SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Contracting with the Healthcare Cloud
          Service Provider
 Workshop on Health Information in the Cloud: Business Strategy,
                   Security and Deployment
    NC Healthcare Information and Communications Alliance

                          March 2011
                      Randy Whitmeyer
                     Whitmeyer Tuffin PLLC
                      www.whit-law.com
Topics
•   Legal Backdrop

•   Cloud Computing v. Traditional IT Structures

•   The “Contract Circle”:

    •   Selecting a Health Care IT Vendor

    •   Negotiating Key Contract Terms

    •   Dealing with Vendor Non-Performance
Legal Backdrop
•   HIPAA/HITECH Privacy and Security Rules
•   HITECH Meaningful Use
•   NC and other State Identity Theft Rules
•   NC Destruction of Personal Information Records Law
•   EU Data Protection Directive and Cross-Border Data Flows
•   PCI Rules
•   Electronic Discovery
Cloud Computing
             v.
Traditional I.T. Structures
Graphic Courtesy of Hosted Solutions
Graphic Courtesy of Hosted Solutions
Cloud Computing Services

•   Software as a Service (SaaS)

•   Platform as a Service (PaaS)

•   Infrastructure as a Service (IaaS)
Cloud Computing and Security

Advantages                        Disadvantages
•   Data Dispersal                  •   Lack of Transparency
•   Data Fragmentation              •   Lack of Responsiveness
•   “Tier 1” Data Centers           •   “Trading Market” of
•   Multiple Customer Demands           Subcontractors
                                    •   Vendor Lock-In
•   Easier Patching and Updates
                                    •   Lack of Security Details
Cloud Computing Contract Structures

•   Typically service-based, not licensed
•   OPEX, not CAPEX
•   Often offered via “click and accept” agreements
•   Sometimes incorporate by reference other terms of use
    and policies
•   Sometimes purport to be changeable without notice by the
    vendor
Selecting the Cloud
 Computing Vendor: Due
Diligence and Key Contract
            Terms
Keys to Selecting a Cloud Computing Vendor

•   Approach project realistically, in light of personnel, time and budget
•   Document your requirements
    •   Obtain consultant as necessary

•   Remember the need for training on new systems and new processes
    •   More realistic to adapt process to system than adapt system to process, in most
        cases

•   Perform due diligence on vendor. Rigorously check with other
    similar users on their experiences. Check certifications
•   Last but not least: enter into a good contract!!
Negotiation Ideas
•   Early on in discussions, alert vendor that you want certain key
    adjustments to contract terms, identifying the issues

    •   If possible, use your own form of contract rather than vendor’s
        form

•   Try to keep multiple vendors in the process as long as possible to
    keep competitive pressure on both price and terms

•   Consider a formal RFP/response process for larger systems
Security and Privacy Terms
•   Confidentiality
•   Third-Party security audits
•   Right to review detailed security/disaster recovery policies
•   Obligation to maintain security and security policies
•   Right to audit and test security
•   Notification in the case of breach
•   Indemnification for breaches/payment of costs of required notices to
    customers
•   Encryption
Business Associate Agreement


•   Whose form of BAA?
    •   NCHICA form, of course!
•   How much embellished?
•   How does it relate to other confidentiality, security and
    privacy provisions in contract?
Regulatory Issues
•   Certification by ONC-ATCB, such as CCHIT

•   Meaningful use criteria

•   Cooperation with certification and attestation

•   Timing of implementation
Other Key Data Issues
•   Ownership of Data

•   Disposition of Data on Termination

•   Location of Data

•   Legal / Government Request to Access Data
Service Level Agreements
•   Uptime
•   Performance & Response Time
•   Error Correction Time
•   Infrastructure / Security
•   Performance Credits
•   Use of Measurement Technology
•   Notice/Reporting Obligations
Pricing Terms
•   Monthly service fees

    •   Per user or provider, or based on transactions?

    •   When does it start?

•   Implementation fees

    •   Commitment to start date?

•   Add-on pricing

•   Payment terms

•   Caps on increase in fees
Term & Termination
•   Length

•   Termination Penalties

•   Data Rights upon Termination

•   Vendor Termination or Suspension

•   Automatic Renewal
Warranties

•   Warranty to specifications and requirements
    •   Avoid limited warranty to just documentation
    •   Include key functional specifications as an appendix to the document.
        Sometimes can pull these straight from vendor’s web site
• Warranty against noninfringement
• Anti-virus warranty
• Warranty that documentation is complete and gets updated with new
  releases in a timely fashion
• Services warranty – vendor should use reasonable skill in
  accordance with industry standards, and supply qualified and
  experienced personnel
Third-Party Software/Services
•   Vendor will want to disclaim responsibility (e.g., for performance or
    IP issues) for third party software components of solution, especially
    open source
•   Buyer’s perspective:
    •   I’m buying a solution, and it shouldn’t matter to me whether vendor
        chose to implement parts of the solution with third-party pieces
•   Resolution varies and is often fact-specific:
•   Well-known, off the shelf components more likely to be excluded
Support and Maintenance


•   Rights to new versions
•   Timeframes for responding to and fixing problems
•   Target/efforts versus commitment with financial
    repercussions
Intellectual Property
•   Proprietary software company will jealously guard ownership of its products
•   Dispute often arises over ownership of any custom developed IP, such as interfaces
•   Buyer’s argument:
    •   I paid for it, I should own it
•   Vendor’s argument:
    •   You are paying for accelerated development
    •   I would never be able to have a product if each piece of custom IP was owned by the
        buyer
•   Possible compromises:
    •   Exclusive use for a period of time
    •   Sharing in royalties
Other Terms

                               •   Modification of Contract
•   Acceptance
    Terms/Procedures
                               •   Assignability
•   Limitations of Liability
                               •   Choice of Law/Jurisdiction
•   Indemnification
                               •   Subcontractor approval
•   Insurance
                               •   Source Code escrow
Project Failure
                (The typical scenario)
•   Buyer: The service is late, has not been delivered at all, or
    has excessive errors

•   Vendor: Buyer unilaterally expanded the scope of the
    project, or failed to understand the service and its effect on
    the practice.
Project Failure
                  (Buyer’s Perspective)
•   Strategies:
    •   Document problems early and often, and communicate
        to Vendor
    •   Avoid unduly flattering emails; always come back to
        haunt in dispute situations
    •   Send formal notice of breach
    •   Provide opportunity to cure
    •   Withholding payment: must be done carefully
Project Failure
              (Vendor’s Perspective)

•   Document changes in scope/obtain agreement

•   Document unforeseen technical issues

•   Consider when/if to withhold software/services, if unpaid
Key Takeaways
•   Due Diligence is critical when choosing Cloud Computing
    Vendors . This includes not only direct questioning but
    also third-party review such as dun and bradstreet reports,
    ongoing litigation review, and merger activity.

•   Insist on transparency

•   Risk can vary depending on type of data involved and type
    of cloud

•   Form contracts rarely handle key issues satisfactorily
Any questions?


   Randy Whitmeyer
Whitmeyer - Tuffin PLLC
 randy@whit-law.com
    919-880-6880

Contenu connexe

Similaire à NCHICA - Contracts with Healthcare Cloud Computing Vendors

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Black Duck by Synopsys
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider ContractsWhitmeyerTuffin
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Black Duck by Synopsys
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Charleston licensing e content 2011
Charleston   licensing e content 2011Charleston   licensing e content 2011
Charleston licensing e content 2011achesler
 
Charleston Conference licensing e content 2011
Charleston Conference   licensing e content 2011Charleston Conference   licensing e content 2011
Charleston Conference licensing e content 2011achesler
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomBrendon Noney
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementWilliam Tanenbaum
 
20050314 tips on contract management
20050314 tips on contract management20050314 tips on contract management
20050314 tips on contract managementraymond_wan2005
 
Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityRussell_Kennedy
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practiceslisaabe
 
Managing outsource IT contracts - Fundamentals
Managing outsource IT contracts - FundamentalsManaging outsource IT contracts - Fundamentals
Managing outsource IT contracts - FundamentalsRonald Bartels
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Synopsys Software Integrity Group
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionResellerClub
 
Software Contract and Liability
Software Contract and LiabilitySoftware Contract and Liability
Software Contract and LiabilityMohamad Sani
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterEversheds Sutherland
 

Similaire à NCHICA - Contracts with Healthcare Cloud Computing Vendors (20)

Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
Winning the Cage-Match: How to Successfully Navigate Open Source Software iss...
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A Don't Let Open Source be the Deal Breaker In Your M&A
Don't Let Open Source be the Deal Breaker In Your M&A
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Charleston licensing e content 2011
Charleston   licensing e content 2011Charleston   licensing e content 2011
Charleston licensing e content 2011
 
Charleston Conference licensing e content 2011
Charleston Conference   licensing e content 2011Charleston Conference   licensing e content 2011
Charleston Conference licensing e content 2011
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
20050314 tips on contract management
20050314 tips on contract management20050314 tips on contract management
20050314 tips on contract management
 
Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from reality
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 
Managing outsource IT contracts - Fundamentals
Managing outsource IT contracts - FundamentalsManaging outsource IT contracts - Fundamentals
Managing outsource IT contracts - Fundamentals
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Protecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2CoalitionProtecting Your Business Globally - David Snead, i2Coalition
Protecting Your Business Globally - David Snead, i2Coalition
 
Software Contract and Liability
Software Contract and LiabilitySoftware Contract and Liability
Software Contract and Liability
 
How it pros buy cloud servers
How it pros buy cloud serversHow it pros buy cloud servers
How it pros buy cloud servers
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
 

Plus de WhitmeyerTuffin

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud ServicesWhitmeyerTuffin
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursWhitmeyerTuffin
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealWhitmeyerTuffin
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...WhitmeyerTuffin
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealWhitmeyerTuffin
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinWhitmeyerTuffin
 

Plus de WhitmeyerTuffin (6)

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the Deal
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A Deal
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 

Dernier

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Dernier (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

NCHICA - Contracts with Healthcare Cloud Computing Vendors

  • 1. Contracting with the Healthcare Cloud Service Provider Workshop on Health Information in the Cloud: Business Strategy, Security and Deployment NC Healthcare Information and Communications Alliance March 2011 Randy Whitmeyer Whitmeyer Tuffin PLLC www.whit-law.com
  • 2. Topics • Legal Backdrop • Cloud Computing v. Traditional IT Structures • The “Contract Circle”: • Selecting a Health Care IT Vendor • Negotiating Key Contract Terms • Dealing with Vendor Non-Performance
  • 3. Legal Backdrop • HIPAA/HITECH Privacy and Security Rules • HITECH Meaningful Use • NC and other State Identity Theft Rules • NC Destruction of Personal Information Records Law • EU Data Protection Directive and Cross-Border Data Flows • PCI Rules • Electronic Discovery
  • 4. Cloud Computing v. Traditional I.T. Structures
  • 5. Graphic Courtesy of Hosted Solutions
  • 6. Graphic Courtesy of Hosted Solutions
  • 7. Cloud Computing Services • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS)
  • 8. Cloud Computing and Security Advantages Disadvantages • Data Dispersal • Lack of Transparency • Data Fragmentation • Lack of Responsiveness • “Tier 1” Data Centers • “Trading Market” of • Multiple Customer Demands Subcontractors • Vendor Lock-In • Easier Patching and Updates • Lack of Security Details
  • 9. Cloud Computing Contract Structures • Typically service-based, not licensed • OPEX, not CAPEX • Often offered via “click and accept” agreements • Sometimes incorporate by reference other terms of use and policies • Sometimes purport to be changeable without notice by the vendor
  • 10. Selecting the Cloud Computing Vendor: Due Diligence and Key Contract Terms
  • 11. Keys to Selecting a Cloud Computing Vendor • Approach project realistically, in light of personnel, time and budget • Document your requirements • Obtain consultant as necessary • Remember the need for training on new systems and new processes • More realistic to adapt process to system than adapt system to process, in most cases • Perform due diligence on vendor. Rigorously check with other similar users on their experiences. Check certifications • Last but not least: enter into a good contract!!
  • 12. Negotiation Ideas • Early on in discussions, alert vendor that you want certain key adjustments to contract terms, identifying the issues • If possible, use your own form of contract rather than vendor’s form • Try to keep multiple vendors in the process as long as possible to keep competitive pressure on both price and terms • Consider a formal RFP/response process for larger systems
  • 13. Security and Privacy Terms • Confidentiality • Third-Party security audits • Right to review detailed security/disaster recovery policies • Obligation to maintain security and security policies • Right to audit and test security • Notification in the case of breach • Indemnification for breaches/payment of costs of required notices to customers • Encryption
  • 14. Business Associate Agreement • Whose form of BAA? • NCHICA form, of course! • How much embellished? • How does it relate to other confidentiality, security and privacy provisions in contract?
  • 15. Regulatory Issues • Certification by ONC-ATCB, such as CCHIT • Meaningful use criteria • Cooperation with certification and attestation • Timing of implementation
  • 16. Other Key Data Issues • Ownership of Data • Disposition of Data on Termination • Location of Data • Legal / Government Request to Access Data
  • 17. Service Level Agreements • Uptime • Performance & Response Time • Error Correction Time • Infrastructure / Security • Performance Credits • Use of Measurement Technology • Notice/Reporting Obligations
  • 18. Pricing Terms • Monthly service fees • Per user or provider, or based on transactions? • When does it start? • Implementation fees • Commitment to start date? • Add-on pricing • Payment terms • Caps on increase in fees
  • 19. Term & Termination • Length • Termination Penalties • Data Rights upon Termination • Vendor Termination or Suspension • Automatic Renewal
  • 20. Warranties • Warranty to specifications and requirements • Avoid limited warranty to just documentation • Include key functional specifications as an appendix to the document. Sometimes can pull these straight from vendor’s web site • Warranty against noninfringement • Anti-virus warranty • Warranty that documentation is complete and gets updated with new releases in a timely fashion • Services warranty – vendor should use reasonable skill in accordance with industry standards, and supply qualified and experienced personnel
  • 21. Third-Party Software/Services • Vendor will want to disclaim responsibility (e.g., for performance or IP issues) for third party software components of solution, especially open source • Buyer’s perspective: • I’m buying a solution, and it shouldn’t matter to me whether vendor chose to implement parts of the solution with third-party pieces • Resolution varies and is often fact-specific: • Well-known, off the shelf components more likely to be excluded
  • 22. Support and Maintenance • Rights to new versions • Timeframes for responding to and fixing problems • Target/efforts versus commitment with financial repercussions
  • 23. Intellectual Property • Proprietary software company will jealously guard ownership of its products • Dispute often arises over ownership of any custom developed IP, such as interfaces • Buyer’s argument: • I paid for it, I should own it • Vendor’s argument: • You are paying for accelerated development • I would never be able to have a product if each piece of custom IP was owned by the buyer • Possible compromises: • Exclusive use for a period of time • Sharing in royalties
  • 24. Other Terms • Modification of Contract • Acceptance Terms/Procedures • Assignability • Limitations of Liability • Choice of Law/Jurisdiction • Indemnification • Subcontractor approval • Insurance • Source Code escrow
  • 25. Project Failure (The typical scenario) • Buyer: The service is late, has not been delivered at all, or has excessive errors • Vendor: Buyer unilaterally expanded the scope of the project, or failed to understand the service and its effect on the practice.
  • 26. Project Failure (Buyer’s Perspective) • Strategies: • Document problems early and often, and communicate to Vendor • Avoid unduly flattering emails; always come back to haunt in dispute situations • Send formal notice of breach • Provide opportunity to cure • Withholding payment: must be done carefully
  • 27. Project Failure (Vendor’s Perspective) • Document changes in scope/obtain agreement • Document unforeseen technical issues • Consider when/if to withhold software/services, if unpaid
  • 28. Key Takeaways • Due Diligence is critical when choosing Cloud Computing Vendors . This includes not only direct questioning but also third-party review such as dun and bradstreet reports, ongoing litigation review, and merger activity. • Insist on transparency • Risk can vary depending on type of data involved and type of cloud • Form contracts rarely handle key issues satisfactorily
  • 29. Any questions? Randy Whitmeyer Whitmeyer - Tuffin PLLC randy@whit-law.com 919-880-6880