SlideShare une entreprise Scribd logo
1  sur  21
Amy Larrimore, The Empire Builders Group
Kathryn Legge, Esq., Griesing Law, LLC
Kathryn Legge, Esq.
Kate Legge was
part of the founding
team of Griesing
Law, LLC. Prior to
working at Griesing
Law, Kate worked
at two AmLaw 100
law firms. She
successfully
represents both
Amy Larrimore
public and closely held companies, locally
and nationwide, in complex commercial
litigation, business counseling, intellectual
property and new media matters, including
trade secret, copyright, unfair competition
and trademark-related disputes. Kate has
represented multiple clients in high stakes
litigation on a range of legal issues and
helps both large and small companies
protect their valuable intellectual property.
Amy is the
managing partner
at The Empire
Builders Group,
which focuses on
empowering
business to excel
in the strategic
growth and
operational areas
She specializes in putting the
systems, technologies, and business
processes in place to help companies
succeed. These areas include
information systems
management, technology management
related to compliance and data
analysis, development and support of
strategic marketing and sales objectives
using technology (including CRM
selection and deployment).
The Franklin Investment Group (FIG) owns
and operates a group of companies that
puts on conferences and trade shows.
The study highlights the complexities added
to the management of cloud computing in
a complex technology architecture.
Case Study
You are negotiating the wrong things at contract
close – SaaS doesn’t negotiate
•Location
•Protections
•Notifications
The cloud represents less RISK even without
preferred terms.
Choose Your Battles
SaaS forces the user to agree
to terms as a point of user
experience, not as a construct
of contract negotiation.
How could this possibly be an
agreement in good faith?
The Myth of Opt In
The risk management
challenge is centered in
the fact that many
different terms of service
comprise one workable
technology “system”
If it was only one…
Where exactly is our website?
• There are no international rules governing
cloud related concerns.
• The EU Data Protection Directive provides that
transfer of personal data may be made only to
member states and to jurisdictions with
adequate data security standards.
• The US is NOT currently deemed to have
adequate data security standards.
Jurisdiction
• Courts are wiling to recognize
personal jurisdiction based on
location of cloud computing
services.
Forward Foods LLC v Next Proteins, Inc., 2008 BL
238516 (N.Y. Sup. 2008)
• In some jurisdictions when
weighing convenience of a
forum, physical recordkeeping
takes precedence.
Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS
133612 (E.D. Tex. Nov. 18, 2011)
• Compliance department requires
instruction on these issues.
Which applies to
the FIG
Architecture?
A well done user experience
(UI or UX) should seamlessly
hide the transfer between
systems.
How could a user possibly
know which terms of service
apply?
The Myth of Opt In
The Mask of User Experience
The Mask of User Experience
A well done user experience
(UI or UX) could
simultaneously show content
from many systems.
How could a user possibly
know which terms of service
apply?
The Myth of Opt In
The Jigsaw Display
Privacy, 4th Amendment and
Stored Communications Act
• Courts are moving in a more protective direction when it
comes to the Fourth Amendment and electronically-stored
information
• Privacy rights in electronically-stored information are not
lost solely because that data is stored in a medium owned
by another.
• The SCA provides a potential loophole in most
jurisdictions that may allow the government to issue a
subpoena not just for past emails in the possession of the
service provider but also future emails.
Data Breach
• Most courts find that a data breach without
subsequent identity theft resulting in
pecuniary loss is not sufficient to confer
standing.
In re Sony Gaming Networks and Customer Data Sec. Breach Litig.,
No.11md2258, 2012 U.S. Dist. LEXIS 14691 (S.D. Cal Oct. 11,
2012); Anderson v. Hannaford Bros. Co., 659 F.3d 151 (1st Cir.
2011); Resnick v. AvMed Inc., 693 F.3d 1317 (11th Cir. 2012)
• Where there is actual evidence of identity
theft or use of any compromised
information, the case is more likely to
survive dismissal
Protection of Trade Secrets
• CFAA: Computer Fraud and Abuse Act
• What is unauthorized access?
• Employees, Third Party Providers, Social Media
• Importance of policy vs. hardware controls
U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012)
• Social media
• Use or Excessive Use
• Social Media Policy
Issues in E-Discovery
• Parties that store third party data should not expect
to be shielded from discovery rules
Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007)
• FRCP require production based on “possession, custody
or control”
• If responding party has the ability to obtain data, it may be
compelled to do so
• Discoverable information is still protected by
privilege, wherever it exists
Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
Best Practice Recommendations
• Use experts to help put in good practices – we are finding
that most exposures are easily preventable
• Legal should request a technology architecture, data flow
and labor access points from the technology group
• Technologists should request executive summaries on
legal risk around the project
• Legal should choose their battles, knowing that lack of
action is critically risky
Kathryn Legge, Esq.
www.griesinglaw.com
215-732-3924
klegge@griesinglaw.com
Amy H. Larrimore
The Empire Builders Group
www.empirebuilders.com
267-825-7311
me@amylarrimore.com

Contenu connexe

Tendances

CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
Dmcenter
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
William Tanenbaum
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
travismd
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
Dan Michaluk
 
Email Archiving
Email ArchivingEmail Archiving
Email Archiving
Dan Tervo
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Vivastream
 

Tendances (20)

Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
Email Archiving
Email ArchivingEmail Archiving
Email Archiving
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 

En vedette

Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311
Amy Larrimore
 
Manati presentacion
Manati presentacionManati presentacion
Manati presentacion
Rodrigo Ruiz
 

En vedette (16)

Increase Your Revenue 80% Using Technology
Increase Your Revenue 80% Using TechnologyIncrease Your Revenue 80% Using Technology
Increase Your Revenue 80% Using Technology
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
What Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit EditionWhat Technology Can Do For You - The Nonprofit Edition
What Technology Can Do For You - The Nonprofit Edition
 
Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311Applying technology to jumpstart your sales v092311
Applying technology to jumpstart your sales v092311
 
Manati presentacion
Manati presentacionManati presentacion
Manati presentacion
 
SCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with TechnologySCORE Peer Learning: Increasing your services with Technology
SCORE Peer Learning: Increasing your services with Technology
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Twitter: How to Start a Revolution
Twitter: How to Start a RevolutionTwitter: How to Start a Revolution
Twitter: How to Start a Revolution
 
How to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool ApprovedHow to Fool the Lawyers and Get Your SaaS Tool Approved
How to Fool the Lawyers and Get Your SaaS Tool Approved
 
Get Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 PercentGet Rich - Increase Your Revenue 80 Percent
Get Rich - Increase Your Revenue 80 Percent
 
Africa perspectives till 2020
Africa perspectives till 2020Africa perspectives till 2020
Africa perspectives till 2020
 
Kuliah siklus otto
Kuliah siklus ottoKuliah siklus otto
Kuliah siklus otto
 
Latino immigration
Latino immigrationLatino immigration
Latino immigration
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
When a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft BusinessWhen a Website Makes Cents for your Craft Business
When a Website Makes Cents for your Craft Business
 

Similaire à Managing the Legal Concerns of Cloud Computing

httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
EuroCloud
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 

Similaire à Managing the Legal Concerns of Cloud Computing (20)

Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 

Dernier

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Dernier (20)

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 

Managing the Legal Concerns of Cloud Computing

  • 1. Amy Larrimore, The Empire Builders Group Kathryn Legge, Esq., Griesing Law, LLC
  • 2. Kathryn Legge, Esq. Kate Legge was part of the founding team of Griesing Law, LLC. Prior to working at Griesing Law, Kate worked at two AmLaw 100 law firms. She successfully represents both Amy Larrimore public and closely held companies, locally and nationwide, in complex commercial litigation, business counseling, intellectual property and new media matters, including trade secret, copyright, unfair competition and trademark-related disputes. Kate has represented multiple clients in high stakes litigation on a range of legal issues and helps both large and small companies protect their valuable intellectual property. Amy is the managing partner at The Empire Builders Group, which focuses on empowering business to excel in the strategic growth and operational areas She specializes in putting the systems, technologies, and business processes in place to help companies succeed. These areas include information systems management, technology management related to compliance and data analysis, development and support of strategic marketing and sales objectives using technology (including CRM selection and deployment).
  • 3. The Franklin Investment Group (FIG) owns and operates a group of companies that puts on conferences and trade shows. The study highlights the complexities added to the management of cloud computing in a complex technology architecture. Case Study
  • 4. You are negotiating the wrong things at contract close – SaaS doesn’t negotiate •Location •Protections •Notifications The cloud represents less RISK even without preferred terms. Choose Your Battles
  • 5. SaaS forces the user to agree to terms as a point of user experience, not as a construct of contract negotiation. How could this possibly be an agreement in good faith? The Myth of Opt In
  • 6. The risk management challenge is centered in the fact that many different terms of service comprise one workable technology “system” If it was only one…
  • 7.
  • 8. Where exactly is our website? • There are no international rules governing cloud related concerns. • The EU Data Protection Directive provides that transfer of personal data may be made only to member states and to jurisdictions with adequate data security standards. • The US is NOT currently deemed to have adequate data security standards.
  • 9. Jurisdiction • Courts are wiling to recognize personal jurisdiction based on location of cloud computing services. Forward Foods LLC v Next Proteins, Inc., 2008 BL 238516 (N.Y. Sup. 2008) • In some jurisdictions when weighing convenience of a forum, physical recordkeeping takes precedence. Gelmato S.A. v. HTC Corp., 2011 U.S. Dist. LEXIS 133612 (E.D. Tex. Nov. 18, 2011) • Compliance department requires instruction on these issues. Which applies to the FIG Architecture?
  • 10. A well done user experience (UI or UX) should seamlessly hide the transfer between systems. How could a user possibly know which terms of service apply? The Myth of Opt In
  • 11. The Mask of User Experience
  • 12. The Mask of User Experience
  • 13. A well done user experience (UI or UX) could simultaneously show content from many systems. How could a user possibly know which terms of service apply? The Myth of Opt In
  • 15. Privacy, 4th Amendment and Stored Communications Act • Courts are moving in a more protective direction when it comes to the Fourth Amendment and electronically-stored information • Privacy rights in electronically-stored information are not lost solely because that data is stored in a medium owned by another. • The SCA provides a potential loophole in most jurisdictions that may allow the government to issue a subpoena not just for past emails in the possession of the service provider but also future emails.
  • 16.
  • 17. Data Breach • Most courts find that a data breach without subsequent identity theft resulting in pecuniary loss is not sufficient to confer standing. In re Sony Gaming Networks and Customer Data Sec. Breach Litig., No.11md2258, 2012 U.S. Dist. LEXIS 14691 (S.D. Cal Oct. 11, 2012); Anderson v. Hannaford Bros. Co., 659 F.3d 151 (1st Cir. 2011); Resnick v. AvMed Inc., 693 F.3d 1317 (11th Cir. 2012) • Where there is actual evidence of identity theft or use of any compromised information, the case is more likely to survive dismissal
  • 18. Protection of Trade Secrets • CFAA: Computer Fraud and Abuse Act • What is unauthorized access? • Employees, Third Party Providers, Social Media • Importance of policy vs. hardware controls U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012) • Social media • Use or Excessive Use • Social Media Policy
  • 19. Issues in E-Discovery • Parties that store third party data should not expect to be shielded from discovery rules Columbia Pictures, Inc. v. Bunnell, 245 F.R.D. 443 (C.D. Cal. 2007) • FRCP require production based on “possession, custody or control” • If responding party has the ability to obtain data, it may be compelled to do so • Discoverable information is still protected by privilege, wherever it exists Tomlinson v. El Paso Corp.,245 F.R.D. 474 (D. Colo. 2007)
  • 20. Best Practice Recommendations • Use experts to help put in good practices – we are finding that most exposures are easily preventable • Legal should request a technology architecture, data flow and labor access points from the technology group • Technologists should request executive summaries on legal risk around the project • Legal should choose their battles, knowing that lack of action is critically risky
  • 21. Kathryn Legge, Esq. www.griesinglaw.com 215-732-3924 klegge@griesinglaw.com Amy H. Larrimore The Empire Builders Group www.empirebuilders.com 267-825-7311 me@amylarrimore.com