SlideShare a Scribd company logo
1 of 15
Top Ten IT Legal Issues for the
Enterprise
Brad Frazer
bfrazer@hawleytroxell.com
208.388.4875
@bfrazjd
INTERFACE Boise
September 5, 2013
Introduction
• Legal and IT Inextricably Combined
• Issue Spotting Guide
• Key Take-Aways (“KTAs”) on each
slide
• Objective: to help you have
defenses when your company get
sued
BYOD/Mobility
• Threats: Increased opportunities
for mischief. Examples: warranties,
contract terms, SoMe
• KTA: Top-down employee control
via HR, IT and Legal
Privacy
• Threats: Disclosure of PII
• Caveats: HIPAA, GLB, COPPA
• KTA: Know relevant regulatory
environment; implement and
follow policies
Big Data and Data Ownership
• Threats: Who owns the data?
• Why do you care? $$$$$
• KTA: Clear policies regarding data
ownership; ties in to Privacy Policy
Social Media Policies
• Threats: Defamation, trademark
infringement, copyright
infringement
• KTA: DNMYWGS, but creates a
defense
Cloud/SAAS Versus Traditional
Licensing
• Threats: Not knowing what you
have creates operational, merger,
exit difficulties
• KTA: Is it a license or a
subscription agreement? They are
different!
Document Retention/Destruction
• Threats: Litigation!
• KTA: Think of it as a document
destruction policy and follow it
scrupulously!
The Idaho Cloud Services
Clarification Act
• Threats: Sales and Use Taxes on
Cloud-based Services
• KTA: New legislation defines cloud
services as “not software”
Data Backup and Security
• Threats: Regulatory violations;
litigation
• KTA: Don’t promise what you
cannot deliver (contracts, SLAs)
In-Bound Enterprise Licensing
• Threats: “It doesn’t work!” OR,
Audit letter from, e.g., BSA
• KTA: (1) Deliverables-based
payments; (2) stop the click-wrap
madness; (3) license awareness!
Data Breach
• Threats: Regulatory smack-down
(states vary)
• KTA: Know your regulatory
environment and comply
religiously; employee policies
regarding hacking
Bonus Topic!
New gTLDs
• Threat: You are Nike, and you do
not own Nike.shoes
• KTA: Trademark Clearinghouse
and Sunrise Periods
Conclusion
All of these are legal exposures and
issues for the enterprise, and at some
point, IT is implicated.
www.hawleytroxell.com
THANK YOU!
Brad Frazer
bfrazer@hawleytroxell.com
208.388.4875
@bfrazjd

More Related Content

What's hot

Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
ipspat
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Shawn Tuma
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving Change
Iron Mountain
 

What's hot (20)

Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
Wearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rightsWearable technologies, privacy and intellectual property rights
Wearable technologies, privacy and intellectual property rights
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
S719a
S719aS719a
S719a
 
GDPR introduction
GDPR introductionGDPR introduction
GDPR introduction
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
SOX: A Short Guide to Compliance
SOX: A Short Guide to ComplianceSOX: A Short Guide to Compliance
SOX: A Short Guide to Compliance
 
Privacy by design Austin Chambers 11-9-17
Privacy by design Austin Chambers 11-9-17Privacy by design Austin Chambers 11-9-17
Privacy by design Austin Chambers 11-9-17
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Enterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving ChangeEnterprise Discovery: Taking Control, Driving Change
Enterprise Discovery: Taking Control, Driving Change
 

Viewers also liked (7)

Health Care Reform Shared Responsibility Presentation
Health Care Reform Shared Responsibility Presentation Health Care Reform Shared Responsibility Presentation
Health Care Reform Shared Responsibility Presentation
 
Copyrights, Trademarks, and Fair Use for Authors
Copyrights, Trademarks, and Fair Use for AuthorsCopyrights, Trademarks, and Fair Use for Authors
Copyrights, Trademarks, and Fair Use for Authors
 
Legal Implications of a Mobile Enterprise
Legal Implications of a Mobile EnterpriseLegal Implications of a Mobile Enterprise
Legal Implications of a Mobile Enterprise
 
Who Owns the Code? A Brief Guide to Software Ownership for Developers and End...
Who Owns the Code? A Brief Guide to Software Ownership for Developers and End...Who Owns the Code? A Brief Guide to Software Ownership for Developers and End...
Who Owns the Code? A Brief Guide to Software Ownership for Developers and End...
 
Software Law for Developers
Software Law for DevelopersSoftware Law for Developers
Software Law for Developers
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 

Similar to Top Ten IT Legal Issues for the Enterprise

2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
 

Similar to Top Ten IT Legal Issues for the Enterprise (20)

Drive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory ComplianceDrive Data Privacy Regulatory Compliance
Drive Data Privacy Regulatory Compliance
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
5 Questions To Ask Before Getting Started With Data Annotation
5 Questions To Ask Before Getting Started With Data Annotation5 Questions To Ask Before Getting Started With Data Annotation
5 Questions To Ask Before Getting Started With Data Annotation
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 

More from Hawley Troxell

Show Me the Money: Key Things to Remember When Commercializing Your Code
Show Me the Money: Key Things to Remember When Commercializing Your CodeShow Me the Money: Key Things to Remember When Commercializing Your Code
Show Me the Money: Key Things to Remember When Commercializing Your Code
Hawley Troxell
 
Intellectual Property Issues in International Commerce
Intellectual Property Issues in International CommerceIntellectual Property Issues in International Commerce
Intellectual Property Issues in International Commerce
Hawley Troxell
 
Protecting Your Internet Brand
Protecting Your Internet BrandProtecting Your Internet Brand
Protecting Your Internet Brand
Hawley Troxell
 
Top 10 Internet Issues
Top 10 Internet Issues Top 10 Internet Issues
Top 10 Internet Issues
Hawley Troxell
 
Employee Benefits Update for 2012
Employee Benefits Update for 2012Employee Benefits Update for 2012
Employee Benefits Update for 2012
Hawley Troxell
 
Municipal Finance Presentation 2011
Municipal Finance Presentation 2011Municipal Finance Presentation 2011
Municipal Finance Presentation 2011
Hawley Troxell
 

More from Hawley Troxell (6)

Show Me the Money: Key Things to Remember When Commercializing Your Code
Show Me the Money: Key Things to Remember When Commercializing Your CodeShow Me the Money: Key Things to Remember When Commercializing Your Code
Show Me the Money: Key Things to Remember When Commercializing Your Code
 
Intellectual Property Issues in International Commerce
Intellectual Property Issues in International CommerceIntellectual Property Issues in International Commerce
Intellectual Property Issues in International Commerce
 
Protecting Your Internet Brand
Protecting Your Internet BrandProtecting Your Internet Brand
Protecting Your Internet Brand
 
Top 10 Internet Issues
Top 10 Internet Issues Top 10 Internet Issues
Top 10 Internet Issues
 
Employee Benefits Update for 2012
Employee Benefits Update for 2012Employee Benefits Update for 2012
Employee Benefits Update for 2012
 
Municipal Finance Presentation 2011
Municipal Finance Presentation 2011Municipal Finance Presentation 2011
Municipal Finance Presentation 2011
 

Recently uploaded

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Top Ten IT Legal Issues for the Enterprise