is a business associate?

Security A covered entity must prove it is HIPAA security compliant (including through its vendors). Compliance obligations flow back to the covered entity, so due diligence on the vendor as well as contractual assurances are necessary. This includes the requirement to remain in compliance as the law changes or allow remedies to exist in the contract. Most vendors have security language to review, if asked. Audits and SAS 70 Type II, ISO 27001.

Data Breach Most vendors will recognize that they need to comply with security breach laws. Due diligence on the vendor is key in this area as well as having sufficient contractual language for all parties to be able to comply with data breach rules. Remedy?

E-discovery Due diligence should be required on capabilities of the vendor and related e-discovery tools and service descriptions/contractual language. Where/how is the data stored? How will the tools work for compliance, will they be for e-mails only or for other information stored in the cloud (such as instant messaging or documents)? What is the response plan for responding to third-party subpoenas or other attestation requests and witness availability? Right to Conduct Forensics?

E-discovery (cont d) Dealing with privacy of individual s use and social network policies. Cross-border discovery issues (conflict between U.S. discovery rules and foreign privacy laws and blocking statutes potentially preventing disclosure). Litigation holds/retention Policies. Metadata. Location of documents may make access to them by government/third parties accessible other than going through client directly. Expectation of Privacy and Attorney-Client Privilege (and company policies!). How is data actually destroyed? Rewritten?

Service Level Agreements Most SLAs relate to up time although there are some virus and security SLAs. Sole and exclusive remedies clauses. Warranty language regarding SLAs. Uptime/Schedule or Authorized Downtime/Response Time/Permitted outages. Uptime SLAs vs. Functionality SLAs

Modifications to the Service Most vendors start with proposition that they can modify service at any time. Especially in a regulated environment, due diligence is performed on the service to determine capability and that service is relied upon.

Modifications to Terms and Conditions Most agreements retain the ability to change the terms and conditions of the underlying agreement, including those incorporated by reference, at any time. This can be troubling because it would apply to privacy and security policies as well, in addition to e-discovery.

Suspension of the Services Distinction of suspension of an end-user account versus the services as a whole. Business continuity. Compliance with health care and other obligations.

Termination and Assistance Services Most vendors do not have explicit terms for termination assistance other than providing the ability to download data for a certain period of time. It may not be practical to not have access to the service during the termination period. Consider the e-mail system. What about security violations, multiple SLA breach, violation of privacy and security policies... Not susceptible to cure.

Disaster Recovery and Business Continuity Due diligence requirements. Disaster recovery versus SLAs for up time. HIPAA: 45 CFR 164.308(a)(7)(ii).

Privacy Policies Cloud vendors have links to numerous privacy policies incorporated into the agreement. Applying these privacy policies to the business versus individual users who sign up for a free service period. Modifications of privacy policies.

Data Transfer/Offshoring Understanding the practice of the current vendor. Capabilities differ based on deployment model as well.

Warranty Services in accordance with SLAs? In accordance with documentation? What are the remedies? Duration is for term of agreement...

Liability Remedies for lost or damaged data Breaches surrounding privacy, security Compliance with regulatory laws Termination Assistance Insurance

Other General Issues Jurisdictional Issues (virtualization and mult-tenancy) Bankruptcy (financial strength monitoring) M&A Vendor Cessation of Business Subcontracting Open source Force Majeure

Other General Issues Electronic Communications Privacy Act (ECPA) IP Contingency Planning Price Protection Data Migration Accounting/ Revenue Rec. Issues (control vs. nocontrol) U.S. Patriot Act

Conclusion The technology is ahead of the lawyers. The business models are still evolving. The contracts are still evolving. Regulation/Laws are on their way. Organizations like NIST along with vendors are working diligently to create standards. The business must choose the appropriate service and deployment models.

Legal Issues in the Cloud: A Case Study Jason Epstein 211 Commerce Street Suite 800 Nashville, Tennessee 37201 (615) 726-5575 jepstein@bakerdonelson.com