Presenting a live 90‐minute webinar with interactive Q&A Cloud Computing: Managing the Legal Risks Mitigating Liabilities in Outsourcing Virtual Storage and Applications T d ’ f l f 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific TUESDAY, MARCH 29, 2011 T oday’ s faculty features: Janine Anthony Bowen, Partner, Jack Attorneys & Advisors, Atlanta Daniel A. Masur, Partner, Mayer Brown, Washington, D.C. Lora L. Fong, Managing Counsel, Salesforce.com, Inc., New York The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Presenting a live 90‐minute webinar with interactive Q&A
Cloud Computing: Managing the Legal RisksMitigating Liabilities in Outsourcing Virtual Storage and Applications
Janine Anthony Bowen, Partner, Jack Attorneys & Advisors, Atlanta
Daniel A. Masur, Partner, Mayer Brown, Washington, D.C.
Lora L. Fong, Managing Counsel, Salesforce.com, Inc., New York
The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.
Conference Materials
If you have not printed the conference materials for this program, please complete the following steps:
• Click on the + sign next to “Conference Materials” in the middle of the left-hand column on your screen hand column on your screen.
• Click on the tab labeled “Handouts” that appears, and there you will see a PDF of the slides for today's program.
• Double click on the PDF and a separate page will open. Double click on the PDF and a separate page will open.
• Print the slides by clicking on the printer icon.
Continuing Education Credits FOR LIVE EVENT ONLY
For CLE purposes, please let us know how many people are listening at your location by completing each of the following steps:
• Close the notification box
• In the chat box, type (1) your company name and (2) the number of attendees at your location
• Click the blue icon beside the box to send
Tips for Optimal Quality
S d Q litSound QualityIf you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection.
If the sound quality is not satisfactory and you are listening via your computer speakers, you may listen via the phone: dial 1-888-450-9970 and enter your PIN when prompted Otherwise please send us a chat or e mail when prompted. Otherwise, please send us a chat or e-mail [email protected] immediately so we can address the problem.
If you dialed in and have any difficulties during the call, press *0 for assistance.
Viewing QualityTo maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key againpress the F11 key again.
Cloud Computing:Managing the Legal RisksManaging the Legal RisksPrimer and Risk Mitigation
Cloud Computing Pl i E li h D fi i iPlain English Definition
• From the User’s Perspectivep– Data processing and storage, application development, and software hosting over the Internet instead of on a personal computer or over a business’ network
– Available on an ‘on demand’ basis
– Location of information stored ‘in the Cloud’ is potentially unknown at any given point in timeat any given point in time
– Relatively inexpensive
7
National Institute of Standards & Technology’s DefinitionStandards & Technology s Definition
• Cloud computing is a model for enabling convenient, on‐demandp g gnetwork access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities (the Mayer Brown Practices). The Mayer Brown Practices are: Mayer Brown LLP, a limited liability partnership established in the United States; Mayer Brown International LLP, a limited liability partnership incorporated in England and Wales; JSM, a Hong Kong partnership, and its associated entities in Asia; and Tauil & Chequer Advogados, a Brazilian law partnership with which Mayer Brown is associated. The Mayer Brown Practices are known as Mayer Brown JSM in Asia. “Mayer Brown” and the Mayer Brown logo are the trademarks of the Mayer Brown Practices in their respective jurisdictions.
@ y
Top SecretThe Real Value of Cloud Computing!e ea a ue o C oud Co pu g
1
Contracting for Cloud Computing ServicesThe Road to the Cloud!
2
Breadth of Cloud-Based Offerings
“Nice to have” business tools
Routine, non‐sensitive data
Limited scope of business use Mission critical applicationsLimited scope of business use pp
Regulated or business sensitive data
Enterprise‐wide use
Each end of the spectrum presents different legal and contractual challenges, options and trade‐offs
12
Cloud Customers Must Make Informed Tradeoffs
Th i d d “f ” h ill k f•There is no standard contract “form” that will work for each situation
– Traditional outsourcing and software licensing terms may be useful, but can not be inflexibly applied to cloud computing
•More robust contractual protection may or may not be the correct answer — it dependscorrect answer it depends
•Prospective cloud customers must take into account– Criticality of the software, data and services in question
U i i i d i h l d i– Unique issues associated with cloud computing– Availability and pricing of various alternatives
•For “nice‐to‐have” business tools or routine data, a low cost solution may outweigh contractual protections
•Requiring robust contractual protections may increase the price and eliminate certain providers altogetherprice and eliminate certain providers altogether
16
Key Issues in Cloud Computing
17
“…more than 75 percent of senior business leaders believe that safety, f y,security and privacy are top potential risks of cloud computing.” risks of cloud computing.
Brad Smith, GC, Microsoft
18
Issues with Cloud ComputingPrivacy and Security — the Elephant in the Roomy y p
•Data transfer issues (EU and similar jurisdictions)( j )
•Data location issues•Location of users accessing data•Movement and storage of data•Use of subcontractors•Use of multiple platforms•Use of multiple platforms•Lack of transparency and control
•Data breach issues•Data destruction issues
b l d•Ability to impose security and privacy requirements
19
Issues with Cloud Computing Privacy and Security — USy y
•Gramm‐Leach‐Bliley Act (GLBA) • Federal Trade Commission Act (FTCA)•Health Insurance Portability and
Accountability Act (HIPAA)
•Health Information Technology
Act (FTCA)
• ID Theft Red Flags
• State Privacy Security LawsHealth Information Technology for Economic and Clinical Health (HITECH)
State Privacy Security Laws (Breach Notification — 46 States and Encryption (MA and NV), use of SSN’s etc )• Fair Credit Reporting
Act/FACT Act
use of SSN s, etc.)
• Industry Standards (PCI)
• Litigation and enforcement cases• Litigation and enforcement cases
20
Issues with Cloud Computing Privacy and Security — USy y
•General security of personal information laws (e.g., Arkansas, California, Indiana, Maryland, Massachusetts, Nevada, Rhode Island, Texas and Utah).
•Standard: reasonable security procedures and practices appropriate to the nature of the information.pp p
•Massachusetts regulations far exceed most other laws and regs. – Create duty to protect and have detailed system requirements– Require a written security programRequire a written security program– Requires that companies oversee service providers by selecting providers who
are capable of maintaining appropriate security measures consistent with the MA regsR i h i id i h i l d– Requires that service provider contracts require them to implement and maintain appropriate security measures
– Requires encryption of personal information across public networks, wireless networks and portable devices (laptops, hard drives, etc.)
16
Issues with Cloud ComputingPrivacy and Security — Non-USy y
In EEA and other jurisdictions where data protection and data transfer regulation is strict cloud computingdata transfer regulation is strict, cloud computing challenges and issues increase
21
Issues with Cloud ComputingPrivacy and Security — Non-USy y
•Transfers of personal data out of EU are highly regulated.
•Even viewing data outside of EU is a transfer.
•Very few countries are approved for data transfers (Norway, Liechtenstein, Iceland, Switzerland, Argentina, Canada, Isle of Man, Jersey, Guernsey, Faeroe Islands) .
•EU approved clauses (controller to processor) are the•EU approved clauses (controller to processor) are the most common means of transferring data between companies and service providers.
•EU recently updated the clauses to require that processors obtain prior written consent of controllers before using sub‐processors.
Other Critical Contracting Issues for Cloud Customers
Regulatory and Compliance Challenges
Other Key Issues and Challenges
•Auditability
•Lack of transparency and
•Service levels
• Disaster recovery and control
•Subcontracting and flow d f i i
business continuity
• Intellectual property issuesdown of provisions
•Export control issues• Change management issues
• Exit rights•Electronic discovery issues
•Record retention issues• Financial stability of providers/due diligence
22
Cloud ComputingSo now what? Can we even do this?
23
Contracting for Cloud ComputingYES!
•Keep your eye on
– Criticality of the software, data and services
U i i i d– Unique issues associated with cloud computing
– Availability and pricing of– Availability and pricing of various alternatives
•Look to traditional outsourcingLook to traditional outsourcing contracts and software and data use agreements as a good starting point
24
Cloud Computing Case StudyLos Angeles – CSC/Google Contractg / g
•Establish and maintain robust information
•Data access limited to U.S. citizens with high levelrobust information
security program
•Clearly defined
citizens with high‐level security clearances
•Notice of data/security•Clearly defined data ownership
•Private cloud for
•Notice of data/security requests and breaches
•Service Levels with•Private cloud for sensitive data
•Mandatory data encryption
•Service Levels, with meaningful penalties
•E‐Discovery functionalityMandatory data encryption
•Data storage only in U.S.
E Discovery functionality
26
Case StudyLos Angeles – CSC/Google Contract, cont’dg / g ,
•Mandatory subcontractor flow down
•Broad indemnification obligation with unlimitedflow down
•Broad audit rights. Including annual SAS 70
obligation, with unlimited liability for certain breaches
•Clearly defined exit rightsIncluding annual SAS 70 audit at provider expense
•Disaster recovery –
•Clearly defined exit rights, including retention and delivery of data at no charge•Disaster recovery –
data/service restoration within 4 hours
Source: “The City of Los Angeles Steps into the Cloud,” Randy Gainer27
Questions?
30
Minimizing and Mitigating Risks
•AgendaAgenda– Considerations in Vendor Selection
– Contracting Models
– Impact of Industry StandardsStandards
31
Why not just rely on the contract? Who you are drives what you can expect
• Cloud users should clearly understand what they are getting and y y g ggetting into:– Generally speaking, only the largest implementations get negotiated contract terms
– No negotiation likely in most cases – risk mitigation analysis should establish ‘business level’ comfort
•Where negotiation is possible risk mitigation should drive negotiation•Where negotiation is possible, risk mitigation should drive negotiation of key provisions
3232
But first, how’s cloud computing different?
•Geography – Data in the cloud can be anywhere; multiple copies can be in multiple locations
• The potential for brokering capacity exists, this is ‘surge computing’
• In current state of play cloud providers assume virtually no liability – all i k id ith thrisk resides with the user
•Difficult for a user to know where liability rests, even if it were properly assigned
• The nature of the potential legal issue depends on where a user plugs into the cloud
•Virtually complete loss of control by data owner (who holds it and where•Virtually complete loss of control by data owner (who holds it and where is it?)
•Relatively inexpensive OPEX instead of CAPEX
33
Quick List of Potential Mitigation ConsiderationsConsiderations
Functionality of solution Pricing
Uptime Response time
Quality of service Data Security/Privacy
Backup and disaster recovery Integration with existing systems
Data access Customer service/support
Adapted from “Evaluating SaaS Solutions: A Checklist for Small and Mid‐sized Enterprises”p g phttp://www.saugatech.com/thoughtleadership/TL_October2009_Eval_SAP.pdf
34
Some Areas of Concern
•Service quality/SLAs/Availability
•Disaster recoveryDisaster recovery
•Provider competence
•Provider Viability
3535
Mitigation Considerations:SLAsSLAs
• Control‐oriented– System availabilityy y– System response time– Fail‐over for disaster recovery
•Operations‐oriented– Data retrieval– Data integrityT iti i t– Transition assistance
•Business‐orientedError resolution time– Error resolution time
– Timeliness re: professional services around cloud solutions
• Provider track record of success?•Views of commentators/bloggers•Views of commentators/bloggers• Is the pricing right for the breadth of offering?• Perceived level of sophistication of the vendor (e.g. over the phone, email))– Knowledge of industry– Knowledge of the business
• If vendor is an early stage company, who is supporting it financially?•Does the site look sophisticated or sophmoric?•Are there integration partners?
3838
Mitigation Considerations: Vi bilit f th Cl d P idViability of the Cloud Provider
•Viability matters. Why? A cloud user makes an investment when choosing cloud provider. For example:– Integrating cloud services into business processes
– Migrating data from its environment
• Lack of standardization makes moving to a new cloud provider difficult
Wh t h t l d ’ d t i th t f•What happens to a cloud user’s data in the event of:– Bankruptcy
– M&A
– Escrow
39
Cloud Contracting Preliminaries:Cloud vs Outsourcing vs ASPCloud vs. Outsourcing vs. ASP
Limits Placed on Yes Very little or no Yes Risk shared byLimits Placed on Provider’s Liability
Yes. Very little or no liability to provider.
Yes. Risk shared by provider and user.
Ri k i h E f B b B bRisk in the Event of Problems
Born by user. Born by party responsible.
42
Cloud Contracting Models:Terms of Use & Privacy PolicyTerms of Use & Privacy Policy
• The Privacy Policy and Terms of Use specify the privacy protections in place as well as the terms under which the services are offered
•Mini Case Study – Google’s Terms and Privacy Policy– User grants content license – Google can modify the content to deliver the service
– User’s use of services is ‘as is’ and ‘as available’
– No liability for user’s damages, including for deletion, corruption, or failure to store a user’s data
– Effect on a Gmail user is one consideration, but what about a Google Apps (PaaS) user?
43
Impact of Industry Standards
•What standards applicable to cloud computing exist?– Payment Card Industry Data Security Standards
•A set of requirements for enhancement of payment account data security– ISO 27000 Series Standards
•An information security standard that provides best practices for those o at o secu ty sta da d t at p o des best p act ces o t oseimplementing an information security management system
– Open Cloud Manifesto
•Basic premise is that cloud computing should be open like other technologies (e.g. use open source technologies) to enhance ability: (a) for a user to transfer to a new provider, (b) for companies to work together, and (c) to speed and ease integrationspeed and ease integration
44
Take Aways
• Be thoughtful about which parts of your business are cloud‐worthyof your business are cloud worthy. All business processes are not suitable.
• Have a plan to deal with mistakes pthat will happen in the cloud (business, technology, legal). What level of risk can you tolerate?
•Work with your key internal and external advisors to think through
l d Ayour cloud strategy. A cross‐functional strategy is in order.
4545
Q&AContact MeContact Me
•Janine Anthony Bowen, Esq., CIPPJanine Anthony Bowen, Esq., CIPPjbowen@jack‐law.comwww.visualcv.com/jdabowenwww linkedin com/in/jdabowenwww.linkedin.com/in/jdabowen
•678‐823‐6611
•Twitter ‐@cloudlawyer
•www.jack‐law.com
4646JACK Attorneys & Advisors: Technology/IP Law & the Business of Technology ‐ Quite Simply, We Get It.
Chatter - Collaboration CloudCollaboration apps and platform. Work with colleagues—real time.
Force.com - Custom Cloud 2The leading cloud platform for custom application development
49
Agenda
– Technology model
– Key legal issues and contracting strategiesy g g g
50
Technology Model
Ten Year Computing Cycles10x more users with each cycle
2000s Mobile Cloud Computing2000s Mobile Cloud Computing
1990 D kt Cl d C ti1990s Desktop Cloud Computing
1980s Client/server Computing
1970 Mi i C ti
1980s Client/server Computing
1970s Mini Computing
1960s Mainframe Computing
52
Next Generation Devices Changing How We Access the Internet
Device Shipments
Tablets
Smartphones
Mobile PCs
Desktop
Mobile PCs
Source: Gartner Research; Smartphone, Tablet, and PC Forecast, December, 2010.
53
Social Networking Surpasses Email
Email Users
Social Networking Users
Source: Comscore, 2010
54
Fundamental Shift in Cloud Computing
Easy . Fast . Low Cost Social . Mobile . Open
55
What’s in the Cloud?
Traditionally Managed On-Premise– ServersServers
– OS
– Application software
– Development environment
– Upgrade/Maintenance
– Security
– Backup
Disaster Recovery/BCP– Disaster Recovery/BCP
56
NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)
Cloud computing is a model for enabling convenient, ondemand network access to a shared pool ofdemand network access to a shared pool ofconfigurable computing resources (e.g., networks,servers, storage, applications, and services) that can beg pp )rapidly provisioned and released with minimalmanagement effort or service provider interaction. Thiscloud model promotes availability and is composed offive essential characteristics, three service models, andf d l t d lfour deployment models.
57
NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)
Five Essential Characteristics1 On-Demand Self-Service: Consumer provisions computing1. On Demand Self Service: Consumer provisions computing
capabilities without provider intervention
2. Broad Network Access: Accessible via standard mechanisms promoting use by various “client” platforms (smart phones, pdas, tablets, laptops)\
3 Resource Pooling: Provider resources pooled using multi-3. Resource Pooling: Provider resources pooled using multitenant model to serve multiple consumers.
4. Rapid Elasticity: scale up, scale down
5. Measured Elasticity: control and optimization with metrics on resource consumption/allocation
58
NIST Definition – 3 Service Models (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)
Software as a Service (SaaS)– Provider’s applications, infrastructure
– Accessible via client devices over web browser interfaceAccessible via client devices over web browser interface
– Consumer doesn’t manage or control infrastructure
– Consumer may have configurable application settings (e.g. user permissions)
Platform as a Service (PaaS)Platform as a Service (PaaS)– Consumer created or acquired applications
– Use of programming languages & tools supported by cloud provider
– Consumer control over deployed applications
– Provider managed infrastructure
Infrastructure as a Service (IaaS)( )– Consumer capability to provision processing resources
– Consumer able to deploy arbitrary software (OS, Apps)Consumer able to deploy arbitrary software (OS, Apps)
59
NIST Definition - 4 Deployment Models(Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)
1. Private Cloud – operated by a single organization
2. Community Cloud –shared by multiple organizations
3. Public Cloud – available to general public
4 Hybrid Cloud – two or more distinct clouds bound together4. Hybrid Cloud two or more distinct clouds bound together
60
NIST Definition of Cloud Computing (Authors: Peter Mell and Tim Grance, Version 15, 10-7-09)
Three Features of “Mature” SaaS Applications
Scalability Scalability– 1 to N users
Multi-Tenancy Multi-Tenancy– One code base supporting multiple logical instances
Metadata driven ConfigurabilityMetadata driven Configurability– Users configure via metadata vs. application code changes
61
Multi-Tenancy Makes Public Cloud Computing Possible
Single-Tenant (O P i H t d)
Multi-Tenant(On-Premise or Hosted)
D di t d A St k f E h O Si l St k f AllDedicated App Stack for Each Application
One Single Stack for All Applications
62
Metadata: How Multi-Tenant Services Deliver a Unique Experience to Every CustomerUnique Experience to Every Customer
90,000+ Customers
11 Million + 100+ M
Salesforce A
ISV Apps 850
Custom Apps 100k+
Metadata11 Million +
Customizations100+ M
Integration Calls / Day
Apps 850+ 100k+
31+ major upgradesj pgCustomizations, Integrations and apps run on the latest release automatically
63
Cloud ComputingLiberates the Consumer from IT Burdens
...By using cloud services, the Federal Government will gainaccess to powerful technology resources faster and at loweraccess to powerful technology resources faster and at lowercosts. This frees us to focus on mission-critical tasks insteadof purchasing, configuring, and maintaining redundantinfrastructure. The Obama Administration is committed toleveraging the power of cloud computing to help close thetechnology gap and deliver for the American peopletechnology gap and deliver for the American people..
Vivek Kundra, the U.S. government’s first Chief Information Officer.http://www.whitehouse.gov/blog/2010/05/13/moving-cloud (emphasis added)
– Economies of scale• (e.g. salesforce.com supports approximately 83,000 customers
currently on only 1 500 Dell PCs plus an additional 1 500 forcurrently on only 1,500 Dell PCs, plus an additional 1,500 for redundancy/Disaster Recovery etc.).
65
Faster Rollouts and Innovation
Faster implementation of applications
Faster Vendor Innovation Faster Vendor Innovation
Flexibility and scalability to serve companies of all sizes (1 – X users)(1 – X users)
Code base developed, maintained, enhanced by the providerprovider
• Upgrades tested and deployed
• Security
A dit hi t t ki• Audit history tracking
• Tuning
• Backups
• Disaster Recovery
66
The Cloud Serves Companies of Every Size
ENTERPRISE
MID-MARKET
SMALL BUSINESS
67
Subscription Model
Fixed # of Users / Period / Product
For customerSubscription
For customer– Minimal up-front investment
– FlexibilityFlexibility
For vendor– Financial predictabilityp y
– Cash flow
Pricing – Provider may discount for greater commitment
68
Contracting in the Cloud
Legal Issues – No Software License if Outside Customer’s Firewall
Inside customer’s firewall– Licensing modelLicensing model
– Software license seeks to avoid first sale doctrine (allows purchaser to sell or give away a copy of a copyrighted work
once lawfully obtained)
Outside customer’s firewallN i di t ib t d i l d ti th f ft– No copies distributed in cloud computing, therefore no software license needed
– Cloud computing is a “service” that is “provided” or “made p g pavailable” to customer (SaaS, PaaS, IaaS)
70
Legal Issues - Maintenance & Support
On premises model typically requires customer to purchase maintenance or support in addition topurchase maintenance or support in addition to software license
Multi-tenancy model may or may not include– Functional enhancements, upgrades, pg
– Fixes, patches
– User support
71
Legal Issues – Data Privacy & Security
Best Practices– Transparency:Transparency:
• explain their information handling practices
• disclose the performance and reliability of their services
– Use Limitation.• Provider disclaims ownership rights in customer data
• Use customer data only as their customers instruct them or to fulfill• Use customer data only as their customers instruct them or to fulfill their contractual or legal obligations.
– Disclosure.• Provider discloses customer data only if and to extent legally
require & provide affected customers prior notice of any such compelled disclosure if permitted.
72
Data Privacy & Security Best Practices (cont.)
– Security Management System. • Provider maintains robust security management system that is
based on an internationally accepted security framework (e.g.ISO 27001)27001)
– Customer Security Features. • Customers have configurable security features to implement in
their usage of the cloud computing services
– Data Location. • Provider should tell customers the countries in which customerProvider should tell customers the countries in which customer
data is hosted
73
Data Privacy & Security Best Practices (cont.)
Breach Notification. – Provider should notify customers of known security breaches that
affect the confidentiality or security of the customer data.
Audit Audit.– Provider should use third-party auditors to ensure compliance with its
security management system.
Data Portability.– Provider should make available to customers their data in an
industry-standard, downloadable format.y
74
Legal Issues – Liability Considerations
For cloud computing vendor, risk of data security breach outstrips all othersp
Multi-tenancy enables single incident to affect thousands of customers, changing risk calculus
Critical to think through worst-case scenarios, and re-think as company grows and evolves – Types of harm– Damages available– Settlement valuesSettlement values– Insurance coverage
75
Legal Issues – Limitation of Liability
Cloud computing provider must decide what it is willing to sustain in worst-case scenario and draft contractsto sustain in worst case scenario, and draft contracts accordingly
Will provider pay damages/settlements arising from 3dWill provider pay damages/settlements arising from 3d party claims, e.g. security breach/data loss fines/credit monitoring fees
Typically, provider will not cover consequential damages (i.e., customer’s lost profits) resulting from security breach
76
Legal Issues – Third-Party Applications
Trend: cloud computing platforms allowing applications from multiple sources to integrate and share datafrom multiple sources to integrate and share data
Assure consent to sharing of data
77
Legal Issues - Indemnification
In most technology contracts, key indemnity agreed to by providerby provider– IP infringement
In cloud computing, customer inputs content intoIn cloud computing, customer inputs content into provider’s systems– Provider doesn’t control, or often even see, customer content,
but hosts it
78
Legal Issues – Indemnification - CDA
Does Communications Decency Act§230 protect provider?– “No provider or user of an interactive computer service shall be treated
as the publisher or speaker of any information provided by another information content provider.”
– CDA § 230 "creates a federal immunity to any cause of action that would make service providers liable for information originating with a third-party user of the service…. [L]awsuits seeking to hold a service liable for its exercise of a publisher’s traditional editorial functions –such as deciding whether to publish withdraw postpone or altersuch as deciding whether to publish, withdraw, postpone or alter content – are barred.” Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997), cert. denied, 524 U.S. 937 (1998)
Doesn’t apply to IP infringement claims or claims outside U SDoesn t apply to IP infringement claims or claims outside U.S.
79
Legal Issues - Indemnification
Cloud computing provider should indemnify customer for IP claims based on technology or content providedfor IP claims based on technology or content provided by vendor
Customer should indemnify cloud computing vendor for:Customer should indemnify cloud computing vendor for:– IP claims based on content submitted by users
– Claims that storage, processing, display of content violates any law or third-party right (especially privacy)
80
Legal Issues – Reliability & Availability
Service Levels– Multi-tenancy motivates provider to deliver high availabilityMulti tenancy motivates provider to deliver high availability
– If service unavailable for one, almost certainly unavailable for many or all
– Effect on business will usually impose much greater discipline on vendor than contractual remedies
T d i t d t Trend is toward transparency
81
Legal Issues – Data Ownership, Access & Destruction
Explicit provisions as to who owns the data
Assurances as to ability to access data During the contract term– During the contract term
– After termination
– In a format that is usable
Obligation to destroy the data – After termination
– At any time if necessary (tricky multi-tenancy issues)
82
Legal Issues – Source Code Escrow
Escrow Agreements - Common in enterprise software license agreement where vendor ceases to supportlicense agreement where vendor ceases to support software
Makes sense in behind-the-customer-firewall model
Doesn’t make sense in multi-tenant model– Much more practical for customer to take its content and load itMuch more practical for customer to take its content and load it
in alternative service
83
Legal Issues – Other Customer Obligations
Self-Service – administrative function is customer role
Access to data – permissions profiles record or field levelAccess to data permissions, profiles, record or field level controls
Password security, no sharing of passwords
Responsibility for accuracy, quality, integrity and legality of customer’s content and means by which it acquired content
Use service in accordance with applicable laws
Not use service to store or transmit infringing, libelous, or th i l f l t ti t i l t totherwise unlawful or tortious material, or to store or
transmit material in violation of third-party privacy rights
84
Lora L. Fong, Esq.Managing Counselsalesforce.com, inc.