Evolving Technology Issues: Cloud Computing



Similar documents
OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

The Cloud Computing Revolution: Beyond the Hype

Legal Issues in the Cloud: A Case Study. Jason Epstein

Cloud Computing: Legal Risks and Best Practices

Cloud Computing Technology

How To Deal With Cloud Computing

Cloud Computing; What is it, How long has it been here, and Where is it going?

Security Issues in Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

OE Cloud Standard Terms of Service

Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION

LEGAL ISSUES IN CLOUD COMPUTING

Legal issues in the Cloud

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Security & Trust in the Cloud

How To Protect Your Data In The Cloud

Managing Cloud Computing Risk

Technology & Business Overview of Cloud Computing

AXIS12 DRUPAL IN A BOX ON THE CLOUD

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Contracting for Cloud Computing

Insights into Cloud Computing

Cloud Computing. What is Cloud Computing?

Information Technology: This Year s Hot Issue - Cloud Computing

IS PRIVATE CLOUD A UNICORN?

CLOUD COMPUTING. A Primer

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Cloud Computing and HIPAA Privacy and Security

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Seeing Though the Clouds

Cloud Computing Contracts. October 11, 2012

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

Clinical Trials in the Cloud: A New Paradigm?

JPMA - Terms and Conditions

Select Internet. Standard Terms and Conditions relating to the supply of online backup services by Select Internet

Orchestrating the New Paradigm Cloud Assurance

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Cloud Computing An Elephant In The Dark

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Service Schedule for Business Lite powered by Microsoft Office 365

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Fusion Acceptable Use Policy. Effective Feb 2, 2015

Negotiating EHR Acquisition Contracts

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Cloud Computing: Risks and Auditing

CHAPTER 8 CLOUD COMPUTING

Negotiating Software as a Service Contracts

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Cloud Computing Questions to Ask

Acceptable Use and Publishing Policy

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS


A Flexible and Comprehensive Approach to a Cloud Compliance Program

Acceptable Use Policy

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Cloud P ROVIDER CHOOSE A HOW TO. A White Paper presented by

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Terms and Conditions- OnAER Remote Monitoring Service

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Sycamore Leaf Solutions LLC

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Oracle Applications and Cloud Computing - Future Direction

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

MTNL MUMBAI FREE SERVICES Terms and Conditions

Your Content refers to the information that you wish to transfer using our Services.

Acceptable Use Policy of UNWIRED Ltd.

Open Source and Cloud. Ramesh Kumar

Transcription:

Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP

Cloud Computing Does compliance with applicable laws fall to the user or to the service supplier? What to consider before entering agreement Which laws and regulations/standards are challenging for cloud computing Assessing the cloud provider s Mitigating cloud provider shortcomings Questions

Definition: NIST Definition Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction Essential Characteristics On-demand self-service. Broad network access. Resource pooling. Rapid elasticity. Measured Service. http://csrc.nist.gov/publications/drafts/800-145/draft-sp-800-145_cloud-definition.pdf

Its Easy: Vendor T&C s Vendor Terms of Service Types of Accounts Consent to Access Your Files Files and Folders Your Public Folder Your Shared Folder Your Responsibilities Privacy Account Security Your Use of the Services Vendor Property and Feedback General Prohibitions false or misleading; defamatory; ( privacy; obscene, pornographic, or offensive; (v) promotes bigotry, racism, hatred or harm against any individual or group; (vi) infringes another's rights, including any intellectual property rights; or (vii) violates, or encourages any conduct that would violate, any applicable law or regulation or would give rise to civil liability; Access, tamper with, or use non-public areas Attempt to probe, scan ; Attempt to access or search the Site, Content, Files or Services with any engine, software, tool, agent, device or mechanism other than the software and/or search agents provided by Vendor or other generally available third-party web browsers (such as Microsoft Internet Explorer or Mozilla Firefox), including but not limited to browser automation tools; Send unsolicited email, Forge any TCP/IP packet header; Attempt to decipher, decompile, disassemble or reverse engineer; Interfere with, or attempt to interfere with, the access of any user Impersonate or misrepresent your affiliation with any person or entity. Digital Millennium Copyright Act Compliance Respecting Copyright When Using Your Shared and Public Folders Links 4

Definition: Service Models IaaS Facility Management Hardware PaaS Development Platform SaaS ASP Mixed Overlap with Outsourcing Facility Management Hardware Operating Environment Applications

Definition: Deployment Model Private Cloud Community Cloud ABA Wikis Public Cloud Google Amazon Hybrid Frequently mixed Important to understand who you are dealing Important to understand who providers are dealing with

Responsibility For Compliance? Does compliance with applicable laws fall to the user or to the service supplier? You can outsource performance You cannot outsource responsibility

What to consider when your data crosses borders Privacy / Security Law Existing Policies ITAR Sarbanes Oxley Safe Harbor

Challenging Laws / Regulations / Standards Privacy Standards Whose Policies Apply Vendor Practices vs. Customer Practices Graham Leach Bliley HIPAA Bank Regulations Sarbanes Oxley SLAs PCI

Assessing the cloud provider s compliance situation Pre-assessment (honey moon) Evaluate Leverage Evaluate Data Evaluate Mission Criticality Evaluate Type of Cloud Plan for Non-contractual remedies Plan Exit Strategy

Mitigating cloud provider shortcomings Back-to-Back Obligations Insurance Non-contractual Remedies Contractual Remedies Be Aware of Boilerplate Limitations Remedies Choice of Law Contractual Statutes of Limitation

Red Flags: Criticality of Service Sensitivity of Data Reputation of Provider SAS 70 Audits Boilerplate Terms User Experience SLAs Lack of Specific Information

Key Clauses: SLA Changes to Service IP and Data Ownership Limitations of Liability Privacy and Security Litigation Termination

Key Clauses: SLAs Availability Up Time Break Fix Response Time Level of Effort Vendor Will Fix with 2 hours or Vendor will use commercially reasonable efforts to fix within 2 hours 14

Key Clauses: SLAs Uptime Measurement Monthly, Monthly 99% = 7 hours Yearly 99% - 87 hours Permitted Downtime Sunday 2:00 a.m. regular maintenance window Is Emergency Maintenance part of Permitted downtime? How Good is the Reporting? 15

Key Clauses: SLAs How Measured Force Majeure Reasonable Disaster Plan Third Party Acts Customer Acts, Equipment, Software 16

Key Clauses: SLAs Remedies Credits Incentive Stick and Carrot Exclusive? Must Request Fail to meet in 2 consecutive months Fail to meet in any 4 months in a rolling 12 month period 17

Key Clauses: SLAs Practical Considerations: Vendor Reputation Multi-tenancy Transparency 18

Key Clauses: Changes to Service Improvement or Reduction Sufficient Notice Right to Terminate? Requirement to buy new equipment/software to remain compatible? How Notified? Email Posted Notice online in Service Description Writing (unusual) Fee Increases How much notice? 19

Key Clauses: IP and Data Ownership Customer Owns Customer Data Customer Provided Software Notice when Data accessed, given to law enforcement Vendor Owns Vendor Software Tools Use of Aggregated Data How Aggregated is it? How is Data Used? Service not really License Subscription 20

Key Clauses: Limitation Liability Cap Extensive Disclaimers Frequently Disclaim Direct Low Cap 1 month fees, to 12 month fees Insurance as a Proxy 21

Key Clauses: Privacy and Security Whose Policies Apply Both? Do they Mesh Who has your Data SAS 70 Watch out for check-box approach Understand criteria against which tested 22

Key Clauses: Litigation Hold, Subpoena, Can an Effective Litigation Hold be Implement Whose Cost Pre-negotiate Rates Notice of Subpoena NSA 23

Key Clauses: Termination Vendor Suspension/Termination Payment Dispute DDOS attack, viruses High Volume Illegal Activity Client Termination Convenience not usual or for termination fee Absolute Right to Recover Data Conversion Tools, data maps? Termination Assistance? 24

Questions? Michael P. Bennett Edwards Wildman Palmer LLP 225 West Wacker Drive Chicago, IL 60606-1229 Tel: (312)201-2679 Fax: (312) 416-4597 Email: mbennett@edwardswildman.com Web: http://www.edwardswildman.com