SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Legal and Commercial
Issues of a Cloud Service




                 Alex Kirkhope / Dominic Higham
                               11 October 2011
Introductions and themes


  Service specification and service levels
  Rights, liabilities and remedies
  Standard terms
  Data protection issues
  Dispute readiness




Cloud Computing - BCS                         11 October 2011   2
Defining Cloud Computing




 “a model for enabling convenient, on-demand network access to
 a shared pool of configurable computing resources that can be
 rapidly provisioned and released with minimal management
 effort or service provider interaction. "


 National Institution Standards and Technology (NIST)



                    Software as a Service       Platform as a Service

                               Infrastructure as a Service


Cloud Computing - BCS                                              11 October 2011   3
The business drivers


 • cost effective
 • scalable / dealing with spikes
 • easy to install
 • standard service offering
 • integrated maintenance
 • avoids supplier lock in (?)




Cloud Computing - BCS               11 October 2011   4
Legal Issues


  Service specification and levels
  Contractual rights, remedies and liabilities
  Control over data
  Data privacy




Cloud Computing - BCS                             11 October 2011   5
Service specification / service levels


  As with any outsourcing arrangements... be clear about what
   you are getting
        basic service features
        application features
        business continuity
        availability / response times / downtime
        helpdesk support
        charging structure
            utility based? fixed fee?
        performance monitoring
            recompense if 'below par'?



Cloud Computing - BCS                                11 October 2011   6
Rights, remedies and liabilities


  Terms almost always 'non-negotiable'
        supplier unwilling to take on risk
        liability capped at very low levels and 'direct loss' tightly defined
        rare to see service credit regime
        service provided 'as is'
        if you don't like it  simply walk away


  As customer you will be expected to
        pay on time
        sign & indemnify the 'acceptable user policy'
        understand limited commitments around the service


Cloud Computing - BCS                                               11 October 2011   7
Screen shots - GoogleApps




Cloud Computing - BCS       11 October 2011   8
Standard –v- negotiated terms


  Standard terms
        low liability limits
        reduced rights in case of data loss, downtime, etc.
        Typically, more keenly priced
        Customer loss –v- provider's business
  Negotiated terms
        chance to gain better protection subject to bargaining position




Cloud Computing - BCS                                           11 October 2011   9
Limitations of Liability - AWS


  11. Limitations of Liability
     WE AND OUR AFFILIATES OR LICENSORS WILL NOT BE LIABLE TO YOU FOR ANY DIRECT,
     INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES
     (INCLUDING DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, OR DATA), EVEN IF A
     PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHER,
     NEITHER WE NOR ANY OF OUR AFFILIATES OR LICENSORS WILL BE RESPONSIBLE FOR
     ANY COMPENSATION, REIMBURSEMENT, OR DAMAGES ARISING IN CONNECTION WITH:
     (A) YOUR INABILITY TO USE THE SERVICES, INCLUDING AS A RESULT OF ANY (I)
     TERMINATION OR SUSPENSION OF THIS AGREEMENT OR YOUR USE OF OR ACCESS TO
     THE SERVICE OFFERINGS, (II) OUR DISCONTINUATION OF ANY OR ALL OF THE SERVICE
     OFFERINGS, OR, (III) WITHOUT LIMITING ANY OBLIGATIONS UNDER THE SLAS, ANY
     UNANTICIPATED OR UNSCHEDULED DOWNTIME OF ALL OR A PORTION OF THE
     SERVICES FOR ANY REASON, INCLUDING AS A RESULT OF POWER OUTAGES, SYSTEM
     FAILURES OR OTHER INTERRUPTIONS; (B) THE COST OF PROCUREMENT OF
     SUBSTITUTE GOODS OR SERVICES; (c) ANY INVESTMENTS, EXPENDITURES, OR
     COMMITMENTS BY YOU IN CONNECTION WITH THIS AGREEMENT OR YOUR USE OF OR
     ACCESS TO THE SERVICE OFFERINGS; OR (D) ANY UNAUTHORIZED ACCESS TO,
     ALTERATION OF, OR THE DELETION, DESTRUCTION, DAMAGE, LOSS OR FAILURE TO
     STORE ANY OF YOUR CONTENT OR OTHER DATA. IN ANY CASE, OUR AND OUR
     AFFILIATES’ AND LICENSORS’ AGGREGATE LIABILITY UNDER THIS AGREEMENT WILL BE
     LIMITED TO THE AMOUNT YOU ACTUALLY PAY US UNDER THIS AGREEMENT FOR THE
     SERVICE THAT GAVE RISE TO THE CLAIM DURING THE 12 MONTHS PRECEDING THE
     CLAIM.
Cloud Computing - BCS                                              11 October 2011   10
Challenging the standard terms


  What is the Unfair Contract Terms Act 1977?
  UCTA - Guidelines for Application of Reasonableness Test
   include:
  (a) the strength of the bargaining positions of the parties
   relative to each other, taking into account (among other things)
   alternative means by which the customer’s requirements could
   have been met;
  (b) whether the customer … had an opportunity of entering
   into a similar contract with other persons, but without having a
   similar term;




Cloud Computing - BCS                                   11 October 2011   11
Case law


  St Albans v ICL
  Watford Electronics v Sanderson, 2001
        Where experienced businessmen representing substantial
         companies of equal bargaining power negotiate an agreement,
         they may be taken to have had regard to the matters known to
         them. They should, in my view be taken to be the best judge of the
         commercial fairness of the agreement which they have made;
         including the fairness of each of the terms in that agreement. They
         should be taken to be the best judge on the question whether the
         terms of the agreement are reasonable. The court should not
         assume that either is likely to commit his company to an
         agreement which he thinks is unfair, or which he thinks includes
         unreasonable terms. Unless satisfied that one party has, in effect,
         taken unfair advantage of the other – or that a term is so
         unreasonable that it cannot properly have been understood or
         considered - the court should not interfere.
Cloud Computing - BCS                                          11 October 2011   12
Termination for breach/cause


  More important in longer terms arrangements


 Termination for Cause by Either Party
 Either party may terminate this Agreement for cause upon
 [30/10/7] days advance notice to the other party if there is any
 material default or breach of this Agreement by the other party,
 unless the defaulting party has cured the material default or
 breach within the ## day notice period.




Cloud Computing - BCS                                  11 October 2011   13
Material Breach?


  There is no commonly accepted definition of "material breach". Where a contract is
   expressed to be terminable for material breach and no definition is included the courts
   will look at all the surrounding circumstances. Key points include:
  the intention of the parties. Did they intend to give the non breaching party the right to
   terminate?;
  the nature of the contract and the obligations involved;
  what the breach consists of and how it impacts on the innocent party;
  the circumstances in which the breach arises including any explanation given;
  was the breach accidental or intentional?; and
  the consequences for the breaching party if the breach is material. This is less
   important than the impact of the breach on the non breaching party.


  Contrast termination for repudiatory breach
  What is the effect of this contractual position?


Cloud Computing - BCS                                                        11 October 2011   14
Data ownership


  If you put data in the Cloud understand:
        who may be able to access it : strength of confidentiality / security
         undertakings offered
        commitments provided on exit / transition : how easy would it be to
         transfer to another provider
        would you be prepared to put your crown jewels there?




Cloud Computing - BCS                                             11 October 2011   15
Data privacy


  Data Protection Act 1998
        if you put personal data in the cloud you have responsibility as a
         data controller…
        to be satisfied that adequate measures in place to protect
         confidentiality and security of data against unauthorised loss,
         damage, destruction, etc
        to prevent the data from being processed outside Europe unless
         further legal protections are in place
        it is not good enough to simply rely on the 'good word' of a supplier
        ICO (and FSA if you are FSA regulated) take a strict approach to
         enforcement
            Zurich fined £2.4m for failing to undertake adequate due diligence
             when allowing customer data to be outsourced to South Africa.


Cloud Computing - BCS                                                  11 October 2011   16
Data loss


  Data loss remains high profile – NHS, HMRC, Deloitte, MoD,
   banks and financial institutions
  Consequences
        fines
        criminal sanction
        undertakings
        reputation
        claims
        management time and money dealing with claims




Cloud Computing - BCS                                    11 October 2011   17
ICO


  What will the ICO look at?
        circumstances of breach
        the response to the loss
        steps to mitigate
        adequacy of procedures, standards, encryption
  Steps to take:
        investigate, assess, contain
        inform regulators and/or public – deal with publicity
        prevent recurrence and remedy underlying issues
  Personal Information Online Code of Practice
        pragmatic approach but will want to see risk analysis done.
  Cloud and outsourcing are not the only source of data loss risk
Cloud Computing - BCS                                            11 October 2011   18
Contract management and dispute
readiness

  material breach and repudiatory breach
  dispute approach
        contract management – service of notices etc.
        discussions – open and without prejudice
        escalation procedures
        documents
        witnesses
  business continuity - exit and transition and future provision of
   services




Cloud Computing - BCS                                    11 October 2011   19
Conclusions



 Cloud computing is growing rapidly
 Attractive as a commercial / business proposition
 There are risks : understand before proceeding
 Go in 'eyes wide open'




Cloud Computing - BCS                              11 October 2011   20
Any questions or comments?




alex.kirkhope@dlapiper.com
dominic.higham@dlapiper.com




Cloud Computing - BCS         11 October 2011   21

Weitere ähnliche Inhalte

Was ist angesagt?

China to legalise blockchain based evidence in courts
China to legalise blockchain based evidence in courtsChina to legalise blockchain based evidence in courts
China to legalise blockchain based evidence in courtsBlockchain Council
 
Reasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate RulesReasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate RulesJan Dhont
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016bsookman
 
Contractual Rights and the Internet: Ensuring Your Rights Are Protected
Contractual Rights and the Internet: Ensuring Your Rights Are ProtectedContractual Rights and the Internet: Ensuring Your Rights Are Protected
Contractual Rights and the Internet: Ensuring Your Rights Are ProtectedInternet Law Center
 
ACC presentation on tokenization of everything - February-March 2018
ACC presentation on tokenization of everything - February-March 2018ACC presentation on tokenization of everything - February-March 2018
ACC presentation on tokenization of everything - February-March 2018Louis Lehot
 
Chapter 12 - Web Design
Chapter 12 - Web DesignChapter 12 - Web Design
Chapter 12 - Web Designtclanton4
 

Was ist angesagt? (6)

China to legalise blockchain based evidence in courts
China to legalise blockchain based evidence in courtsChina to legalise blockchain based evidence in courts
China to legalise blockchain based evidence in courts
 
Reasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate RulesReasons to consider Binding Corporate Rules
Reasons to consider Binding Corporate Rules
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
 
Contractual Rights and the Internet: Ensuring Your Rights Are Protected
Contractual Rights and the Internet: Ensuring Your Rights Are ProtectedContractual Rights and the Internet: Ensuring Your Rights Are Protected
Contractual Rights and the Internet: Ensuring Your Rights Are Protected
 
ACC presentation on tokenization of everything - February-March 2018
ACC presentation on tokenization of everything - February-March 2018ACC presentation on tokenization of everything - February-March 2018
ACC presentation on tokenization of everything - February-March 2018
 
Chapter 12 - Web Design
Chapter 12 - Web DesignChapter 12 - Web Design
Chapter 12 - Web Design
 

Andere mochten auch

Managing vmware with power cli
Managing vmware with power cliManaging vmware with power cli
Managing vmware with power clisubtitle
 
Isha forest flower jan 2014
Isha forest flower jan 2014Isha forest flower jan 2014
Isha forest flower jan 2014Bhim Upadhyaya
 
Education for empowerment by narenedra modi
Education for empowerment by narenedra modiEducation for empowerment by narenedra modi
Education for empowerment by narenedra modiBhim Upadhyaya
 
Automation with Microsoft Powershell
Automation with Microsoft PowershellAutomation with Microsoft Powershell
Automation with Microsoft Powershellsubtitle
 
Negative voting concept and system paper
Negative voting concept and system paperNegative voting concept and system paper
Negative voting concept and system paperBhim Upadhyaya
 
Everything changed - Lisbon Challenge
Everything changed  - Lisbon ChallengeEverything changed  - Lisbon Challenge
Everything changed - Lisbon ChallengeNuno Machado Lopes
 
Why the fuck should people care?
Why the fuck should people care?Why the fuck should people care?
Why the fuck should people care?Thiemo Gillissen
 
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भए
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भएMa pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भए
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भएBhim Upadhyaya
 
Using iMovie to Create Course Materials - Tesol 2012
Using iMovie to Create Course Materials - Tesol 2012 Using iMovie to Create Course Materials - Tesol 2012
Using iMovie to Create Course Materials - Tesol 2012 Tasha Troy
 
Kirk and Mandy's Wedding Shower
Kirk and Mandy's Wedding ShowerKirk and Mandy's Wedding Shower
Kirk and Mandy's Wedding ShowerCharles Figley
 
Philip & Esther's OMF Thailand Slides, Harvest 2014
Philip & Esther's OMF Thailand Slides, Harvest 2014Philip & Esther's OMF Thailand Slides, Harvest 2014
Philip & Esther's OMF Thailand Slides, Harvest 2014Greg Wiley
 
Ocv nola may2012_final-pdf
Ocv nola may2012_final-pdfOcv nola may2012_final-pdf
Ocv nola may2012_final-pdfCharles Figley
 
ICT the catalyst for inovation in education
ICT the catalyst for inovation in educationICT the catalyst for inovation in education
ICT the catalyst for inovation in educationChole Richard
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrentgkmv
 

Andere mochten auch (20)

Role Plays In Teaching Fl
Role Plays In  Teaching  FlRole Plays In  Teaching  Fl
Role Plays In Teaching Fl
 
Managing vmware with power cli
Managing vmware with power cliManaging vmware with power cli
Managing vmware with power cli
 
Isha forest flower jan 2014
Isha forest flower jan 2014Isha forest flower jan 2014
Isha forest flower jan 2014
 
Education for empowerment by narenedra modi
Education for empowerment by narenedra modiEducation for empowerment by narenedra modi
Education for empowerment by narenedra modi
 
Automation with Microsoft Powershell
Automation with Microsoft PowershellAutomation with Microsoft Powershell
Automation with Microsoft Powershell
 
Bos smk 2014
Bos smk 2014Bos smk 2014
Bos smk 2014
 
Sambutan hardiknas 2014
Sambutan hardiknas 2014Sambutan hardiknas 2014
Sambutan hardiknas 2014
 
Negative voting concept and system paper
Negative voting concept and system paperNegative voting concept and system paper
Negative voting concept and system paper
 
Everything changed - Lisbon Challenge
Everything changed  - Lisbon ChallengeEverything changed  - Lisbon Challenge
Everything changed - Lisbon Challenge
 
Why the fuck should people care?
Why the fuck should people care?Why the fuck should people care?
Why the fuck should people care?
 
Pictionary de deportes
Pictionary de deportesPictionary de deportes
Pictionary de deportes
 
SoftBank IMS + Femto
SoftBank IMS + FemtoSoftBank IMS + Femto
SoftBank IMS + Femto
 
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भए
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भएMa pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भए
Ma pradhanmantri bhayeko bhaye as pub nayapatrika म प्रम भएको भए
 
Unit4,lesson2
Unit4,lesson2Unit4,lesson2
Unit4,lesson2
 
Using iMovie to Create Course Materials - Tesol 2012
Using iMovie to Create Course Materials - Tesol 2012 Using iMovie to Create Course Materials - Tesol 2012
Using iMovie to Create Course Materials - Tesol 2012
 
Kirk and Mandy's Wedding Shower
Kirk and Mandy's Wedding ShowerKirk and Mandy's Wedding Shower
Kirk and Mandy's Wedding Shower
 
Philip & Esther's OMF Thailand Slides, Harvest 2014
Philip & Esther's OMF Thailand Slides, Harvest 2014Philip & Esther's OMF Thailand Slides, Harvest 2014
Philip & Esther's OMF Thailand Slides, Harvest 2014
 
Ocv nola may2012_final-pdf
Ocv nola may2012_final-pdfOcv nola may2012_final-pdf
Ocv nola may2012_final-pdf
 
ICT the catalyst for inovation in education
ICT the catalyst for inovation in educationICT the catalyst for inovation in education
ICT the catalyst for inovation in education
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 

Ähnlich wie Legal & Commercial, Issues of a Cloud Service

Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm finalLou Milrad
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLou Milrad
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_lawbsookman
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summitAdv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingRitambhara Agrawal
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsMani Soft International
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 

Ähnlich wie Legal & Commercial, Issues of a Cloud Service (20)

Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm final
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud Services
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Law 302
Law 302Law 302
Law 302
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 

Mehr von subtitle

NetApp Administration and Best Practice, Brendon Higgins, Proact UK
NetApp Administration and Best Practice, Brendon Higgins, Proact UKNetApp Administration and Best Practice, Brendon Higgins, Proact UK
NetApp Administration and Best Practice, Brendon Higgins, Proact UKsubtitle
 
Puppet Primer, Robbie Jerrom, Solution Architect VMware
Puppet Primer, Robbie Jerrom, Solution Architect VMwarePuppet Primer, Robbie Jerrom, Solution Architect VMware
Puppet Primer, Robbie Jerrom, Solution Architect VMwaresubtitle
 
eG Innovations, How to.. VDI Performance
eG Innovations, How to.. VDI PerformanceeG Innovations, How to.. VDI Performance
eG Innovations, How to.. VDI Performancesubtitle
 
Demystifying SSD, Mark Smith, S3
Demystifying SSD, Mark Smith, S3Demystifying SSD, Mark Smith, S3
Demystifying SSD, Mark Smith, S3subtitle
 
HP CloudSystem, Alex Haddock, HP Server Strategy Team
HP CloudSystem, Alex Haddock, HP Server Strategy TeamHP CloudSystem, Alex Haddock, HP Server Strategy Team
HP CloudSystem, Alex Haddock, HP Server Strategy Teamsubtitle
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protectionsubtitle
 
10 zig presentation
10 zig presentation10 zig presentation
10 zig presentationsubtitle
 
How I reshaped my lab environment
How I reshaped my lab environmentHow I reshaped my lab environment
How I reshaped my lab environmentsubtitle
 
Progressive deduplication & off site protection of vm ware data
Progressive deduplication & off site protection of vm ware dataProgressive deduplication & off site protection of vm ware data
Progressive deduplication & off site protection of vm ware datasubtitle
 
20121108 vmug london event nimble sorage for vdi
20121108 vmug london event nimble sorage for vdi20121108 vmug london event nimble sorage for vdi
20121108 vmug london event nimble sorage for vdisubtitle
 
VMware, Storage & Kitchen appliances
VMware, Storage & Kitchen appliancesVMware, Storage & Kitchen appliances
VMware, Storage & Kitchen appliancessubtitle
 
NetApp C-mode for 7 mode engineers
NetApp C-mode for 7 mode engineersNetApp C-mode for 7 mode engineers
NetApp C-mode for 7 mode engineerssubtitle
 
V sphere 5.1-storage-features-&-futures
V sphere 5.1-storage-features-&-futuresV sphere 5.1-storage-features-&-futures
V sphere 5.1-storage-features-&-futuressubtitle
 
VMUG 6 Program
VMUG 6 ProgramVMUG 6 Program
VMUG 6 Programsubtitle
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automationsubtitle
 
Virtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or EnablerVirtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or Enablersubtitle
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentationsubtitle
 
Green it vmug presentation v1
Green it vmug presentation v1Green it vmug presentation v1
Green it vmug presentation v1subtitle
 
Vision dt solutions vmug leeds
Vision dt solutions vmug leedsVision dt solutions vmug leeds
Vision dt solutions vmug leedssubtitle
 

Mehr von subtitle (20)

NetApp Administration and Best Practice, Brendon Higgins, Proact UK
NetApp Administration and Best Practice, Brendon Higgins, Proact UKNetApp Administration and Best Practice, Brendon Higgins, Proact UK
NetApp Administration and Best Practice, Brendon Higgins, Proact UK
 
Puppet Primer, Robbie Jerrom, Solution Architect VMware
Puppet Primer, Robbie Jerrom, Solution Architect VMwarePuppet Primer, Robbie Jerrom, Solution Architect VMware
Puppet Primer, Robbie Jerrom, Solution Architect VMware
 
eG Innovations, How to.. VDI Performance
eG Innovations, How to.. VDI PerformanceeG Innovations, How to.. VDI Performance
eG Innovations, How to.. VDI Performance
 
Demystifying SSD, Mark Smith, S3
Demystifying SSD, Mark Smith, S3Demystifying SSD, Mark Smith, S3
Demystifying SSD, Mark Smith, S3
 
HP CloudSystem, Alex Haddock, HP Server Strategy Team
HP CloudSystem, Alex Haddock, HP Server Strategy TeamHP CloudSystem, Alex Haddock, HP Server Strategy Team
HP CloudSystem, Alex Haddock, HP Server Strategy Team
 
Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
 
10 zig presentation
10 zig presentation10 zig presentation
10 zig presentation
 
Big Data
Big DataBig Data
Big Data
 
How I reshaped my lab environment
How I reshaped my lab environmentHow I reshaped my lab environment
How I reshaped my lab environment
 
Progressive deduplication & off site protection of vm ware data
Progressive deduplication & off site protection of vm ware dataProgressive deduplication & off site protection of vm ware data
Progressive deduplication & off site protection of vm ware data
 
20121108 vmug london event nimble sorage for vdi
20121108 vmug london event nimble sorage for vdi20121108 vmug london event nimble sorage for vdi
20121108 vmug london event nimble sorage for vdi
 
VMware, Storage & Kitchen appliances
VMware, Storage & Kitchen appliancesVMware, Storage & Kitchen appliances
VMware, Storage & Kitchen appliances
 
NetApp C-mode for 7 mode engineers
NetApp C-mode for 7 mode engineersNetApp C-mode for 7 mode engineers
NetApp C-mode for 7 mode engineers
 
V sphere 5.1-storage-features-&-futures
V sphere 5.1-storage-features-&-futuresV sphere 5.1-storage-features-&-futures
V sphere 5.1-storage-features-&-futures
 
VMUG 6 Program
VMUG 6 ProgramVMUG 6 Program
VMUG 6 Program
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automation
 
Virtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or EnablerVirtualisation:- Business Continuity Solution or Enabler
Virtualisation:- Business Continuity Solution or Enabler
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
 
Green it vmug presentation v1
Green it vmug presentation v1Green it vmug presentation v1
Green it vmug presentation v1
 
Vision dt solutions vmug leeds
Vision dt solutions vmug leedsVision dt solutions vmug leeds
Vision dt solutions vmug leeds
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Legal & Commercial, Issues of a Cloud Service

  • 1. Legal and Commercial Issues of a Cloud Service Alex Kirkhope / Dominic Higham 11 October 2011
  • 2. Introductions and themes  Service specification and service levels  Rights, liabilities and remedies  Standard terms  Data protection issues  Dispute readiness Cloud Computing - BCS 11 October 2011 2
  • 3. Defining Cloud Computing “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. " National Institution Standards and Technology (NIST) Software as a Service Platform as a Service Infrastructure as a Service Cloud Computing - BCS 11 October 2011 3
  • 4. The business drivers • cost effective • scalable / dealing with spikes • easy to install • standard service offering • integrated maintenance • avoids supplier lock in (?) Cloud Computing - BCS 11 October 2011 4
  • 5. Legal Issues  Service specification and levels  Contractual rights, remedies and liabilities  Control over data  Data privacy Cloud Computing - BCS 11 October 2011 5
  • 6. Service specification / service levels  As with any outsourcing arrangements... be clear about what you are getting  basic service features  application features  business continuity  availability / response times / downtime  helpdesk support  charging structure  utility based? fixed fee?  performance monitoring  recompense if 'below par'? Cloud Computing - BCS 11 October 2011 6
  • 7. Rights, remedies and liabilities  Terms almost always 'non-negotiable'  supplier unwilling to take on risk  liability capped at very low levels and 'direct loss' tightly defined  rare to see service credit regime  service provided 'as is'  if you don't like it  simply walk away  As customer you will be expected to  pay on time  sign & indemnify the 'acceptable user policy'  understand limited commitments around the service Cloud Computing - BCS 11 October 2011 7
  • 8. Screen shots - GoogleApps Cloud Computing - BCS 11 October 2011 8
  • 9. Standard –v- negotiated terms  Standard terms  low liability limits  reduced rights in case of data loss, downtime, etc.  Typically, more keenly priced  Customer loss –v- provider's business  Negotiated terms  chance to gain better protection subject to bargaining position Cloud Computing - BCS 11 October 2011 9
  • 10. Limitations of Liability - AWS  11. Limitations of Liability WE AND OUR AFFILIATES OR LICENSORS WILL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES (INCLUDING DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, OR DATA), EVEN IF A PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHER, NEITHER WE NOR ANY OF OUR AFFILIATES OR LICENSORS WILL BE RESPONSIBLE FOR ANY COMPENSATION, REIMBURSEMENT, OR DAMAGES ARISING IN CONNECTION WITH: (A) YOUR INABILITY TO USE THE SERVICES, INCLUDING AS A RESULT OF ANY (I) TERMINATION OR SUSPENSION OF THIS AGREEMENT OR YOUR USE OF OR ACCESS TO THE SERVICE OFFERINGS, (II) OUR DISCONTINUATION OF ANY OR ALL OF THE SERVICE OFFERINGS, OR, (III) WITHOUT LIMITING ANY OBLIGATIONS UNDER THE SLAS, ANY UNANTICIPATED OR UNSCHEDULED DOWNTIME OF ALL OR A PORTION OF THE SERVICES FOR ANY REASON, INCLUDING AS A RESULT OF POWER OUTAGES, SYSTEM FAILURES OR OTHER INTERRUPTIONS; (B) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; (c) ANY INVESTMENTS, EXPENDITURES, OR COMMITMENTS BY YOU IN CONNECTION WITH THIS AGREEMENT OR YOUR USE OF OR ACCESS TO THE SERVICE OFFERINGS; OR (D) ANY UNAUTHORIZED ACCESS TO, ALTERATION OF, OR THE DELETION, DESTRUCTION, DAMAGE, LOSS OR FAILURE TO STORE ANY OF YOUR CONTENT OR OTHER DATA. IN ANY CASE, OUR AND OUR AFFILIATES’ AND LICENSORS’ AGGREGATE LIABILITY UNDER THIS AGREEMENT WILL BE LIMITED TO THE AMOUNT YOU ACTUALLY PAY US UNDER THIS AGREEMENT FOR THE SERVICE THAT GAVE RISE TO THE CLAIM DURING THE 12 MONTHS PRECEDING THE CLAIM. Cloud Computing - BCS 11 October 2011 10
  • 11. Challenging the standard terms  What is the Unfair Contract Terms Act 1977?  UCTA - Guidelines for Application of Reasonableness Test include:  (a) the strength of the bargaining positions of the parties relative to each other, taking into account (among other things) alternative means by which the customer’s requirements could have been met;  (b) whether the customer … had an opportunity of entering into a similar contract with other persons, but without having a similar term; Cloud Computing - BCS 11 October 2011 11
  • 12. Case law  St Albans v ICL  Watford Electronics v Sanderson, 2001  Where experienced businessmen representing substantial companies of equal bargaining power negotiate an agreement, they may be taken to have had regard to the matters known to them. They should, in my view be taken to be the best judge of the commercial fairness of the agreement which they have made; including the fairness of each of the terms in that agreement. They should be taken to be the best judge on the question whether the terms of the agreement are reasonable. The court should not assume that either is likely to commit his company to an agreement which he thinks is unfair, or which he thinks includes unreasonable terms. Unless satisfied that one party has, in effect, taken unfair advantage of the other – or that a term is so unreasonable that it cannot properly have been understood or considered - the court should not interfere. Cloud Computing - BCS 11 October 2011 12
  • 13. Termination for breach/cause  More important in longer terms arrangements Termination for Cause by Either Party Either party may terminate this Agreement for cause upon [30/10/7] days advance notice to the other party if there is any material default or breach of this Agreement by the other party, unless the defaulting party has cured the material default or breach within the ## day notice period. Cloud Computing - BCS 11 October 2011 13
  • 14. Material Breach?  There is no commonly accepted definition of "material breach". Where a contract is expressed to be terminable for material breach and no definition is included the courts will look at all the surrounding circumstances. Key points include:  the intention of the parties. Did they intend to give the non breaching party the right to terminate?;  the nature of the contract and the obligations involved;  what the breach consists of and how it impacts on the innocent party;  the circumstances in which the breach arises including any explanation given;  was the breach accidental or intentional?; and  the consequences for the breaching party if the breach is material. This is less important than the impact of the breach on the non breaching party.  Contrast termination for repudiatory breach  What is the effect of this contractual position? Cloud Computing - BCS 11 October 2011 14
  • 15. Data ownership  If you put data in the Cloud understand:  who may be able to access it : strength of confidentiality / security undertakings offered  commitments provided on exit / transition : how easy would it be to transfer to another provider  would you be prepared to put your crown jewels there? Cloud Computing - BCS 11 October 2011 15
  • 16. Data privacy  Data Protection Act 1998  if you put personal data in the cloud you have responsibility as a data controller…  to be satisfied that adequate measures in place to protect confidentiality and security of data against unauthorised loss, damage, destruction, etc  to prevent the data from being processed outside Europe unless further legal protections are in place  it is not good enough to simply rely on the 'good word' of a supplier  ICO (and FSA if you are FSA regulated) take a strict approach to enforcement  Zurich fined £2.4m for failing to undertake adequate due diligence when allowing customer data to be outsourced to South Africa. Cloud Computing - BCS 11 October 2011 16
  • 17. Data loss  Data loss remains high profile – NHS, HMRC, Deloitte, MoD, banks and financial institutions  Consequences  fines  criminal sanction  undertakings  reputation  claims  management time and money dealing with claims Cloud Computing - BCS 11 October 2011 17
  • 18. ICO  What will the ICO look at?  circumstances of breach  the response to the loss  steps to mitigate  adequacy of procedures, standards, encryption  Steps to take:  investigate, assess, contain  inform regulators and/or public – deal with publicity  prevent recurrence and remedy underlying issues  Personal Information Online Code of Practice  pragmatic approach but will want to see risk analysis done.  Cloud and outsourcing are not the only source of data loss risk Cloud Computing - BCS 11 October 2011 18
  • 19. Contract management and dispute readiness  material breach and repudiatory breach  dispute approach  contract management – service of notices etc.  discussions – open and without prejudice  escalation procedures  documents  witnesses  business continuity - exit and transition and future provision of services Cloud Computing - BCS 11 October 2011 19
  • 20. Conclusions  Cloud computing is growing rapidly  Attractive as a commercial / business proposition  There are risks : understand before proceeding  Go in 'eyes wide open' Cloud Computing - BCS 11 October 2011 20
  • 21. Any questions or comments? alex.kirkhope@dlapiper.com dominic.higham@dlapiper.com Cloud Computing - BCS 11 October 2011 21