SlideShare una empresa de Scribd logo
1 de 37
“Partly Sunny with a Chance of Rain”: Forecasting the Legal Issues in Cloud Computingby:Thomas A. Kulik, PartnerScheef & Stone, L.L.P.Dallas Bar Association – Computer Law SectionSeptember 27, 2010 
About the Presenter Tom Kulik is a Partner in Scheef & Stone, L.L.P. and chairs the firm’s Intellectual Property Practice Group out of its headquarters in Dallas, Texas.  With an understanding of how intellectual property assets influence business, he strategically counsels clients on matters involving the evaluation, acquisition, development and protection of intellectual property rights, with an emphasis on creatively leveraging such assets both domestically and internationally. Prior to matriculation in law school, he was an award-winning systems engineer for 3Com Corporation, where he was responsible for local and wide-area network architecture and design supporting both Fortune 500 and start-up companies in the computer services, financial and pharmaceutical industries.  Leveraging this industry experience, his practice focuses on intellectual property transactions, particularly within the context of the computer software, emerging Internet technologies and e-commerce, and includes an extensive trademark preparation and prosecution practice and attendant intellectual property litigation. 
What is the “Cloud”?... 
…and What is “Cloud Computing”? “SaaS”      “PaaS” “IaaS” 
  “Cloud Computing” – A Hazy Phrase for a Foggy (Evolving) Concept “As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier…[but essentially] encompasses any subscription-based or pay-per-use service  that, in real time over the Internet, extends IT's existing capabilities.” What Cloud Computing Really Means, Eric Knor & Galen Gruman, InfoWorld, 2009 
“Cloud Computing” Definition – The National Institute of Standards and Technology  “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of fiveessential characteristics, threeservice models, and fourdeployment models.” The NIST Definition of Cloud Computing, Peter Mell and Tim Grance, Version 15, October 7, 2009 
“Cloud Computing”- Essential Characteristics ,[object Object]
Broad network access – services available through the network to cellphones, PDAs, laptops, iPads, etc.
Resource pooling– dynamic assignment of physical andvirtual computing resources
Rapid elasticity – quick scale-out/scale-in – seamless and seemingly unlimited to the user
Measured Service – automatic control to optimize management of resources (storage, processing, bandwidth, accounts)
“Cloud Computing” – Service Models ,[object Object]
External software hosting in a cloud infrastructure
Platform-as-a-Service (“PaaS”)
Think “SaaS-plus” – computing platform and “solution stack” for building and running custom applications by the user
Infrastructure-as-a-Service (“IaaS”)
Data processing, storage, network and other fundamental computing resources in cloud infrastructure
Examples of Cloud Services from Cloud Service Providers” (“CSPs”) ,[object Object]
Amazon Elastic Compute Cloud (EC2), Amazon S3, Rackspace
Software-as-a-Service (“SaaS”)
Google Apps, Zoho, Facebook Applications
Platform-as-a-Service (“PaaS”)
SalesforceAppExchange, Google AppExchange
“Cloud Computing” – Deployment Models ,[object Object]
Used solely by/operated solely for the organization
Community Cloud
Used by/operated for multiple organizations tied to a “specific community” with “shared concerns”
Public Cloud
Owned by CSP providing cloud services to the public
Hybrid Cloud
Composition of 2 or more distinct clouds “bound together by standardized or proprietary technology that enables data and application portability” 
“Cloud Computing” – Definition in a Nutshell A fully-scalable service for processing and storing data using third-party shared resources, software and information accessible over a network (i.e. the Internet), and provided to computers and other devices on-demand: ,[object Object]
May be pay-per-use
Even free!
Why the Cloud Model? A “Perfect Storm”  Economics - IT capital cost pressures pushing for better ROI More for Less - Technological Innovation is permitting: Better communications bandwidth availability Improved microprocessor/bus speeds Increased storage capabilities “Virtualization” – easier for CSPs to maximize infrastructure for the services provided and offload much IT management 
The Legal Considerations in Cloud Computing:  More Than A Drizzle… ,[object Object]
Contractual Considerations

Más contenido relacionado

La actualidad más candente

Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller SolicitorBrian Miller, Solicitor
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_lawbsookman
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...University of Technology, Sydney
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSAnchises Moraes
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesCassie McGarvey, JD
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 

La actualidad más candente (20)

Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
UTSpeaks: Clearing up the Cloud - How should we navigate the pitfalls of IT’s...
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Cloud security - Publication
Cloud security - Publication Cloud security - Publication
Cloud security - Publication
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
softwss
softwsssoftwss
softwss
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 

Similar a Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Computing

Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...lisaabe
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentationjohnjamesahearn
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computingKashif Bhatti
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Cloud computing
Cloud computingCloud computing
Cloud computinghundejibat
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')DLA Piper Nederland N.V.
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 

Similar a Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Computing (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
Cloud computing: 'everything you always wanted to know (but were aftaid to ask')
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 

Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Computing

  • 1. “Partly Sunny with a Chance of Rain”: Forecasting the Legal Issues in Cloud Computingby:Thomas A. Kulik, PartnerScheef & Stone, L.L.P.Dallas Bar Association – Computer Law SectionSeptember 27, 2010 
  • 2. About the Presenter Tom Kulik is a Partner in Scheef & Stone, L.L.P. and chairs the firm’s Intellectual Property Practice Group out of its headquarters in Dallas, Texas.  With an understanding of how intellectual property assets influence business, he strategically counsels clients on matters involving the evaluation, acquisition, development and protection of intellectual property rights, with an emphasis on creatively leveraging such assets both domestically and internationally. Prior to matriculation in law school, he was an award-winning systems engineer for 3Com Corporation, where he was responsible for local and wide-area network architecture and design supporting both Fortune 500 and start-up companies in the computer services, financial and pharmaceutical industries.  Leveraging this industry experience, his practice focuses on intellectual property transactions, particularly within the context of the computer software, emerging Internet technologies and e-commerce, and includes an extensive trademark preparation and prosecution practice and attendant intellectual property litigation. 
  • 3. What is the “Cloud”?... 
  • 4. …and What is “Cloud Computing”? “SaaS” “PaaS” “IaaS” 
  • 5. “Cloud Computing” – A Hazy Phrase for a Foggy (Evolving) Concept “As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier…[but essentially] encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.” What Cloud Computing Really Means, Eric Knor & Galen Gruman, InfoWorld, 2009 
  • 6. “Cloud Computing” Definition – The National Institute of Standards and Technology “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of fiveessential characteristics, threeservice models, and fourdeployment models.” The NIST Definition of Cloud Computing, Peter Mell and Tim Grance, Version 15, October 7, 2009 
  • 7.
  • 8. Broad network access – services available through the network to cellphones, PDAs, laptops, iPads, etc.
  • 9. Resource pooling– dynamic assignment of physical andvirtual computing resources
  • 10. Rapid elasticity – quick scale-out/scale-in – seamless and seemingly unlimited to the user
  • 11. Measured Service – automatic control to optimize management of resources (storage, processing, bandwidth, accounts)
  • 12.
  • 13. External software hosting in a cloud infrastructure
  • 15. Think “SaaS-plus” – computing platform and “solution stack” for building and running custom applications by the user
  • 17. Data processing, storage, network and other fundamental computing resources in cloud infrastructure
  • 18.
  • 19. Amazon Elastic Compute Cloud (EC2), Amazon S3, Rackspace
  • 21. Google Apps, Zoho, Facebook Applications
  • 24.
  • 25. Used solely by/operated solely for the organization
  • 27. Used by/operated for multiple organizations tied to a “specific community” with “shared concerns”
  • 29. Owned by CSP providing cloud services to the public
  • 31. Composition of 2 or more distinct clouds “bound together by standardized or proprietary technology that enables data and application portability” 
  • 32.
  • 35. Why the Cloud Model? A “Perfect Storm” Economics - IT capital cost pressures pushing for better ROI More for Less - Technological Innovation is permitting: Better communications bandwidth availability Improved microprocessor/bus speeds Increased storage capabilities “Virtualization” – easier for CSPs to maximize infrastructure for the services provided and offload much IT management 
  • 36.
  • 41.
  • 42. Is a “multi-tenant” architecture – data stored on a virtual server that shares same physical server with other virtual servers
  • 43. Security dependent upon configuration of the virtual servers and API vulnerabilities
  • 44. Geographic distribution concerns – the “cloud” knows no boundaries
  • 45. Breach harder to detect & manage
  • 46. CSP may use third-party providers for elements of the service
  • 47. Audit trail across multiple platforms not necessarily integrated
  • 49.
  • 50. Trans-border flow of private information may trigger obligations
  • 51. U.S. laws far LESS restrictive than other countries (particularly the European Union)
  • 52. Liability for breach depends upon who controls the data versus mere data processors
  • 53. Many data privacy laws pre-date cloud computing capability
  • 54.
  • 55. Graham Leach Bliley Act - Financial institutions must have policies/procedures in place to protect “non-public personal financial information” from improper disclosure
  • 56. HIPAA/HITECH Act – “Covered entities” required to notify affected persons of breach of unencrypted “personal health information”
  • 57. FTC Safeguards Rule – Financial institutions required to have written security plan regarding customer’s private information
  • 58. FTC Red Flags Rule – Institutions holding credit accounts must have written identity theft program
  • 59. Stored Communications Act - protection from disclosure for emails and other private data that are in such electronic storage
  • 60.
  • 61. EU Data Protection Directive 95/46/EC – no transfer of data to countries OUTSIDE the EU unless they offer an “adequate level of protection” OR where exceptions apply...like the U.S. Safe Harbor List
  • 62. U.S. Department of Commerce negotiated a safe harbor framework with the European Commission to “bridge” differences in privacy protection with EU member states
  • 63. Certifying to the “safe harbor” will assure that EU organizations know that your company provides "adequate" privacy protection
  • 64.
  • 65. REVIEW CSP privacy policy AND security procedures for continuity with existing company procedures & guidelines (i.e. audit/reporting requirements, security breach notifications)
  • 66. IDENTIFY and SPECIFY data security controls at the software level (i.e. encryption, firewalls), as well as physical security
  • 67.
  • 68. Location of service/data NOT fixed, but distributed
  • 69. CSP owns the technology, NOT the user/company
  • 71. Risk allocation far more difficult to address
  • 72. No traditional software “license” – is an access model
  • 73. Little to no indemnity/infringement protection from CSP
  • 74. Limitation of liability may not cover anticipated risk
  • 75.
  • 76. Governing law/Venue always favors the CSP
  • 78. Usually no liability for damages whatsoever (data deletion, corruption, failure to access, etc.)
  • 79. Limited to No Warranty
  • 80. “AS-IS” or “as available”
  • 81. No warranty that service uninterrupted/error-free – limited to SLA, which may be inadequate
  • 82.
  • 83. CSPs usually reserve right to terminate unilaterally
  • 84. Data portability in event of termination? Avoid “lock-in”
  • 85. What is CSP goes bankrupt?
  • 87. Usually rely upon service credits in event of specified period of downtime, BUT credits mean little when the service is down!
  • 89. The Legal Considerations in Cloud Computing: Contractual Considerations Google Apps Examples: “Representations. …Google warrants that it will provide the Services in accordance with the applicable SLA.” “Disclaimers. EXCEPT AS EXPRESSLY PROVIDED FOR HEREIN, NEITHER PARTY MAKES ANY OTHER WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR USE AND NONINFRINGEMENT. GOOGLE MAKES NO REPRESENTATIONS ABOUT ANY CONTENT OR INFORMATION MADE ACCESSIBLE BY OR THROUGH THE SERVICE. THE SERVICE IS NEITHER DESIGNED NOR INTENDED FOR HIGH RISK ACTIVITIES. CUSTOMER ACKNOWLEDGES THAT THE SERVICES ARE NOT A TELEPHONY SERVICE AND THAT THE SERVICES ARE NOT CAPABLE OF PLACING OR RECEIVING ANY CALLS, INCLUDING EMERGENCY SERVICES CALLS, OVER PUBLICLY SWITCHED TELEPHONE NETWORKS. 
  • 90. The Legal Considerations in Cloud Computing: Contractual Considerations Google Apps Examples: “Limitation on Indirect Liability.NEITHER PARTY WILL BE LIABLE UNDER THIS AGREEMENT FOR LOST REVENUES OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES, EVEN IF THE PARTY KNEW OR SHOULD HAVE KNOWN THAT SUCH DAMAGES WERE POSSIBLE AND EVEN IF DIRECT DAMAGES DO NOT SATISFY A REMEDY.” “Limitation on Amount of Liability.NEITHER PARTY MAY BE HELD LIABLE UNDER THIS AGREEMENT FOR MORE THAN THE AMOUNT PAID BY CUSTOMER TO GOOGLE DURING THE TWELVE MONTHS PRIOR TO THE EVENT GIVING RISE TO LIABILITY. “Governing Law. This Agreement is governed by California law, excluding that state’s choice of law rules. FOR ANY DISPUTE RELATING TO THIS AGREEMENT, THE PARTIES CONSENT TO PERSONAL JURISDICTION IN, AND THE EXCLUSIVE VENUE OF, THE COURTS IN SANTA CLARA COUNTY, CALIFORNIA. “ 
  • 91.
  • 92. REVIEW service levels/credits with a wary eye – may NOT be enough to cover for impact of downtime on business
  • 93. MUST address data export capabilities and ensure compatibility with business continuity and DR plan
  • 95.
  • 96. Trade secrets issues – inconsistent with cloud model?
  • 97.
  • 98. Remote storage DVR system held not to be a violation of U.S. copyright law (See Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F.3d 121 (2nd Cir. 2008), cert. den’d129 S.Ct. 2890 (2009))
  • 99. Opens door for Digital Entertainment Content Ecosystem (DECE) – a.k.a. “Ultraviolet” - purchase content once, then view in many formats and on many devices from cloud-based account
  • 100.
  • 101.
  • 102. REVIEW any legacy system tie-in to cloud for license compliance
  • 103. RETHINK placing trade secret information within the cloud – law is evolving here
  • 104.
  • 106. Data may be housed in multiple countries
  • 107. CSPs may use 3P providers
  • 109. Enforceability – multiple countries vs. governing law
  • 110. Country where data is resident in computer facility – governmental access?
  • 111.
  • 112. Unlike outsourced solutions, users may not know what infrastructure they are using or the physical location of data
  • 113. CSP may be able to retrieve the data, but NOT know where your data is for the purpose of a litigation hold
  • 114. CSP may use third-party service providers for elements of services provided to the user, exacerbating the issue
  • 115. Courts may NOT distinguish servers in the “cloud” from ones in direct possession
  • 116.
  • 118. Where CSPs use 3P providers – greater danger
  • 120. Data at rest – MUST be free from corruption
  • 121. How to ensure NO CHANGE to data upon hold?
  • 122. Standard CSP agreements do NOT account for possibility of ESI preservation by default
  • 123.
  • 124. DEMAND accountability for handling of ESI
  • 126. Acknowledge compliance with litigation holds
  • 127. STRONGLY CONSIDER a separate agreement
  • 128.
  • 129. Considerations are more delicate for law firms due to client confidentiality obligations, privilege, etc.
  • 130. Bottom line: it is available, but is it ethical?
  • 131.
  • 132. 2 states: Use of CSPs for storage of client files so long as a reasonable standard of care is exercised:
  • 133. NJ: N.J. Sup. Ct. Advisory Comm. On Professional Ethics, Opinion 701 (2006)
  • 134. NV: Nev. State Bar Standing Commission on Ethics and Prof. Responsibility, Formal Opinion 33 (2006)
  • 135. More on the way
  • 136. North Carolina Proposed 2010 Formal Ethics Opinion 7, “Subscribing to Software as a Service While Fulfilling the Duties of Confidentiality and Preservation of Client Property” (April 15, 2010)
  • 138.
  • 139. MUST be knowledgeable about CSP handling of data
  • 140. MUST contract with CSP to preserve confidentiality/security of data
  • 141. Transposing the “reasonableness” standard from “brick & mortar” to the “cloud” not as easy as you may think:
  • 142. Security – client confidentiality requires strong contractual protections
  • 143. Backups – MUST think about IaaS infrastructure
  • 144. Data access – SLA service credit should NOT be sole remedy
  • 145. Portability – Transfer of data in event of termination crucial
  • 146. Bankruptcy of CSP – how to account for possibility?
  • 147.
  • 148. Understand how the CSP will handle the data
  • 149. Don’t be afraid to ask questions – arguably have a duty TO ask them!
  • 150. Security should cover both software capabilities AND physical facilities
  • 151. Bottom Line: LET’S BE CAREFUL OUT THERE!…
  • 152. “Partly Sunny with a Chance of Rain”: Forecasting the Legal Issues in Cloud Computing Email: tom.kulik@solidcounsel.com LinkedIn: www.linkedin.com/in/tkulik Twitter: www.twitter.com/TomKulik (@TomKulik) Blog: www.legalintangibles.com 

Notas del editor

  1. Narrow Definition: “virtual” servers on the InternetBroad Definition: Anything outside the VPN
  2. Community cloud shared concerns = mission, security requirements, policy, and compliance considerations Hybrid = cloud “bursting” for load balancing between clouds
  3. Cloud Computing providers expose a set of software interfaces or APIsthat customers use to manage and interact with cloud services.Provisioning, management, orchestration, and monitoring are allperformed using these interfaces. The security and availability ofgeneral cloud services is dependent upon the security of these basicAPIs.From authentication and access control to encryption andactivity monitoring, these interfaces must be designed to protect againstboth accidental and malicious attempts to circumvent policy.Furthermore, organizations and third parties often build upon theseinterfaces to offer value-added services to their customers.
  4. Psecond bullet: Liability for breach – Legislation (EU DPD) makes a distinction between a DATA CONTROLLER (party that defines the purpose AND means for data processing) vs. DATA PROCESSOR (a passive performer)-DATA CONTROLLER is liable toward DATA SUBJECTS-DATA CONTROLLER must choose between the right DATA PROCESSORS for the designated purpose, then negotiate appropriate contractual protection
  5. How is U.S. different than EU in handling data privacy?-The United States uses a statel approach that relies on a mix of legislation, regulation, and self-regulation. The European Union, however, relies on comprehensive legislation that, for example, requires creation of government data protection agencies, registration of databases with those agencies, and in some instances prior approval before personal data processing may begin.
  6. Risk Allocation:Some CSPs (i.e. Google) will provide a limited infringement indemnity; others will not or otherwise attempt to ”pass-through” risk from CSPs own 3P providersMay disclaim “high-risk” activities, but don’t define “high-risk”:Google Apps: EXCEPT AS EXPRESSLY PROVIDED FOR HEREIN, NEITHER PARTY MAKES ANY OTHER WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR USE AND NONINFRINGEMENT. GOOGLE MAKES NO REPRESENTATIONS ABOUT ANY CONTENT OR INFORMATION MADE ACCESSIBLE BY OR THROUGH THE SERVICE. THE SERVICE IS NEITHER DESIGNED NOR INTENDED FOR HIGH RISK ACTIVITIES. CUSTOMER ACKNOWLEDGES THAT THE SERVICES ARE NOT A TELEPHONY SERVICE AND THAT THE SERVICES ARE NOT CAPABLE OF PLACING OR RECEIVING ANY CALLS, INCLUDING EMERGENCY SERVICES CALLS, OVER PUBLICLY SWITCHED TELEPHONE NETWORKS. Bottom line: NOT your Grandma’s traditional outsourcing model!
  7. Avoid “lock-in” – CSP agreements characterized by shorter, subscription-based terms-Control termination triggers; prevent abrupt/uncontrolled terminationsRemember: “click-through” model for many CSPs will not account for certain elements – (i.e. source code escrow NOT part of the standard CSP agreement)-Make inter-operabiity an issue – ensure compatibility with own systems, customer systems, 3P systems and foreseeable future technologiesBankruptcy: Data may be treated as non-intellectual asset and subject to different rules than for copyrighted matter under Section 365(n)-What about personal information? Look to privacy policy, but may not be so clear depending upon the nature of the personal information
  8. Legacy model – many licenses prohibited use in a time-sharing or service-bureau environment – cloud model problematic where such restrictions ariseIP creation issues - For example, U.S. law dictates that a copyright vests in an author of an original work when such work is fixed in a tangible medium of expression. Where such works are created and saved by a foreign-national independent contractor for a client using software that resides on a server outside the U.S., whether the work is created under U.S. law, the copyright laws of a foreign territory or where the contractor is a national depend on a multitude of factors that will affect the rights vested in the client. -Remember: assignment of rights misses the pointTrade secrets – basically “CI-plus”, but must have policies/procedures in place that elevate the CI to trade secret status – how accomplished in the cloud?
  9. 2nd Circuit opinion - focused on Cablevision's proposed Remote Storage-Digital Video Recorder (RS-DVR) schematic, in which copies of a work in whole or in part were recorded on buffers prior to their being transmitted to customers' receiving equipment. The District Court presumed that those copies constituted the "embodiment" of the recorded work."The district court mistakenly limited its analysis primarily to the embodiment requirement," wrote Appeals Court Judge John M. Walker earlier today. "As a result of this error, once it determined that the buffer data was 'clearly . . . capable of being reproduced, i.e., that the work was embodied in the buffer, the district court concluded that the work was therefore 'fixed' in the buffer, and that a copy had thus been made."But buffers are temporary storage media, Judge Walker went on, designed only to harbor portions of files for a "transitory duration" -- in other words, just long enough to get the file transmitted and removed from memory. He cited an earlier court decision in favor of a repair service that had rescued a customer's hard drive, and in so doing had copied that customer's software -- allegedly illegally. Since the rescue copy was only for a "transitory duration," that court ruled, the duplication wasn't really a "copy" for practical purposes.In the case of RS-DVR, the transitory period was found to be no greater than 1.2 seconds. "While our inquiry is necessarily fact-specific, and other factors not present here may alter the duration analysis significantly," Judge Walker wrote, "these facts strongly suggest that the works in this case are embodied in the buffer for only a 'transitory' period, thus failing the duration requirement."So if the buffer doesn't truly constitute a copy, then the transmission doesn't constitute a "performance" of that copy.
  10. The Stored Communications Act ("SCA", 18 U.S.C. § 2701 et seq.) is widely thought to provide protection from disclosure for emails and other private data that are in such electronic storage. However, a less-known loophole in the SCA can permit stored information to be accessed without the author's permission and then divulged to competitors, to adversaries, to strangers, or to the general public, without liability under the SCA. The SCA provides that any person who intentionally accesses stored electronic communications without authorization or beyond the scope of his authorization is subject to civil and criminal penalties. 18 U.S.C. § 2701(a), (b). However, there are two important exceptions to this protection: Even if an author of a communication has not authorized a third party to access that communication, the SCA provides that this unauthorized third party is immune from liability if he/she was authorized to gain access by the provider of the electronic communications service --such as the ISP or the business the operates the network. The SCA further provides that an unauthorized third party is also immune if he/she has been given permission to access the communication by a user of the service on which the communication is stored -- such as a member of a private website, such as a MySpace page. This means that even if the author has not consented for anyone except for the recipients to access his/her private emails, a lot of people could still be looking at them, copying them and doing whoknowswhatelse to them -- with SCA-immunity.
  11. Example:- CSP houses data across multiple servers in multiple countries-Subcontracts with 3P providers for facilities (i.e. disaster recovery) as well as peak-load surge demand for excess capacityIf breach – who is responsible?
  12. Litigation:Plaintiff’s perspective: who do you serve the litigation hold on?Defendant’s perspective will the hold be acted upon in time? Do my 3P vendor contracts cover this possibility?
  13. Litigation:Plaintiff’s perspective: who do you serve the litigation hold on?Defendant’s perspective will the hold be acted upon in time? Do my 3P vendor contracts cover this possibility?
  14. Why “it depends”-Seems that a “reasonable standard of care” applies, but little guidance on what is reasonable
  15. Why “it depends”-Seems that a “reasonable standard of care” applies, but little guidance on what is reasonable
  16. Why “it depends”-Seems that a “reasonable standard of care” applies, but little guidance on what is reasonable