+ All Categories
Home > Documents > Cloud Computing: Managing the Legal Risks

Cloud Computing: Managing the Legal Risks

Date post: 12-Sep-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
85
Presenting a live 90minute webinar with interactive Q&A Cloud Computing: Managing the Legal Risks Mitigating Liabilities in Outsourcing Virtual Storage and Applications T d ’ f l f 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific TUESDAY, MARCH 29, 2011 T odays faculty features: Janine Anthony Bowen, Partner, Jack Attorneys & Advisors, Atlanta Daniel A. Masur, Partner, Mayer Brown, Washington, D.C. Lora L. Fong, Managing Counsel, Salesforce.com, Inc., New York The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.
Transcript
Page 1: Cloud Computing: Managing the Legal Risks

Presenting a live 90‐minute webinar with interactive Q&A

Cloud Computing: Managing the Legal RisksMitigating Liabilities in Outsourcing Virtual Storage and Applications

T d ’ f l f

1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific

TUESDAY, MARCH 29, 2011

Today’s faculty features:

Janine Anthony Bowen, Partner, Jack Attorneys & Advisors, Atlanta

Daniel A. Masur, Partner, Mayer Brown, Washington, D.C.

Lora L. Fong, Managing Counsel, Salesforce.com, Inc., New York

The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

Page 2: Cloud Computing: Managing the Legal Risks

Conference Materials

If you have not printed the conference materials for this program, please complete the following steps:

• Click on the + sign next to “Conference Materials” in the middle of the left-hand column on your screen hand column on your screen.

• Click on the tab labeled “Handouts” that appears, and there you will see a PDF of the slides for today's program.

• Double click on the PDF and a separate page will open. Double click on the PDF and a separate page will open.

• Print the slides by clicking on the printer icon.

Page 3: Cloud Computing: Managing the Legal Risks

Continuing Education Credits FOR LIVE EVENT ONLY

For CLE purposes, please let us know how many people are listening at your location by completing each of the following steps:

• Close the notification box

• In the chat box, type (1) your company name and (2) the number of attendees at your location

• Click the blue icon beside the box to send

Page 4: Cloud Computing: Managing the Legal Risks

Tips for Optimal Quality

S d Q litSound QualityIf you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection.

If the sound quality is not satisfactory and you are listening via your computer speakers, you may listen via the phone: dial 1-888-450-9970 and enter your PIN when prompted Otherwise please send us a chat or e mail when prompted. Otherwise, please send us a chat or e-mail [email protected] immediately so we can address the problem.

If you dialed in and have any difficulties during the call, press *0 for assistance.

Viewing QualityTo maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key againpress the F11 key again.

Page 5: Cloud Computing: Managing the Legal Risks

Cloud Computing:Managing the Legal RisksManaging the Legal RisksPrimer and Risk Mitigation

Janine Anthony Bowen, Esq., CIPPjbowen@jack‐law.com (678) 823‐6611March 29 2011March 29, 2011

©2011 Jack Attorneys & Advisors. All Rights Reserved

Page 6: Cloud Computing: Managing the Legal Risks

Agenda

•Brief Overview of CloudBrief Overview of Cloud Computing

•Later Minimizing &•Later…Minimizing & Mitigating Legal Risk

66

Page 7: Cloud Computing: Managing the Legal Risks

Cloud Computing  Pl i E li h D fi i iPlain English Definition

• From the User’s Perspectivep– Data processing and storage, application development, and software hosting over the Internet instead of on a personal computer or over a business’ network

– Available on an ‘on demand’ basis

– Location of information stored ‘in the Cloud’ is potentially unknown at any given point in timeat any given point in time

– Relatively inexpensive

7

Page 8: Cloud Computing: Managing the Legal Risks

National Institute of Standards & Technology’s DefinitionStandards & Technology s Definition

• Cloud computing is a model for enabling convenient, on‐demandp g gnetwork access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

8

Page 9: Cloud Computing: Managing the Legal Risks

NIST Definition (cont)

• Essential Characteristics– On‐demand self‐service

•Deployment Models– Private CloudOn demand self service

– Broad network access

– Resource pooling

Private Cloud

– Community Cloud

– Public Cloud

– Rapid elasticity

– Measured Service

– Hybrid Cloud

9

Page 10: Cloud Computing: Managing the Legal Risks

Three Service Models

SaaS (Software as a Service)The consumer uses the provider’s

SoftwareSoftware

The consumer uses the provider s applications running on a cloud infrastructure. (e.g. Google Apps)

PlatformPlatform

SoftwareSoftwareAs A ServiceAs A ServicePaaS (Platform as a Service)

The consumer has control over the deployed applications and possibly 

InfrastructureInfrastructure

PlatformPlatformAs A ServiceAs A Service

p y pp p yapplication hosting environment configurations. (e.g. Force.com)

IaaS (Infrastructure as a Service) Infrastructure Infrastructure As A ServiceAs A Service

IaaS (Infrastructure as a Service)The consumer is able to deploy and run arbitrary software. (e.g. Amazon EC3)

10

EC3)

Page 11: Cloud Computing: Managing the Legal Risks

Virtual Server

11

Page 12: Cloud Computing: Managing the Legal Risks

Multi‐tenant

ABC Company XYZ Company

ABC Company User

yPurchasingApplication

yPurchasingApplication

Acme Atlas

XYZ Company User

Acme CompanyCompanyInventory

Application

CompanyInventory

Application

Top-Notch Small Biz

Acme Company User

Top-Notch Company User

InternetConnection

Top Notch CompanyLogistics

Application

Small Biz Company

PayrollApplication

Hypervisor

Small Biz Company User

Virtual Server with

HypervisorOperating System Atlas Company

User

Tenants

12

Multiple TenantsTenants

Page 13: Cloud Computing: Managing the Legal Risks

Contracting for Cloud Computing Contracting for Cloud Computing Services — Key Considerations

March 29, 2011Dan MasurPartner202 263 3329 [email protected] 

Mayer Brown is a global legal services organization comprising legal practices that are separate entities (the Mayer Brown Practices). The Mayer Brown Practices are: Mayer Brown LLP, a limited liability partnership established in the United States; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales; JSM, a Hong Kong partnership, and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. The Mayer Brown Practices are known as Mayer Brown JSM in Asia. “Mayer Brown” and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions.

@ y

Page 14: Cloud Computing: Managing the Legal Risks

Top SecretThe Real Value of Cloud Computing!e ea a ue o C oud Co pu g

1

Page 15: Cloud Computing: Managing the Legal Risks

Contracting for Cloud Computing ServicesThe Road to the Cloud!

2

Page 16: Cloud Computing: Managing the Legal Risks

Breadth of Cloud-Based Offerings

“Nice to have” business tools

Routine, non‐sensitive data

Limited scope of business use Mission critical applicationsLimited scope of business use pp

Regulated or business sensitive data

Enterprise‐wide use

Each end of the spectrum presents different legal and contractual challenges, options and trade‐offs

12

Page 17: Cloud Computing: Managing the Legal Risks

Cloud Customers Must Make Informed Tradeoffs

Th i d d “f ” h ill k f•There is no standard contract “form” that will work for each situation

– Traditional outsourcing and software licensing terms may be useful, but can not be inflexibly applied to cloud computing

•More robust contractual protection may or may not be the correct answer — it dependscorrect answer  it depends

•Prospective cloud customers must take into account– Criticality of the software, data and services in question

U i i i d i h l d i– Unique issues associated with cloud computing– Availability and pricing of various alternatives

•For “nice‐to‐have” business tools or routine data, a low cost solution may outweigh contractual protections

•Requiring robust contractual protections may increase the price and eliminate certain providers altogetherprice and eliminate certain providers altogether

16

Page 18: Cloud Computing: Managing the Legal Risks

Key Issues in Cloud Computing

17

Page 19: Cloud Computing: Managing the Legal Risks

“…more than 75 percent of senior business leaders believe that safety, f y,security and privacy are top potential risks of cloud computing.” risks of cloud computing.

Brad Smith, GC, Microsoft

18

Page 20: Cloud Computing: Managing the Legal Risks

Issues with Cloud ComputingPrivacy and Security — the Elephant in the Roomy y p

•Data transfer issues (EU and similar jurisdictions)( j )

•Data location issues•Location of users accessing data•Movement and storage of data•Use of subcontractors•Use of multiple platforms•Use of multiple platforms•Lack of transparency and control

•Data breach issues•Data destruction issues

b l d•Ability to impose security and privacy requirements

19

Page 21: Cloud Computing: Managing the Legal Risks

Issues with Cloud Computing Privacy and Security — USy y

•Gramm‐Leach‐Bliley Act (GLBA) • Federal Trade Commission Act (FTCA)•Health Insurance Portability and 

Accountability Act (HIPAA) 

•Health Information Technology

Act (FTCA)

• ID Theft Red Flags

• State Privacy Security LawsHealth Information Technology for Economic and Clinical Health (HITECH)

State  Privacy Security Laws (Breach Notification — 46 States and Encryption (MA and NV), use of SSN’s etc )• Fair Credit Reporting 

Act/FACT Act

use of SSN s, etc.)

• Industry Standards (PCI) 

• Litigation and enforcement cases• Litigation and enforcement cases

20

Page 22: Cloud Computing: Managing the Legal Risks

Issues with Cloud Computing Privacy and Security — USy y

•General security of personal information laws (e.g., Arkansas, California, Indiana, Maryland, Massachusetts, Nevada, Rhode Island, Texas and Utah).

•Standard:  reasonable security procedures and practices appropriate to the nature of the information.pp p

•Massachusetts regulations far exceed most other laws and regs.  – Create duty to protect and have detailed system requirements– Require a written security programRequire a written security program– Requires that companies oversee service providers by selecting providers who 

are capable of maintaining appropriate security measures consistent with the MA regsR i h i id i h i l d– Requires that service provider contracts require them to implement and maintain appropriate security measures

– Requires encryption of personal information across public networks, wireless networks and portable devices (laptops, hard drives, etc.)

16

Page 23: Cloud Computing: Managing the Legal Risks

Issues with Cloud ComputingPrivacy and Security — Non-USy y

In EEA and other jurisdictions where data protection and data transfer regulation is strict cloud computingdata transfer regulation is strict, cloud computing challenges and issues increase 

21

Page 24: Cloud Computing: Managing the Legal Risks

Issues with Cloud ComputingPrivacy and Security — Non-USy y

•Transfers of personal data out of EU are highly regulated.

•Even viewing data outside of EU is a transfer.

•Very few countries are approved for data transfers (Norway, Liechtenstein, Iceland, Switzerland, Argentina, Canada, Isle of Man, Jersey, Guernsey, Faeroe Islands) .

•EU approved clauses (controller to processor) are the•EU approved clauses (controller to processor) are the most common means of transferring data between companies and service providers.

•EU recently updated the clauses to require that processors obtain prior written consent of controllers before using sub‐processors. 

Page 25: Cloud Computing: Managing the Legal Risks

Other Critical Contracting Issues for Cloud Customers

Regulatory and Compliance Challenges

Other Key Issues and Challenges

•Auditability

•Lack of transparency and 

•Service levels

• Disaster recovery and control

•Subcontracting and flow d f i i

business continuity

• Intellectual property issuesdown of provisions

•Export control issues• Change management issues

• Exit rights•Electronic discovery issues

•Record retention issues• Financial stability of providers/due diligence

22

Page 26: Cloud Computing: Managing the Legal Risks

Cloud ComputingSo now what? Can we even do this?

23

Page 27: Cloud Computing: Managing the Legal Risks

Contracting for Cloud ComputingYES!

•Keep your eye on

– Criticality of the software, data and services

U i i i d– Unique issues associated with cloud computing 

– Availability and pricing of– Availability and pricing of various alternatives

•Look to traditional outsourcingLook to traditional outsourcing contracts and software and data use agreements as a good starting point

24

Page 28: Cloud Computing: Managing the Legal Risks

Cloud Computing Case StudyLos Angeles – CSC/Google Contractg / g

•Establish and maintain robust information

•Data access limited to U.S. citizens with high levelrobust information 

security program

•Clearly defined

citizens with high‐level security clearances

•Notice of data/security•Clearly defined data ownership

•Private cloud for

•Notice of data/security requests and breaches

•Service Levels with•Private cloud for sensitive data 

•Mandatory data encryption

•Service Levels, with meaningful penalties

•E‐Discovery functionalityMandatory data encryption

•Data storage only in U.S.

E Discovery functionality

26

Page 29: Cloud Computing: Managing the Legal Risks

Case StudyLos Angeles – CSC/Google Contract, cont’dg / g ,

•Mandatory subcontractor flow down

•Broad indemnification obligation with unlimitedflow down

•Broad audit rights. Including annual SAS 70

obligation, with unlimited liability for certain breaches

•Clearly defined exit rightsIncluding annual SAS 70 audit at provider expense

•Disaster recovery –

•Clearly defined exit rights, including retention and delivery of data at no charge•Disaster recovery –

data/service restoration  within 4 hours

Source:  “The City of Los Angeles Steps into the Cloud,” Randy Gainer27

Page 30: Cloud Computing: Managing the Legal Risks

Questions?

30

Page 31: Cloud Computing: Managing the Legal Risks

Minimizing and Mitigating Risks

•AgendaAgenda– Considerations in Vendor Selection

– Contracting Models

– Impact of Industry StandardsStandards

31

Page 32: Cloud Computing: Managing the Legal Risks

Why not just rely on the contract? Who you are drives what you can expect

• Cloud users should clearly understand what they are getting and y y g ggetting into:– Generally speaking, only the largest implementations get negotiated contract terms

– No negotiation likely in most cases – risk mitigation analysis should establish ‘business level’ comfort

•Where negotiation is possible risk mitigation should drive negotiation•Where negotiation is possible, risk mitigation should drive negotiation of key provisions

3232

Page 33: Cloud Computing: Managing the Legal Risks

But first, how’s cloud computing different?

•Geography – Data in the cloud can be anywhere; multiple copies can be in multiple locations

• The potential for brokering capacity exists, this is ‘surge computing’

• In current state of play cloud providers assume virtually no liability – all i k id ith thrisk resides with the user

•Difficult for a user to know where liability rests, even if it were properly assigned

• The nature of the potential legal issue depends on where a user plugs into the cloud 

•Virtually complete loss of control by data owner (who holds it and where•Virtually complete loss of control by data owner (who holds it and where is it?)

•Relatively inexpensive OPEX instead of CAPEX

33

Page 34: Cloud Computing: Managing the Legal Risks

Quick List of  Potential Mitigation ConsiderationsConsiderations

Functionality of solution Pricing

Uptime Response time 

Quality of service Data Security/Privacy

Backup and disaster recovery Integration with existing systems

Data access Customer service/support

Adapted from “Evaluating SaaS Solutions: A Checklist for Small and Mid‐sized Enterprises”p g phttp://www.saugatech.com/thoughtleadership/TL_October2009_Eval_SAP.pdf

34

Page 35: Cloud Computing: Managing the Legal Risks

Some Areas of Concern

•Service quality/SLAs/Availability

•Disaster recoveryDisaster recovery

•Provider competence

•Provider Viability

3535

Page 36: Cloud Computing: Managing the Legal Risks

Mitigation Considerations:SLAsSLAs

• Control‐oriented– System availabilityy y– System response time– Fail‐over for disaster recovery

•Operations‐oriented– Data retrieval– Data integrityT iti i t– Transition assistance

•Business‐orientedError resolution time– Error resolution time

– Timeliness re: professional services around cloud solutions

3636

Page 37: Cloud Computing: Managing the Legal Risks

Mitigation Considerations:Disaster RecoveryDisaster Recovery

•How are backup systems architected?  – Complete redundancy?  Multiple redundancies?  Duplicate systems? p y p p yReal‐time backup?

•Where are backup systems located geographically?

•Are third party backup systems utilized (partially/totally)?

•How long would a catastrophic event at a data center affect system g p yavailability?

• Concerns for physical assets based on geography

3737

Page 38: Cloud Computing: Managing the Legal Risks

Mitigation Considerations:Competence IssuesCompetence Issues

• Provider track record of success?•Views of commentators/bloggers•Views of commentators/bloggers• Is the pricing right for the breadth of offering?• Perceived level of sophistication of the vendor (e.g. over the phone, email))– Knowledge of industry– Knowledge of the business

• If vendor is an early stage company, who is supporting it financially?•Does the site look sophisticated or sophmoric?•Are there integration partners?

3838

Page 39: Cloud Computing: Managing the Legal Risks

Mitigation Considerations: Vi bilit f th Cl d P idViability of the Cloud Provider

•Viability matters.  Why? A cloud user makes an investment when choosing cloud provider.  For example:– Integrating cloud services into business processes

– Migrating data from its environment

• Lack of standardization makes moving to a new cloud provider difficult

Wh t h t l d ’ d t i th t f•What happens to a cloud user’s data in the event of:– Bankruptcy

– M&A

– Escrow

39

Page 40: Cloud Computing: Managing the Legal Risks

Cloud Contracting Preliminaries:Cloud vs Outsourcing vs ASPCloud vs. Outsourcing vs. ASP

Cloud Computing Outsourcing ASP

Location of Service/Data

unknown known knownService/Data

Owner of Technology

provider company provider

Contract non‐negotiable highly negotiated negotiated

Contract Risk company provider shared

Scalability Yes No Maybe

40

Page 41: Cloud Computing: Managing the Legal Risks

Cloud Contracting Models:License vs Service AgreementLicense vs. Service Agreement

License  Service Agreement Necessary in CloudAgreement

License Grant Yes. No. No.  No physical transfer of SW.

IP Infringement Yes. No. No.  No physical Protection transfer of SW.

Ownership  Yes. Yes. Yes.  Use of cloud pProtection does not translate 

into ownership transfer.

41

Page 42: Cloud Computing: Managing the Legal Risks

Cloud Contracting Models:Online Agreement vs Standard ContractOnline Agreement vs. Standard Contract

Online Agreement Standard Contract

Negotiable No. Yes, generally.Negotiable No. Yes, generally.

Limits Placed on Yes Very little or no Yes Risk shared byLimits Placed on Provider’s Liability

Yes.  Very little or no liability to provider.

Yes.  Risk shared by provider and user.

Ri k i h E f B b B bRisk in the Event of Problems

Born by user. Born by party responsible.

42

Page 43: Cloud Computing: Managing the Legal Risks

Cloud Contracting Models:Terms of Use & Privacy PolicyTerms of Use & Privacy Policy

• The Privacy Policy and Terms of Use specify the privacy protections in place as well as the terms under which the services are offered

•Mini Case Study – Google’s Terms and Privacy Policy– User grants content license – Google can modify the content to deliver the service

– User’s use of services is ‘as is’ and ‘as available’

– No liability for user’s damages, including for deletion, corruption, or failure to store a user’s data

– Effect on a Gmail user is one consideration, but what about a Google Apps (PaaS) user?

43

Page 44: Cloud Computing: Managing the Legal Risks

Impact of Industry Standards

•What standards applicable to cloud computing exist?– Payment Card Industry Data Security Standards

•A set of requirements for enhancement  of payment account data security– ISO 27000 Series Standards

•An information security standard that provides best practices for those o at o secu ty sta da d t at p o des best p act ces o t oseimplementing an information security management system

– Open Cloud Manifesto

•Basic premise is that cloud computing should be open like other technologies (e.g. use open source technologies) to enhance ability: (a) for a user to transfer to a new provider, (b) for companies to work together, and (c) to speed and ease integrationspeed and ease integration

44

Page 45: Cloud Computing: Managing the Legal Risks

Take Aways

• Be thoughtful about which parts of your business are cloud‐worthyof your business are cloud worthy.  All business processes are not suitable.

• Have a plan to deal with mistakes pthat will happen in the cloud (business, technology, legal).  What level of risk can you tolerate?

•Work with your key internal and external advisors to think through 

l d Ayour cloud strategy.  A cross‐functional strategy is in order.

4545

Page 46: Cloud Computing: Managing the Legal Risks

Q&AContact MeContact Me

•Janine Anthony Bowen, Esq., CIPPJanine Anthony Bowen, Esq., CIPPjbowen@jack‐law.comwww.visualcv.com/jdabowenwww linkedin com/in/jdabowenwww.linkedin.com/in/jdabowen

•678‐823‐6611

•Twitter ‐@cloudlawyer

•www.jack‐law.com

4646JACK Attorneys & Advisors:  Technology/IP Law & the Business of Technology ‐ Quite Simply, We Get It.

Page 47: Cloud Computing: Managing the Legal Risks

47©2010 J.A. Bowen. All Rights Reserved 47

Page 48: Cloud Computing: Managing the Legal Risks

Contracting in the CloudContracting in the CloudLora L. Fong, Esq.M i C lManaging [email protected]

March 29, 2011

Copyright 2010 salesforce.com, inc

Page 49: Cloud Computing: Managing the Legal Risks

Disclaimer

My views are my own, and generally (but not always) reflect those of salesforce.com - the leader in enterprise cloud computing

Sales Cloud™The world’s #1 sales applicationThe world’s #1 sales application.

Service Cloud™The future of customer service.

Chatter - Collaboration CloudCollaboration apps and platform. Work with colleagues—real time.

Force.com - Custom Cloud 2The leading cloud platform for custom application development

49

Page 50: Cloud Computing: Managing the Legal Risks

Agenda

– Technology model

– Key legal issues and contracting strategiesy g g g

50

Page 51: Cloud Computing: Managing the Legal Risks

Technology Model

Page 52: Cloud Computing: Managing the Legal Risks

Ten Year Computing Cycles10x more users with each cycle

2000s Mobile Cloud Computing2000s Mobile Cloud Computing

1990 D kt Cl d C ti1990s Desktop Cloud Computing

1980s Client/server Computing

1970 Mi i C ti

1980s Client/server Computing

1970s Mini Computing

1960s Mainframe Computing

52

Page 53: Cloud Computing: Managing the Legal Risks

Next Generation Devices Changing How We Access the Internet

Device Shipments

Tablets

Smartphones

Mobile PCs

Desktop

Mobile PCs

Source: Gartner Research; Smartphone, Tablet, and PC Forecast, December, 2010.

53

Page 54: Cloud Computing: Managing the Legal Risks

Social Networking Surpasses Email

Email Users

Social Networking Users

Source: Comscore, 2010

54

Page 55: Cloud Computing: Managing the Legal Risks

Fundamental Shift in Cloud Computing

Easy . Fast . Low Cost Social . Mobile . Open

55

Page 56: Cloud Computing: Managing the Legal Risks

What’s in the Cloud?

Traditionally Managed On-Premise– ServersServers

– OS

– Application software

– Development environment

– Upgrade/Maintenance

– Security

– Backup

Disaster Recovery/BCP– Disaster Recovery/BCP

56

Page 57: Cloud Computing: Managing the Legal Risks

NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)

Cloud computing is a model for enabling convenient, ondemand network access to a shared pool ofdemand network access to a shared pool ofconfigurable computing resources (e.g., networks,servers, storage, applications, and services) that can beg pp )rapidly provisioned and released with minimalmanagement effort or service provider interaction. Thiscloud model promotes availability and is composed offive essential characteristics, three service models, andf d l t d lfour deployment models.

57

Page 58: Cloud Computing: Managing the Legal Risks

NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)

Five Essential Characteristics1 On-Demand Self-Service: Consumer provisions computing1. On Demand Self Service: Consumer provisions computing

capabilities without provider intervention

2. Broad Network Access: Accessible via standard mechanisms promoting use by various “client” platforms (smart phones, pdas, tablets, laptops)\

3 Resource Pooling: Provider resources pooled using multi-3. Resource Pooling: Provider resources pooled using multitenant model to serve multiple consumers.

4. Rapid Elasticity: scale up, scale down

5. Measured Elasticity: control and optimization with metrics on resource consumption/allocation

58

Page 59: Cloud Computing: Managing the Legal Risks

NIST Definition – 3 Service Models (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)

Software as a Service (SaaS)– Provider’s applications, infrastructure

– Accessible via client devices over web browser interfaceAccessible via client devices over web browser interface

– Consumer doesn’t manage or control infrastructure

– Consumer may have configurable application settings (e.g. user permissions)

Platform as a Service (PaaS)Platform as a Service (PaaS)– Consumer created or acquired applications

– Use of programming languages & tools supported by cloud provider

– Consumer control over deployed applications

– Provider managed infrastructure

Infrastructure as a Service (IaaS)( )– Consumer capability to provision processing resources

– Provider controls underlying cloud infrastructure

– Consumer able to deploy arbitrary software (OS, Apps)Consumer able to deploy arbitrary software (OS, Apps)

59

Page 60: Cloud Computing: Managing the Legal Risks

NIST Definition - 4 Deployment Models(Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)

1. Private Cloud – operated by a single organization

2. Community Cloud –shared by multiple organizations

3. Public Cloud – available to general public

4 Hybrid Cloud – two or more distinct clouds bound together4. Hybrid Cloud two or more distinct clouds bound together

60

Page 61: Cloud Computing: Managing the Legal Risks

NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)

Three Features of “Mature” SaaS Applications

Scalability Scalability– 1 to N users

Multi-Tenancy Multi-Tenancy– One code base supporting multiple logical instances

Metadata driven ConfigurabilityMetadata driven Configurability– Users configure via metadata vs. application code changes

61

Page 62: Cloud Computing: Managing the Legal Risks

Multi-Tenancy Makes Public Cloud Computing Possible

Single-Tenant (O P i H t d)

Multi-Tenant(On-Premise or Hosted)

D di t d A St k f E h O Si l St k f AllDedicated App Stack for Each Application

One Single Stack for All Applications

62

Page 63: Cloud Computing: Managing the Legal Risks

Metadata: How Multi-Tenant Services Deliver a Unique Experience to Every CustomerUnique Experience to Every Customer

90,000+ Customers

11 Million + 100+ M

Salesforce A

ISV Apps 850

Custom Apps 100k+

Metadata11 Million +

Customizations100+ M

Integration Calls / Day

Apps 850+ 100k+

31+ major upgradesj pgCustomizations, Integrations and apps run on the latest release automatically

63

Page 64: Cloud Computing: Managing the Legal Risks

Cloud ComputingLiberates the Consumer from IT Burdens

...By using cloud services, the Federal Government will gainaccess to powerful technology resources faster and at loweraccess to powerful technology resources faster and at lowercosts. This frees us to focus on mission-critical tasks insteadof purchasing, configuring, and maintaining redundantinfrastructure. The Obama Administration is committed toleveraging the power of cloud computing to help close thetechnology gap and deliver for the American peopletechnology gap and deliver for the American people..

Vivek Kundra, the U.S. government’s first Chief Information Officer.http://www.whitehouse.gov/blog/2010/05/13/moving-cloud (emphasis added)

64

Page 65: Cloud Computing: Managing the Legal Risks

Shifting the Burden to the Cloud

Application and Platform – DevelopmentDevelopment

– Maintenance

– Functional Enhancements

Infrastructure– Hardware resource acquisition, management

– Economies of scale• (e.g. salesforce.com supports approximately 83,000 customers

currently on only 1 500 Dell PCs plus an additional 1 500 forcurrently on only 1,500 Dell PCs, plus an additional 1,500 for redundancy/Disaster Recovery etc.).

65

Page 66: Cloud Computing: Managing the Legal Risks

Faster Rollouts and Innovation

Faster implementation of applications

Faster Vendor Innovation Faster Vendor Innovation

Flexibility and scalability to serve companies of all sizes (1 – X users)(1 – X users)

Code base developed, maintained, enhanced by the providerprovider

• Upgrades tested and deployed

• Security

A dit hi t t ki• Audit history tracking

• Tuning

• Backups

• Disaster Recovery

66

Page 67: Cloud Computing: Managing the Legal Risks

The Cloud Serves Companies of Every Size

ENTERPRISE

MID-MARKET

SMALL BUSINESS

67

Page 68: Cloud Computing: Managing the Legal Risks

Subscription Model

Fixed # of Users / Period / Product

For customerSubscription

For customer– Minimal up-front investment

– FlexibilityFlexibility

For vendor– Financial predictabilityp y

– Cash flow

Pricing – Provider may discount for greater commitment

68

Page 69: Cloud Computing: Managing the Legal Risks

Contracting in the Cloud

Page 70: Cloud Computing: Managing the Legal Risks

Legal Issues – No Software License if Outside Customer’s Firewall

Inside customer’s firewall– Licensing modelLicensing model

– Software license seeks to avoid first sale doctrine (allows purchaser to sell or give away a copy of a copyrighted work

once lawfully obtained)

Outside customer’s firewallN i di t ib t d i l d ti th f ft– No copies distributed in cloud computing, therefore no software license needed

– Cloud computing is a “service” that is “provided” or “made p g pavailable” to customer (SaaS, PaaS, IaaS)

70

Page 71: Cloud Computing: Managing the Legal Risks

Legal Issues - Maintenance & Support

On premises model typically requires customer to purchase maintenance or support in addition topurchase maintenance or support in addition to software license

Multi-tenancy model may or may not include– Functional enhancements, upgrades, pg

– Fixes, patches

– User support

71

Page 72: Cloud Computing: Managing the Legal Risks

Legal Issues – Data Privacy & Security

Best Practices– Transparency:Transparency:

• explain their information handling practices

• disclose the performance and reliability of their services

– Use Limitation.• Provider disclaims ownership rights in customer data

• Use customer data only as their customers instruct them or to fulfill• Use customer data only as their customers instruct them or to fulfill their contractual or legal obligations.

– Disclosure.• Provider discloses customer data only if and to extent legally

require & provide affected customers prior notice of any such compelled disclosure if permitted.

72

Page 73: Cloud Computing: Managing the Legal Risks

Data Privacy & Security Best Practices (cont.)

– Security Management System. • Provider maintains robust security management system that is

based on an internationally accepted security framework (e.g.ISO 27001)27001)

– Customer Security Features. • Customers have configurable security features to implement in

their usage of the cloud computing services

– Data Location. • Provider should tell customers the countries in which customerProvider should tell customers the countries in which customer

data is hosted

73

Page 74: Cloud Computing: Managing the Legal Risks

Data Privacy & Security Best Practices (cont.)

Breach Notification. – Provider should notify customers of known security breaches that

affect the confidentiality or security of the customer data.

Audit Audit.– Provider should use third-party auditors to ensure compliance with its

security management system.

Data Portability.– Provider should make available to customers their data in an

industry-standard, downloadable format.y

74

Page 75: Cloud Computing: Managing the Legal Risks

Legal Issues – Liability Considerations

For cloud computing vendor, risk of data security breach outstrips all othersp

Multi-tenancy enables single incident to affect thousands of customers, changing risk calculus

Critical to think through worst-case scenarios, and re-think as company grows and evolves – Types of harm– Damages available– Settlement valuesSettlement values– Insurance coverage

75

Page 76: Cloud Computing: Managing the Legal Risks

Legal Issues – Limitation of Liability

Cloud computing provider must decide what it is willing to sustain in worst-case scenario and draft contractsto sustain in worst case scenario, and draft contracts accordingly

Will provider pay damages/settlements arising from 3dWill provider pay damages/settlements arising from 3d party claims, e.g. security breach/data loss fines/credit monitoring fees

Typically, provider will not cover consequential damages (i.e., customer’s lost profits) resulting from security breach

76

Page 77: Cloud Computing: Managing the Legal Risks

Legal Issues – Third-Party Applications

Trend: cloud computing platforms allowing applications from multiple sources to integrate and share datafrom multiple sources to integrate and share data

Assure consent to sharing of data

77

Page 78: Cloud Computing: Managing the Legal Risks

Legal Issues - Indemnification

In most technology contracts, key indemnity agreed to by providerby provider– IP infringement

In cloud computing, customer inputs content intoIn cloud computing, customer inputs content into provider’s systems– Provider doesn’t control, or often even see, customer content,

but hosts it

78

Page 79: Cloud Computing: Managing the Legal Risks

Legal Issues – Indemnification - CDA

Does Communications Decency Act§230 protect provider?– “No provider or user of an interactive computer service shall be treated

as the publisher or speaker of any information provided by another information content provider.”

– CDA § 230 "creates a federal immunity to any cause of action that would make service providers liable for information originating with a third-party user of the service…. [L]awsuits seeking to hold a service liable for its exercise of a publisher’s traditional editorial functions –such as deciding whether to publish withdraw postpone or altersuch as deciding whether to publish, withdraw, postpone or alter content – are barred.” Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997), cert. denied, 524 U.S. 937 (1998)

Doesn’t apply to IP infringement claims or claims outside U SDoesn t apply to IP infringement claims or claims outside U.S.

79

Page 80: Cloud Computing: Managing the Legal Risks

Legal Issues - Indemnification

Cloud computing provider should indemnify customer for IP claims based on technology or content providedfor IP claims based on technology or content provided by vendor

Customer should indemnify cloud computing vendor for:Customer should indemnify cloud computing vendor for:– IP claims based on content submitted by users

– Claims that storage, processing, display of content violates any law or third-party right (especially privacy)

80

Page 81: Cloud Computing: Managing the Legal Risks

Legal Issues – Reliability & Availability

Service Levels– Multi-tenancy motivates provider to deliver high availabilityMulti tenancy motivates provider to deliver high availability

– If service unavailable for one, almost certainly unavailable for many or all

– Effect on business will usually impose much greater discipline on vendor than contractual remedies

T d i t d t Trend is toward transparency

81

Page 82: Cloud Computing: Managing the Legal Risks

Legal Issues – Data Ownership, Access & Destruction

Explicit provisions as to who owns the data

Assurances as to ability to access data During the contract term– During the contract term

– After termination

– In a format that is usable

Obligation to destroy the data – After termination

– At any time if necessary (tricky multi-tenancy issues)

82

Page 83: Cloud Computing: Managing the Legal Risks

Legal Issues – Source Code Escrow

Escrow Agreements - Common in enterprise software license agreement where vendor ceases to supportlicense agreement where vendor ceases to support software

Makes sense in behind-the-customer-firewall model

Doesn’t make sense in multi-tenant model– Much more practical for customer to take its content and load itMuch more practical for customer to take its content and load it

in alternative service

83

Page 84: Cloud Computing: Managing the Legal Risks

Legal Issues – Other Customer Obligations

Self-Service – administrative function is customer role

Access to data – permissions profiles record or field levelAccess to data permissions, profiles, record or field level controls

Password security, no sharing of passwords

Responsibility for accuracy, quality, integrity and legality of customer’s content and means by which it acquired content

Use service in accordance with applicable laws

Not use service to store or transmit infringing, libelous, or th i l f l t ti t i l t totherwise unlawful or tortious material, or to store or

transmit material in violation of third-party privacy rights

84

Page 85: Cloud Computing: Managing the Legal Risks

Lora L. Fong, Esq.Managing Counselsalesforce.com, inc.


Recommended