SlideShare a Scribd company logo
1 of 30
Download to read offline
Doing Business Globally HostingCon Europe Amsterdam, October 2014 
W. David Snead 
Attorney + Counselor – Washington, D.C. 
Tactical Legal Advice for Internet Business 
david.snead@dsnead.com 
Paolo Balboni 
European ICT & Data Protection Lawyer – ICT Legal Consulting Int. – Amsterdam 
paolo.balboni@ictlegalconsulting.com
• 
Creating a contract that works 
• 
Compliance 
• 
Key provisions in a global contract
Why do you need a global contract? 
Pros 
• 
Attracts larger clients 
• 
Ease of administration 
• 
May ease legal compliance 
Cons 
• 
Complicated contract 
• 
Jurisdictional issues 
• 
Vendor compliance difficulties
1. 
Exceeding customer expectations 
2. 
Supporting your brand 
3. 
Protecting your revenue 
4. 
Meeting your contract obligations 
5. 
Litigation prevention 
Contract goals
• 
Engage in a 180’ contract review 
• 
Procure insurance 
• 
Stand behind your product 
• 
Don’t rely on limitations of liability 
What should you do first?
Vendors 
• 
Flow down provisions 
• 
Right to change products 
• 
Fee changes 
• 
Warranties 
• 
Responsibility for subcontractors 
• 
Indemnification 
180’ contract review 
• 
Match up to your agreement 
• 
Create implementation period 
• 
Include right to substitute 
• 
Create implementation period 
• 
Provide evidence to customers 
• 
Match up to your agreement 
• 
Include responsibility flow down 
• 
Match up to your agreement 
• 
Procure insurance 
• 
Match to technology
Customer 
Vendor 
Company 
Skin in the game 
No refunds 
Applies to purchased services 
Reliability 
Force Majeure No subcontractors Cable cuts 90 day warranty 
Detailed Service Level Agreement written in plain English 
Price 
Right to change prices No subcontractors Difference in contract term 
Tolerate price gaps 
Provide documentation 
Support 
Tier 2 Self help 
Ready access on website Clear response times.
Customer 
Contract 
Implementation 
Skin in the game 
SLA: credits 
• 
Automatic notification and credit 
Reliability 
SLA: plain English 
• 
Tie back to vendors 
• 
Internal metric score cards 
• 
Percentages implemented mechanically 
Price 
• 
Price changes at term 
• 
Increases with evidence 
• 
Contract term process 
• 
Negotiate notice of increases 
• 
No asterisks 
Support 
Support based on revenue 
• 
Self help available 
• 
Automatic notice of cut off
Customer Goal 
Flow down provision 
Legal issues 
Operations issues 
Summary provision 
Price stability 
Increase in electric prices 
• 
Increase prices 
• 
Disclose information 
• 
Meeting of the minds 
• 
Measure 
• 
Provide information 
• 
Revenue stability 
• 
Monitor vendor contracts 
• 
Prices stable during term 
• 
Pass through prices increase on notice
THIS PRODUCT COULD INCLUDE TECHNICAL OR OTHER MISTAKES, INACCURACIES OR TYPOGRAPHICAL ERRORS. WE MAY MAKE CHANGES TO THE MATERIALS AND SERVICES AT THIS SITE, INCLUDING THE PRICES AND DESCRIPTIONS OF ANY PRODUCTS LISTED HEREIN, AT ANY TIME WITHOUT NOTICE. THE MATERIALS OR SERVICES AT THIS SITE MAY BE OUT OF DATE, AND WE MAKE NO COMMITMENT TO UPDATE SUCH MATERIALS OR SERVICES. THE USE OF THE SERVICES OR THE DOWNLOADING OR OTHER ACQUISITION OF ANY MATERIALS THROUGH THIS SITE IS DONE AT YOUR OWN DISCRETION AND RISK AND WITH YOUR AGREEMENT THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM SUCH ACTIVITIES.
Customer 
Vendor 
Company 
Skin in the game 
No refunds 
Applies to purchased services 
Reliability 
Force Majeure No subcontractors Cable cuts 90 day warranty 
Detailed Service Level Agreement written in plain English 
Price 
Right to change prices No subcontractors Difference in contract term 
Tolerate price gaps Provide documentation 
Support 
Tier 2 Self help 
Ready access on website Clear response times.
• 
Creating a contract that works 
• 
Data compliance 
• 
Addressing cultural issues
• 
Sectoral Based 
• 
Reactive 
• 
Generally state based 
• 
Narrowly tailored 
• 
Issue Based 
• 
Proactive 
• 
National implementation
DATA PROTECTION/SECURITY COMPLIANCE AS A COMPETITIVE MARKET ADVANTAGE 
• 
A couple of deal-breaking elements from our daily experience: 1. Personal Data Processing Agreements (where duties and obligations are clearly identified) 2. Transparency and control over the personal data flow (circulation/transfer of personal data) 
• 
These elements are requested by customers for 2 main reasons: 1. COMPLIANCE: to establish enough control by the customer (Controller) on the personal data processing carried out by the provider (Processor) 2. INTERNAL RESPONSIBILITIES: to internally show that protection and control over personal data, as a company asset, have been considered in the choice of a provider that offers enough guarantees
EU data protection/security checklist A Service Provider (SP) will have to share: 
① 
Information about its identity (and the representative in the EU, if applicable), its data protection role, and the contact details of the Data Protection Officer or of a “privacy contact person” 
② 
SP will have to describe in which ways the data will be processed and provide information on data location and subcontractors 
③ 
How data transfers may take place and on which legal ground (mainly model contracts, binding corporate rules – SH principles have been under revision)
④ 
Data security measure in place, with special reference to: - availability of data - integrity - confidentiality - transparency - isolation (purpose limitation) - intervenability 
⑤ 
Way to monitor SP data security / possibility to run audits for clients or trusted third-parties
⑥ 
Personal data breach notification policy 
⑦ 
Data portability, migration, and transfer back assistance 
⑧ 
Data retention, restitution and deletion policies 
⑨ 
Accountability, meaning the policies and procedures SP has in place to ensure and demonstrate compliance, throughout the SP value chain (e.g., sub-contractors)
⑩ 
Cooperation with clients to respect data protection law, e.g., to assure the exercise of data protection rights 
11 
Management of law enforcement request of access to personal data 
12 
Remedies available for the customer in case of CSP breach of contract
• 
HIPAA / GLB / FCRA 
• 
FTC needs most attention 
• 
Marketing to minors 
• 
State laws may apply 
• 
No Federal breach law
• 
Massachusetts sets standard 
• 
Focus on identification numbers 
• 
Increasingly includes biometric 
• 
No private right of action 
• 
Nexus requirement 
• 
Encryption exemption 
• 
No exemption for deminimus disclosures 
• 
7 states with no law
Transparency 
+ 
Contractual reassurance on legal compliance 
= 
Customer Trust 
CUSTOMER TRUST = BUSINESS
• 
Creating a contract that works 
• 
Data compliance 
• 
Key provisions in a global contract
Company will indemnify, defend and hold harmless Customer, its affiliates, directors, officers, employees and agents (collectively, the “Customer Group”) from and against all Losses asserted against, resulting to, imposed upon or incurred by the Customer Group (or any member thereof) to the extent arising from (i) any personal injury, death or physical damage to, or loss or theft of, tangible personal property caused by the gross negligence or willful misconduct of Company or its employees, agents or subcontractors, or (ii) allegations that the Services (excluding any third party components) directly infringe a patent issued under the laws of a country in which the Services are actually provided to Customer; provided, however, that, in addition to the foregoing indemnification, Company’s sole and exclusive liability with respect to this Section 1, and Customer’s sole and exclusive remedy with respect to this Section 1, is limited to Company making the Services non-infringing or arranging for Customer’s continued use of the Services by license or otherwise, but if either of the foregoing options are commercially impracticable for Company, in Company’s sole discretion, upon written notice to Customer, Company may cancel the directly affected Services, refund to Customer any prepaid fees for such cancelled Services and, if applicable, adjust Customer’s ongoing monthly fees for the continuing Services to account for such cancelled Services. Notwithstanding anything to the contrary in this Section 1, Company will have no indemnification obligation to Customer under this Section 1 for any infringement arising from (A) an unauthorized modification of the Services by Customer, (B) Customer’s combination of the Services with any intellectual property not developed or owned by Company if the Services would have avoided the infringement but for such combination by Customer, or (C) Customer’s failure to install updates, patches or other similar items provided by Company or the licensor of the intellectual property that is the subject of such a claim. 
Legalese 
Plain English 
• 
Cover all intellectual property that is yours. 
• 
Take up the suit. 
• 
Agree to work proactively 
Indemnification means it.
NOTWITHSTANDING ANY ORAL OR WRITTEN COMMUNICATIONS BETWEEN COMPANY AND CUSTOMER ABOUT OR IN CONNECTION WITH THE SERVICESAND TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, NEITHER COMPANY NOR ANY OF ITS EMPLOYEES, AFFILIATES, AGENTS, SUPPLIERS, SUB-CONTRACTORS OR LICENSORS MAKE ANY WARRANTIES OF ANY KIND, ORAL OR WRITTEN, EXPRESS OR IMPLIED, ARISING FROM COURSE OF DEALING, COURSE OF PERFORMANCE OR OTHERWISE INCLUDING, BUT NOT LIMITED TO, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, CONFORMITY TO ANY REPRESENTATION OR DESCRIPTION, COMPLETELY SECURE, ERROR-FREE, NON-INTERRUPTION, NON- INTERFERENCE OR NON-INFRINGEMENT. EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT OR IN THE ADDENDA, THE SERVICES AND EQUIPMENT PROVIDED UNDER OR ASSOCIATED WITH THIS AGREEMENT ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. 
Legalese 
Plain English 
EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT (INCLUDING, WITHOUT LIMITATION, THE SERVICE LEVEL AGREEMENTS) 
Make Warranties. Not Disclaimers.
Company guarantees 100% availability of the Company Cloud Network. The Company Cloud Network will be deemed 'available' if the networking components are available and responding to Company monitoring tools as designed and in a non- degraded manner (as evidenced in the Company monitoring tool). 
Legalese 
Plain English 
• 
Monitor proactively 
• 
Provide automatic credits 
• 
Agree to consider customer monitoring 
No hoops.
Start from the customer’s perspective 
No “hot coffee” decisions 
Consider data protection/security compliance as a competitive market advantage 
Engage in a 180’ contract review
W. David Snead 
Attorney + Counselor – Washington, D.C. 
Tactical Legal Advice for Internet Business 
david.snead@dsnead.com 
wdsneadpc / Twitter 
thewhir.com / Blog 
Paolo Balboni 
European ICT & Data Protection Lawyer – ICT Legal Consulting Int. – Amsterdam 
paolo.balboni@ictlegalconsulting.com 
@balbonipaolo / Twitter 
www.ictlegalconsulting.com / Website

More Related Content

What's hot

Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
U.S. Quarterly Privacy Update
U.S. Quarterly Privacy UpdateU.S. Quarterly Privacy Update
U.S. Quarterly Privacy UpdateTrustArc
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprPierre Feillet
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowOgilvy Health
 
In house lawyers' forum - March 2018, Birmingham
In house lawyers' forum - March 2018, BirminghamIn house lawyers' forum - March 2018, Birmingham
In house lawyers' forum - March 2018, BirminghamBrowne Jacobson LLP
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm finalLou Milrad
 

What's hot (12)

Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
A Look Behind The Compliance Headlines
A Look Behind The Compliance HeadlinesA Look Behind The Compliance Headlines
A Look Behind The Compliance Headlines
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Private Sector Whistleblower Rewards and Protections
Private Sector Whistleblower Rewards and ProtectionsPrivate Sector Whistleblower Rewards and Protections
Private Sector Whistleblower Rewards and Protections
 
U.S. Quarterly Privacy Update
U.S. Quarterly Privacy UpdateU.S. Quarterly Privacy Update
U.S. Quarterly Privacy Update
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdpr
 
California Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to knowCalifornia Consumer Privacy Act: What your brand needs to know
California Consumer Privacy Act: What your brand needs to know
 
In house lawyers' forum - March 2018, Birmingham
In house lawyers' forum - March 2018, BirminghamIn house lawyers' forum - March 2018, Birmingham
In house lawyers' forum - March 2018, Birmingham
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm final
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 

Viewers also liked

Nobia Q4 2011 Interim Report
Nobia Q4 2011 Interim ReportNobia Q4 2011 Interim Report
Nobia Q4 2011 Interim ReportNobia Group
 
Nobia Q3 2011 Interim Presentation
Nobia Q3 2011 Interim PresentationNobia Q3 2011 Interim Presentation
Nobia Q3 2011 Interim PresentationNobia Group
 
Audit world slides
Audit world slidesAudit world slides
Audit world slideswdsnead
 
Visual Literacy Design Project
Visual Literacy Design ProjectVisual Literacy Design Project
Visual Literacy Design ProjectHoney Patel
 
Nobia Capital Market Day 2011-05-26
Nobia Capital Market Day 2011-05-26Nobia Capital Market Day 2011-05-26
Nobia Capital Market Day 2011-05-26Nobia Group
 

Viewers also liked (6)

Nobia Q4 2011 Interim Report
Nobia Q4 2011 Interim ReportNobia Q4 2011 Interim Report
Nobia Q4 2011 Interim Report
 
Nobia Q3 2011 Interim Presentation
Nobia Q3 2011 Interim PresentationNobia Q3 2011 Interim Presentation
Nobia Q3 2011 Interim Presentation
 
Audit world slides
Audit world slidesAudit world slides
Audit world slides
 
Visual Literacy Design Project
Visual Literacy Design ProjectVisual Literacy Design Project
Visual Literacy Design Project
 
Nobia Capital Market Day 2011-05-26
Nobia Capital Market Day 2011-05-26Nobia Capital Market Day 2011-05-26
Nobia Capital Market Day 2011-05-26
 
Type Posters
Type PostersType Posters
Type Posters
 

Similar to 10 07-14 hosting con europe 2014 presentation unannotated

Outsourcing and Procurement: The Hot Points and Pitfalls
Outsourcing and Procurement: The Hot Points and PitfallsOutsourcing and Procurement: The Hot Points and Pitfalls
Outsourcing and Procurement: The Hot Points and PitfallsJon Hansen
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider ContractsWhitmeyerTuffin
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionResellerClub
 
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemIT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemMeyers Nave
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
PART IDirections Please review the License Agreement below .docx
PART IDirections Please review the License Agreement below .docxPART IDirections Please review the License Agreement below .docx
PART IDirections Please review the License Agreement below .docxodiliagilby
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)AltheimPrivacy
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big dataRoger Royse
 
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docxdanielfoster65629
 
Presentation of BTS.pptx
Presentation of BTS.pptxPresentation of BTS.pptx
Presentation of BTS.pptxRakibRahman25
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryHNI Risk Services
 
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...Jason Meyer
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisationitnewsafrica
 

Similar to 10 07-14 hosting con europe 2014 presentation unannotated (20)

Outsourcing and Procurement: The Hot Points and Pitfalls
Outsourcing and Procurement: The Hot Points and PitfallsOutsourcing and Procurement: The Hot Points and Pitfalls
Outsourcing and Procurement: The Hot Points and Pitfalls
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid ThemIT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
IT Equipment and Services Agreements: Contractual Pitfalls and How to Avoid Them
 
OBA Presentation on Warranties
OBA Presentation on WarrantiesOBA Presentation on Warranties
OBA Presentation on Warranties
 
Compliance Service Management Solution
Compliance Service Management SolutionCompliance Service Management Solution
Compliance Service Management Solution
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
pdf.pdf
pdf.pdfpdf.pdf
pdf.pdf
 
PART IDirections Please review the License Agreement below .docx
PART IDirections Please review the License Agreement below .docxPART IDirections Please review the License Agreement below .docx
PART IDirections Please review the License Agreement below .docx
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
 
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx
[INSERT TITLE HERE] 1Homework 3PART IDirections Pleas.docx
 
Presentation of BTS.pptx
Presentation of BTS.pptxPresentation of BTS.pptx
Presentation of BTS.pptx
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...
Compliance and Commercial Contracts: Playing Offense and Defense in Drafting ...
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 

Recently uploaded

Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理bd2c5966a56d
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 

Recently uploaded (20)

Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 

10 07-14 hosting con europe 2014 presentation unannotated

  • 1. Doing Business Globally HostingCon Europe Amsterdam, October 2014 W. David Snead Attorney + Counselor – Washington, D.C. Tactical Legal Advice for Internet Business david.snead@dsnead.com Paolo Balboni European ICT & Data Protection Lawyer – ICT Legal Consulting Int. – Amsterdam paolo.balboni@ictlegalconsulting.com
  • 2. • Creating a contract that works • Compliance • Key provisions in a global contract
  • 3. Why do you need a global contract? Pros • Attracts larger clients • Ease of administration • May ease legal compliance Cons • Complicated contract • Jurisdictional issues • Vendor compliance difficulties
  • 4. 1. Exceeding customer expectations 2. Supporting your brand 3. Protecting your revenue 4. Meeting your contract obligations 5. Litigation prevention Contract goals
  • 5. • Engage in a 180’ contract review • Procure insurance • Stand behind your product • Don’t rely on limitations of liability What should you do first?
  • 6. Vendors • Flow down provisions • Right to change products • Fee changes • Warranties • Responsibility for subcontractors • Indemnification 180’ contract review • Match up to your agreement • Create implementation period • Include right to substitute • Create implementation period • Provide evidence to customers • Match up to your agreement • Include responsibility flow down • Match up to your agreement • Procure insurance • Match to technology
  • 7.
  • 8.
  • 9. Customer Vendor Company Skin in the game No refunds Applies to purchased services Reliability Force Majeure No subcontractors Cable cuts 90 day warranty Detailed Service Level Agreement written in plain English Price Right to change prices No subcontractors Difference in contract term Tolerate price gaps Provide documentation Support Tier 2 Self help Ready access on website Clear response times.
  • 10. Customer Contract Implementation Skin in the game SLA: credits • Automatic notification and credit Reliability SLA: plain English • Tie back to vendors • Internal metric score cards • Percentages implemented mechanically Price • Price changes at term • Increases with evidence • Contract term process • Negotiate notice of increases • No asterisks Support Support based on revenue • Self help available • Automatic notice of cut off
  • 11. Customer Goal Flow down provision Legal issues Operations issues Summary provision Price stability Increase in electric prices • Increase prices • Disclose information • Meeting of the minds • Measure • Provide information • Revenue stability • Monitor vendor contracts • Prices stable during term • Pass through prices increase on notice
  • 12.
  • 13. THIS PRODUCT COULD INCLUDE TECHNICAL OR OTHER MISTAKES, INACCURACIES OR TYPOGRAPHICAL ERRORS. WE MAY MAKE CHANGES TO THE MATERIALS AND SERVICES AT THIS SITE, INCLUDING THE PRICES AND DESCRIPTIONS OF ANY PRODUCTS LISTED HEREIN, AT ANY TIME WITHOUT NOTICE. THE MATERIALS OR SERVICES AT THIS SITE MAY BE OUT OF DATE, AND WE MAKE NO COMMITMENT TO UPDATE SUCH MATERIALS OR SERVICES. THE USE OF THE SERVICES OR THE DOWNLOADING OR OTHER ACQUISITION OF ANY MATERIALS THROUGH THIS SITE IS DONE AT YOUR OWN DISCRETION AND RISK AND WITH YOUR AGREEMENT THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM SUCH ACTIVITIES.
  • 14. Customer Vendor Company Skin in the game No refunds Applies to purchased services Reliability Force Majeure No subcontractors Cable cuts 90 day warranty Detailed Service Level Agreement written in plain English Price Right to change prices No subcontractors Difference in contract term Tolerate price gaps Provide documentation Support Tier 2 Self help Ready access on website Clear response times.
  • 15. • Creating a contract that works • Data compliance • Addressing cultural issues
  • 16. • Sectoral Based • Reactive • Generally state based • Narrowly tailored • Issue Based • Proactive • National implementation
  • 17. DATA PROTECTION/SECURITY COMPLIANCE AS A COMPETITIVE MARKET ADVANTAGE • A couple of deal-breaking elements from our daily experience: 1. Personal Data Processing Agreements (where duties and obligations are clearly identified) 2. Transparency and control over the personal data flow (circulation/transfer of personal data) • These elements are requested by customers for 2 main reasons: 1. COMPLIANCE: to establish enough control by the customer (Controller) on the personal data processing carried out by the provider (Processor) 2. INTERNAL RESPONSIBILITIES: to internally show that protection and control over personal data, as a company asset, have been considered in the choice of a provider that offers enough guarantees
  • 18. EU data protection/security checklist A Service Provider (SP) will have to share: ① Information about its identity (and the representative in the EU, if applicable), its data protection role, and the contact details of the Data Protection Officer or of a “privacy contact person” ② SP will have to describe in which ways the data will be processed and provide information on data location and subcontractors ③ How data transfers may take place and on which legal ground (mainly model contracts, binding corporate rules – SH principles have been under revision)
  • 19. ④ Data security measure in place, with special reference to: - availability of data - integrity - confidentiality - transparency - isolation (purpose limitation) - intervenability ⑤ Way to monitor SP data security / possibility to run audits for clients or trusted third-parties
  • 20. ⑥ Personal data breach notification policy ⑦ Data portability, migration, and transfer back assistance ⑧ Data retention, restitution and deletion policies ⑨ Accountability, meaning the policies and procedures SP has in place to ensure and demonstrate compliance, throughout the SP value chain (e.g., sub-contractors)
  • 21. ⑩ Cooperation with clients to respect data protection law, e.g., to assure the exercise of data protection rights 11 Management of law enforcement request of access to personal data 12 Remedies available for the customer in case of CSP breach of contract
  • 22. • HIPAA / GLB / FCRA • FTC needs most attention • Marketing to minors • State laws may apply • No Federal breach law
  • 23. • Massachusetts sets standard • Focus on identification numbers • Increasingly includes biometric • No private right of action • Nexus requirement • Encryption exemption • No exemption for deminimus disclosures • 7 states with no law
  • 24. Transparency + Contractual reassurance on legal compliance = Customer Trust CUSTOMER TRUST = BUSINESS
  • 25. • Creating a contract that works • Data compliance • Key provisions in a global contract
  • 26. Company will indemnify, defend and hold harmless Customer, its affiliates, directors, officers, employees and agents (collectively, the “Customer Group”) from and against all Losses asserted against, resulting to, imposed upon or incurred by the Customer Group (or any member thereof) to the extent arising from (i) any personal injury, death or physical damage to, or loss or theft of, tangible personal property caused by the gross negligence or willful misconduct of Company or its employees, agents or subcontractors, or (ii) allegations that the Services (excluding any third party components) directly infringe a patent issued under the laws of a country in which the Services are actually provided to Customer; provided, however, that, in addition to the foregoing indemnification, Company’s sole and exclusive liability with respect to this Section 1, and Customer’s sole and exclusive remedy with respect to this Section 1, is limited to Company making the Services non-infringing or arranging for Customer’s continued use of the Services by license or otherwise, but if either of the foregoing options are commercially impracticable for Company, in Company’s sole discretion, upon written notice to Customer, Company may cancel the directly affected Services, refund to Customer any prepaid fees for such cancelled Services and, if applicable, adjust Customer’s ongoing monthly fees for the continuing Services to account for such cancelled Services. Notwithstanding anything to the contrary in this Section 1, Company will have no indemnification obligation to Customer under this Section 1 for any infringement arising from (A) an unauthorized modification of the Services by Customer, (B) Customer’s combination of the Services with any intellectual property not developed or owned by Company if the Services would have avoided the infringement but for such combination by Customer, or (C) Customer’s failure to install updates, patches or other similar items provided by Company or the licensor of the intellectual property that is the subject of such a claim. Legalese Plain English • Cover all intellectual property that is yours. • Take up the suit. • Agree to work proactively Indemnification means it.
  • 27. NOTWITHSTANDING ANY ORAL OR WRITTEN COMMUNICATIONS BETWEEN COMPANY AND CUSTOMER ABOUT OR IN CONNECTION WITH THE SERVICESAND TO THE FULL EXTENT PERMITTED BY APPLICABLE LAW, NEITHER COMPANY NOR ANY OF ITS EMPLOYEES, AFFILIATES, AGENTS, SUPPLIERS, SUB-CONTRACTORS OR LICENSORS MAKE ANY WARRANTIES OF ANY KIND, ORAL OR WRITTEN, EXPRESS OR IMPLIED, ARISING FROM COURSE OF DEALING, COURSE OF PERFORMANCE OR OTHERWISE INCLUDING, BUT NOT LIMITED TO, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, CONFORMITY TO ANY REPRESENTATION OR DESCRIPTION, COMPLETELY SECURE, ERROR-FREE, NON-INTERRUPTION, NON- INTERFERENCE OR NON-INFRINGEMENT. EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT OR IN THE ADDENDA, THE SERVICES AND EQUIPMENT PROVIDED UNDER OR ASSOCIATED WITH THIS AGREEMENT ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. Legalese Plain English EXCEPT AS EXPRESSLY STATED IN THIS AGREEMENT (INCLUDING, WITHOUT LIMITATION, THE SERVICE LEVEL AGREEMENTS) Make Warranties. Not Disclaimers.
  • 28. Company guarantees 100% availability of the Company Cloud Network. The Company Cloud Network will be deemed 'available' if the networking components are available and responding to Company monitoring tools as designed and in a non- degraded manner (as evidenced in the Company monitoring tool). Legalese Plain English • Monitor proactively • Provide automatic credits • Agree to consider customer monitoring No hoops.
  • 29. Start from the customer’s perspective No “hot coffee” decisions Consider data protection/security compliance as a competitive market advantage Engage in a 180’ contract review
  • 30. W. David Snead Attorney + Counselor – Washington, D.C. Tactical Legal Advice for Internet Business david.snead@dsnead.com wdsneadpc / Twitter thewhir.com / Blog Paolo Balboni European ICT & Data Protection Lawyer – ICT Legal Consulting Int. – Amsterdam paolo.balboni@ictlegalconsulting.com @balbonipaolo / Twitter www.ictlegalconsulting.com / Website