SlideShare una empresa de Scribd logo
1 de 28
Social Business = Cloud + Big Data
+ Social Media + Mobile Computing

  William A. Tanenbaum
         Chair, Technology, Intellectual Property & Outsourcing Group
         Chair, GreenTech and Sustainability Group
         Kaye Scholer LLP
         New York and Palo Alto Offices


   60758855.pptx
Overview

• Cloud + Big Data + Social Media + Mobile Computing = Social
  Business
• “Cloud of Clouds”
• New outsourcing
• Sustainability in mainstream companies and in supply chains
  will be IT-enabled and make use of Cloud
• Cloud vs. IT Outsourcing
• Security as a service
• BYOD to work (“bring your own device”)


        60758855.pptx         2
“Old” Business Data Aggregation

• Credit Reports
• Background Checks
• Financial industry reporting of trading activity




         60758855.pptx            3
New Data Aggregation

• What is new?
• Big Data – the three “V’s”
 – Volume
 – Velocity
 – Variety
• Computer “horse power” to handle volume
• Unstructured as well as structured data
• Social Media as Supply Chain
 – Measuring intensity
• User-provided information
         60758855.pptx         4
Hypothetical to Illustrate Key Issues
• Property management outsourcing hypothetical
• Underlying city map
• Building locations overlay
• Building interior/mechanicals overlay
• Maintenance records
• Mobile-to-Cloud
• Cloud to legacy records and vice versa
• Tenant PII
 – Leave vs. service agreement
 – Consent
        60758855.pptx            5
Key Issues – Continued
• Building sensors (and sensors to the Cloud)
 – Wired vs. IP addresses
• Track employee location
• Real-time truck re-routing
• Monitor employee efficiency
• Determine parts inventory levels
• Supply chain coordination for just-in-time repairs




        60758855.pptx           6
Key Issues – Continued
• Customer wants historical data to evaluate maintenance and
  provider performance (and number of skilled employees)
• Customer wants predictive analytics
• Customer wants real time dashboards
• Big Data needs data displays (need not be static)
• Provider wants data for fine-tuning SLA’s and pricing for future
  projects and employee training
• Predictive analytics tools/algorithms
• Different levels of data roll-ups


         60758855.pptx            7
Key Issues – Continued
• Multiple outsource providers and subcontractors and IT
  infrastructure providers
• Sustainability
 – Make buildings and units more energy and water-efficient
 – Electric vehicles
 – Trucks as “Rolling Storage Units” (“RSU’s”)
 – Power co-generation; solar/wind
• Portfolio of providers
• Cross-licenses
• Summary: need to know your data ecosystem

         60758855.pptx               8
Sources of Data
• Customer records
• Customer websites
• Business partners
• Third parties
• Internet tracking companies
• Social Media
• Company submissions to portals maintained supply chain
  customer or jointly in an industry
 – ROHS as illustrative
• Metadata
• Clouds used by employees on “BYOD”
         60758855.pptx          9
Owners vs. Licensing vs. Right of Access

• Cannot license data you do not own or in which you do not
  have sufficient license rights




        60758855.pptx         10
Customer Records

• Customer records and company’s own websites
 – Terms of Use and Consent
 – Click-through agreements
 – Challenges to enforceability




         60758855.pptx            11
Obtaining – and Proving – Consent

• Contracts of adhesion vs. expectations privacy and use
• Enforceability vs. number of screens
• How record and prove consent?
 – Electronic signatures?
 – E-Sign




         60758855.pptx         12
Business Partners and Third Party Data
Providers
• Anonymity
 – Is it anonymous if all companies use the same encryption hash?
   • Potentially an issue with health data in new health care electronic
     record ecosystems




         60758855.pptx               13
Internet Tracking Companies

• Web bugs are not the current controversy
• Health care as illustrative of sensitive issues
• FDA and FTC
• Representations, Warranties and Continuing Covenants
• Indemnities; termination remedies
• Consequential damages vs. specified direct damages




         60758855.pptx           14
Social Media

• Social media as supply chain




        60758855.pptx            15
New Role for HR Outsourcing

• Problem:
 – Potential HR legal liability from considering information reported on
   Facebook and other social networks
• Emerging Business Solution:
 – New role for Outsourcing
 – Outsource providers conduct social media background checks
 – Insulate HR departments




         60758855.pptx               16
Potential Outsourcing Issues

• Outsource providers retained to perform data analytics
• Results in datasets from multiple customers which can be
  combined to yield valuable data asset
• Outsourcing providers directly monetize or license data to
  third parties
• How can outsource customer protect against data collected
  for it and data analytics on such data being used by
  competitors?




        60758855.pptx          17
Customer’s Potential Solutions

• Assert ownership over data
• Assert exclusive rights over analytic tools
• Use contact to limit combination of datasets with those of
  other customers, public data, or other sources of data (or
  other sources)




        60758855.pptx           18
Outsourcing

• Portfolio model of outsource providers
• Need to structure to ensure data sharing
• Licensing rights back to each provider




        60758855.pptx          19
Revisiting Common NDA Provisions

• Fact Pattern: common exclusion of protection for public
  domain material
• Business Problem: information technically in the public
  domain needs to be maintained as private asset or protected
  because of regulatory obligations
 – EU PII; U.S. GLB, Health, FTC
 – Non-regulatory data constitutes business intelligence
• Solution: modify public domain




         60758855.pptx              20
Competitive Intelligence

• Business Problem: Competitive information can be
  inadvertently disclosed through identification in RFP’s of
  subcontractors and analytics tools
• Solutions:
 – Reduce scope of identification
 – Early stage use of confidentiality agreements




         60758855.pptx              21
Cross-License Data Agreements

• License terms for data
• Cannot license what do not own or have license rights to
• Scope of use limitations
• Negative covenants




        60758855.pptx          22
Defensive Use of Trade Secret Protection

• Wal-Mart and Sustainability Consortium
• Reporting requirements/requests
• Can adverse information be “shielded” by trade secret?
• SEC and financial statement reporting obligations
• Is this public data?




         60758855.pptx         23
Licensing and Outsourcing Terms

• Outsourcing: Draft RFP’s to contract schedules to review by
  subject matter experts
 – Regulatory compliance
• For IP ownership and documentation, complete pre-agreed
  upon assignment in recordable form, even if not recorded, and
  record with PTO or Copyright Office when advisable
• Audit rights
• Specific data deliverables
• Data Managers
• Timely notice of data claims

         60758855.pptx           24
Questions and Answers

William A. Tanenbaum
   Chair, Technology, Intellectual Property & Outsourcing Group
   Chair, GreenTech and Sustainability Group
   Kaye Scholer LLP, New York and Palo Alto
   wtanenbaum@kayescholer.com
   212-836-7661




        60758855.pptx           25
William A. Tanenbaum
wtanenbaum@kayescholer.com
William A. Tanenbaum is the international chair of Kaye Scholer’s Technology,
Intellectual Property & Outsourcing Group and its GreenTech and Sustainability
Group and works in the firm’s New York and Palo Alto offices. Chambers found
that he “built one of New York City’s most outstanding transactional IT practices,”
that he is a “well-respected attorney, with a well-informed approach [who] provides
litigation, transaction work and strategic counseling on a range of technology
issues,” that he is “efficient, solution-driven and makes excellent judgment calls,”
and that he is an “internationally recognized intellectual property, technology and
outsourcing lawyer”. He is recognized as a “Leading Individual” and was awarded
“Recommended” ratings in both “Technology and IT Outsourcing” and “Business
Process Outsourcing,” and named as a “Notable Practitioner” at the national level
in Outsourcing. He was voted one of the world’s top 250 IP strategists (IAM client
survey) and he was selected as one of the country’s top 25 pre-eminent IT
practitioners in the Best of the Best USA. He regularly advises clients on strategic
intellectual property concerns, privacy, data security, data transfer, information life
cycle management and competitive intelligence matters, in both transactional and
litigation contexts.

         60758855.pptx                   26
William A. Tanenbaum (cont’d)

 Mr. Tanenbaum is the founder and co-chair of PLI’s annual Outsourcing
 Conference, the founder and chair of its Green Technology conference, and a
 regular lecturer at industry outsourcing conferences. He chairs Kaye Scholer’s
 GreenTech breakfast seminar series and presents webcasts on IT, IP and
 GreenTech topics. He has contributed to Bloomberg’s Energy Sustainability Law
 Report. He is a past President of the International Technology Law Association
 (formerly the Computer Law Association) and is listed in Who’s Who in America,
 the International Who’s Who of Business Lawyers, the Guide to the World’s
 Leading Litigation Experts and the Guide to the World’s Leading Patent Law
 Experts. He is the privacy and data protection columnist for the New York Law
 Journal, co-author of a book on privacy law and has been quoted in The Economist
 magazine as an expert on IP law. His articles have been used at Harvard and
 other law schools. He graduated from Brown University (degree with highest
 honors and Phi Beta Kappa) and Cornell Law School.




         60758855.pptx                 27
Chicago . Frankfurt . London . Los Angeles . New York . Palo Alto . Shanghai . Washington DC . West Palm Beach




           Copyright ©2011 by Kaye Scholer LLP. All Rights Reserved. This publication is intended as a general guide only. It does not
           contain a general legal analysis or constitute an opinion of Kaye Scholer LLP or any member of the firm on legal issues described.
           It is recommended that readers not rely on this general guide in structuring individual transactions but that professional advice be
           sought in connection with individual transactions. References herein to “Kaye Scholer LLP & Affiliates,” “Kaye Scholer,” “Kaye
           Scholer LLP,” “the firm” and terms of similar import refer to Kaye Scholer LLP and its affiliates operating in various jurisdictions.

Más contenido relacionado

La actualidad más candente

Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyDATAVERSITY
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
 
Battle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceBattle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceDATAVERSITY
 
United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...Orchestra Networks
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementEryk Budi Pratama
 
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...DATAVERSITY
 
Telco Big Data 2012 Highlights
Telco Big Data 2012 HighlightsTelco Big Data 2012 Highlights
Telco Big Data 2012 HighlightsAlan Quayle
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Alan McSweeney
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data EraPieter De Leenheer
 
Utilities Industry - Smart Analytics
Utilities Industry - Smart AnalyticsUtilities Industry - Smart Analytics
Utilities Industry - Smart AnalyticsTeradata
 
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021DATAVERSITY
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceCILIPScotland
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...Chris Takacs
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 

La actualidad más candente (20)

Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
How to Integrate Data and Protect Privacy
How to Integrate Data and Protect PrivacyHow to Integrate Data and Protect Privacy
How to Integrate Data and Protect Privacy
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)
 
Battle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceBattle the Dark Side of Data Governance
Battle the Dark Side of Data Governance
 
United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...United Technologies, Hands On Reference Data Management For Corporate Finance...
United Technologies, Hands On Reference Data Management For Corporate Finance...
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
 
Telco Big Data 2012 Highlights
Telco Big Data 2012 HighlightsTelco Big Data 2012 Highlights
Telco Big Data 2012 Highlights
 
Gartner Predicts 2018
Gartner Predicts 2018Gartner Predicts 2018
Gartner Predicts 2018
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
Utilities Industry - Smart Analytics
Utilities Industry - Smart AnalyticsUtilities Industry - Smart Analytics
Utilities Industry - Smart Analytics
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library Service
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...
WhitePaper-BuyersGuidePatentSearchAnalysisSoftware-AdvancedAnalysis-Corporate...
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 

Destacado

Healthcare Statitsics - a Market Research Report by RapidValue Solutions
Healthcare Statitsics - a Market Research Report by RapidValue SolutionsHealthcare Statitsics - a Market Research Report by RapidValue Solutions
Healthcare Statitsics - a Market Research Report by RapidValue SolutionsRapidValue
 
Fabricio Silva: Cloud Computing Technologies for Genomic Big Data Analysis
Fabricio  Silva: Cloud Computing Technologies for Genomic Big Data AnalysisFabricio  Silva: Cloud Computing Technologies for Genomic Big Data Analysis
Fabricio Silva: Cloud Computing Technologies for Genomic Big Data AnalysisFlávio Codeço Coelho
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureReza Rahimi
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summit
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summitAnalysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summit
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summitSlim Baltagi
 
Startups and Bollywood
Startups and BollywoodStartups and Bollywood
Startups and BollywoodP J
 
Characteristics of gifted students
Characteristics of gifted studentsCharacteristics of gifted students
Characteristics of gifted studentsTrinette Atri
 

Destacado (11)

Healthcare Statitsics - a Market Research Report by RapidValue Solutions
Healthcare Statitsics - a Market Research Report by RapidValue SolutionsHealthcare Statitsics - a Market Research Report by RapidValue Solutions
Healthcare Statitsics - a Market Research Report by RapidValue Solutions
 
Cloud computing era
Cloud computing eraCloud computing era
Cloud computing era
 
Fabricio Silva: Cloud Computing Technologies for Genomic Big Data Analysis
Fabricio  Silva: Cloud Computing Technologies for Genomic Big Data AnalysisFabricio  Silva: Cloud Computing Technologies for Genomic Big Data Analysis
Fabricio Silva: Cloud Computing Technologies for Genomic Big Data Analysis
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big Picture
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summit
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summitAnalysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summit
Analysis-of-Major-Trends-in-big-data-analytics-slim-baltagi-hadoop-summit
 
Bollywood quiz answers
Bollywood quiz answersBollywood quiz answers
Bollywood quiz answers
 
Gifted Presentation
Gifted PresentationGifted Presentation
Gifted Presentation
 
Startups and Bollywood
Startups and BollywoodStartups and Bollywood
Startups and Bollywood
 
Characteristics of gifted students
Characteristics of gifted studentsCharacteristics of gifted students
Characteristics of gifted students
 

Similar a Social Business = Cloud + Big Data + Social Media + Mobile Computing

How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementWilliam Tanenbaum
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...MicheleNati
 
Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Catapult
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
 
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...MicheleNati
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data assetBala Iyer
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...Jeff Kelly
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera
 
Achieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryAchieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryCary Smithson
 
ADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence StrategiesADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence StrategiesDATAVERSITY
 
New Analytic Uses of Master Data Management in the Enterprise
New Analytic Uses of Master Data Management in the EnterpriseNew Analytic Uses of Master Data Management in the Enterprise
New Analytic Uses of Master Data Management in the EnterpriseDATAVERSITY
 
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...Lightbend
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)Denodo
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)Denodo
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 

Similar a Social Business = Cloud + Big Data + Social Media + Mobile Computing (20)

How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
 
Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
 
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data asset
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
Achieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryAchieving Digital Transformation in Regulatory
Achieving Digital Transformation in Regulatory
 
ADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence StrategiesADV Slides: Data Curation for Artificial Intelligence Strategies
ADV Slides: Data Curation for Artificial Intelligence Strategies
 
New Analytic Uses of Master Data Management in the Enterprise
New Analytic Uses of Master Data Management in the EnterpriseNew Analytic Uses of Master Data Management in the Enterprise
New Analytic Uses of Master Data Management in the Enterprise
 
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...
Microservices And Fast Data: Industry And Architecture Trends [with 451 Resea...
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 

Más de William Tanenbaum

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost William Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...William Tanenbaum
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...William Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...William Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsWilliam Tanenbaum
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210William Tanenbaum
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...William Tanenbaum
 

Más de William Tanenbaum (20)

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
 

Social Business = Cloud + Big Data + Social Media + Mobile Computing

  • 1. Social Business = Cloud + Big Data + Social Media + Mobile Computing William A. Tanenbaum Chair, Technology, Intellectual Property & Outsourcing Group Chair, GreenTech and Sustainability Group Kaye Scholer LLP New York and Palo Alto Offices 60758855.pptx
  • 2. Overview • Cloud + Big Data + Social Media + Mobile Computing = Social Business • “Cloud of Clouds” • New outsourcing • Sustainability in mainstream companies and in supply chains will be IT-enabled and make use of Cloud • Cloud vs. IT Outsourcing • Security as a service • BYOD to work (“bring your own device”) 60758855.pptx 2
  • 3. “Old” Business Data Aggregation • Credit Reports • Background Checks • Financial industry reporting of trading activity 60758855.pptx 3
  • 4. New Data Aggregation • What is new? • Big Data – the three “V’s” – Volume – Velocity – Variety • Computer “horse power” to handle volume • Unstructured as well as structured data • Social Media as Supply Chain – Measuring intensity • User-provided information 60758855.pptx 4
  • 5. Hypothetical to Illustrate Key Issues • Property management outsourcing hypothetical • Underlying city map • Building locations overlay • Building interior/mechanicals overlay • Maintenance records • Mobile-to-Cloud • Cloud to legacy records and vice versa • Tenant PII – Leave vs. service agreement – Consent 60758855.pptx 5
  • 6. Key Issues – Continued • Building sensors (and sensors to the Cloud) – Wired vs. IP addresses • Track employee location • Real-time truck re-routing • Monitor employee efficiency • Determine parts inventory levels • Supply chain coordination for just-in-time repairs 60758855.pptx 6
  • 7. Key Issues – Continued • Customer wants historical data to evaluate maintenance and provider performance (and number of skilled employees) • Customer wants predictive analytics • Customer wants real time dashboards • Big Data needs data displays (need not be static) • Provider wants data for fine-tuning SLA’s and pricing for future projects and employee training • Predictive analytics tools/algorithms • Different levels of data roll-ups 60758855.pptx 7
  • 8. Key Issues – Continued • Multiple outsource providers and subcontractors and IT infrastructure providers • Sustainability – Make buildings and units more energy and water-efficient – Electric vehicles – Trucks as “Rolling Storage Units” (“RSU’s”) – Power co-generation; solar/wind • Portfolio of providers • Cross-licenses • Summary: need to know your data ecosystem 60758855.pptx 8
  • 9. Sources of Data • Customer records • Customer websites • Business partners • Third parties • Internet tracking companies • Social Media • Company submissions to portals maintained supply chain customer or jointly in an industry – ROHS as illustrative • Metadata • Clouds used by employees on “BYOD” 60758855.pptx 9
  • 10. Owners vs. Licensing vs. Right of Access • Cannot license data you do not own or in which you do not have sufficient license rights 60758855.pptx 10
  • 11. Customer Records • Customer records and company’s own websites – Terms of Use and Consent – Click-through agreements – Challenges to enforceability 60758855.pptx 11
  • 12. Obtaining – and Proving – Consent • Contracts of adhesion vs. expectations privacy and use • Enforceability vs. number of screens • How record and prove consent? – Electronic signatures? – E-Sign 60758855.pptx 12
  • 13. Business Partners and Third Party Data Providers • Anonymity – Is it anonymous if all companies use the same encryption hash? • Potentially an issue with health data in new health care electronic record ecosystems 60758855.pptx 13
  • 14. Internet Tracking Companies • Web bugs are not the current controversy • Health care as illustrative of sensitive issues • FDA and FTC • Representations, Warranties and Continuing Covenants • Indemnities; termination remedies • Consequential damages vs. specified direct damages 60758855.pptx 14
  • 15. Social Media • Social media as supply chain 60758855.pptx 15
  • 16. New Role for HR Outsourcing • Problem: – Potential HR legal liability from considering information reported on Facebook and other social networks • Emerging Business Solution: – New role for Outsourcing – Outsource providers conduct social media background checks – Insulate HR departments 60758855.pptx 16
  • 17. Potential Outsourcing Issues • Outsource providers retained to perform data analytics • Results in datasets from multiple customers which can be combined to yield valuable data asset • Outsourcing providers directly monetize or license data to third parties • How can outsource customer protect against data collected for it and data analytics on such data being used by competitors? 60758855.pptx 17
  • 18. Customer’s Potential Solutions • Assert ownership over data • Assert exclusive rights over analytic tools • Use contact to limit combination of datasets with those of other customers, public data, or other sources of data (or other sources) 60758855.pptx 18
  • 19. Outsourcing • Portfolio model of outsource providers • Need to structure to ensure data sharing • Licensing rights back to each provider 60758855.pptx 19
  • 20. Revisiting Common NDA Provisions • Fact Pattern: common exclusion of protection for public domain material • Business Problem: information technically in the public domain needs to be maintained as private asset or protected because of regulatory obligations – EU PII; U.S. GLB, Health, FTC – Non-regulatory data constitutes business intelligence • Solution: modify public domain 60758855.pptx 20
  • 21. Competitive Intelligence • Business Problem: Competitive information can be inadvertently disclosed through identification in RFP’s of subcontractors and analytics tools • Solutions: – Reduce scope of identification – Early stage use of confidentiality agreements 60758855.pptx 21
  • 22. Cross-License Data Agreements • License terms for data • Cannot license what do not own or have license rights to • Scope of use limitations • Negative covenants 60758855.pptx 22
  • 23. Defensive Use of Trade Secret Protection • Wal-Mart and Sustainability Consortium • Reporting requirements/requests • Can adverse information be “shielded” by trade secret? • SEC and financial statement reporting obligations • Is this public data? 60758855.pptx 23
  • 24. Licensing and Outsourcing Terms • Outsourcing: Draft RFP’s to contract schedules to review by subject matter experts – Regulatory compliance • For IP ownership and documentation, complete pre-agreed upon assignment in recordable form, even if not recorded, and record with PTO or Copyright Office when advisable • Audit rights • Specific data deliverables • Data Managers • Timely notice of data claims 60758855.pptx 24
  • 25. Questions and Answers William A. Tanenbaum Chair, Technology, Intellectual Property & Outsourcing Group Chair, GreenTech and Sustainability Group Kaye Scholer LLP, New York and Palo Alto wtanenbaum@kayescholer.com 212-836-7661 60758855.pptx 25
  • 26. William A. Tanenbaum wtanenbaum@kayescholer.com William A. Tanenbaum is the international chair of Kaye Scholer’s Technology, Intellectual Property & Outsourcing Group and its GreenTech and Sustainability Group and works in the firm’s New York and Palo Alto offices. Chambers found that he “built one of New York City’s most outstanding transactional IT practices,” that he is a “well-respected attorney, with a well-informed approach [who] provides litigation, transaction work and strategic counseling on a range of technology issues,” that he is “efficient, solution-driven and makes excellent judgment calls,” and that he is an “internationally recognized intellectual property, technology and outsourcing lawyer”. He is recognized as a “Leading Individual” and was awarded “Recommended” ratings in both “Technology and IT Outsourcing” and “Business Process Outsourcing,” and named as a “Notable Practitioner” at the national level in Outsourcing. He was voted one of the world’s top 250 IP strategists (IAM client survey) and he was selected as one of the country’s top 25 pre-eminent IT practitioners in the Best of the Best USA. He regularly advises clients on strategic intellectual property concerns, privacy, data security, data transfer, information life cycle management and competitive intelligence matters, in both transactional and litigation contexts. 60758855.pptx 26
  • 27. William A. Tanenbaum (cont’d) Mr. Tanenbaum is the founder and co-chair of PLI’s annual Outsourcing Conference, the founder and chair of its Green Technology conference, and a regular lecturer at industry outsourcing conferences. He chairs Kaye Scholer’s GreenTech breakfast seminar series and presents webcasts on IT, IP and GreenTech topics. He has contributed to Bloomberg’s Energy Sustainability Law Report. He is a past President of the International Technology Law Association (formerly the Computer Law Association) and is listed in Who’s Who in America, the International Who’s Who of Business Lawyers, the Guide to the World’s Leading Litigation Experts and the Guide to the World’s Leading Patent Law Experts. He is the privacy and data protection columnist for the New York Law Journal, co-author of a book on privacy law and has been quoted in The Economist magazine as an expert on IP law. His articles have been used at Harvard and other law schools. He graduated from Brown University (degree with highest honors and Phi Beta Kappa) and Cornell Law School. 60758855.pptx 27
  • 28. Chicago . Frankfurt . London . Los Angeles . New York . Palo Alto . Shanghai . Washington DC . West Palm Beach Copyright ©2011 by Kaye Scholer LLP. All Rights Reserved. This publication is intended as a general guide only. It does not contain a general legal analysis or constitute an opinion of Kaye Scholer LLP or any member of the firm on legal issues described. It is recommended that readers not rely on this general guide in structuring individual transactions but that professional advice be sought in connection with individual transactions. References herein to “Kaye Scholer LLP & Affiliates,” “Kaye Scholer,” “Kaye Scholer LLP,” “the firm” and terms of similar import refer to Kaye Scholer LLP and its affiliates operating in various jurisdictions.

Notas del editor

  1. Mobile to Cloud leads to Cloud to Cloud
  2. Expectations re prviacy,
  3. Social MediaSocial network privacy rulesFacebook controversies as an illustrativeGoogle book project Issues with treating as a copyright litigation settlement Blogging as advertising and “sponsored” content
  4. Social network privacy rulesFacebook controversies as an illustrativeGoogle book project Issues with treating as a copyright litigation settlement Blogging as advertising and “sponsored” content
  5. Cooperative Business Ventures Terms of use and obtaining consent Practical enforceability issues Contracts of adhesion What are current reasonable expectations? European vs. US PII (and Canada too) What data can be combined Licensing as a vehicle Combining representations and warranties with continuing covenants Indemnification for proper collection and consent