SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Navigating Risk In
Data & Technology
Transactions
John C. Yates
March 27 – 28, 2014
Atlanta, Georgia
Negotiating Risk Management Terms For
Data & Technology Contracts/Overview
The parties in data and technology transactions typically allocate risks
contractually through:
– Disclaimers and representations and warranties
– Indemnification and limitation of liability provisions
2
Indemnities
1. A licensee in data and technology transactions should seek to include an
indemnification right for third-party intellectual property (IP) infringement claims
so long as licensee stays within the scope of its permitted use of a license grant.
2. Alternatively, a licensor should ensure that its obligation to indemnify a licensee
for third-party IP claims is appropriately narrowed to ensure that the licensor is
not responsible for third-party IP claims that result from licensee’s improper
modification or inclusion of IP that creates an infringement.
3
Confidentiality
1. Where the data licensee may share its own confidential information with the
licensor, mutual confidentiality obligations may be appropriate.
2. The parties should consider:
a. The time limit on the confidentiality obligations.
b. Whether to include common exceptions from the confidentially requirements for information
that is:
i. Or becomes commonly known;
ii. In the possession of the receiving party before disclosure;
iii. Separately received from a third party; or
iv. Independently developed by the receiving party.
c. Which party has the burden of proof for showing that the confidentiality exception applies.
d. The treatment of legally compelled disclosure, including an obligation by the receiving party
to notify the disclosing party of such a request and the receiving party’s cooperation in
helping the disclosing party obtain a protective order.
4
Security
1. Good data protection requires the participation and coordination of
management and staff at all levels of a business. It often falls to the legal
department, working closely with the information technology (IT) function and
with the support of senior executives, to lead the company-wide information
management and protection program.
2. Effective information and data security depends on developing comprehensive
policies and procedures, and applying them consistently. In this regard, it is
especially important to have in place:
a. A uniform confidentiality and proprietary rights agreement that must be signed
by all employees as a condition of employment.
b. An IT and communications systems policy that governs employees' appropriate
use of these company resources, in the interest of protecting confidential
information.
5
Security
3. Further, the agreement may specify:
a. The types of controls and data security to be used by the licensee including, for a
service provider, the provider's data center and service network.
b. The obligation to be and remain in compliance with applicable data security laws and
regulations and, if applicable, professional obligations affecting persons with data in
particular industries and professions, such as attorneys, healthcare providers and
securities brokers and dealers.
c. Procedures and obligations for data security breaches and related investigations,
including obligations to notify the licensor of any detected security breaches or
unauthorized access and to provide assistance in investigating security breaches and
obtaining the return of misappropriated data and other appropriate remedies.
d. The parties' data transfer, communications, and encryption protocols.
6
Limitations Of Liability
1. Each party is likely to seek limitations on liability in the form of a liability cap (i.e.,
the amount of fees paid to it under the agreement).
2. Each party is also likely to seek an exclusion of damages in connection with lost
data, lost profits, loss of reputation, and any indirect, special, punitive or
consequential damages.
3. Certain exceptions to these limitations may include:
a. Indemnification obligations (particularly for IP infringement); breaches of confidentiality,
privacy or data security; violations of applicable law; damage to tangible property;
personal injury or death; and gross negligence and willful misconduct (for which
damages may not be limited in certain states).
4. A party’s ability to carve-out the foregoing exceptions typically depends on the
parties' relative bargaining power.
7
Export
1. The Department of Commerce is authorized to regulate the export or re-export of U.S.-
origin dual-use goods, software, and technology.
2. Perform a risk assessment. Evaluate compliance issues, including the degree to which
the company’s employees conduct business with foreign customers, the company’s
use of third-party agents and intermediaries, the regulatory environment of the regions
where the company operates, and the effects of any recent business developments.
3. Focus on countries of concern. Review your customers and the nature of transactions
with them so you can gain a better understanding of where your company’s compliance
focus should be placed.
4. Identify at-risk business groups. New components of U.S. export controls and
sanctions laws target insurance companies, financial institutions,
IT companies, and other businesses that traditionally have not had
a significant risk exposure to export control issues.
8
Open Source
1. Risk to intellectual property – using open source software (“OSS”) may cause
other IP rights in a company’s proprietary software to enter the public domain if
not integrated properly.
2. Risk to future revenue – integration of OSS into a company’s developing
software may dilute the future value of the software.
3. Acquisition risk – without performing adequate due diligence, companies risk
acquiring software that has been diluted by the inclusion of OSS.
4. Competitive risk – incorporating OSS into a company’s proprietary software
and then distributing the software might result in the software becoming part of
the public domain.
9
Patent
1. If issues concerning the validity or scope of a patent increase the risk for the licensee, the
licensee can request the following protective measures: (a) reduce royalty or other
payments, (b) obtain a specific indemnification for the issue, or (c) forego the license
altogether.
2. If Licensors are unwilling to provide a warranty for non-infringement in connection with
licensee’s activities, the parties may craft a representation and warranty regarding the
licensor's knowledge of (a) any patent blocking the practice of the licensed patent and (b)
pending or threatened allegation that a licensed product infringes any third-party patent.
3. A licensor often seeks to have the licensee indemnify the licensor for third-party product
liability claims relating to the licensee's commercialization of the licensed patent.
4. To back up the indemnity, the licensor may want to include a provision requiring the
licensee to maintain insurance policies to cover third-party claims arising from defective
licensed products the licensee distributed as well as the licensee's indemnity obligations
regarding any product liability claim.
10

Weitere ähnliche Inhalte

Was ist angesagt?

GDPR Solutions That Won't Break the Bank
GDPR Solutions That Won't Break the BankGDPR Solutions That Won't Break the Bank
GDPR Solutions That Won't Break the Bank"John "Jeb"" Beckwith
 
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Accellis Technology Group
 
Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)ravimohan2
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ, Inc.
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as publishedRalph Schumann
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slideswrightjr02
 
Electronic Media Liability Application - Allied Protector Plan
Electronic Media Liability Application - Allied Protector PlanElectronic Media Liability Application - Allied Protector Plan
Electronic Media Liability Application - Allied Protector Planevaj171
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHUREShan Budesha
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanHaseeb Shalmani
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 

Was ist angesagt? (20)

GDPR Solutions That Won't Break the Bank
GDPR Solutions That Won't Break the BankGDPR Solutions That Won't Break the Bank
GDPR Solutions That Won't Break the Bank
 
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
Rules of Professional Conduct and Cybersecurity presented by Accellis Technol...
 
Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)Pitfalls of Software Licenses (2)
Pitfalls of Software Licenses (2)
 
CBIZ Cyber Liability Flyer
CBIZ Cyber Liability FlyerCBIZ Cyber Liability Flyer
CBIZ Cyber Liability Flyer
 
1588245852 epdf
1588245852 epdf1588245852 epdf
1588245852 epdf
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slides
 
Electronic Media Liability Application - Allied Protector Plan
Electronic Media Liability Application - Allied Protector PlanElectronic Media Liability Application - Allied Protector Plan
Electronic Media Liability Application - Allied Protector Plan
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURE
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb KhanSOFTWARE LICENSE and types of software license./ by Haseeb Khan
SOFTWARE LICENSE and types of software license./ by Haseeb Khan
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
safety-act-faq
safety-act-faqsafety-act-faq
safety-act-faq
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 

Ähnlich wie Navigating Risk In Data & Technology Transactions

Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkFrancoise Gilbert
 
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsSLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsOliver Barreto Rodríguez
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsMani Soft International
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 

Ähnlich wie Navigating Risk In Data & Technology Transactions (20)

Legal aspect of IT contracts
Legal aspect of IT contractsLegal aspect of IT contracts
Legal aspect of IT contracts
 
Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal AspectsSLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
SLALOM Project Legal Webinar Introduction 20151019 Legal Aspects
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 

Mehr von MMMTechLaw

Invest georgia
Invest georgiaInvest georgia
Invest georgiaMMMTechLaw
 
2012 M&A Deal Terms Study
2012 M&A Deal Terms Study2012 M&A Deal Terms Study
2012 M&A Deal Terms StudyMMMTechLaw
 
Cloud Insights 2012
Cloud Insights 2012Cloud Insights 2012
Cloud Insights 2012MMMTechLaw
 
Hyde Park Capital Technology Report
Hyde Park Capital Technology ReportHyde Park Capital Technology Report
Hyde Park Capital Technology ReportMMMTechLaw
 
Financial Technology July Market Analysis
Financial Technology July Market AnalysisFinancial Technology July Market Analysis
Financial Technology July Market AnalysisMMMTechLaw
 
Six Healthcare Trends
Six Healthcare TrendsSix Healthcare Trends
Six Healthcare TrendsMMMTechLaw
 
Risk Factor Report
Risk Factor ReportRisk Factor Report
Risk Factor ReportMMMTechLaw
 
2012 MSEC Legal Update
2012 MSEC Legal Update2012 MSEC Legal Update
2012 MSEC Legal UpdateMMMTechLaw
 
BDO Private Equity Study 2012
BDO Private Equity Study 2012BDO Private Equity Study 2012
BDO Private Equity Study 2012MMMTechLaw
 
Infrastructure software 2011 2012
Infrastructure software 2011 2012Infrastructure software 2011 2012
Infrastructure software 2011 2012MMMTechLaw
 
Open Mobile Survey 2012
Open Mobile Survey 2012Open Mobile Survey 2012
Open Mobile Survey 2012MMMTechLaw
 
M&A education report
M&A education reportM&A education report
M&A education reportMMMTechLaw
 
Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012MMMTechLaw
 
Industrials M&A Report
Industrials M&A ReportIndustrials M&A Report
Industrials M&A ReportMMMTechLaw
 
Grant Thornton/Pitchbook PE Exits Report
Grant Thornton/Pitchbook PE Exits ReportGrant Thornton/Pitchbook PE Exits Report
Grant Thornton/Pitchbook PE Exits ReportMMMTechLaw
 
Technology m&a report
Technology m&a reportTechnology m&a report
Technology m&a reportMMMTechLaw
 
Q11 Healthcare Report
Q11 Healthcare ReportQ11 Healthcare Report
Q11 Healthcare ReportMMMTechLaw
 
What Every Tech Company Needs to Know
What Every Tech Company Needs to KnowWhat Every Tech Company Needs to Know
What Every Tech Company Needs to KnowMMMTechLaw
 
Msec conference save the date
Msec conference save the dateMsec conference save the date
Msec conference save the dateMMMTechLaw
 

Mehr von MMMTechLaw (20)

Invest georgia
Invest georgiaInvest georgia
Invest georgia
 
2012 M&A Deal Terms Study
2012 M&A Deal Terms Study2012 M&A Deal Terms Study
2012 M&A Deal Terms Study
 
Cloud Insights 2012
Cloud Insights 2012Cloud Insights 2012
Cloud Insights 2012
 
Hyde Park Capital Technology Report
Hyde Park Capital Technology ReportHyde Park Capital Technology Report
Hyde Park Capital Technology Report
 
Financial Technology July Market Analysis
Financial Technology July Market AnalysisFinancial Technology July Market Analysis
Financial Technology July Market Analysis
 
Six Healthcare Trends
Six Healthcare TrendsSix Healthcare Trends
Six Healthcare Trends
 
Risk Factor Report
Risk Factor ReportRisk Factor Report
Risk Factor Report
 
2012 MSEC Legal Update
2012 MSEC Legal Update2012 MSEC Legal Update
2012 MSEC Legal Update
 
BDO Private Equity Study 2012
BDO Private Equity Study 2012BDO Private Equity Study 2012
BDO Private Equity Study 2012
 
Infrastructure software 2011 2012
Infrastructure software 2011 2012Infrastructure software 2011 2012
Infrastructure software 2011 2012
 
Open Mobile Survey 2012
Open Mobile Survey 2012Open Mobile Survey 2012
Open Mobile Survey 2012
 
M&A education report
M&A education reportM&A education report
M&A education report
 
Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012
 
Industrials M&A Report
Industrials M&A ReportIndustrials M&A Report
Industrials M&A Report
 
Grant Thornton/Pitchbook PE Exits Report
Grant Thornton/Pitchbook PE Exits ReportGrant Thornton/Pitchbook PE Exits Report
Grant Thornton/Pitchbook PE Exits Report
 
Technology m&a report
Technology m&a reportTechnology m&a report
Technology m&a report
 
Q11 Healthcare Report
Q11 Healthcare ReportQ11 Healthcare Report
Q11 Healthcare Report
 
What Every Tech Company Needs to Know
What Every Tech Company Needs to KnowWhat Every Tech Company Needs to Know
What Every Tech Company Needs to Know
 
Wma bab 2012
Wma bab 2012Wma bab 2012
Wma bab 2012
 
Msec conference save the date
Msec conference save the dateMsec conference save the date
Msec conference save the date
 

Kürzlich hochgeladen

Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnitymahikaanand16
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 

Kürzlich hochgeladen (20)

Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 

Navigating Risk In Data & Technology Transactions

  • 1. Navigating Risk In Data & Technology Transactions John C. Yates March 27 – 28, 2014 Atlanta, Georgia
  • 2. Negotiating Risk Management Terms For Data & Technology Contracts/Overview The parties in data and technology transactions typically allocate risks contractually through: – Disclaimers and representations and warranties – Indemnification and limitation of liability provisions 2
  • 3. Indemnities 1. A licensee in data and technology transactions should seek to include an indemnification right for third-party intellectual property (IP) infringement claims so long as licensee stays within the scope of its permitted use of a license grant. 2. Alternatively, a licensor should ensure that its obligation to indemnify a licensee for third-party IP claims is appropriately narrowed to ensure that the licensor is not responsible for third-party IP claims that result from licensee’s improper modification or inclusion of IP that creates an infringement. 3
  • 4. Confidentiality 1. Where the data licensee may share its own confidential information with the licensor, mutual confidentiality obligations may be appropriate. 2. The parties should consider: a. The time limit on the confidentiality obligations. b. Whether to include common exceptions from the confidentially requirements for information that is: i. Or becomes commonly known; ii. In the possession of the receiving party before disclosure; iii. Separately received from a third party; or iv. Independently developed by the receiving party. c. Which party has the burden of proof for showing that the confidentiality exception applies. d. The treatment of legally compelled disclosure, including an obligation by the receiving party to notify the disclosing party of such a request and the receiving party’s cooperation in helping the disclosing party obtain a protective order. 4
  • 5. Security 1. Good data protection requires the participation and coordination of management and staff at all levels of a business. It often falls to the legal department, working closely with the information technology (IT) function and with the support of senior executives, to lead the company-wide information management and protection program. 2. Effective information and data security depends on developing comprehensive policies and procedures, and applying them consistently. In this regard, it is especially important to have in place: a. A uniform confidentiality and proprietary rights agreement that must be signed by all employees as a condition of employment. b. An IT and communications systems policy that governs employees' appropriate use of these company resources, in the interest of protecting confidential information. 5
  • 6. Security 3. Further, the agreement may specify: a. The types of controls and data security to be used by the licensee including, for a service provider, the provider's data center and service network. b. The obligation to be and remain in compliance with applicable data security laws and regulations and, if applicable, professional obligations affecting persons with data in particular industries and professions, such as attorneys, healthcare providers and securities brokers and dealers. c. Procedures and obligations for data security breaches and related investigations, including obligations to notify the licensor of any detected security breaches or unauthorized access and to provide assistance in investigating security breaches and obtaining the return of misappropriated data and other appropriate remedies. d. The parties' data transfer, communications, and encryption protocols. 6
  • 7. Limitations Of Liability 1. Each party is likely to seek limitations on liability in the form of a liability cap (i.e., the amount of fees paid to it under the agreement). 2. Each party is also likely to seek an exclusion of damages in connection with lost data, lost profits, loss of reputation, and any indirect, special, punitive or consequential damages. 3. Certain exceptions to these limitations may include: a. Indemnification obligations (particularly for IP infringement); breaches of confidentiality, privacy or data security; violations of applicable law; damage to tangible property; personal injury or death; and gross negligence and willful misconduct (for which damages may not be limited in certain states). 4. A party’s ability to carve-out the foregoing exceptions typically depends on the parties' relative bargaining power. 7
  • 8. Export 1. The Department of Commerce is authorized to regulate the export or re-export of U.S.- origin dual-use goods, software, and technology. 2. Perform a risk assessment. Evaluate compliance issues, including the degree to which the company’s employees conduct business with foreign customers, the company’s use of third-party agents and intermediaries, the regulatory environment of the regions where the company operates, and the effects of any recent business developments. 3. Focus on countries of concern. Review your customers and the nature of transactions with them so you can gain a better understanding of where your company’s compliance focus should be placed. 4. Identify at-risk business groups. New components of U.S. export controls and sanctions laws target insurance companies, financial institutions, IT companies, and other businesses that traditionally have not had a significant risk exposure to export control issues. 8
  • 9. Open Source 1. Risk to intellectual property – using open source software (“OSS”) may cause other IP rights in a company’s proprietary software to enter the public domain if not integrated properly. 2. Risk to future revenue – integration of OSS into a company’s developing software may dilute the future value of the software. 3. Acquisition risk – without performing adequate due diligence, companies risk acquiring software that has been diluted by the inclusion of OSS. 4. Competitive risk – incorporating OSS into a company’s proprietary software and then distributing the software might result in the software becoming part of the public domain. 9
  • 10. Patent 1. If issues concerning the validity or scope of a patent increase the risk for the licensee, the licensee can request the following protective measures: (a) reduce royalty or other payments, (b) obtain a specific indemnification for the issue, or (c) forego the license altogether. 2. If Licensors are unwilling to provide a warranty for non-infringement in connection with licensee’s activities, the parties may craft a representation and warranty regarding the licensor's knowledge of (a) any patent blocking the practice of the licensed patent and (b) pending or threatened allegation that a licensed product infringes any third-party patent. 3. A licensor often seeks to have the licensee indemnify the licensor for third-party product liability claims relating to the licensee's commercialization of the licensed patent. 4. To back up the indemnity, the licensor may want to include a provision requiring the licensee to maintain insurance policies to cover third-party claims arising from defective licensed products the licensee distributed as well as the licensee's indemnity obligations regarding any product liability claim. 10