SlideShare a Scribd company logo
LA / NY / SF / DC / arentfox.com
Data Use Rules in
Different Business
Scenarios: It’s All
Contextual
William A. Tanenbaum
Co-Head, Technology Transactions
Arent Fox LLP
Presentation Overview
Corporate businesses plans lead to . . .
. . . implementation of data collection and data use
plans, leads to . . .
. . . legal risks, calling for . . .
. . . advance IT planning, and
. . . litigation planning, which requires . . .
– Understanding the different mindsets of Chief Technology
Officer and Chief Data Officers
– Collaboration between litigators and technology
transaction lawyers
– Understanding outsourcing and RFP process
2
Business Scenarios to be Covered
1. Digital Redlining
2. Big Box Retail Health Clinics
3. PHI on Web-Hosted Databases
4. FCC vs. FTC
5. Terrorist Activity
6. Data Breaches and Attorneys General
3
Business Scenarios (continued)
7. Ransomware
8. Supply Chains and Class Actions
9. Internet of Things and Privacy
10. Data Retention vs. Big Data
4
Data is the Asset
“Big Data” is real and data analytics is improved
Business uses
– Better internal operations
– Development of new product and services
– New role for outsourcing: revenue generating vs. cost
savings
– Data as asset for external monetization
Frenemies and data sharing
Collision of privacy approaches: industrial
companies vs. free-wheeling Internet companies
5
Data IP and Licenses
Vexing question: who owns the data?
Scope of IP protection for data
Solution often = data sharing > data
ownership
6
1. Digital Redlining
Hypothetical: bank wants to offer different
credit cards to different applicants based on
applicant qualifications
Bank buys data from external data sources
Repurposing of data for use different from
original collection (banking vs. advertising)
Problem of “bad algorithms”
Litigation risk: proceedings for “redlining”
7
Digital Redlining (continued)
Litigation
– Prepare defenses for regulatory actions and for
litigation
Transactional aspects
– Verify that audience and audience member
attributes fit intended use
– Verify third party has right to convey to banks for
intended use supported by upstream data
collection rights
– Heavy negotiations over reps and indemnities and
– Carve-outs are the yellow flags
8
Learning from Litigators
Tech Transactional lawyers need to learn from
litigators
– Draft provisions for summary judgment
– Draft for arbitrators because of prevalence in tech
disputes
Litigators need to be aware that SOWs, SLAs
are often source of disputes and are often
“inherited” from draftsman who is not a lawyer
– Complicates litigation and arbitration
9
Transactional Roles for Litigators
Most IT projects start with an RFP
Advisable for litigator to participate in designing
RFP to identify litigation risks and asks for
relevant information
Best if RPF maps to MSA and SOWs
Collaborate with tech transactional lawyers
Drafting the right arbitration clause
– discovery, arbitrator qualifications and selection
process, etc.)
10
2. Big Box Health Clinics
Hypo: big box retailer sets up captive hearing
clinic in order to sell hearing aids
Hearing doctors need transfer of health care
data from hospital, but only need subset of
electronic health records
Problem if transfer has to be all of nothing
Does HIPAA and patient’s consent form allow
transfer without second consent?
11
Health Clinic (continued)
Problem for retailer: difficult for hospital to
identify and transfer only hearing-related
medical information
Patient/customer upset of prior irrelevant
surgeries are disclosed
Illustrates that all privacy is contextual
12
Enabling Contextual Privacy Disclosures
Practical problem is that takes too long for the
hospital to manually separate the relevant data
Companies such as Microsoft suggest solution is
to use software agents (a form of AI)
But: risk of bad algorithms in AI and potential
difficulty of “mining” data lake of patient electronic
medical records
Transaction/IT risks: need good IT integrator to
deal with hospital records and outsourcing AI
provider
Transactions must be HIPAA compliant
13
3. Putting PHI on Web-Hosted Databases
Patient data is part of medical information
posted to web-hosted databases for research
or other use by third parties
Does this violate consent obtained from
patient
– Review consent forms
HIPAA implications for third party use
Re-use by ongoing chain of medical research
endeavors
14
4. More Contextual Privacy: FCC vs. FTC Opt-
out/Opt-in Rules
D.C. Circuit upheld FCC’s reclassification of
broadband Internet access services as a Title
II telecommunications service in 2014 Open
Internet Order
Forthcoming order will govern how broadband
providers collect, use, protect and share
subscriber PII
15
FCC (continued)
Privacy framework under consideration requires
affirmative opt-in in order for broadband
providers to share data with third parties
This contrasts with FTC’s largely opt-out, case-
by-case approach to privacy protection
This will impact clients relying on data from
broadband providers
Clients must address that contextual privacy in
context of opt-in for some and opt-out for other
purposes
16
5. Terrorist Activity
Hypo: client operate digital platform
Terms of use give strong privacy rights
Client notices suspected terrorist activity
Client wants to tell Department of Homeland
Security and law enforcement
Chief Privacy Officer says disclosure will violate
privacy terms
Solution: obtain subpoena
Practical note: is a terrorist going to sue for
violation of privacy terms of use?
17
Terrorism (continued)
Practical note: is an alleged terrorist actually
going to sue for violation of privacy terms of
use?
But what if the client suspicion while in good
faith turns out to be wrong?
– Will the “terrorist” have a cause of action
notwithstanding the subpoena?
18
6. Outsourcing, Data Breaches and AGs
Many data breaches are caused by outsource
vendors using technology with insufficient
cybersecurity
– Problems in switch from transition to steady-state
operations
– Problems in updates
– Problems in integrating technology from a client’s
multiple vendors
19
AGs (continued)
Risk is that large database breach will lead to
investigations and actions by state attorneys
general
Client may argue that it was the “victim” of the
expert technology company it hired
But repeated breaches undercut this
argument
20
AGs (continued)
Litigator’s role:
– Acquire understanding of outsourcing to argue
that client acted in good faith but was victim of its
own expert
– Explain technology to AG staff that may not
understand the technology fine points to that
bolster client’s position
– Understand the political dimension of negotiating
with the AC
– Retaining the right tech and cyber experts
21
Clients and Cybersecurity Experts
Which comes first, the lawyer or the forensics
firm?
Advising clients (and cyber firms) of the
advantage of communications under attorney-
client privilege
Risk is that client’s IT department gets ahead of
the GC’s office
Litigators benefit from understanding how IT
departments operate when problems arise, and
how their communication with incumbent vendors
can create difficulties
22
7. Ransomware
Ransomware is not a classic database breach
Data locked up -- not disclosed
State database breach acts not triggered and
statutory notices not required
Issue: insurance carrier data lawyers “on
retainer” are database breach lawyers and
may not be qualified for ransomware
23
Ransomware (continued)
Client may need to fight to get insurance
carrier to pay for non-panel lawyer
If pay ransom, hope is that criminal is an
honest criminal
Evidence that ransomware is business is
existence of websites on how to pay ransom
Will be your introduction to bitcoins
24
Ransomware (continued)
Who will you work with?
– Cyber forensics firm
– Internal IT department
– IT outsource provider
Transactional planning
– Set up IT outsourcing to operate an backup
system even if primary system is locked up
– Often data not software is at risk
– Role of cloud computing
Footer Text 25
8. Supply Chain and Class Actions
Bad data is used in design of mass market
products or process
New-class products can contain bad data
Result: defects in mass market products
Risk: class action lawsuits
Cybersecurity vs. class actions
Footer Text 26
Supply Chains and Class Actions (continued)
Data-related litigation planning for class
actions
– Class certification (State vs. Federal
requirements)
– Sufficiency of injury
– Plan for affirmative defenses
– Pre-review of insurance coverage
– Consider effect on stock price
– PR planning
27
9. IoT and Privacy
Does the use of the Internet of Things create
risk of violation of privacy terms?
Risk: cyber weakness in IoT technology
Risk: data will be secure but use will exceed
scope of consent
Source of risks:
– Vendors of small connected devices often do not
bake security
28
IoT (continued)
Source of risks:
– Vendors of small connected devices often do not bake
security into the devices
– Security is not upgraded
– If automated system-wide security is not technologically
possible or not included, then manual upgrade process is the
alternative and inherently problem laden
– Networked devices can be hacked
– Even if devices are secure, data can be exposed during
transmission
– Business benefits of IoT can inadvertently result in
failure to adhere to privacy terms and use can exceed
the consent obtained
29
IoT (continued)
FTC guidance
– In the Matter of The Benefits, Challenges, and
Potential Roles for the Government in Fostering
the Advancement of the Internet of Things Docket
No. 160331306-6306-01
– Mobile App Developers: Start with Security
30
10. Big Data vs. Document Retention
Conflict between:
– GC’s goal of tailoring document (i.e., data)
retention periods to minimizing litigation risk
– Marketing and business teams’ goal of retaining
customer and other data for long periods in order
to conduct analytics of relevant data to generate
revenue
Issue becomes: revenue vs. litigation risk
Related issue: protecting forensic analysis
31
Question and Answer
William A. Tanenbaum
Co-Head, Technology Transactions, Arent
Fox LLP
William.Tanenbaum@arentfox.com
32
William A. Tanenbaum, Arent Fox LLP
William A. Tanenbaum was named as one of the Top Five IT lawyers in the country
by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year”
in IT in New York by US News & World Report/Best Lawyers. Chambers named
Bill as one of only five lawyers in Band One in Outsourcing & Technology in New
York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global
edition. Legal500 found that he is a “Leading Authority” on Technology &
Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who
Legal: Thought Leaders 2017. Bill is a Past President of the International
Technology Law Association. He is currently a Vice President of the Society for
Information Management (SIM) (New York Chapter), and industry CIO
organization, and the only lawyer on the Board of Directors.
Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone
else;” “brings extremely high integrity, a deep intellect, fearlessness and a
practical, real-world mindset to every problem;” “efficient, solution-driven and
makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have
worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's
Who Legal).
33

More Related Content

What's hot

20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
Klemchuk LLP
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
Polsinelli PC
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
CompTIA
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Anne ndolo
 
Data protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and BirdData protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and Bird
Coadec
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015Jan Dhont
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
Knowledge Management Associates, LLC
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2Dan Michaluk
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
Roger Royse
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Fasoo
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
Rising Media, Inc.
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 

What's hot (20)

20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Data protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and BirdData protection for Lend.io - legal analysis by Bird and Bird
Data protection for Lend.io - legal analysis by Bird and Bird
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 

Viewers also liked

Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
Certes
 
Implementing OLE at Penn
Implementing OLE at PennImplementing OLE at Penn
Implementing OLE at Penn
Beth Picknally Camden
 
11 arincare tutorial dummy 3 10-59
11 arincare tutorial dummy 3 10-5911 arincare tutorial dummy 3 10-59
11 arincare tutorial dummy 3 10-59
Utai Sukviwatsirikul
 
MANUSCRIPT FOR PUBLICATION
MANUSCRIPT FOR PUBLICATIONMANUSCRIPT FOR PUBLICATION
MANUSCRIPT FOR PUBLICATIONDjabanor Joshua
 
Blog terminado
Blog terminadoBlog terminado
Blog terminado
Daniel Camino
 
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
Priya Jain
 
Presentación1
Presentación1Presentación1
Presentación1ignafano
 
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case ReportMonocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
Dr. Jagannath Boramani
 
JAWSDAYS2016 Technical Deep DIVE
JAWSDAYS2016 Technical Deep DIVE JAWSDAYS2016 Technical Deep DIVE
JAWSDAYS2016 Technical Deep DIVE
陽平 山口
 
Bill Gates lessons
Bill Gates lessonsBill Gates lessons
Bill Gates lessonsVinod Mehra
 

Viewers also liked (15)

Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
Twan Paes - Action Learning - balanced leadership - drive it, Shape it, own it!
 
Implementing OLE at Penn
Implementing OLE at PennImplementing OLE at Penn
Implementing OLE at Penn
 
11 arincare tutorial dummy 3 10-59
11 arincare tutorial dummy 3 10-5911 arincare tutorial dummy 3 10-59
11 arincare tutorial dummy 3 10-59
 
144421493721(ijbpr)
144421493721(ijbpr)144421493721(ijbpr)
144421493721(ijbpr)
 
MANUSCRIPT FOR PUBLICATION
MANUSCRIPT FOR PUBLICATIONMANUSCRIPT FOR PUBLICATION
MANUSCRIPT FOR PUBLICATION
 
Blog terminado
Blog terminadoBlog terminado
Blog terminado
 
Media
MediaMedia
Media
 
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
Application Form for NEDFI Recruitment 2016 – 08 Assistant Manager Vacancy – ...
 
Presentación1
Presentación1Presentación1
Presentación1
 
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case ReportMonocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
Monocular Elevation Deficit With Pellucid Marginal Degeneration: A Case Report
 
JAWSDAYS2016 Technical Deep DIVE
JAWSDAYS2016 Technical Deep DIVE JAWSDAYS2016 Technical Deep DIVE
JAWSDAYS2016 Technical Deep DIVE
 
160 z. hussain
160 z. hussain160 z. hussain
160 z. hussain
 
Bab 5 optik
Bab 5   optikBab 5   optik
Bab 5 optik
 
Technology
TechnologyTechnology
Technology
 
Bill Gates lessons
Bill Gates lessonsBill Gates lessons
Bill Gates lessons
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contectual it is all contextual

William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Nicole Black
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
William Tanenbaum
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
Agustin Argelich Casals
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
Argelich Networks
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
Shawn Tuma
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
Mohammad Mydul Islam
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
Government Technology and Services Coalition
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
MMMTechLaw
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
keturahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
walterl4
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
TrustArc
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contectual it is all contextual (20)

William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 

More from William Tanenbaum

IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
William Tanenbaum
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
William Tanenbaum
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
William Tanenbaum
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
William Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...William Tanenbaum
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumWilliam Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsWilliam Tanenbaum
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210William Tanenbaum
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...William Tanenbaum
 

More from William Tanenbaum (12)

IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
 

Recently uploaded

Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 

Recently uploaded (20)

Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 

Date Use Rules in Different Business Scenarios: It's All Contectual it is all contextual

  • 1. LA / NY / SF / DC / arentfox.com Data Use Rules in Different Business Scenarios: It’s All Contextual William A. Tanenbaum Co-Head, Technology Transactions Arent Fox LLP
  • 2. Presentation Overview Corporate businesses plans lead to . . . . . . implementation of data collection and data use plans, leads to . . . . . . legal risks, calling for . . . . . . advance IT planning, and . . . litigation planning, which requires . . . – Understanding the different mindsets of Chief Technology Officer and Chief Data Officers – Collaboration between litigators and technology transaction lawyers – Understanding outsourcing and RFP process 2
  • 3. Business Scenarios to be Covered 1. Digital Redlining 2. Big Box Retail Health Clinics 3. PHI on Web-Hosted Databases 4. FCC vs. FTC 5. Terrorist Activity 6. Data Breaches and Attorneys General 3
  • 4. Business Scenarios (continued) 7. Ransomware 8. Supply Chains and Class Actions 9. Internet of Things and Privacy 10. Data Retention vs. Big Data 4
  • 5. Data is the Asset “Big Data” is real and data analytics is improved Business uses – Better internal operations – Development of new product and services – New role for outsourcing: revenue generating vs. cost savings – Data as asset for external monetization Frenemies and data sharing Collision of privacy approaches: industrial companies vs. free-wheeling Internet companies 5
  • 6. Data IP and Licenses Vexing question: who owns the data? Scope of IP protection for data Solution often = data sharing > data ownership 6
  • 7. 1. Digital Redlining Hypothetical: bank wants to offer different credit cards to different applicants based on applicant qualifications Bank buys data from external data sources Repurposing of data for use different from original collection (banking vs. advertising) Problem of “bad algorithms” Litigation risk: proceedings for “redlining” 7
  • 8. Digital Redlining (continued) Litigation – Prepare defenses for regulatory actions and for litigation Transactional aspects – Verify that audience and audience member attributes fit intended use – Verify third party has right to convey to banks for intended use supported by upstream data collection rights – Heavy negotiations over reps and indemnities and – Carve-outs are the yellow flags 8
  • 9. Learning from Litigators Tech Transactional lawyers need to learn from litigators – Draft provisions for summary judgment – Draft for arbitrators because of prevalence in tech disputes Litigators need to be aware that SOWs, SLAs are often source of disputes and are often “inherited” from draftsman who is not a lawyer – Complicates litigation and arbitration 9
  • 10. Transactional Roles for Litigators Most IT projects start with an RFP Advisable for litigator to participate in designing RFP to identify litigation risks and asks for relevant information Best if RPF maps to MSA and SOWs Collaborate with tech transactional lawyers Drafting the right arbitration clause – discovery, arbitrator qualifications and selection process, etc.) 10
  • 11. 2. Big Box Health Clinics Hypo: big box retailer sets up captive hearing clinic in order to sell hearing aids Hearing doctors need transfer of health care data from hospital, but only need subset of electronic health records Problem if transfer has to be all of nothing Does HIPAA and patient’s consent form allow transfer without second consent? 11
  • 12. Health Clinic (continued) Problem for retailer: difficult for hospital to identify and transfer only hearing-related medical information Patient/customer upset of prior irrelevant surgeries are disclosed Illustrates that all privacy is contextual 12
  • 13. Enabling Contextual Privacy Disclosures Practical problem is that takes too long for the hospital to manually separate the relevant data Companies such as Microsoft suggest solution is to use software agents (a form of AI) But: risk of bad algorithms in AI and potential difficulty of “mining” data lake of patient electronic medical records Transaction/IT risks: need good IT integrator to deal with hospital records and outsourcing AI provider Transactions must be HIPAA compliant 13
  • 14. 3. Putting PHI on Web-Hosted Databases Patient data is part of medical information posted to web-hosted databases for research or other use by third parties Does this violate consent obtained from patient – Review consent forms HIPAA implications for third party use Re-use by ongoing chain of medical research endeavors 14
  • 15. 4. More Contextual Privacy: FCC vs. FTC Opt- out/Opt-in Rules D.C. Circuit upheld FCC’s reclassification of broadband Internet access services as a Title II telecommunications service in 2014 Open Internet Order Forthcoming order will govern how broadband providers collect, use, protect and share subscriber PII 15
  • 16. FCC (continued) Privacy framework under consideration requires affirmative opt-in in order for broadband providers to share data with third parties This contrasts with FTC’s largely opt-out, case- by-case approach to privacy protection This will impact clients relying on data from broadband providers Clients must address that contextual privacy in context of opt-in for some and opt-out for other purposes 16
  • 17. 5. Terrorist Activity Hypo: client operate digital platform Terms of use give strong privacy rights Client notices suspected terrorist activity Client wants to tell Department of Homeland Security and law enforcement Chief Privacy Officer says disclosure will violate privacy terms Solution: obtain subpoena Practical note: is a terrorist going to sue for violation of privacy terms of use? 17
  • 18. Terrorism (continued) Practical note: is an alleged terrorist actually going to sue for violation of privacy terms of use? But what if the client suspicion while in good faith turns out to be wrong? – Will the “terrorist” have a cause of action notwithstanding the subpoena? 18
  • 19. 6. Outsourcing, Data Breaches and AGs Many data breaches are caused by outsource vendors using technology with insufficient cybersecurity – Problems in switch from transition to steady-state operations – Problems in updates – Problems in integrating technology from a client’s multiple vendors 19
  • 20. AGs (continued) Risk is that large database breach will lead to investigations and actions by state attorneys general Client may argue that it was the “victim” of the expert technology company it hired But repeated breaches undercut this argument 20
  • 21. AGs (continued) Litigator’s role: – Acquire understanding of outsourcing to argue that client acted in good faith but was victim of its own expert – Explain technology to AG staff that may not understand the technology fine points to that bolster client’s position – Understand the political dimension of negotiating with the AC – Retaining the right tech and cyber experts 21
  • 22. Clients and Cybersecurity Experts Which comes first, the lawyer or the forensics firm? Advising clients (and cyber firms) of the advantage of communications under attorney- client privilege Risk is that client’s IT department gets ahead of the GC’s office Litigators benefit from understanding how IT departments operate when problems arise, and how their communication with incumbent vendors can create difficulties 22
  • 23. 7. Ransomware Ransomware is not a classic database breach Data locked up -- not disclosed State database breach acts not triggered and statutory notices not required Issue: insurance carrier data lawyers “on retainer” are database breach lawyers and may not be qualified for ransomware 23
  • 24. Ransomware (continued) Client may need to fight to get insurance carrier to pay for non-panel lawyer If pay ransom, hope is that criminal is an honest criminal Evidence that ransomware is business is existence of websites on how to pay ransom Will be your introduction to bitcoins 24
  • 25. Ransomware (continued) Who will you work with? – Cyber forensics firm – Internal IT department – IT outsource provider Transactional planning – Set up IT outsourcing to operate an backup system even if primary system is locked up – Often data not software is at risk – Role of cloud computing Footer Text 25
  • 26. 8. Supply Chain and Class Actions Bad data is used in design of mass market products or process New-class products can contain bad data Result: defects in mass market products Risk: class action lawsuits Cybersecurity vs. class actions Footer Text 26
  • 27. Supply Chains and Class Actions (continued) Data-related litigation planning for class actions – Class certification (State vs. Federal requirements) – Sufficiency of injury – Plan for affirmative defenses – Pre-review of insurance coverage – Consider effect on stock price – PR planning 27
  • 28. 9. IoT and Privacy Does the use of the Internet of Things create risk of violation of privacy terms? Risk: cyber weakness in IoT technology Risk: data will be secure but use will exceed scope of consent Source of risks: – Vendors of small connected devices often do not bake security 28
  • 29. IoT (continued) Source of risks: – Vendors of small connected devices often do not bake security into the devices – Security is not upgraded – If automated system-wide security is not technologically possible or not included, then manual upgrade process is the alternative and inherently problem laden – Networked devices can be hacked – Even if devices are secure, data can be exposed during transmission – Business benefits of IoT can inadvertently result in failure to adhere to privacy terms and use can exceed the consent obtained 29
  • 30. IoT (continued) FTC guidance – In the Matter of The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things Docket No. 160331306-6306-01 – Mobile App Developers: Start with Security 30
  • 31. 10. Big Data vs. Document Retention Conflict between: – GC’s goal of tailoring document (i.e., data) retention periods to minimizing litigation risk – Marketing and business teams’ goal of retaining customer and other data for long periods in order to conduct analytics of relevant data to generate revenue Issue becomes: revenue vs. litigation risk Related issue: protecting forensic analysis 31
  • 32. Question and Answer William A. Tanenbaum Co-Head, Technology Transactions, Arent Fox LLP William.Tanenbaum@arentfox.com 32
  • 33. William A. Tanenbaum, Arent Fox LLP William A. Tanenbaum was named as one of the Top Five IT lawyers in the country by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year” in IT in New York by US News & World Report/Best Lawyers. Chambers named Bill as one of only five lawyers in Band One in Outsourcing & Technology in New York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global edition. Legal500 found that he is a “Leading Authority” on Technology & Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who Legal: Thought Leaders 2017. Bill is a Past President of the International Technology Law Association. He is currently a Vice President of the Society for Information Management (SIM) (New York Chapter), and industry CIO organization, and the only lawyer on the Board of Directors. Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone else;” “brings extremely high integrity, a deep intellect, fearlessness and a practical, real-world mindset to every problem;” “efficient, solution-driven and makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's Who Legal). 33