SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Contracting with the Healthcare Cloud
          Service Provider
 Workshop on Health Information in the Cloud: Business Strategy,
                   Security and Deployment
    NC Healthcare Information and Communications Alliance

                          March 2011
                      Randy Whitmeyer
                     Whitmeyer Tuffin PLLC
                      www.whit-law.com
Topics
•   Legal Backdrop

•   Cloud Computing v. Traditional IT Structures

•   The “Contract Circle”:

    •   Selecting a Health Care IT Vendor

    •   Negotiating Key Contract Terms

    •   Dealing with Vendor Non-Performance
Legal Backdrop
•   HIPAA/HITECH Privacy and Security Rules
•   HITECH Meaningful Use
•   NC and other State Identity Theft Rules
•   NC Destruction of Personal Information Records Law
•   EU Data Protection Directive and Cross-Border Data Flows
•   PCI Rules
•   Electronic Discovery
Cloud Computing
             v.
Traditional I.T. Structures
Graphic Courtesy of Hosted Solutions
Graphic Courtesy of Hosted Solutions
Cloud Computing Services

•   Software as a Service (SaaS)

•   Platform as a Service (PaaS)

•   Infrastructure as a Service (IaaS)
Cloud Computing and Security

Advantages                        Disadvantages
•   Data Dispersal                  •   Lack of Transparency
•   Data Fragmentation              •   Lack of Responsiveness
•   “Tier 1” Data Centers           •   “Trading Market” of
•   Multiple Customer Demands           Subcontractors
                                    •   Vendor Lock-In
•   Easier Patching and Updates
                                    •   Lack of Security Details
Cloud Computing Contract Structures

•   Typically service-based, not licensed
•   OPEX, not CAPEX
•   Often offered via “click and accept” agreements
•   Sometimes incorporate by reference other terms of use
    and policies
•   Sometimes purport to be changeable without notice by the
    vendor
Selecting the Cloud
 Computing Vendor: Due
Diligence and Key Contract
            Terms
Keys to Selecting a Cloud Computing Vendor

•   Approach project realistically, in light of personnel, time and budget
•   Document your requirements
    •   Obtain consultant as necessary

•   Remember the need for training on new systems and new processes
    •   More realistic to adapt process to system than adapt system to process, in most
        cases

•   Perform due diligence on vendor. Rigorously check with other
    similar users on their experiences. Check certifications
•   Last but not least: enter into a good contract!!
Negotiation Ideas
•   Early on in discussions, alert vendor that you want certain key
    adjustments to contract terms, identifying the issues

    •   If possible, use your own form of contract rather than vendor’s
        form

•   Try to keep multiple vendors in the process as long as possible to
    keep competitive pressure on both price and terms

•   Consider a formal RFP/response process for larger systems
Security and Privacy Terms
•   Confidentiality
•   Third-Party security audits
•   Right to review detailed security/disaster recovery policies
•   Obligation to maintain security and security policies
•   Right to audit and test security
•   Notification in the case of breach
•   Indemnification for breaches/payment of costs of required notices to
    customers
•   Encryption
Business Associate Agreement


•   Whose form of BAA?
    •   NCHICA form, of course!
•   How much embellished?
•   How does it relate to other confidentiality, security and
    privacy provisions in contract?
Regulatory Issues
•   Certification by ONC-ATCB, such as CCHIT

•   Meaningful use criteria

•   Cooperation with certification and attestation

•   Timing of implementation
Other Key Data Issues
•   Ownership of Data

•   Disposition of Data on Termination

•   Location of Data

•   Legal / Government Request to Access Data
Service Level Agreements
•   Uptime
•   Performance & Response Time
•   Error Correction Time
•   Infrastructure / Security
•   Performance Credits
•   Use of Measurement Technology
•   Notice/Reporting Obligations
Pricing Terms
•   Monthly service fees

    •   Per user or provider, or based on transactions?

    •   When does it start?

•   Implementation fees

    •   Commitment to start date?

•   Add-on pricing

•   Payment terms

•   Caps on increase in fees
Term & Termination
•   Length

•   Termination Penalties

•   Data Rights upon Termination

•   Vendor Termination or Suspension

•   Automatic Renewal
Warranties

•   Warranty to specifications and requirements
    •   Avoid limited warranty to just documentation
    •   Include key functional specifications as an appendix to the document.
        Sometimes can pull these straight from vendor’s web site
• Warranty against noninfringement
• Anti-virus warranty
• Warranty that documentation is complete and gets updated with new
  releases in a timely fashion
• Services warranty – vendor should use reasonable skill in
  accordance with industry standards, and supply qualified and
  experienced personnel
Third-Party Software/Services
•   Vendor will want to disclaim responsibility (e.g., for performance or
    IP issues) for third party software components of solution, especially
    open source
•   Buyer’s perspective:
    •   I’m buying a solution, and it shouldn’t matter to me whether vendor
        chose to implement parts of the solution with third-party pieces
•   Resolution varies and is often fact-specific:
•   Well-known, off the shelf components more likely to be excluded
Support and Maintenance


•   Rights to new versions
•   Timeframes for responding to and fixing problems
•   Target/efforts versus commitment with financial
    repercussions
Intellectual Property
•   Proprietary software company will jealously guard ownership of its products
•   Dispute often arises over ownership of any custom developed IP, such as interfaces
•   Buyer’s argument:
    •   I paid for it, I should own it
•   Vendor’s argument:
    •   You are paying for accelerated development
    •   I would never be able to have a product if each piece of custom IP was owned by the
        buyer
•   Possible compromises:
    •   Exclusive use for a period of time
    •   Sharing in royalties
Other Terms

                               •   Modification of Contract
•   Acceptance
    Terms/Procedures
                               •   Assignability
•   Limitations of Liability
                               •   Choice of Law/Jurisdiction
•   Indemnification
                               •   Subcontractor approval
•   Insurance
                               •   Source Code escrow
Project Failure
                (The typical scenario)
•   Buyer: The service is late, has not been delivered at all, or
    has excessive errors

•   Vendor: Buyer unilaterally expanded the scope of the
    project, or failed to understand the service and its effect on
    the practice.
Project Failure
                  (Buyer’s Perspective)
•   Strategies:
    •   Document problems early and often, and communicate
        to Vendor
    •   Avoid unduly flattering emails; always come back to
        haunt in dispute situations
    •   Send formal notice of breach
    •   Provide opportunity to cure
    •   Withholding payment: must be done carefully
Project Failure
              (Vendor’s Perspective)

•   Document changes in scope/obtain agreement

•   Document unforeseen technical issues

•   Consider when/if to withhold software/services, if unpaid
Key Takeaways
•   Due Diligence is critical when choosing Cloud Computing
    Vendors . This includes not only direct questioning but
    also third-party review such as dun and bradstreet reports,
    ongoing litigation review, and merger activity.

•   Insist on transparency

•   Risk can vary depending on type of data involved and type
    of cloud

•   Form contracts rarely handle key issues satisfactorily
Any questions?


   Randy Whitmeyer
Whitmeyer - Tuffin PLLC
 randy@whit-law.com
    919-880-6880

Weitere ähnliche Inhalte

Ähnlich wie NCHICA - Contracts with Healthcare Cloud Computing Vendors

Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
WhitmeyerTuffin
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
wdsnead
 
Charleston licensing e content 2011
Charleston   licensing e content 2011Charleston   licensing e content 2011
Charleston licensing e content 2011
achesler
 
20050314 tips on contract management
20050314 tips on contract management20050314 tips on contract management
20050314 tips on contract management
raymond_wan2005
 

Ähnlich wie NCHICA - Contracts with Healthcare Cloud Computing Vendors (20)

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Charleston licensing e content 2011
Charleston   licensing e content 2011Charleston   licensing e content 2011
Charleston licensing e content 2011
 
Charleston Conference licensing e content 2011
Charleston Conference   licensing e content 2011Charleston Conference   licensing e content 2011
Charleston Conference licensing e content 2011
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
20050314 tips on contract management
20050314 tips on contract management20050314 tips on contract management
20050314 tips on contract management
 
Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from reality
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 
Managing outsource IT contracts - Fundamentals
Managing outsource IT contracts - FundamentalsManaging outsource IT contracts - Fundamentals
Managing outsource IT contracts - Fundamentals
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
Software Contract and Liability
Software Contract and LiabilitySoftware Contract and Liability
Software Contract and Liability
 
How it pros buy cloud servers
How it pros buy cloud serversHow it pros buy cloud servers
How it pros buy cloud servers
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
 

Mehr von WhitmeyerTuffin

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
WhitmeyerTuffin
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
WhitmeyerTuffin
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the Deal
WhitmeyerTuffin
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
WhitmeyerTuffin
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A Deal
WhitmeyerTuffin
 

Mehr von WhitmeyerTuffin (6)

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the Deal
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A Deal
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

NCHICA - Contracts with Healthcare Cloud Computing Vendors

  • 1. Contracting with the Healthcare Cloud Service Provider Workshop on Health Information in the Cloud: Business Strategy, Security and Deployment NC Healthcare Information and Communications Alliance March 2011 Randy Whitmeyer Whitmeyer Tuffin PLLC www.whit-law.com
  • 2. Topics • Legal Backdrop • Cloud Computing v. Traditional IT Structures • The “Contract Circle”: • Selecting a Health Care IT Vendor • Negotiating Key Contract Terms • Dealing with Vendor Non-Performance
  • 3. Legal Backdrop • HIPAA/HITECH Privacy and Security Rules • HITECH Meaningful Use • NC and other State Identity Theft Rules • NC Destruction of Personal Information Records Law • EU Data Protection Directive and Cross-Border Data Flows • PCI Rules • Electronic Discovery
  • 4. Cloud Computing v. Traditional I.T. Structures
  • 5. Graphic Courtesy of Hosted Solutions
  • 6. Graphic Courtesy of Hosted Solutions
  • 7. Cloud Computing Services • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS)
  • 8. Cloud Computing and Security Advantages Disadvantages • Data Dispersal • Lack of Transparency • Data Fragmentation • Lack of Responsiveness • “Tier 1” Data Centers • “Trading Market” of • Multiple Customer Demands Subcontractors • Vendor Lock-In • Easier Patching and Updates • Lack of Security Details
  • 9. Cloud Computing Contract Structures • Typically service-based, not licensed • OPEX, not CAPEX • Often offered via “click and accept” agreements • Sometimes incorporate by reference other terms of use and policies • Sometimes purport to be changeable without notice by the vendor
  • 10. Selecting the Cloud Computing Vendor: Due Diligence and Key Contract Terms
  • 11. Keys to Selecting a Cloud Computing Vendor • Approach project realistically, in light of personnel, time and budget • Document your requirements • Obtain consultant as necessary • Remember the need for training on new systems and new processes • More realistic to adapt process to system than adapt system to process, in most cases • Perform due diligence on vendor. Rigorously check with other similar users on their experiences. Check certifications • Last but not least: enter into a good contract!!
  • 12. Negotiation Ideas • Early on in discussions, alert vendor that you want certain key adjustments to contract terms, identifying the issues • If possible, use your own form of contract rather than vendor’s form • Try to keep multiple vendors in the process as long as possible to keep competitive pressure on both price and terms • Consider a formal RFP/response process for larger systems
  • 13. Security and Privacy Terms • Confidentiality • Third-Party security audits • Right to review detailed security/disaster recovery policies • Obligation to maintain security and security policies • Right to audit and test security • Notification in the case of breach • Indemnification for breaches/payment of costs of required notices to customers • Encryption
  • 14. Business Associate Agreement • Whose form of BAA? • NCHICA form, of course! • How much embellished? • How does it relate to other confidentiality, security and privacy provisions in contract?
  • 15. Regulatory Issues • Certification by ONC-ATCB, such as CCHIT • Meaningful use criteria • Cooperation with certification and attestation • Timing of implementation
  • 16. Other Key Data Issues • Ownership of Data • Disposition of Data on Termination • Location of Data • Legal / Government Request to Access Data
  • 17. Service Level Agreements • Uptime • Performance & Response Time • Error Correction Time • Infrastructure / Security • Performance Credits • Use of Measurement Technology • Notice/Reporting Obligations
  • 18. Pricing Terms • Monthly service fees • Per user or provider, or based on transactions? • When does it start? • Implementation fees • Commitment to start date? • Add-on pricing • Payment terms • Caps on increase in fees
  • 19. Term & Termination • Length • Termination Penalties • Data Rights upon Termination • Vendor Termination or Suspension • Automatic Renewal
  • 20. Warranties • Warranty to specifications and requirements • Avoid limited warranty to just documentation • Include key functional specifications as an appendix to the document. Sometimes can pull these straight from vendor’s web site • Warranty against noninfringement • Anti-virus warranty • Warranty that documentation is complete and gets updated with new releases in a timely fashion • Services warranty – vendor should use reasonable skill in accordance with industry standards, and supply qualified and experienced personnel
  • 21. Third-Party Software/Services • Vendor will want to disclaim responsibility (e.g., for performance or IP issues) for third party software components of solution, especially open source • Buyer’s perspective: • I’m buying a solution, and it shouldn’t matter to me whether vendor chose to implement parts of the solution with third-party pieces • Resolution varies and is often fact-specific: • Well-known, off the shelf components more likely to be excluded
  • 22. Support and Maintenance • Rights to new versions • Timeframes for responding to and fixing problems • Target/efforts versus commitment with financial repercussions
  • 23. Intellectual Property • Proprietary software company will jealously guard ownership of its products • Dispute often arises over ownership of any custom developed IP, such as interfaces • Buyer’s argument: • I paid for it, I should own it • Vendor’s argument: • You are paying for accelerated development • I would never be able to have a product if each piece of custom IP was owned by the buyer • Possible compromises: • Exclusive use for a period of time • Sharing in royalties
  • 24. Other Terms • Modification of Contract • Acceptance Terms/Procedures • Assignability • Limitations of Liability • Choice of Law/Jurisdiction • Indemnification • Subcontractor approval • Insurance • Source Code escrow
  • 25. Project Failure (The typical scenario) • Buyer: The service is late, has not been delivered at all, or has excessive errors • Vendor: Buyer unilaterally expanded the scope of the project, or failed to understand the service and its effect on the practice.
  • 26. Project Failure (Buyer’s Perspective) • Strategies: • Document problems early and often, and communicate to Vendor • Avoid unduly flattering emails; always come back to haunt in dispute situations • Send formal notice of breach • Provide opportunity to cure • Withholding payment: must be done carefully
  • 27. Project Failure (Vendor’s Perspective) • Document changes in scope/obtain agreement • Document unforeseen technical issues • Consider when/if to withhold software/services, if unpaid
  • 28. Key Takeaways • Due Diligence is critical when choosing Cloud Computing Vendors . This includes not only direct questioning but also third-party review such as dun and bradstreet reports, ongoing litigation review, and merger activity. • Insist on transparency • Risk can vary depending on type of data involved and type of cloud • Form contracts rarely handle key issues satisfactorily
  • 29. Any questions? Randy Whitmeyer Whitmeyer - Tuffin PLLC randy@whit-law.com 919-880-6880