SlideShare ist ein Scribd-Unternehmen logo
1 von 14
McCarthy Tétrault Advance™
Building Capabilities for Growth
The Six‐Minute Business Lawyer 2013, The Law
Society of Upper Canada, June 6, 2013
Current Issues in Negotiating IT
Contracts – Challenges of Cloud
Computing
Barry B. Sookman
Direct Line: (416) 601-7949
E-Mail: bsookman@mccarthy.ca June 6, 2012
McCarthy Tétrault LLP / mccarthy.ca / 12519801
What is cloud computing?
The US National Institute of Standards and Technology (NIST) Definition
of Cloud Computing, http://ow.ly/aRX1M/
“Cloud computing is a model for
enabling ubiquitous, convenient,
on-demand network access to a
shared pool of configurable computing
resources (e.g., networks, servers,
storage, applications, and services)
that can be rapidly provisioned
and released with minimal
management effort or service
provider interaction.”
McCarthy Tétrault LLP / mccarthy.ca / 12519801
2
Service Models
NIST Cloud Computing Reference Architecture http://ow.ly/aRYoy
¬ SaaS: The capability provided to the consumer is to use the provider‟s applications
running on a cloud infrastructure.
¬ PaaS: The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications created using programming languages,
libraries, services, and tools supported by the provider. The consumer does not manage
or control the underlying cloud infrastructure including network, servers, operating
systems, or storage, but has control over the deployed applications and possibly
configuration settings for the
application-hosting environment.
¬ IaaS: The capability provided to the consumer is
to provision processing, storage, networks,
and other fundamental computing resources
where the consumer is able to deploy and run
arbitrary software, which can include operating
systems and applications. The consumer does
not manage or control the underlying cloud
infrastructure but has control over operating
systems, storage, and deployed applications; and
possibly limited control of select networking components (e.g., host firewalls).
ICS Solutions Azure Advantage http://ow.ly/aRVSB
McCarthy Tétrault LLP / mccarthy.ca / 12519801
3
Deployment Models
Sam Johnston, http://ow.ly/aRWs2
Private: cloud infrastructure operated solely for an organization.
Community: cloud infrastructure shared by several organizations and
supports specific community with shared concerns.
Public: cloud infrastructure made
available to general public or large
industry group.
Hybrid: cloud infrastructure comprised
of two or more clouds that remain
unique entities but have data or
application portability.
Note: Public clouds are more
problematic from compliance
perspectives.
McCarthy Tétrault LLP / mccarthy.ca / 12519801
4
Cloud Suppliers
Cloud Technology Spectrum, Gravitant, 2012,
http://blog.gravitant.com20120727cloud-technology-spectrum
McCarthy Tétrault LLP / mccarthy.ca / 12519801
5
SaaS Ecosystem is Expanding
Top PaaS, SaaS and IaaS Cloud Companies by CloudTimes, Cloud Times, 2011,
http://cloudtimes.org/2011/11/30/top-paas-saas-and-iaas-cloud-companies-by-cloudtimes/
McCarthy Tétrault LLP / mccarthy.ca / 12519801
6
SaaS Deployment is Mainstream
The Growing Importance of SaaS as an Application Deployment Model, Aberdeen Group, 2013,
http://blogs.aberdeen.com/it-infrastructure/the-growing-importance-of-saas-as-an-application-
deployment-model/
McCarthy Tétrault LLP / mccarthy.ca / 12519801
7
OSFI Feb 29, 2012: New technology-
based outsourcing arrangements
¬ “Information technology plays a very important role in the financial services
business and OSFI recognizes the opportunities and benefits that new
technology-based services such as Cloud Computing can bring; however, FRFIs
should also recognize the unique features of such services and duly consider the
associated risks.
¬ As such, and in light of the proliferation of new technology-based outsourcing
services, OSFI is reminding all FRFIs that the expectations contained in Guideline
B-10 remain current and continue to apply in respect of such services. In
particular, FRFIs should consider their ability to meet the expectations contained
in Guideline B-10 in respect of a material arrangement, with an emphasis on i)
confidentiality, security and separation of property, ii) contingency planning, iii)
location of records, iv) access and audit rights, v) subcontracting, and vi)
monitoring the material outsourcing arrangements.
¬ OSFI considers the management of outsourcing risks important to ensuring that
FRFIs continue to be managed prudently and OSFI will be monitoring this issue
as part of its ongoing supervisory work.” (emphasis added)
McCarthy Tétrault LLP / mccarthy.ca / 12519801
8
PIPEDA
¬ Organizations are accountable for personal information under their
control.
¬ PIPEDA Sch., Principle 4.1.3 requires organizations to use contractual
or other means to provide a “comparable level of protection” while the
information is being processed.
¬ OPC Guidelines “Comparable level of protection‟ means that the third
party processor must provide protection that can be compared to the
level of protection the personal information would receive if it had not
been transferred. It does not mean that the protection must be the
same across the board but it does mean that they should be generally
equivalent, p.4.
McCarthy Tétrault LLP / mccarthy.ca / 12519801
9
Can Data be Transferred Outside of
Canada for Cloud Computing
OPC, Report on the 2010 OPC’s Consultations on Online Tracking, Profiling and
Targeting, and Cloud Computing
¬ PIPEDA is largely modeled on the principles outlined in the OECD Guidelines,
and is intended to balance an individual's right to privacy with the need of an
organization to collect, use or disclose that information for an appropriate
purpose. We have long stated that we believe that privacy does not hinder
innovation and economic progress. The organization-to-organization approach
that underscores PIPEDA supports transborder flows and data protection by
holding organizations to account for their personal information protection
practices. Information is accessible to authorities regardless of where it resides.
As noted in our Guidelines, we do, however, maintain our view that a
careful risk assessment needs to be undertaken prior to any arrangement
that involves the outsourcing of personal data to other organizations that
operate globally, and that this assessment should consider the legal
requirements of the jurisdiction in which the third-party processor operates, as
well as some of the political, economic and social conditions, and any additional
risk factors, in that jurisdiction.
McCarthy Tétrault LLP / mccarthy.ca / 12519801
10
Potential Problems
Major areas of focus:
¬ Privacy and data protection/location of data/cross border issues
¬ Information security/data integrity issues
¬ Compliance e.g. OSFI B-10, audit
¬ Dependence on service provider in increasingly complex
environments, e.g., service
interruptions, SLA/availability, controls, change management
¬ Access to data/lock-in
¬ One sided provider friendly T&Cs including limits of liability
¬ Ownership and protection of IP and trade secrets
¬ Electronic discovery obligations
McCarthy Tétrault LLP / mccarthy.ca / 12519801
11
Contract for services
¬ W Kwon Hon et al Negotiating Cloud Contracts – Looking at Clouds from Both Sides Now, Queen
Mary School of Law, http://ow.ly/aSGS0
¬ “Despite any perception that providers' standard terms are non-negotiable, cloud contracts can be,
and have been, negotiated by customers such as financial institutions… This paper concludes that
there are indeed signs of change.
¬ Based on our research, users consider that providers‟ standard contract terms or offerings do not
sufficiently accommodate customer needs in various respects. The top six types of terms most
negotiated, according to our sources, were as follows, with the third and fourth issues ranking
roughly equally in importance (depending on type of user/service):
¬ 1. exclusion or limitation of liability and remedies, particularly regarding data integrity and
disaster recovery;
¬ 2. service levels, including availability;
¬ 3. security and privacy, particularly regulatory issues under the EU Data Protection Directive
(„DPD‟);
¬ 4. lock-in and exit, including term, termination rights and return of data on exit;
¬ 5. providers' ability to change service features unilaterally and
¬ 6. intellectual property rights ('IPRs').”
¬ Contracts frequently permit service providers to unilaterally amend terms.
McCarthy Tétrault LLP / mccarthy.ca / 12519801
12
QUESTIONS?
McCarthy Tétrault LLP / mccarthy.ca / 12519801
13
VANCOUVER
Suite 1300, 777 Dunsmuir Street
P.O. Box 10424, Pacific Centre
Vancouver BC V7Y 1K2
Tel: 604-643-7100
Fax: 604-643-7900
Toll-Free: 1-877-244-7711
CALGARY
Suite 3300, 421 7th Avenue SW
Calgary AB T2P 4K9
Tel: 403-260-3500
Fax: 403-260-3501
Toll-Free: 1-877-244-7711
TORONTO
Box 48, Suite 5300
Toronto Dominion Bank Tower
Toronto ON M5K 1E6
Tel: 416-362-1812
Fax: 416-868-0673
Toll-Free: 1-877-244-7711
MONTRÉAL
Suite 2500
1000 De La Gauchetière Street West
Montréal QC H3B 0A2
Tel: 514-397-4100
Fax: 514-875-6246
Toll-Free: 1-877-244-7711
QUÉBEC
Le Complexe St-Amable
1150, rue de Claire-Fontaine, 7e étage
Québec QC G1R 5G4
Tel: 418-521-3000
Fax: 418-521-3099
Toll-Free: 1-877-244-7711
UNITED KINGDOM & EUROPE
125 Old Broad Street, 26th Floor
London EC2N 1AR
UNITED KINGDOM
Tel: +44 (0)20 7489 5700
Fax: +44 (0)20 7489 5777
McCarthy Tétrault LLP / mccarthy.ca / 12519801
14

Weitere ähnliche Inhalte

Was ist angesagt?

Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingRitambhara Agrawal
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Chad Gilles
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831Jamie Clark
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20Kasia Szkuta
 

Was ist angesagt? (20)

Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831EC cloudconsult OASIS 20110831
EC cloudconsult OASIS 20110831
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based  enterprise 20Legal challenges of cloud based  enterprise 20
Legal challenges of cloud based enterprise 20
 

Andere mochten auch

Sookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediaSookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediabsookman
 
Docs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumDocs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumbsookman
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_bsookman
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynotebsookman
 
Sookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationSookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationbsookman
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slidesbsookman
 
Sookman casl and universities
Sookman casl and universitiesSookman casl and universities
Sookman casl and universitiesbsookman
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talkbsookman
 
Challenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology CompaniesChallenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology Companiesbsookman
 
Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)bsookman
 
ALAI Canada: Colloque Annual
ALAI Canada: Colloque AnnualALAI Canada: Colloque Annual
ALAI Canada: Colloque Annualbsookman
 
Sookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalSookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalbsookman
 

Andere mochten auch (12)

Sookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediaSookman oba confernece_using_social_media
Sookman oba confernece_using_social_media
 
Docs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumDocs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposium
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynote
 
Sookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationSookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentation
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slides
 
Sookman casl and universities
Sookman casl and universitiesSookman casl and universities
Sookman casl and universities
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talk
 
Challenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology CompaniesChallenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology Companies
 
Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)
 
ALAI Canada: Colloque Annual
ALAI Canada: Colloque AnnualALAI Canada: Colloque Annual
ALAI Canada: Colloque Annual
 
Sookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalSookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_final
 

Ähnlich wie Sookman law society_6_min_business_law

GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm finalLou Milrad
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLou Milrad
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An EnablerSLA-Ready Network
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentationjohnjamesahearn
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeDataCore Software
 

Ähnlich wie Sookman law society_6_min_business_law (20)

GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
journal paper
journal paperjournal paper
journal paper
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm final
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud Services
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 

Mehr von bsookman

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016bsookman
 
Copyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v SodracCopyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v Sodracbsookman
 
Sookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesSookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesbsookman
 
Sookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewSookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewbsookman
 
Wally hill lexpert casl messaging provisions and challenges
Wally hill lexpert   casl messaging provisions and challengesWally hill lexpert   casl messaging provisions and challenges
Wally hill lexpert casl messaging provisions and challengesbsookman
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertbsookman
 
Oliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingOliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingbsookman
 
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...bsookman
 
Monica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsMonica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsbsookman
 
Sookman lexpert casl_slides
Sookman lexpert casl_slidesSookman lexpert casl_slides
Sookman lexpert casl_slidesbsookman
 
Casl and freedom_of_expression_-_final_lsuc_conference_slides
Casl and freedom_of_expression_-_final_lsuc_conference_slidesCasl and freedom_of_expression_-_final_lsuc_conference_slides
Casl and freedom_of_expression_-_final_lsuc_conference_slidesbsookman
 
Bloom sookman lsuc 2013 copyright year-in-review
Bloom sookman lsuc   2013 copyright year-in-reviewBloom sookman lsuc   2013 copyright year-in-review
Bloom sookman lsuc 2013 copyright year-in-reviewbsookman
 
Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013bsookman
 
Sookman ryerson conference
Sookman ryerson conferenceSookman ryerson conference
Sookman ryerson conferencebsookman
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
Mc carthy technology law_summit
Mc carthy technology law_summitMc carthy technology law_summit
Mc carthy technology law_summitbsookman
 
Sookman law socity_12_minute_civil_litigator
Sookman law socity_12_minute_civil_litigatorSookman law socity_12_minute_civil_litigator
Sookman law socity_12_minute_civil_litigatorbsookman
 

Mehr von bsookman (18)

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
 
Copyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v SodracCopyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v Sodrac
 
Sookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesSookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slides
 
Sookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewSookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in review
 
Wally hill lexpert casl messaging provisions and challenges
Wally hill lexpert   casl messaging provisions and challengesWally hill lexpert   casl messaging provisions and challenges
Wally hill lexpert casl messaging provisions and challenges
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpert
 
Oliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingOliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertising
 
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
 
Monica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsMonica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuions
 
Sookman lexpert casl_slides
Sookman lexpert casl_slidesSookman lexpert casl_slides
Sookman lexpert casl_slides
 
Casl and freedom_of_expression_-_final_lsuc_conference_slides
Casl and freedom_of_expression_-_final_lsuc_conference_slidesCasl and freedom_of_expression_-_final_lsuc_conference_slides
Casl and freedom_of_expression_-_final_lsuc_conference_slides
 
Bloom sookman lsuc 2013 copyright year-in-review
Bloom sookman lsuc   2013 copyright year-in-reviewBloom sookman lsuc   2013 copyright year-in-review
Bloom sookman lsuc 2013 copyright year-in-review
 
Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013
 
Sookman ryerson conference
Sookman ryerson conferenceSookman ryerson conference
Sookman ryerson conference
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
Mc carthy technology law_summit
Mc carthy technology law_summitMc carthy technology law_summit
Mc carthy technology law_summit
 
Sookman law socity_12_minute_civil_litigator
Sookman law socity_12_minute_civil_litigatorSookman law socity_12_minute_civil_litigator
Sookman law socity_12_minute_civil_litigator
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Sookman law society_6_min_business_law

  • 1. McCarthy Tétrault Advance™ Building Capabilities for Growth The Six‐Minute Business Lawyer 2013, The Law Society of Upper Canada, June 6, 2013 Current Issues in Negotiating IT Contracts – Challenges of Cloud Computing Barry B. Sookman Direct Line: (416) 601-7949 E-Mail: bsookman@mccarthy.ca June 6, 2012 McCarthy Tétrault LLP / mccarthy.ca / 12519801
  • 2. What is cloud computing? The US National Institute of Standards and Technology (NIST) Definition of Cloud Computing, http://ow.ly/aRX1M/ “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” McCarthy Tétrault LLP / mccarthy.ca / 12519801 2
  • 3. Service Models NIST Cloud Computing Reference Architecture http://ow.ly/aRYoy ¬ SaaS: The capability provided to the consumer is to use the provider‟s applications running on a cloud infrastructure. ¬ PaaS: The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. ¬ IaaS: The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). ICS Solutions Azure Advantage http://ow.ly/aRVSB McCarthy Tétrault LLP / mccarthy.ca / 12519801 3
  • 4. Deployment Models Sam Johnston, http://ow.ly/aRWs2 Private: cloud infrastructure operated solely for an organization. Community: cloud infrastructure shared by several organizations and supports specific community with shared concerns. Public: cloud infrastructure made available to general public or large industry group. Hybrid: cloud infrastructure comprised of two or more clouds that remain unique entities but have data or application portability. Note: Public clouds are more problematic from compliance perspectives. McCarthy Tétrault LLP / mccarthy.ca / 12519801 4
  • 5. Cloud Suppliers Cloud Technology Spectrum, Gravitant, 2012, http://blog.gravitant.com20120727cloud-technology-spectrum McCarthy Tétrault LLP / mccarthy.ca / 12519801 5
  • 6. SaaS Ecosystem is Expanding Top PaaS, SaaS and IaaS Cloud Companies by CloudTimes, Cloud Times, 2011, http://cloudtimes.org/2011/11/30/top-paas-saas-and-iaas-cloud-companies-by-cloudtimes/ McCarthy Tétrault LLP / mccarthy.ca / 12519801 6
  • 7. SaaS Deployment is Mainstream The Growing Importance of SaaS as an Application Deployment Model, Aberdeen Group, 2013, http://blogs.aberdeen.com/it-infrastructure/the-growing-importance-of-saas-as-an-application- deployment-model/ McCarthy Tétrault LLP / mccarthy.ca / 12519801 7
  • 8. OSFI Feb 29, 2012: New technology- based outsourcing arrangements ¬ “Information technology plays a very important role in the financial services business and OSFI recognizes the opportunities and benefits that new technology-based services such as Cloud Computing can bring; however, FRFIs should also recognize the unique features of such services and duly consider the associated risks. ¬ As such, and in light of the proliferation of new technology-based outsourcing services, OSFI is reminding all FRFIs that the expectations contained in Guideline B-10 remain current and continue to apply in respect of such services. In particular, FRFIs should consider their ability to meet the expectations contained in Guideline B-10 in respect of a material arrangement, with an emphasis on i) confidentiality, security and separation of property, ii) contingency planning, iii) location of records, iv) access and audit rights, v) subcontracting, and vi) monitoring the material outsourcing arrangements. ¬ OSFI considers the management of outsourcing risks important to ensuring that FRFIs continue to be managed prudently and OSFI will be monitoring this issue as part of its ongoing supervisory work.” (emphasis added) McCarthy Tétrault LLP / mccarthy.ca / 12519801 8
  • 9. PIPEDA ¬ Organizations are accountable for personal information under their control. ¬ PIPEDA Sch., Principle 4.1.3 requires organizations to use contractual or other means to provide a “comparable level of protection” while the information is being processed. ¬ OPC Guidelines “Comparable level of protection‟ means that the third party processor must provide protection that can be compared to the level of protection the personal information would receive if it had not been transferred. It does not mean that the protection must be the same across the board but it does mean that they should be generally equivalent, p.4. McCarthy Tétrault LLP / mccarthy.ca / 12519801 9
  • 10. Can Data be Transferred Outside of Canada for Cloud Computing OPC, Report on the 2010 OPC’s Consultations on Online Tracking, Profiling and Targeting, and Cloud Computing ¬ PIPEDA is largely modeled on the principles outlined in the OECD Guidelines, and is intended to balance an individual's right to privacy with the need of an organization to collect, use or disclose that information for an appropriate purpose. We have long stated that we believe that privacy does not hinder innovation and economic progress. The organization-to-organization approach that underscores PIPEDA supports transborder flows and data protection by holding organizations to account for their personal information protection practices. Information is accessible to authorities regardless of where it resides. As noted in our Guidelines, we do, however, maintain our view that a careful risk assessment needs to be undertaken prior to any arrangement that involves the outsourcing of personal data to other organizations that operate globally, and that this assessment should consider the legal requirements of the jurisdiction in which the third-party processor operates, as well as some of the political, economic and social conditions, and any additional risk factors, in that jurisdiction. McCarthy Tétrault LLP / mccarthy.ca / 12519801 10
  • 11. Potential Problems Major areas of focus: ¬ Privacy and data protection/location of data/cross border issues ¬ Information security/data integrity issues ¬ Compliance e.g. OSFI B-10, audit ¬ Dependence on service provider in increasingly complex environments, e.g., service interruptions, SLA/availability, controls, change management ¬ Access to data/lock-in ¬ One sided provider friendly T&Cs including limits of liability ¬ Ownership and protection of IP and trade secrets ¬ Electronic discovery obligations McCarthy Tétrault LLP / mccarthy.ca / 12519801 11
  • 12. Contract for services ¬ W Kwon Hon et al Negotiating Cloud Contracts – Looking at Clouds from Both Sides Now, Queen Mary School of Law, http://ow.ly/aSGS0 ¬ “Despite any perception that providers' standard terms are non-negotiable, cloud contracts can be, and have been, negotiated by customers such as financial institutions… This paper concludes that there are indeed signs of change. ¬ Based on our research, users consider that providers‟ standard contract terms or offerings do not sufficiently accommodate customer needs in various respects. The top six types of terms most negotiated, according to our sources, were as follows, with the third and fourth issues ranking roughly equally in importance (depending on type of user/service): ¬ 1. exclusion or limitation of liability and remedies, particularly regarding data integrity and disaster recovery; ¬ 2. service levels, including availability; ¬ 3. security and privacy, particularly regulatory issues under the EU Data Protection Directive („DPD‟); ¬ 4. lock-in and exit, including term, termination rights and return of data on exit; ¬ 5. providers' ability to change service features unilaterally and ¬ 6. intellectual property rights ('IPRs').” ¬ Contracts frequently permit service providers to unilaterally amend terms. McCarthy Tétrault LLP / mccarthy.ca / 12519801 12
  • 13. QUESTIONS? McCarthy Tétrault LLP / mccarthy.ca / 12519801 13
  • 14. VANCOUVER Suite 1300, 777 Dunsmuir Street P.O. Box 10424, Pacific Centre Vancouver BC V7Y 1K2 Tel: 604-643-7100 Fax: 604-643-7900 Toll-Free: 1-877-244-7711 CALGARY Suite 3300, 421 7th Avenue SW Calgary AB T2P 4K9 Tel: 403-260-3500 Fax: 403-260-3501 Toll-Free: 1-877-244-7711 TORONTO Box 48, Suite 5300 Toronto Dominion Bank Tower Toronto ON M5K 1E6 Tel: 416-362-1812 Fax: 416-868-0673 Toll-Free: 1-877-244-7711 MONTRÉAL Suite 2500 1000 De La Gauchetière Street West Montréal QC H3B 0A2 Tel: 514-397-4100 Fax: 514-875-6246 Toll-Free: 1-877-244-7711 QUÉBEC Le Complexe St-Amable 1150, rue de Claire-Fontaine, 7e étage Québec QC G1R 5G4 Tel: 418-521-3000 Fax: 418-521-3099 Toll-Free: 1-877-244-7711 UNITED KINGDOM & EUROPE 125 Old Broad Street, 26th Floor London EC2N 1AR UNITED KINGDOM Tel: +44 (0)20 7489 5700 Fax: +44 (0)20 7489 5777 McCarthy Tétrault LLP / mccarthy.ca / 12519801 14