SlideShare a Scribd company logo
1 of 21
M O N I Q U E A LT H E I M
M A N A G I N G C O N S U LT A N T
G L O B A L P R I VA C Y A N D S E C U R I T Y
I B M S E C U R I T Y S E R V I C E S
S A R V E S H M A H A J A N
AT T O R N E Y
W I G G I N A N D D A N A
Practising Law Institute (PLI)
Sixteenth Annual Institute
on Privacy and Data Security Law
New York City
June 8-9, 2015
AGENDA
Topic
1. Introduction
Key Cybersecurity and Privacy Considerations in Deals
2. Cybersecurity and Privacy Provisions
in IT Services and Outsourcing Contracts
3. Special Considerations for Cloud Services Agreements
4. Privacy and Security Issues in M&A
5. Q&A
KEY CYBERSECURITY AND PRIVACY
CONSIDERATIONS IN DEALS
KEY CYBERSECURITY AND PRIVACY
CONSIDERATIONS IN DEALS
• Corporate Transaction, services contract,
outsourcing, cloud-based arrangement, etc.
• Impact on and risks for data
Type of Transaction
• Intellectual Property
• Personally Identifiable Information
Data Being Transferred
• Is any of the data subject to regulation?
• Is the transfer itself regulated?
Legal Obligations
4
KEY CYBERSECURITY AND PRIVACY
CONSIDERATIONS IN DEALS
• Policies
• Contractual Commitments
Other Obligations
• How will the data be protected?
• How has the data been protected?
Data Privacy
and Security
• How does the transfer of the data impact liability for
either party?
• How is liability allocated?
Liability
5
CYBERSECURITY AND PRIVACY
PROVISIONS IN IT SERVICES AND
OUTSOURCING CONTRACTS
IT SERVICES AND OUTSOURCING AGREEMENTS
STANDARD PROVISIONS
• Applicable Law
• Respective roles of the Parties
Legal Compliance
• Business Information
• Intellectual Property
• Personally Identifiable Information
Confidentiality
• Categories and scope of PII covered by the Agreement
• Permitted use of PII
• Location and transfer of PII
Privacy Requirements
• Industry standards (e.g., ISO 270001)
• Contractually defined security protocols
• Background checks for personnel
Security Requirements
7
IT SERVICES AND OUTSOURCING AGREEMENTS
STANDARD PROVISIONS
• Customer Audit Rights
• Independent Third-Party Audits
Information Security and
Privacy Audits
• Procedures
• Notification Requirements
Responding to
Data Breach Incidents
• Cap on Service Provider’s liability and exclusions
• Indemnities for data subject claims, government
claims, other costs (e.g., notification, credit-
monitoring)
Liability and Indemnities
• Cross-Border Transfers
• Subcontracting
Data Transfers
8
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Compliance with Privacy Laws
Service Provider shall comply with all applicable Privacy Laws.
9
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Compliance with Privacy Laws
“Privacy Laws” means: (1) laws regarding data protection and privacy, including any
amendments thereto and regulations promulgated thereunder by any country, state, or other
jurisdiction: (a) where Customer is incorporated, formed, domiciled, or conducting business;
(b) where the proprietor or subject of any of the PII resides, or enters, submits, processes, or
transmits PII; (c) where any of the PII is received, collected, hosted, stored, handled,
processed, or transmitted by any entity pursuant to the terms of this Agreement; or (d) where
Customer is for any other reason legally responsible for the protection of the PII, such laws
including, without limitation, (i) the European Data Protection Directive (95/46/EC) and the
Privacy and Electronic Communications Directive (2002/58/EC), including laws and
regulations that apply to cross-border data transfers; (ii) applicable federal or state laws and
regulations of the United States of America, including the Gramm-Leach-Bliley Act, the Health
Insurance Portability and Accountability Act (HIPAA) of 1996, the Children’s Online Privacy
Protection Act of 1998, laws and regulations of the U.S. Federal Trade Commission, the State
of California and the Commonwealth of Massachusetts; and (iii) the Personal Information
Protection and Electronic Documents Act (“PIPEDA”) in effect in Canada; and (2) any
applicable principles, guidelines and codes issued by a competent data protection authority,
or other competent governmental body or agency, in respect of such laws.
10
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Data Privacy Provisions
Service Provider shall not collect, handle, process, disclose, use or store any PII, except for
performance of the Services, strictly in accordance with this Agreement, and only to the
extent permitted or required by the Privacy Laws or other applicable laws.
Customer shall determine the scope, purposes, and manner for which such PII may be
accessed or processed by Service Provider, and Service Provider shall limit its access to or
use of Customer Personal Data to that which is necessary to provide the Services, comply
with applicable laws, or as otherwise directed by Customer;
If Service Provider is in or comes into possession of PII, Service Provider shall identify, in
writing, to Customer the locations at which the PII is collected, handled, processed,
disclosed, used or stored.
Service Provider shall not relocate or transfer PII to locations other than those identified
pursuant to [the SoW] herein, except in compliance with the Privacy Laws and with
Customer’s prior written consent.
11
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Security Obligations
Service Provider shall implement and maintain appropriate data security measures to ensure
that Customer Data is protected against loss, damage, destruction or any form of
unauthorized or unlawful collection, handling, processing, disclosure, usage and/or storage in
accordance with (1) the highest industry standards, (2) the security requirements set forth in
[Schedule X], and (3) Privacy Laws. Service Provider shall further maintain and comply with,
a comprehensive written information security program with respect to the collection, handling,
processing, disclosure, use and storage of Customer Data, consistent with the Privacy Laws,
that includes administrative, technical and physical safeguards to protect the security,
integrity, and confidentiality of Customer Data.
12
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Data Breach Incidents
In the event of any actual or potential unauthorized or unlawful access to Customer Data or
unauthorized or unlawful access to Service Provider Systems that are use to receive, access,
store, process, transmit, or otherwise use Customer Data (“Data Breach Incident”), Service
Provider shall immediately notify Customer of the Data Breach Incident. Service Provider
shall expediently investigate the Data Breach Incident, provide Customer a report on its
investigation of the Data Breach Incident. Service Provider shall take all appropriate
measures to mitigate the effects on Customer Data of any such Data Breach Incident. The
parties shall cooperate to resolve any data privacy or security issues involving PII, and to
make any required notifications to individuals affected by the Data Breach Incident. Service
Provider shall be responsible for all costs related to its investigation of the Data Breach
Incident and providing any required notifications to individuals affected by the Data Breach
Incident.
Notwithstanding anything to the contrary in this Agreement, Service Provider’s responsibility
and liability for all costs related to its investigation of Data Breach Incidents and providing
legally required notification to all individuals affected by Data Breach Incidents will not be
subject to any limitation of liability to which the parties have, or in the future may agree or
refer in this Agreement.
13
IT SERVICES AND OUTSOURCING AGREEMENTS
DISCUSSION OF SAMPLE PROVISIONS
Indemnification
Service Provider shall defend, indemnify and hold harmless Customer and its affiliates and
their respective officers, directors, employees, agents, contractors, customers, successors,
and assigns from and against any and all losses arising out of relating to Service Provider’s
breach of its obligations with respect to Customer Data, Service Provider’s violation of
Privacy Laws, or any Data Breach Incident involving Customer Data in Service Provider’s
possession or control.
Notwithstanding anything to the contrary in this Agreement, Service Provider’s
indemnification obligations under this Section will not be subject to any limitation of liability to
which the parties have, or in the future may agree or refer in this Agreement.
14
SPECIAL CONSIDERATIONS FOR
CLOUD SERVICE AGREEMENTS
SPECIAL CONSIDERATIONS FOR
CLOUD SERVICES AGREEMENTS
• Public, Private, Hybrid, Managed Clouds
• IaaS, Paas, Saas
Type of Cloud Service?
• U.S: HIPAA/HITECH, G.LB. Mass. Security Laws
• FFIEC Statement on Cloud Computing; NIST Cloud
Computing Guidelines; PCI DSS Cloud Computing
Guidelines
• EU Data Protection Framework; Art. 29 WP Cloud Opinion
Location and Sector of
Client’s Business May
Restrict Choices
• Russia’s “Localization Law”
• Proposed EU Regulation
Location of Client’s
Market May Restrict
Choices
• U.S.: Patriot Act
• Microsoft Case: extraterritorial reach of U.S. Law
Location of Cloud
Service Provider’s Data
Centers
16
PRIVACY AND SECURITY ISSUES IN M&A
PRIVACY AND SECURITY ISSUES IN M&A
TWO KEY CONCERNS
• Data Breach Incidents
• Violations of Law
Allocation of
Pre-Closing Liability
• Contractual or policy restrictions
• Legal compliance obligations
• Practical limitations
Restrictions on
Use and Integration
of Information
18
PRIVACY AND SECURITY ISSUES IN M&A
DUE DILIGENCE CHECKLIST
Privacy Policies
Security Policies and Practices
Incident Response Protocols
Privacy and Security Officers
Training
1
2
3
4
5
19
PRIVACY AND SECURITY ISSUES IN M&A
DUE DILIGENCE CHECKLIST
Audits Reports
Certifications
Background Checks
Prior Incidents
Cross-Border Transfers
6
7
8
9
10
20
Monique Altheim, Esq., CIPP/US, CIPP/E
Managing Consultant, Global Privacy and Security
IBM Security Services
New York
+1.347.628.1479
malthei@ibm.com
Sarvesh Mahajan
Attorney
Wiggin and Dana, LLP
New York
+1.212-551-2626
smahajan@wiggin.com
Thanks for listening!
Any questions…

More Related Content

What's hot

Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsTrustArc
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementTrustArc
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Cobb Digital Bitesize workshop - GDPR, are you compliant?
Cobb Digital Bitesize workshop - GDPR, are you compliant?Cobb Digital Bitesize workshop - GDPR, are you compliant?
Cobb Digital Bitesize workshop - GDPR, are you compliant?Lauren Isaacs
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesAmazon Web Services
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsTrustArc
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa complianceTrustArc
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulationGreg Ezeilo
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketingSpotler
 

What's hot (20)

Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR Management
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Cobb Digital Bitesize workshop - GDPR, are you compliant?
Cobb Digital Bitesize workshop - GDPR, are you compliant?Cobb Digital Bitesize workshop - GDPR, are you compliant?
Cobb Digital Bitesize workshop - GDPR, are you compliant?
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & Implications
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
GDPR changes affect direct marketing
GDPR changes affect direct marketingGDPR changes affect direct marketing
GDPR changes affect direct marketing
 

Viewers also liked

How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsAltheimPrivacy
 
Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Mary Howrey
 
كيفية إضافة تقرير المواطن
كيفية إضافة تقرير المواطنكيفية إضافة تقرير المواطن
كيفية إضافة تقرير المواطنTom Trewinnard
 
8. Comparative History: Article Readings
8. Comparative History: Article Readings8. Comparative History: Article Readings
8. Comparative History: Article Readings03ram
 
Interview Questions for Organisations
Interview Questions for OrganisationsInterview Questions for Organisations
Interview Questions for OrganisationsNoel Hatch
 
Involving citizens in the re use of assets
Involving citizens in the re use of assetsInvolving citizens in the re use of assets
Involving citizens in the re use of assetsNoel Hatch
 
Drishtee village Immersion Program
Drishtee village Immersion ProgramDrishtee village Immersion Program
Drishtee village Immersion ProgramChandra Vikash
 
040 0049-01 b-nfsu-system_manual-web
040 0049-01 b-nfsu-system_manual-web040 0049-01 b-nfsu-system_manual-web
040 0049-01 b-nfsu-system_manual-webLucciodavid
 
Urban Games to Make a Living
Urban Games to Make a LivingUrban Games to Make a Living
Urban Games to Make a LivingNoel Hatch
 
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)Tom Trewinnard
 
Stimulants Workshop
Stimulants WorkshopStimulants Workshop
Stimulants WorkshopNoel Hatch
 
American Urbanization: New York City
American Urbanization: New York CityAmerican Urbanization: New York City
American Urbanization: New York Citymeggss24
 
Make your Future
Make your FutureMake your Future
Make your FutureNoel Hatch
 
How to post a Citizen Report (EN)
How to post a Citizen Report (EN)How to post a Citizen Report (EN)
How to post a Citizen Report (EN)Tom Trewinnard
 
Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)03ram
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...AltheimPrivacy
 
2006 annual audited financial statements
2006 annual audited financial statements2006 annual audited financial statements
2006 annual audited financial statementsProphecy Corp
 

Viewers also liked (20)

How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social AdsHow to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
How to Hide Your Page "Likes" from Facebook Graph Search and Social Ads
 
Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013Senior Health Insurance_DVU_September 12 2013
Senior Health Insurance_DVU_September 12 2013
 
LinkedIn for Lawyers
LinkedIn for Lawyers LinkedIn for Lawyers
LinkedIn for Lawyers
 
كيفية إضافة تقرير المواطن
كيفية إضافة تقرير المواطنكيفية إضافة تقرير المواطن
كيفية إضافة تقرير المواطن
 
8. Comparative History: Article Readings
8. Comparative History: Article Readings8. Comparative History: Article Readings
8. Comparative History: Article Readings
 
Interview Questions for Organisations
Interview Questions for OrganisationsInterview Questions for Organisations
Interview Questions for Organisations
 
Involving citizens in the re use of assets
Involving citizens in the re use of assetsInvolving citizens in the re use of assets
Involving citizens in the re use of assets
 
Drishtee village Immersion Program
Drishtee village Immersion ProgramDrishtee village Immersion Program
Drishtee village Immersion Program
 
1403903271
14039032711403903271
1403903271
 
040 0049-01 b-nfsu-system_manual-web
040 0049-01 b-nfsu-system_manual-web040 0049-01 b-nfsu-system_manual-web
040 0049-01 b-nfsu-system_manual-web
 
Urban Games to Make a Living
Urban Games to Make a LivingUrban Games to Make a Living
Urban Games to Make a Living
 
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)
Checkdesk @ IPI News Innovation Platform, London (Sep 13, 2013)
 
Stimulants Workshop
Stimulants WorkshopStimulants Workshop
Stimulants Workshop
 
Survey
SurveySurvey
Survey
 
American Urbanization: New York City
American Urbanization: New York CityAmerican Urbanization: New York City
American Urbanization: New York City
 
Make your Future
Make your FutureMake your Future
Make your Future
 
How to post a Citizen Report (EN)
How to post a Citizen Report (EN)How to post a Citizen Report (EN)
How to post a Citizen Report (EN)
 
Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)Hist.141 (Little Ice Age)
Hist.141 (Little Ice Age)
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
 
2006 annual audited financial statements
2006 annual audited financial statements2006 annual audited financial statements
2006 annual audited financial statements
 

Similar to Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)

Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor WebinarEthisphere
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowRachel Roach
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataUlf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big dataRoger Royse
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companiesRoger Royse
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm finalLou Milrad
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLou Milrad
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 septRachel Aldighieri
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 

Similar to Security and Privacy in Deals (altheim & mahajan)(6-3 -2015) (20)

Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
GDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to KnowGDPR & Your Cloud Provider - What You Need to Know
GDPR & Your Cloud Provider - What You Need to Know
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Legal challenges of big data
Legal challenges of big dataLegal challenges of big data
Legal challenges of big data
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm final
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud Services
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 

More from AltheimPrivacy

NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyRipped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyAltheimPrivacy
 
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...AltheimPrivacy
 
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...AltheimPrivacy
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...AltheimPrivacy
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Three Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookThree Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookAltheimPrivacy
 
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
Cross Border Ediscovery vs. EU Data Protection at LegalTech West CoastAltheimPrivacy
 
Facebook New Changes 2011
Facebook New Changes 2011Facebook New Changes 2011
Facebook New Changes 2011AltheimPrivacy
 

More from AltheimPrivacy (9)

NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data PrivacyRipped from the Headlines: Cautionary Tales from the Annals of Data Privacy
Ripped from the Headlines: Cautionary Tales from the Annals of Data Privacy
 
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
 
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...
Bridging U.S. Cross-Border Ediscovery Obligations and EU Data Protection Obli...
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Three Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on FacebookThree Easy Steps To Basic Privacy/Security on Facebook
Three Easy Steps To Basic Privacy/Security on Facebook
 
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 
Facebook New Changes 2011
Facebook New Changes 2011Facebook New Changes 2011
Facebook New Changes 2011
 

Recently uploaded

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Recently uploaded (20)

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)

  • 1. M O N I Q U E A LT H E I M M A N A G I N G C O N S U LT A N T G L O B A L P R I VA C Y A N D S E C U R I T Y I B M S E C U R I T Y S E R V I C E S S A R V E S H M A H A J A N AT T O R N E Y W I G G I N A N D D A N A Practising Law Institute (PLI) Sixteenth Annual Institute on Privacy and Data Security Law New York City June 8-9, 2015
  • 2. AGENDA Topic 1. Introduction Key Cybersecurity and Privacy Considerations in Deals 2. Cybersecurity and Privacy Provisions in IT Services and Outsourcing Contracts 3. Special Considerations for Cloud Services Agreements 4. Privacy and Security Issues in M&A 5. Q&A
  • 3. KEY CYBERSECURITY AND PRIVACY CONSIDERATIONS IN DEALS
  • 4. KEY CYBERSECURITY AND PRIVACY CONSIDERATIONS IN DEALS • Corporate Transaction, services contract, outsourcing, cloud-based arrangement, etc. • Impact on and risks for data Type of Transaction • Intellectual Property • Personally Identifiable Information Data Being Transferred • Is any of the data subject to regulation? • Is the transfer itself regulated? Legal Obligations 4
  • 5. KEY CYBERSECURITY AND PRIVACY CONSIDERATIONS IN DEALS • Policies • Contractual Commitments Other Obligations • How will the data be protected? • How has the data been protected? Data Privacy and Security • How does the transfer of the data impact liability for either party? • How is liability allocated? Liability 5
  • 6. CYBERSECURITY AND PRIVACY PROVISIONS IN IT SERVICES AND OUTSOURCING CONTRACTS
  • 7. IT SERVICES AND OUTSOURCING AGREEMENTS STANDARD PROVISIONS • Applicable Law • Respective roles of the Parties Legal Compliance • Business Information • Intellectual Property • Personally Identifiable Information Confidentiality • Categories and scope of PII covered by the Agreement • Permitted use of PII • Location and transfer of PII Privacy Requirements • Industry standards (e.g., ISO 270001) • Contractually defined security protocols • Background checks for personnel Security Requirements 7
  • 8. IT SERVICES AND OUTSOURCING AGREEMENTS STANDARD PROVISIONS • Customer Audit Rights • Independent Third-Party Audits Information Security and Privacy Audits • Procedures • Notification Requirements Responding to Data Breach Incidents • Cap on Service Provider’s liability and exclusions • Indemnities for data subject claims, government claims, other costs (e.g., notification, credit- monitoring) Liability and Indemnities • Cross-Border Transfers • Subcontracting Data Transfers 8
  • 9. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Compliance with Privacy Laws Service Provider shall comply with all applicable Privacy Laws. 9
  • 10. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Compliance with Privacy Laws “Privacy Laws” means: (1) laws regarding data protection and privacy, including any amendments thereto and regulations promulgated thereunder by any country, state, or other jurisdiction: (a) where Customer is incorporated, formed, domiciled, or conducting business; (b) where the proprietor or subject of any of the PII resides, or enters, submits, processes, or transmits PII; (c) where any of the PII is received, collected, hosted, stored, handled, processed, or transmitted by any entity pursuant to the terms of this Agreement; or (d) where Customer is for any other reason legally responsible for the protection of the PII, such laws including, without limitation, (i) the European Data Protection Directive (95/46/EC) and the Privacy and Electronic Communications Directive (2002/58/EC), including laws and regulations that apply to cross-border data transfers; (ii) applicable federal or state laws and regulations of the United States of America, including the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Children’s Online Privacy Protection Act of 1998, laws and regulations of the U.S. Federal Trade Commission, the State of California and the Commonwealth of Massachusetts; and (iii) the Personal Information Protection and Electronic Documents Act (“PIPEDA”) in effect in Canada; and (2) any applicable principles, guidelines and codes issued by a competent data protection authority, or other competent governmental body or agency, in respect of such laws. 10
  • 11. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Data Privacy Provisions Service Provider shall not collect, handle, process, disclose, use or store any PII, except for performance of the Services, strictly in accordance with this Agreement, and only to the extent permitted or required by the Privacy Laws or other applicable laws. Customer shall determine the scope, purposes, and manner for which such PII may be accessed or processed by Service Provider, and Service Provider shall limit its access to or use of Customer Personal Data to that which is necessary to provide the Services, comply with applicable laws, or as otherwise directed by Customer; If Service Provider is in or comes into possession of PII, Service Provider shall identify, in writing, to Customer the locations at which the PII is collected, handled, processed, disclosed, used or stored. Service Provider shall not relocate or transfer PII to locations other than those identified pursuant to [the SoW] herein, except in compliance with the Privacy Laws and with Customer’s prior written consent. 11
  • 12. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Security Obligations Service Provider shall implement and maintain appropriate data security measures to ensure that Customer Data is protected against loss, damage, destruction or any form of unauthorized or unlawful collection, handling, processing, disclosure, usage and/or storage in accordance with (1) the highest industry standards, (2) the security requirements set forth in [Schedule X], and (3) Privacy Laws. Service Provider shall further maintain and comply with, a comprehensive written information security program with respect to the collection, handling, processing, disclosure, use and storage of Customer Data, consistent with the Privacy Laws, that includes administrative, technical and physical safeguards to protect the security, integrity, and confidentiality of Customer Data. 12
  • 13. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Data Breach Incidents In the event of any actual or potential unauthorized or unlawful access to Customer Data or unauthorized or unlawful access to Service Provider Systems that are use to receive, access, store, process, transmit, or otherwise use Customer Data (“Data Breach Incident”), Service Provider shall immediately notify Customer of the Data Breach Incident. Service Provider shall expediently investigate the Data Breach Incident, provide Customer a report on its investigation of the Data Breach Incident. Service Provider shall take all appropriate measures to mitigate the effects on Customer Data of any such Data Breach Incident. The parties shall cooperate to resolve any data privacy or security issues involving PII, and to make any required notifications to individuals affected by the Data Breach Incident. Service Provider shall be responsible for all costs related to its investigation of the Data Breach Incident and providing any required notifications to individuals affected by the Data Breach Incident. Notwithstanding anything to the contrary in this Agreement, Service Provider’s responsibility and liability for all costs related to its investigation of Data Breach Incidents and providing legally required notification to all individuals affected by Data Breach Incidents will not be subject to any limitation of liability to which the parties have, or in the future may agree or refer in this Agreement. 13
  • 14. IT SERVICES AND OUTSOURCING AGREEMENTS DISCUSSION OF SAMPLE PROVISIONS Indemnification Service Provider shall defend, indemnify and hold harmless Customer and its affiliates and their respective officers, directors, employees, agents, contractors, customers, successors, and assigns from and against any and all losses arising out of relating to Service Provider’s breach of its obligations with respect to Customer Data, Service Provider’s violation of Privacy Laws, or any Data Breach Incident involving Customer Data in Service Provider’s possession or control. Notwithstanding anything to the contrary in this Agreement, Service Provider’s indemnification obligations under this Section will not be subject to any limitation of liability to which the parties have, or in the future may agree or refer in this Agreement. 14
  • 15. SPECIAL CONSIDERATIONS FOR CLOUD SERVICE AGREEMENTS
  • 16. SPECIAL CONSIDERATIONS FOR CLOUD SERVICES AGREEMENTS • Public, Private, Hybrid, Managed Clouds • IaaS, Paas, Saas Type of Cloud Service? • U.S: HIPAA/HITECH, G.LB. Mass. Security Laws • FFIEC Statement on Cloud Computing; NIST Cloud Computing Guidelines; PCI DSS Cloud Computing Guidelines • EU Data Protection Framework; Art. 29 WP Cloud Opinion Location and Sector of Client’s Business May Restrict Choices • Russia’s “Localization Law” • Proposed EU Regulation Location of Client’s Market May Restrict Choices • U.S.: Patriot Act • Microsoft Case: extraterritorial reach of U.S. Law Location of Cloud Service Provider’s Data Centers 16
  • 17. PRIVACY AND SECURITY ISSUES IN M&A
  • 18. PRIVACY AND SECURITY ISSUES IN M&A TWO KEY CONCERNS • Data Breach Incidents • Violations of Law Allocation of Pre-Closing Liability • Contractual or policy restrictions • Legal compliance obligations • Practical limitations Restrictions on Use and Integration of Information 18
  • 19. PRIVACY AND SECURITY ISSUES IN M&A DUE DILIGENCE CHECKLIST Privacy Policies Security Policies and Practices Incident Response Protocols Privacy and Security Officers Training 1 2 3 4 5 19
  • 20. PRIVACY AND SECURITY ISSUES IN M&A DUE DILIGENCE CHECKLIST Audits Reports Certifications Background Checks Prior Incidents Cross-Border Transfers 6 7 8 9 10 20
  • 21. Monique Altheim, Esq., CIPP/US, CIPP/E Managing Consultant, Global Privacy and Security IBM Security Services New York +1.347.628.1479 malthei@ibm.com Sarvesh Mahajan Attorney Wiggin and Dana, LLP New York +1.212-551-2626 smahajan@wiggin.com Thanks for listening! Any questions…