About the Clemson-USC Data Center Sharing Service Agreement Winter 2010 Common Solutions Group Asbed Bedrossian USC.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

6/4/2014 Introduction to Contract Review and Negotiation Robert W. Smithee, JD Director Virtual Medical Group Programs Center for Healthcare Innovation,
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Public Records Office Indiana Access to Public Records Act and Responding to Subpoenas Employee Training.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
IIT Office of General Counsel Education Program Non-Disclosure/Confidentiality Agreements.
SERVICE LEVEL AGREEMENTS The Technical Contract Within the Master Agreement.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
St. Hugh Catholic School Student iPad Use Liability Agreement.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Mr. Caputo Unit #1 Lesson #7
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
CONTRACTS: Before You Sign a University Contract...
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Legal Issues in SaaS SwANH InfoXchange 2007 Legal Issues in SaaS SwANH InfoXchange 2007 Claire R. Howard, Esq. Getman, Stacey, Schulthess & Steere, P.A.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Chapter 5: The Behavior Analyst’s Responsibility to Clients Guideline 2 Leigh O’Brien Caldwell College.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Confidentiality Agreements at Ryerson … or “if I tell you, I’ll have to kill you!” Heather Gallant, ORS.
INTERNET and CODE OF CONDUCT
Session 3 – Information Security Policies
Security Policies Group 1 - Week 8 policy for use of technology.
Chapter 5 Brokerage and Agency 2010©Cengage Learning. All Rights Reserved.
HIPAA Trading Partners, Legal Relationships October 2, 2001 presented by Peter B. Goldstein, Esq. Cap Gemini Ernst & Young, US LLC.
IDEA 2004 Procedural Safeguards: Legal Rights and Options Mississippi Association of School Superintendent Spring, Mississippi Department of Education.
Joan L. Lucas – General Counsel
HIPAA PRIVACY AND SECURITY AWARENESS.
Swim Team Contact Information *Age as of June 1 st Swimmer #1 Name:___________________________ Birthday: ___/___/_____ Age:____ Asthma: Y __ N __ Allergies:_______________________________________.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Client and Customer Relationships In This Chapter Duties to clients and customers Exercising reasonable care and diligence Agency conflicts, dual.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Dino Tsibouris (614) Vendor Contracts: What You Need and What You May Be Missing.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
The Data Protection Act - Confidentiality and Associated Problems.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Introduced some basic knowledge of the contract First, what is the contract? Contract, also known as contract. China's definition of the contract, the.
Protecting your Managed Services Practice: Are you at Risk?
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HOW TO PROTECT YOUR INTEREST IN A SALE CONTRACT Focus on what you “get” when you sign!
The Law Offices of Sheila Deselich Cohen. Generally subject to the Employee Retirement Income Security Act of 1974 (“ERISA”). Two main types of plans:
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Every employer must ensure, as far as is reasonable practicable, the health, safety and welfare of all his employees More specifically, employers must.
© Shepherd and Wedderburn LLP Legal Aspects of the Design, Development and Marketing of Mobile Applications Presentation by Joanna Boag-Thomson Shepherd.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Mark Kaufmann. Objectives Share and discuss common tips and traps and ways to address Identify strategies for various vendor “ploys” Reality Check Negotiations.
Contracting for the Cloud
E&O Risk Management: Meeting the Challenge of Change
SA Legal Contract Review and Submission Process Training
EPA CONTRACT TEMPLATE Overview
EPA SUBCONTRACT TEMPLATE Overview September 2017
Chapter 4 Contractual Rights and Obligations
Cyber Risk Management Through Vendor Contracts
Chapter 3: IRS and FTC Data Security Rules
Cyber Issues Facing Medical Practice Managers
Speaker: Sarah Chambers, Esq. Claims Counsel| Professional Liability
Purchasing Contracts Training
Find the Problems with the Provisions May 11, 2016 Presented By:
Arbitration Proceedings II
Confidentiality Agreement
Non-Disclosure Agreements (NDAs) & Teaming Agreements (TAs)
Presentation transcript:

About the Clemson-USC Data Center Sharing Service Agreement Winter 2010 Common Solutions Group Asbed Bedrossian USC

Network Each university provides a dedicated NLR Gig circuit plus all the local L2/L3 hardware necessary to make both circuits work in their local site. We say that all network access must be lawful and comply with all applicable laws regarding transmission of any materials.

Data Center Each university provides 3 racks of space to the other, together with associated power requirements. Remote hands to install the remote university. equipment. Remote hands to resolve urgent/emergency problems for remote university.

Tape Data Storage Each university. provides 300 tape slots space in their SL8500 STK Silo. Each university. provides tape drive bays in their SL8500 STK Silo. Access to the local ACSLS tape library manager.

Equipment After the connectivity equipment, the rest of the rack space can be used by the remote university for whatever equipment is appropriate for their DR strategy. They also need to get appropriate vendor support.

Physical Access Standard local data center access procedures apply. Standard local data center access procedures apply for Vendor access.

Contact Info Appropriate contact info is exchanged. NOC to NOC protocols are established for 24x7 contact.

Force Majeur Defined as a long list of uncontrollable external special effect.

Terms of Service Starts with the signing, and may be renewed by appropriate signatures for additional term. current term is for 3.5 more years. mid 2013.

Termination 1 year written notice. Remote university may request one additional year, so it may take up to 2 years to fully terminate the SLA.

Risk of Loss All equipment risk of loss is assumed by the owning university at all times and for all reasons. Remote university must handle all equipment with the same level of care as they do their own equipment.

Additional Space Request May be agreed upon in writing. Contiguous space may or may not be physically possible.

Suspension of Service A side may, at its sole discretion, suspend or terminate an SLA upon written notice, if the other side is in breach or violation of the agreement, or if there is a need to do so in order to maintain its local service and integrity.

Warranty, Disclaimers, LOL Everything is provided AS IS. Even the Internet. So Data transmission, corruption, service interruptions, viruses, worms, lions, tigers, loss of service, etc. all agree to no liability to the local site. No university reps are liable to the other university. No legal actions may be commenced after 1 year from the SLA termination. Each side says has their own adequate liability insurance.

Additional Legalese No claims due to any failures in performance due to force majeure. Neither side can bind or represent the other. There is no fiduciary relationship, it's not a jt venture or partnership. SLA is enforced according to the laws of the defending party's state. All official notices in writing, or . In case of an emergency, verbal first is OK, followed by in writing.

Confidential Information Each party agrees to keep it in strict confidence and not use it or disclose it to third parties in any way. Provision is made for disclosure to local directors, counsel etc who need to know for defined obligations. Same levels of protection to remote confidential info as to local. In the event of any Subpoenas for disclosure of the other party's confidential info, the other party must be notified within 48 hours and both sides must cooperate in any attempts to obtain protective orders. All sides agree that this is a highly sensitive area and doing the wrong thing may result in irreparable harm and trigger actions.

Discussion