Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for.

Slides:



Advertisements
Similar presentations
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
Advertisements

© 2008 Oracle Corporation – Proprietary and Confidential.
Office Of Purchasing and Contracts Procurement Outreach Training Level II - Module C Specialized Agreements.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
…delivery models. “ASC-HS” - The official hosting services for ARCHIBUS, the number one Software Solution for Real Estate, Infrastructure, and Facilities.
SERVICE LEVEL AGREEMENTS The Technical Contract Within the Master Agreement.
A LITIGATOR’S ADVICE ON LITIGATION AVOIDANCE Alan N. Greenspan Jackson Walker LLP © 2004 by Alan N. Greenspan. All rights reserved.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
Pension Fund Trustees Liability Ncedi Mbongwe. Introduction to Camargue Underwriting Managers Established in 2001 Underwriters: Mutual and Federal and.
© 2014 Microsoft Corporation. All rights reserved.
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
St. Hugh Catholic School Student iPad Use Liability Agreement.
Drafting and Reviewing Confidentiality Agreements West LegalEdcenter 2012.
Managing Risk in Academic Placement Agreements Joseph C. Risser, CPCU, ARM-P Director, Risk Management California Polytechnic State University.
Fosterswift.com PROTECTING AGAINST THE UNKNOWN : How to Successfully Review IT Contracts to Increase Your Rights and Avoid Potential Liability Samuel Frederick.
. Software Licenses T HE T EXAS A&M U NIVERSITY S YSTEM Nicholas E. Chremos, TAMUS Office of General Counsel November 8, 2012 O FFICE OF T ECHNOLOGY C.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Burnslev.com © 2013 Burns & Levinson LLP Allocating and Mitigating Contractual Risk ACC – NE Corporate Counsel Institute June 12, 2013 Alan M. Block, John.
Jul The New Geant4 License J. Perl The New Geant4 License Makes clear the user’s wide- ranging freedom to use, extend or redistribute Geant4, even.
Intel® Education Learning in Context: Science Journal Intel Solutions Summit 2015, Dallas, TX.
Education’s Value Proposition MARK ZANDI, CHIEF ECONOMIST FROM MOODY’S ECONOMY.COM.
Content Management Systems …mostly Umbraco ALL ABOUT.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
FPGA and ASIC Technology Comparison - 1 © 2009 Xilinx, Inc. All Rights Reserved How do I Get Started with PlanAhead?
Software License Agreement Negotiation 101 Ray Hsu, C.P.M. Assistant Director, Procurement Services University of Washington.
Middleware Promises Warranties that Don’t Indemnities that Won’t Stephen Rubin, Esquire
Contract Review.  1. The final step in the vendor contracting process should be getting the vendor’s standard written contract and signing the contract.
DIRC Workshop on Software Quality and the Legal System 13 February 2004, Gray's Inn, London LEGAL ASPECTS OF SOFTWARE PROCUREMENT Jos Dumortier University.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Conditions and Terms of Use
Reasonable is in Eye of the Beholder Vendor, Customer, & Litigator Perspectives on Software License Provisions Aaron Brodsky Greg Leibold Peter Gergely.
Dino Tsibouris (614) Vendor Contracts: What You Need and What You May Be Missing.
Custom Software Development Intellectual Property and Other Key Issues © 2006 Jeffrey W. Nelson and Iowa Department of Justice (Attach G)
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
International Telecommunication Union New Delhi, India, December 2011 ITU Workshop on Standards and Intellectual Property Rights (IPR) Issues Philip.
+ Web Site Contract Negotiations Gold Coast General Hospital and Acme Startup LLC.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Receipts.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Inspect Material.
-1- Oracle E-Business Suite R12.1 Accounts Receivables Essentials Partner Boot Camp Training Courseware.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Oracle E-Business Suite R12.1 Accounts Payables Partner Boot Camp Training Courseware Part VIII – Transaction Taxes in Payables.
Nomenclature for the OGSA Platform document Fred Maciel.
INTEL CONFIDENTIAL Intel® Smart Connect Technology Remote Wake with WakeMyPC November 2013 – Revision 1.2 CDI/IBP #:
For Oracle employees and authorized partners only. Do not distribute to third parties. © 2008 Oracle Corporation – Proprietary and Confidential.
1 of 26 For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential.
Oracle E-Business Suite R12.1 Accounts Receivables Essentials Partner Boot Camp Training Courseware.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Android Storage MAY 2013 Hu.Cai. NAME OF PRESENTATION [CHANGE IN SLIDE MASTER] MONTH, YEAR [CHANGE IN SLIDE MASTER] Outline 1.Storage In General 2.SharedPreferences.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Oracle Online Training Materials Use of this Site (“Site”) or Materials constitutes.
Four Ways Suppliers Limit Their Risk Contractually
Camargue Commercial Crime
Connectivity to bank and sample account structure
Models for Resources and Management
Lecture 28 Intellectual Property(Cont’d)
<Insert Picture Here>
OGSA Service Classifications
Representations and Warranties Indemnification Liability Caps
Find the Problems with the Provisions May 11, 2016 Presented By:
Motivation for 36OU Open Rack
<Insert Picture Here>
© 2013 Sri U-Thong Limited. All rights reserved
2019 MEDICARE AGE-IN STUDY SENIOR MARKET INSIGHTS SERVICE Part IV
Presentation transcript:

Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for Proposals Good Practice Trends Resources

Changes Increased use of agreements required to extend service periods Increased use of software as a service (no longer buying a commodity) Increasingly complex agreements Increased litigation and risk exposures Increased drive to limit liability Audits

Risk Assessments What is the software use Is data collected, used, or transmitted Define the data and the classification level Identify any financial transactions (PCI) Describe Installation and Support requirements Define if software is self-hosted or web-hosted

Where is my data?

Cloud There is no ‘cloud’. Data is collected and stored somewhere. Where is the data center How secure is the data and the center If outside US, how risky is the data exposure How will data be returned

Data Security and Protection

Data Security & Protection Campus Chief Information Security Officer Safeguards Access, Transmission, Storage Movement and co-location Can the vendor aggregate, slice and dice, or compile Can the vendor have co-location, failovers, etc. How does system safeguard protected data: HIPAA, PCI, FERPA, Personal Information

License / Copy / Instance What does your license cover? What is a ‘copy’, ‘instance’, or ‘impermissible copy’ Does your license transfer from hardware to hardware? Storage box to storage box. “unfettered right to ‘move, migrate, transfer’ license without it being deemed an impermissible copy Use, Access, and Benefit / Authorized Users “install, execute, use, have access to, benefit from, copy, test, display, and perform and make back up and archival copies. Audit

Liability and Indemnification Limits of Liability “Vendor’s liability for damages to customer will not exceed fees paid under this agreement for 36 months preceding date of claim.” Consider Adding: “Except as set forth in paragraphs (list sections pertaining to copyright/intellectual property, indemnification provision, and confidentiality / data breach section).” Indemnification Indemnify, defend, and hold harmless Copyright Infringement costs, data breach costs

Liability and Indemnification EXAMPLE FROM VENDOR AGREEMENT 6.2. Disclaimer. EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT, THE PROGRAM AND DOCUMENTATION ARE PROVIDED “AS IS” AND“WITH ALL FAULTS,” AND VENDOR MAKES NO REPRESENTATIONS OR WARRANTIES, AND DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED, WRITTEN OR ORAL, ARISING FROM COURSE OF DEALING, COURSE OF PERFORMANCE, USAGE OF TRADE, OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF NON-INTERFERENCE, ACCURACY, MERCHANTABILITY, SYSTEMS INTEGRATION, QUALITY, AND FITNESS FOR A PARTICULAR PURPOSE.

Liability and Indemnification EXAMPLE Monetary Liability. THE AGGREGATE TOTAL LIABILITY OF VENDOR UNDER OR IN CONNECTION WITH THE PROGRAM, THE DOCUMENTATION, OR THIS AGREEMENT TO LICENSEE OR ANY OTHER PERSON OR PERSONS SHALL UNDER NO CIRCUMSTANCES EXCEED THE AMOUNTS PAID BY LICENSEE UNDER THIS AGREEMENT.

Request for Proposals (“RFP”) The RFP is a team effort and requires collaboration Conflict of Interest & Confidentiality Develop RFP with the end in mind The RFP Response should be an Exhibit to agreement Detailed project plan and/or statement of work is obtained prior to contract execution. Maintenance and Support detailed including service levels

Request for Proposals (“RFP”) Consider additional items: Service Level Provisions as part of RFP Intellectual Property Rights for co-development Contract Close out plans State in RFP that the CSU General Provisions for IT will be required Security Questionnaire and Requirements as part of RFP All functionality for license is contained in implementation – no future release solutions

Downtime chart

Good Practice Templates Eliminate hyperlinks in your agreements Ensure that no disabling devices are in the software Collaborate with IT: meet, discuss, cross educate Collaborate with other campuses

Interesting Trends Migration to Tablets and Devices – BYOD and Apps Social Media as daily communications Big Data Cloud Computing Software as a Service, Platform as a Service, and Infrastructure as a Service.

Resources Accessible Technology Initiative ICSUAM Information Security Policy ISCUAM Contracts & Procurement ICSUAM ITR Policy SUAMCSU.shtml SUAMCSU.shtml Conflict of Interest