Your SlideShare is downloading. ×
0
 Procuring Software and Information Technology<br />The Legal and Business Issues Presented<br />The Computer Forensics Sh...
An Initial Risk Assessment<br />Security Risk Management Guidance<br />The Risk Matrix is a classification tool used to ra...
Cloud Legal Risks<br />ENISA (European Network and  Information Security Agency) )  and Cloud Security Alliance Leading Pr...
Key legal questions the customer should ask the cloud provider<br />ENISA (European Network and  Information Security Agen...
Key legal Recommendations for Cloud Computing <br />ENISA (European Network and  Information Security Agency) ) and Cloud ...
The Selection Process<br />Value <br />Value <br />Strategic <br />Strategic <br />Delivery<br />Delivery<br />Alignment<b...
Selection Process<br />Requests for Proposal<br />Establishing technical requirements<br />Establishing security requireme...
Products and Services<br />Pricing<br />MFN provisions, pass-throughs of cost savings<br />Change Control<br />How are dis...
Intellectual Property Rights<br />Will any new intellectual property be created?  If so, who will own it?  What rights wil...
Representations and Warranties<br />Sophisticated customers will require a number of representations and warranties and al...
Liability and Remedies<br />Scope of possible injuries for which vendor may be liable<br />Monetary Limits<br />Indemnific...
Governance and Dispute Resolution<br />Relationship Governance<br />Designated project managers and key employees<br />Esc...
Term and Termination	<br />Typical duration of a contract<br />Vendors will rarely want contracts that extend more than 3-...
Appendices<br />Appendix A:  Identifying Constituencies and What Matters to Them<br />Appendix B:  Governmental, Regulator...
Appendix A: Identifying Constituencies and What Matters to Them<br /> <br />
Appendix A: Identifying Constituencies and What Matters to Them (continued)<br />
Appendix B:  Governmental and Regulatory Touch Points<br />
Appendix B:  Governmental and Regulatory Touch Points (continued)<br />
Appendix B (continued): Privacy Law Touch Points<br />
Appendix C:  What We Examine When Assessing “Security” <br />NIST SP 800-53 defines the security controls required by FISM...
Presenters<br />
Upcoming SlideShare
Loading in...5
×

Procurement Of Software And Information Technology Services

401

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
401
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Assets:Company reputation, Customer trust PII, EPHI, PCI, Hardware Persons who support and use the IT systemKey: Know the value of your data Data ClassificationThreatAbuse and Nefarious Use of Cloud ComputingInsecure Application Programming Interfaces Malicious Insiders Shared Technology VulnerabilitiesData Loss/LeakageAccount, Service &amp; Traffic HijackingUnknown Risk ProfileVulnerability Lack of resource isolation Storage of data in multiple jurisdictions and lack of transparency about THIS Lack of information on jurisdictions Lack of completeness and transparency in terms of use
  • Subpoena and E-DiscoveryIn the event of the confiscation of physical hardware as a result of subpoena by law-enforcement agencies or civil suits . the centralization of storage as well as shared tenancy of physical hardware means many more clients are at risk of the disclosure of their data to unwanted parties.Risk From changes of JurisdictionsCustomer data may be held in multiple jurisdictions, some of which may be high risk. If data centers are located in high-risk countries, e.g., those. lacking the rule of law and having an unpredictable legal framework and enforcement, autocratic police states, states that do not respect international agreements, etc, sites could be raided by local authorities and data or systems subject to enforced disclosure or seizure. Data Protection RisksIt can be difficult for the cloud customer to effectively check the data processing that the cloud provider carries out, and thus be sure that the data is handled in a lawful way. It has to be clear that the cloud customer will be the main person responsible for the processing of personal data, even when such processing is carried out by the cloud provider in its role of external processor. Failure to comply with data protection law may lead to administrative, civil and also criminal sanctionsCloud Computing data processing and data security activities and the data controls they have in place, e.g.,. SAS70 certification providers.There may be data security breaches which are not notified to the controller by the cloud provider.The cloud customer may lose control of the data processed by the cloud provider. This issue is increased in the case of multiple transfers of data (e.g., between federated cloud providers). The cloud provider may receive data that have not been lawfully collected by its customer (the controller).Licensing RisksLicensing conditions, such as per-seat agreements, and online licensing checks may become unworkable in a cloud environment.In the case of PaaS and IaaS, there is the possibility for creating original work in the cloud (new applications, software etc). As with all intellectual property, if not protected by the appropriate contractual clauses
  • Transcript of "Procurement Of Software And Information Technology Services"

    1. 1. Procuring Software and Information Technology<br />The Legal and Business Issues Presented<br />The Computer Forensics Show<br />Hotel Pennsylvania, New York, NY<br />April 19, 2011<br />
    2. 2. An Initial Risk Assessment<br />Security Risk Management Guidance<br />The Risk Matrix is a classification tool used to rate security risks based on impact and probability<br />
    3. 3. Cloud Legal Risks<br />ENISA (European Network and Information Security Agency) ) and Cloud Security Alliance Leading Practices<br />
    4. 4. Key legal questions the customer should ask the cloud provider<br />ENISA (European Network and Information Security Agency) ) and Cloud Security Alliance Leading Practices<br />In what country is the cloud provider located? <br />Is the cloud provider’s infrastructure located in the same country or in different countries? <br />Will the cloud provider use other companies whose infrastructure is located outside that of the cloud provider? <br />Where will the data be physically located? <br />Will jurisdiction over the contract terms and over the data be divided? <br />Will any of the cloud provider’s services be subcontracted out? <br />Will any of the cloud provider’s services be outsourced? <br />How will the data provided by the customer and the customer’s customers, be collected, processed and transferred? <br />What happens to the data sent to the cloud provider upon termination of the contract? <br />
    5. 5. Key legal Recommendations for Cloud Computing <br />ENISA (European Network and Information Security Agency) ) and Cloud Security Alliance Leading Practices<br />Customers and cloud providers must have a mutual understanding of each other’s roles and responsibilities related to electronic discovery, including such activities as litigation hold, discovery searches, who provides expert testimony, etc.<br />Cloud providers are advised to assure their information security systems are responsive to customer requirements to preserve data as authentic and reliable, including both primary and secondary information such as metadata and log files.<br /> Data in the custody of cloud service providers must receive equivalent guardianship as in the hands of their original owner or custodian.<br />Plan for both expected and unexpected termination of the relationship in the contract negotiations, and for an orderly return or secure disposal of assets.<br />Pre-contract due diligence, contract term negotiation, post-contract monitoring, and contract termination, and the transition of data custodianship are components of the duty of care required of a cloud services client.<br />Knowing where the cloud service provider will host the data is a prerequisite to implementing the required measures to ensure compliance with local laws that restrict the cross-border flow of data.<br />As the custodian of the personal data of its employees or clients, and of the company’s other intellectual property assets, a company that uses Cloud Computing services should ensure that it retains ownership of its data in its original and authenticable format.<br /> Numerous security issues, such as suspected data breaches, must be addressed in specific provisions of the service agreement that clarify the respective commitments of the cloud service provider and the client.<br />The cloud service provider and the client should have a unified process for responding to subpoenas, service of process, and other legal requests.<br />The cloud services agreement must allow the cloud services client or designated third party to monitor the service provider’s performance and test for vulnerabilities in the system.<br />The parties to a cloud services agreement should ensure that the agreement anticipates problems relating to recovery of the client’s data after their contractual relationship terminates.<br />
    6. 6. The Selection Process<br />Value <br />Value <br />Strategic <br />Strategic <br />Delivery<br />Delivery<br />Alignment<br />Alignment<br />IT <br />IT <br />IT <br />Governance<br />Governance<br />Governance<br />Focus Areas<br />Domains<br />Domains<br />Risk <br />Risk <br />Management<br />Management<br />Performance <br />Measurement<br />Performance <br />Measurement<br />Resource <br />Resource <br />Management<br />Management<br />Stakeholders<br />Using Risk Assessment<br />Establishing a Governance Process At the Outset<br />
    7. 7. Selection Process<br />Requests for Proposal<br />Establishing technical requirements<br />Establishing security requirements: Gap analysis between vendor policies and customer requirements<br />Requesting comments on contract terms during RFP process<br />Upgrading Vendor’s Security Policies<br />
    8. 8. Products and Services<br />Pricing<br />MFN provisions, pass-throughs of cost savings<br />Change Control<br />How are disagreements about change requirements managed?<br />Acceptance/Rejection<br />Service Levels<br />
    9. 9. Intellectual Property Rights<br />Will any new intellectual property be created? If so, who will own it? What rights will the non-owner retain?<br />Will licenses survive termination?<br />
    10. 10. Representations and Warranties<br />Sophisticated customers will require a number of representations and warranties and also require indemnification if they are breached:<br />Ownership of all IP rights;<br />Compliance with all applicable law;<br />Employees with appropriate skills and background;<br />Systems are secure and properly maintained;<br />Industry standard disaster recovery and back-up measures are in place;<br />Data is not stored or maintained in a manner other than described to customer.<br />
    11. 11. Liability and Remedies<br />Scope of possible injuries for which vendor may be liable<br />Monetary Limits<br />Indemnification<br />Service Level Credits<br />Repair/Replacement<br />
    12. 12. Governance and Dispute Resolution<br />Relationship Governance<br />Designated project managers and key employees<br />Escalation clauses<br />Arbitration vs. Court<br />Fast track arbitration mechanisms<br />Continuing payments and work during disputes<br />
    13. 13. Term and Termination <br />Typical duration of a contract<br />Vendors will rarely want contracts that extend more than 3-4 years.<br />Termination for cause<br />Right of customer to terminate for convenience<br />Often means termination fees.<br />Exit Assistance<br />Demand the creation of a plan at the outset that provides for transfer of data, equipment, and knowledge<br />May be the most important item for customer’s leverage, it is important that vendor know customer can end the agreement without too much pain<br />Escrow Provisions/Step-In<br />This is customer’s best protection in the event of a bankruptcy or major failure, but it requires a commitment to make sure escrow is maintained and can be used by customer.<br />It is also important to avoid the potential to get “gummed up” by arbitration over whether it is properly triggered.<br />
    14. 14. Appendices<br />Appendix A: Identifying Constituencies and What Matters to Them<br />Appendix B: Governmental, Regulatory, and Privacy Touch Points<br />Appendix C: What Do We Examine When Assessing ‘Security?’<br />
    15. 15. Appendix A: Identifying Constituencies and What Matters to Them<br /> <br />
    16. 16. Appendix A: Identifying Constituencies and What Matters to Them (continued)<br />
    17. 17. Appendix B: Governmental and Regulatory Touch Points<br />
    18. 18. Appendix B: Governmental and Regulatory Touch Points (continued)<br />
    19. 19. Appendix B (continued): Privacy Law Touch Points<br />
    20. 20. Appendix C: What We Examine When Assessing “Security” <br />NIST SP 800-53 defines the security controls required by FISMA (as summarized by SecureIT at: www.secureit.com/resources/WP_FISMA_and_SAS_70.pdf):<br />
    21. 21. Presenters<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×