SlideShare a Scribd company logo
EXECUTIVE BRIEFING:
 STRATEGIC ISSUES
SURROUNDING CLOUD
    SERVICES
       April 11, 2013
EXECUTIVE BRIEFING: STRATEGIC ISSUES
   SURROUNDING CLOUD SERVICES

 BRIEF INTRODUCTION TO
   CLOUD COMPUTING
              April 11, 2013
CLOUD DEFINITION

                                    Automation                   Elastic Scale                 Orchestration
      Key
 Characteristics                   On-Demand                    Global Secure
                                                                                               Utility Billing
                                   Self Service                    Access



                                 Software as a                  Platform as a               Infrastructure as a
  Service Types                  Service (SaaS)                Service (PaaS)                 Service (IaaS)




  Cloud Types                     Public                 Private               Hybrid              Community




Thanks to Geoff Sinn and Dimension Data for certain slides. NIST = The National Institute of Standards and Technology
                                                                                                                        3
TRADITIONAL VS. CLOUD COMPUTING




                                  4
BASIC DEFINITIONS: CLOUD TYPES
                         • A Cloud architecture that is deployed for the sole use of a single
    Private Cloud        enterprise – and resides on the enterprise premise (i.e. on-premise)



                         • A Cloud architecture that is deployed for the sole use of a single
 Hosted Private Cloud    enterprise – but hosted by a cloud services provider (i.e. off-premise)


                         • A Cloud architecture that is deployed for the provision of public cloud
                         services – a cloud architecture that serve multiple enterprises – hence
    Public Cloud         sharing of underlying infrastructure elements occur (to varying
                         degrees, based on the actual service type).

                         • A dedicated partition within a Public Cloud architecture that is
                         allocated to a single enterprise – hence certain elements of the
 Virtual Private Cloud   architecture are shared, while others are dedicated to a single
                         enterprise (related to the service type).

                         • A Cloud architecture that is made up of a combination of previous
    Hybrid Cloud         Cloud Types – most often a combination of Private and Public Cloud
                         Architectures (once again related to the service types).



                         • A Public Cloud Architecture for the provision of cloud services to a
  Community Cloud        specific or limited community or segment or vertical.


                                                                                                     5
BREAKDOWN OF PRIVATE CLOUD




                             Source: Gartner 2011
                                                    6
BREAKDOWN OF PUBLIC CLOUD
• Finished Application that
 you rent and customize




• Developer Platform that
 abstracts the infrastructure,
 OS and middleware to drive
 developer productivity




• Deployment platform that
 abstracts the infrastructure
                                 Source: Forrester Research Inc.
                                                                   7
THE ABC’S OF CLOUD – “XAAS”

AaaS – Architecture          MaaS – Monitoring
BaaS – Backend               NaaS – Networks
CaaS – Call Center           OaaS – Office
DaaS – Data                  PaaS – Platform
EaaS – Email                 QaaS – Data Quality
FaaS – Frameworks            RaaS – Recovery
GaaS – Governance            SaaS – Software
HaaS – Hardware              TaaS – Telephony
IaaS – Infrastructure        Uaas – Unification
JaaS – Java Authentication   Vaas – Value-Added-Services
Kaas – Knowledge             XaaS – Anything
LaaS – Lending               Yaas – Yield Optimization
                             ZaaS – Zebra
 Credit: Updata Partners
                                                           8
BUSINESS DRIVERS OF CLOUD COMPUTING
   Cost Optimization         Risk Optimization           Strategic Agility




• No capex, less assets   • Business continuity      • Time-to-market
• Pay-as-you-use          • Technology               • Innovation
• On-demand capacity        independence             • New business models
• Elasticity              • Operational complexity   • Resource leverage
• Economies of scale      • Specialized skills
• Time-to-value




                                                                             9
ECONOMICS OF CLOUD COMPUTING/SAAS
 Recommend resources from VC firm Updata Partners (Carter
  Griffin) web site:
  http://www.updatapartners.com/resources/12/SEVC-Cloud-Presentation/


    SE Venture Conference 2013 Presentation on Cloud
     Computing
       Growth in Cloud market from $14B in 2010 to $60B in
        2016
       SMB’s are early adopters
    Cloud Computing: GMPP, rCAC and the Importance of
     Component Level Analysis -- Key metrics for measuring and
     managing a SaaS business
    Cloud Computing: A Closer Look at Churn -- a deeper
     analysis of churn and its impact on SaaS businesses
                                                                        10
EXECUTIVE BRIEFING: STRATEGIC ISSUES
   SURROUNDING CLOUD SERVICES

 MANAGING LEGAL RISK IN
      THE CLOUD
              April 11, 2013




                                       11
   Main areas of legal risk:
       Keeping data “secure” to:
          Manage  personal information in compliance with
           growing number of laws and regulations, and
          Maintain trade secrets/other IP

       Avoiding contract risk and the customer-supplier
        “gap”




                                                             12
CLOUD COMPUTING AND SECURITY

     Advantages                  Disadvantages
    Data Dispersal           Lack of Transparency
    Data Fragmentation       Lack of Responsiveness
    Secure Data Centers      “Trading Market” of
                               Subcontractors
    Multiple Customer
     Demands                  Vendor Lock-In
    Easier Patching and
     Updates

                                                        13
UPDATES IN PRIVACY AND SECURITY LAW
   HIPAA Updates
       This month – 10 year anniversary for HIPAA
       2009 Hi-Tech imposed obligations on vendors (“Business Associates”)
       New Omnibus Rule effective March 26, 2013; compliance required generally by
        September 23, 2013. Enhanced obligations on Business Associates and
        increased penalties.

   Massachusetts Data Security Act
       Effective March 2010; contract requirements effective March 2012
       Requires contract terms with vendors; written security policy; and that certain
        personal information to be encrypted

   New COPPA Regulations
       Published December 2012; compliance required July 1, 2013
       Now covers third-party plugins, ad networks
       Expands what constitutes personal information (e.g. IP Addresses)



                                                                                          14
UPDATES IN PRIVACY AND SECURITY LAW
   EU Data Protection Proposed Regulations
       In January 2012, detailed revisions proposed to make the law more
        uniform across the EU, and increases protections and possible penalties
       US companies seeking to transfer personal information from EU to US
        must follow a safe harbor certification/filing approach or other rules to
        comply with EU regulations

   FTC:
       Concerns have increased from use and sale of personal information, to
        use of IP addresses, device identifiers, and other information not
        normally considered as personally identifiable

   Breach Notification Laws:
       NC Identity Theft Protection Act of 2005
       Virtually all states have adopted similar statutes


                                                                                    15
SECURITY POLICY
   Legal Requirement to have a Written Information Security Policy:
       NC law: All companies must have written procedures relating to the destruction
        of personal records as official policy
       Mass. Data Security Act: organizations that handle information about Mass.
        residents must have a comprehensive written information security program
       HIPAA/Hi-Tech: Also requires a written information security program
       Federal Trade Commission: Failure to protect personal information by using
        reasonable security can be an unfair and deceptive trade practice
   Other Good Reasons for a “WISP”
       Complying with breach notification laws
       Assuring compliance with required privacy notices (e.g. California requirement)
       Protecting intellectual property
       Satisfying officer and director fiduciary obligations
       Complying with contracts
       Increasing value of company to buyers
       Dealing with subpoenas and related requests for electronic information in
        discovery



                                                                                          16
CONTRACTING IN THE CLOUD

   Typically service agreements, not licenses
   Often offered via “click and accept” agreements
   Sometimes incorporate by reference other terms of
    use and policies
   Sometimes purport to be changeable without notice
    by the vendor




                                                        17
CONTRACT TERMS: SECURITY AND PRIVACY

   Confidentiality
   Obligation to maintain reasonable and effective
    physical, technical and administrative security
    measures
   Compliance with all applicable data privacy and
    security laws
   Right to review security/disaster recovery policies
   Right to audit and test security


                                                          18
CONTRACT TERMS: SECURITY AND PRIVACY

   Notification in the case of breach
   Indemnification for breaches/payment of costs
    of required notices to customers
   Require use of encryption
   Restrictions on use of subcontractors and
    downstream sharing of information
   Restrictions on where data can be stored

                                                    19
CONTRACT TERMS: DATA ISSUES



   Ownership and Use of Data

   Disposition of Data on Termination

   Location of Data

   Legal / Government Request to Access Data



                                                20
CONTRACT TERMS: SLA’S

   Uptime
   Performance & Response Time
   Error Correction Time
   Infrastructure / Security
   Performance Credits
   Use of Measurement Technology
   Notice/Reporting Obligations




                                    21
CONTRACT TERMS: PRICING

   Monthly service fees
       Per user or provider, or based on transactions?
       When does it start?
   Implementation fees
       Commitment to start date?
   Add-on pricing
   Payment terms
   Caps on increase in fees


                                                          22
CONTRACT TERMS: TERM & TERMINATION

 Length
 Termination Rights

 Termination Penalties

 Data Rights upon Termination

 Vendor Termination or Suspension

 Automatic Renewal




                                     23
KEY TAKEAWAYS

   Companies (vendors and users) should:
       review the laws applicable to their situation, and
        update security practices, policies and
        procedures as needed
       perform appropriate due diligence and contract
        negotiations for important cloud contracts
       review insurance policies and possibility for
        additional insurance


                                                         24

More Related Content

What's hot

Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
Subra Kumaraswamy CISSP CISM
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
Ludovic Petit
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
movinghats
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael Sandberg
KrisValerio
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
Dekkinga, Ewout
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceJosh Tullo
 
Intalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップIntalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップ
Tomoaki Sawada
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Armor
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
HartVidaRaffo
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
Cloud Legal Project
 
Cloud Contract Terms - Kuan Hon, Queen Mary University of London
Cloud Contract Terms - Kuan Hon, Queen Mary University of LondonCloud Contract Terms - Kuan Hon, Queen Mary University of London
Cloud Contract Terms - Kuan Hon, Queen Mary University of LondonChris Purrington
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
Anchises Moraes
 
Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Enrico Boverino
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWes Yanaga
 

What's hot (20)

Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael Sandberg
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
 
Intalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップIntalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップ
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Cloud Contract Terms - Kuan Hon, Queen Mary University of London
Cloud Contract Terms - Kuan Hon, Queen Mary University of LondonCloud Contract Terms - Kuan Hon, Queen Mary University of London
Cloud Contract Terms - Kuan Hon, Queen Mary University of London
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Open Group Conference Csi V5.1
Open Group Conference Csi V5.1Open Group Conference Csi V5.1
Open Group Conference Csi V5.1
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App Fabric
 

Similar to Executive Briefing: Strategic Issues Surrounding Cloud Services

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
Craig Dickson
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
IndicThreads
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computing
jayroy
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For EnterprisesOne App Cloud
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
DrRajapraveenkN
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
GopalThapa9
 
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceGreg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceScanSource, Inc.
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
MerisCon ARTDesign
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
Dimitar Georgiev
 
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
accacloud
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Standards Customer Council
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Benefits Of Building Private Cloud
Benefits Of Building Private CloudBenefits Of Building Private Cloud
Benefits Of Building Private Cloud
dinobusalachi
 

Similar to Executive Briefing: Strategic Issues Surrounding Cloud Services (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 
The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computing
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For Enterprises
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceGreg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Benefits Of Building Private Cloud
Benefits Of Building Private CloudBenefits Of Building Private Cloud
Benefits Of Building Private Cloud
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 

More from WhitmeyerTuffin

Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider ContractsWhitmeyerTuffin
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursWhitmeyerTuffin
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealWhitmeyerTuffin
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...WhitmeyerTuffin
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealWhitmeyerTuffin
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
WhitmeyerTuffin
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsWhitmeyerTuffin
 

More from WhitmeyerTuffin (7)

Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
 
Strategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the DealStrategies and Structure to Get the Most out of the Deal
Strategies and Structure to Get the Most out of the Deal
 
Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...Key Intellectual Property, Contract, and Information Technology Issues in an ...
Key Intellectual Property, Contract, and Information Technology Issues in an ...
 
M&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A DealM&A Trends, Valuation and Financial Preparation for an M&A Deal
M&A Trends, Valuation and Financial Preparation for an M&A Deal
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing Vendors
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Executive Briefing: Strategic Issues Surrounding Cloud Services

  • 1. EXECUTIVE BRIEFING: STRATEGIC ISSUES SURROUNDING CLOUD SERVICES April 11, 2013
  • 2. EXECUTIVE BRIEFING: STRATEGIC ISSUES SURROUNDING CLOUD SERVICES BRIEF INTRODUCTION TO CLOUD COMPUTING April 11, 2013
  • 3. CLOUD DEFINITION Automation Elastic Scale Orchestration Key Characteristics On-Demand Global Secure Utility Billing Self Service Access Software as a Platform as a Infrastructure as a Service Types Service (SaaS) Service (PaaS) Service (IaaS) Cloud Types Public Private Hybrid Community Thanks to Geoff Sinn and Dimension Data for certain slides. NIST = The National Institute of Standards and Technology 3
  • 4. TRADITIONAL VS. CLOUD COMPUTING 4
  • 5. BASIC DEFINITIONS: CLOUD TYPES • A Cloud architecture that is deployed for the sole use of a single Private Cloud enterprise – and resides on the enterprise premise (i.e. on-premise) • A Cloud architecture that is deployed for the sole use of a single Hosted Private Cloud enterprise – but hosted by a cloud services provider (i.e. off-premise) • A Cloud architecture that is deployed for the provision of public cloud services – a cloud architecture that serve multiple enterprises – hence Public Cloud sharing of underlying infrastructure elements occur (to varying degrees, based on the actual service type). • A dedicated partition within a Public Cloud architecture that is allocated to a single enterprise – hence certain elements of the Virtual Private Cloud architecture are shared, while others are dedicated to a single enterprise (related to the service type). • A Cloud architecture that is made up of a combination of previous Hybrid Cloud Cloud Types – most often a combination of Private and Public Cloud Architectures (once again related to the service types). • A Public Cloud Architecture for the provision of cloud services to a Community Cloud specific or limited community or segment or vertical. 5
  • 6. BREAKDOWN OF PRIVATE CLOUD Source: Gartner 2011 6
  • 7. BREAKDOWN OF PUBLIC CLOUD • Finished Application that you rent and customize • Developer Platform that abstracts the infrastructure, OS and middleware to drive developer productivity • Deployment platform that abstracts the infrastructure Source: Forrester Research Inc. 7
  • 8. THE ABC’S OF CLOUD – “XAAS” AaaS – Architecture MaaS – Monitoring BaaS – Backend NaaS – Networks CaaS – Call Center OaaS – Office DaaS – Data PaaS – Platform EaaS – Email QaaS – Data Quality FaaS – Frameworks RaaS – Recovery GaaS – Governance SaaS – Software HaaS – Hardware TaaS – Telephony IaaS – Infrastructure Uaas – Unification JaaS – Java Authentication Vaas – Value-Added-Services Kaas – Knowledge XaaS – Anything LaaS – Lending Yaas – Yield Optimization ZaaS – Zebra Credit: Updata Partners 8
  • 9. BUSINESS DRIVERS OF CLOUD COMPUTING Cost Optimization Risk Optimization Strategic Agility • No capex, less assets • Business continuity • Time-to-market • Pay-as-you-use • Technology • Innovation • On-demand capacity independence • New business models • Elasticity • Operational complexity • Resource leverage • Economies of scale • Specialized skills • Time-to-value 9
  • 10. ECONOMICS OF CLOUD COMPUTING/SAAS  Recommend resources from VC firm Updata Partners (Carter Griffin) web site: http://www.updatapartners.com/resources/12/SEVC-Cloud-Presentation/  SE Venture Conference 2013 Presentation on Cloud Computing  Growth in Cloud market from $14B in 2010 to $60B in 2016  SMB’s are early adopters  Cloud Computing: GMPP, rCAC and the Importance of Component Level Analysis -- Key metrics for measuring and managing a SaaS business  Cloud Computing: A Closer Look at Churn -- a deeper analysis of churn and its impact on SaaS businesses 10
  • 11. EXECUTIVE BRIEFING: STRATEGIC ISSUES SURROUNDING CLOUD SERVICES MANAGING LEGAL RISK IN THE CLOUD April 11, 2013 11
  • 12. Main areas of legal risk:  Keeping data “secure” to:  Manage personal information in compliance with growing number of laws and regulations, and  Maintain trade secrets/other IP  Avoiding contract risk and the customer-supplier “gap” 12
  • 13. CLOUD COMPUTING AND SECURITY Advantages Disadvantages  Data Dispersal  Lack of Transparency  Data Fragmentation  Lack of Responsiveness  Secure Data Centers  “Trading Market” of Subcontractors  Multiple Customer Demands  Vendor Lock-In  Easier Patching and Updates 13
  • 14. UPDATES IN PRIVACY AND SECURITY LAW  HIPAA Updates  This month – 10 year anniversary for HIPAA  2009 Hi-Tech imposed obligations on vendors (“Business Associates”)  New Omnibus Rule effective March 26, 2013; compliance required generally by September 23, 2013. Enhanced obligations on Business Associates and increased penalties.  Massachusetts Data Security Act  Effective March 2010; contract requirements effective March 2012  Requires contract terms with vendors; written security policy; and that certain personal information to be encrypted  New COPPA Regulations  Published December 2012; compliance required July 1, 2013  Now covers third-party plugins, ad networks  Expands what constitutes personal information (e.g. IP Addresses) 14
  • 15. UPDATES IN PRIVACY AND SECURITY LAW  EU Data Protection Proposed Regulations  In January 2012, detailed revisions proposed to make the law more uniform across the EU, and increases protections and possible penalties  US companies seeking to transfer personal information from EU to US must follow a safe harbor certification/filing approach or other rules to comply with EU regulations  FTC:  Concerns have increased from use and sale of personal information, to use of IP addresses, device identifiers, and other information not normally considered as personally identifiable  Breach Notification Laws:  NC Identity Theft Protection Act of 2005  Virtually all states have adopted similar statutes 15
  • 16. SECURITY POLICY  Legal Requirement to have a Written Information Security Policy:  NC law: All companies must have written procedures relating to the destruction of personal records as official policy  Mass. Data Security Act: organizations that handle information about Mass. residents must have a comprehensive written information security program  HIPAA/Hi-Tech: Also requires a written information security program  Federal Trade Commission: Failure to protect personal information by using reasonable security can be an unfair and deceptive trade practice  Other Good Reasons for a “WISP”  Complying with breach notification laws  Assuring compliance with required privacy notices (e.g. California requirement)  Protecting intellectual property  Satisfying officer and director fiduciary obligations  Complying with contracts  Increasing value of company to buyers  Dealing with subpoenas and related requests for electronic information in discovery 16
  • 17. CONTRACTING IN THE CLOUD  Typically service agreements, not licenses  Often offered via “click and accept” agreements  Sometimes incorporate by reference other terms of use and policies  Sometimes purport to be changeable without notice by the vendor 17
  • 18. CONTRACT TERMS: SECURITY AND PRIVACY  Confidentiality  Obligation to maintain reasonable and effective physical, technical and administrative security measures  Compliance with all applicable data privacy and security laws  Right to review security/disaster recovery policies  Right to audit and test security 18
  • 19. CONTRACT TERMS: SECURITY AND PRIVACY  Notification in the case of breach  Indemnification for breaches/payment of costs of required notices to customers  Require use of encryption  Restrictions on use of subcontractors and downstream sharing of information  Restrictions on where data can be stored 19
  • 20. CONTRACT TERMS: DATA ISSUES  Ownership and Use of Data  Disposition of Data on Termination  Location of Data  Legal / Government Request to Access Data 20
  • 21. CONTRACT TERMS: SLA’S  Uptime  Performance & Response Time  Error Correction Time  Infrastructure / Security  Performance Credits  Use of Measurement Technology  Notice/Reporting Obligations 21
  • 22. CONTRACT TERMS: PRICING  Monthly service fees  Per user or provider, or based on transactions?  When does it start?  Implementation fees  Commitment to start date?  Add-on pricing  Payment terms  Caps on increase in fees 22
  • 23. CONTRACT TERMS: TERM & TERMINATION  Length  Termination Rights  Termination Penalties  Data Rights upon Termination  Vendor Termination or Suspension  Automatic Renewal 23
  • 24. KEY TAKEAWAYS  Companies (vendors and users) should:  review the laws applicable to their situation, and update security practices, policies and procedures as needed  perform appropriate due diligence and contract negotiations for important cloud contracts  review insurance policies and possibility for additional insurance 24