SlideShare a Scribd company logo
LA / NY / SF / DC / arentfox.com
Data Use Rules in Different
Business Scenarios: It’s All Contextual
Presentation Overview
Corporate businesses plans lead to . . .
. . . implementation of data collection and data use
plans, leads to . . .
. . . legal risks, calling for . . .
. . . advance IT planning, and
. . . litigation planning, which requires . . .
– Understanding the different mindsets of Chief Technology
Officer and Chief Data Officers
– Collaboration between litigators and technology
transaction lawyers
– Understanding outsourcing and RFP process
2
Business Scenarios to be Covered
1. Digital Redlining
2. Big Box Retail Health Clinics
3. PHI on Web-Hosted Databases
4. FCC vs. FTC
5. Terrorist Activity
6. Data Breaches and Attorneys General
3
Business Scenarios (continued)
7. Ransomware
8. Supply Chains and Class Actions
9. Internet of Things and Privacy
10. Data Retention vs. Big Data
4
Data is the Asset
“Big Data” is real and data analytics is improved
Business uses
– Better internal operations
– Development of new product and services
– New role for outsourcing: revenue generating vs. cost
savings
– Data as asset for external monetization
Frenemies and data sharing
Collision of privacy approaches: industrial
companies vs. free-wheeling Internet companies
5
Data IP and Licenses
Vexing question: who owns the data?
Scope of IP protection for data
Solution often = data sharing > data
ownership
6
1. Digital Redlining
Hypothetical: bank wants to offer different
credit cards to different applicants based on
applicant qualifications
Bank buys data from external data sources
Repurposing of data for use different from
original collection (banking vs. advertising)
Problem of “bad algorithms”
Litigation risk: proceedings for “redlining”
7
Digital Redlining (continued)
Litigation
– Prepare defenses for regulatory actions and for
litigation
Transactional aspects
– Verify that audience and audience member
attributes fit intended use
– Verify third party has right to convey to banks for
intended use supported by upstream data
collection rights
– Heavy negotiations over reps and indemnities and
– Carve-outs are the yellow flags
8
Learning from Litigators
Tech Transactional lawyers need to learn from
litigators
– Draft provisions for summary judgment
– Draft for arbitrators because of prevalence in tech
disputes
Litigators need to be aware that SOWs, SLAs
are often source of disputes and are often
“inherited” from draftsman who is not a lawyer
– Complicates litigation and arbitration
9
Transactional Roles for Litigators
Most IT projects start with an RFP
Advisable for litigator to participate in designing
RFP to identify litigation risks and asks for
relevant information
Best if RPF maps to MSA and SOWs
Collaborate with tech transactional lawyers
Drafting the right arbitration clause
– discovery, arbitrator qualifications and selection
process, etc.)
10
2. Big Box Health Clinics
Hypo: big box retailer sets up captive hearing
clinic in order to sell hearing aids
Hearing doctors need transfer of health care
data from hospital, but only need subset of
electronic health records
Problem if transfer has to be all of nothing
Does HIPAA and patient’s consent form allow
transfer without second consent?
11
Health Clinic (continued)
Problem for retailer: difficult for hospital to
identify and transfer only hearing-related
medical information
Patient/customer upset of prior irrelevant
surgeries are disclosed
Illustrates that all privacy is contextual
12
Enabling Contextual Privacy Disclosures
Practical problem is that takes too long for the
hospital to manually separate the relevant data
Companies such as Microsoft suggest solution is
to use software agents (a form of AI)
But: risk of bad algorithms in AI and potential
difficulty of “mining” data lake of patient electronic
medical records
Transaction/IT risks: need good IT integrator to
deal with hospital records and outsourcing AI
provider
Transactions must be HIPAA compliant
13
3. Putting PHI on Web-Hosted Databases
Patient data is part of medical information
posted to web-hosted databases for research
or other use by third parties
Does this violate consent obtained from
patient
– Review consent forms
HIPAA implications for third party use
Re-use by ongoing chain of medical research
endeavors
14
4. More Contextual Privacy: FCC vs. FTC Opt-
out/Opt-in Rules
D.C. Circuit upheld FCC’s reclassification of
broadband Internet access services as a Title
II telecommunications service in 2014 Open
Internet Order
Forthcoming order will govern how broadband
providers collect, use, protect and share
subscriber PII
15
FCC (continued)
Privacy framework under consideration requires
affirmative opt-in in order for broadband
providers to share data with third parties
This contrasts with FTC’s largely opt-out, case-
by-case approach to privacy protection
This will impact clients relying on data from
broadband providers
Clients must address that contextual privacy in
context of opt-in for some and opt-out for other
purposes
16
5. Terrorist Activity
Hypo: client operate digital platform
Terms of use give strong privacy rights
Client notices suspected terrorist activity
Client wants to tell Department of Homeland
Security and law enforcement
Chief Privacy Officer says disclosure will violate
privacy terms
Solution: obtain subpoena
Practical note: is a terrorist going to sue for
violation of privacy terms of use?
17
Terrorism (continued)
Practical note: is an alleged terrorist actually
going to sue for violation of privacy terms of
use?
But what if the client suspicion while in good
faith turns out to be wrong?
– Will the “terrorist” have a cause of action
notwithstanding the subpoena?
18
6. Outsourcing, Data Breaches and AGs
Many data breaches are caused by outsource
vendors using technology with insufficient
cybersecurity
– Problems in switch from transition to steady-state
operations
– Problems in updates
– Problems in integrating technology from a client’s
multiple vendors
19
AGs (continued)
Risk is that large database breach will lead to
investigations and actions by state attorneys
general
Client may argue that it was the “victim” of the
expert technology company it hired
But repeated breaches undercut this
argument
20
AGs (continued)
Litigator’s role:
– Acquire understanding of outsourcing to argue
that client acted in good faith but was victim of its
own expert
– Explain technology to AG staff that may not
understand the technology fine points to that
bolster client’s position
– Understand the political dimension of negotiating
with the AC
– Retaining the right tech and cyber experts
21
Clients and Cybersecurity Experts
Which comes first, the lawyer or the forensics
firm?
Advising clients (and cyber firms) of the
advantage of communications under attorney-
client privilege
Risk is that client’s IT department gets ahead of
the GC’s office
Litigators benefit from understanding how IT
departments operate when problems arise, and
how their communication with incumbent vendors
can create difficulties
22
7. Ransomware
Ransomware is not a classic database breach
Data locked up -- not disclosed
State database breach acts not triggered and
statutory notices not required
Issue: insurance carrier data lawyers “on
retainer” are database breach lawyers and
may not be qualified for ransomware
23
Ransomware (continued)
Client may need to fight to get insurance
carrier to pay for non-panel lawyer
If pay ransom, hope is that criminal is an
honest criminal
Evidence that ransomware is business is
existence of websites on how to pay ransom
Will be your introduction to bitcoins
24
Ransomware (continued)
Who will you work with?
– Cyber forensics firm
– Internal IT department
– IT outsource provider
Transactional planning
– Set up IT outsourcing to operate an backup
system even if primary system is locked up
– Often data not software is at risk
– Role of cloud computing
Footer Text 25
8. Supply Chain and Class Actions
Bad data is used in design of mass market
products or process
New-class products can contain bad data
Result: defects in mass market products
Risk: class action lawsuits
Cybersecurity vs. class actions
Footer Text 26
Supply Chains and Class Actions (continued)
Data-related litigation planning for class
actions
– Class certification (State vs. Federal
requirements)
– Sufficiency of injury
– Plan for affirmative defenses
– Pre-review of insurance coverage
– Consider effect on stock price
– PR planning
27
9. IoT and Privacy
Does the use of the Internet of Things create
risk of violation of privacy terms?
Risk: cyber weakness in IoT technology
Risk: data will be secure but use will exceed
scope of consent
Source of risks:
– Vendors of small connected devices often do not
bake security
28
IoT (continued)
Source of risks:
– Vendors of small connected devices often do not bake
security into the devices
– Security is not upgraded
– If automated system-wide security is not technologically
possible or not included, then manual upgrade process is the
alternative and inherently problem laden
– Networked devices can be hacked
– Even if devices are secure, data can be exposed during
transmission
– Business benefits of IoT can inadvertently result in
failure to adhere to privacy terms and use can exceed
the consent obtained
29
IoT (continued)
FTC guidance
– In the Matter of The Benefits, Challenges, and
Potential Roles for the Government in Fostering
the Advancement of the Internet of Things Docket
No. 160331306-6306-01
– Mobile App Developers: Start with Security
30
10. Big Data vs. Document Retention
Conflict between:
– GC’s goal of tailoring document (i.e., data)
retention periods to minimizing litigation risk
– Marketing and business teams’ goal of retaining
customer and other data for long periods in order
to conduct analytics of relevant data to generate
revenue
Issue becomes: revenue vs. litigation risk
Related issue: protecting forensic analysis
31
Question and Answer
William A. Tanenbaum
Co-Head, Technology Transactions, Arent
Fox LLP
William.Tanenbaum@arentfox.com
32
William A. Tanenbaum, Arent Fox LLP
William A. Tanenbaum was named as one of the Top Five IT lawyers in the country
by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year”
in IT in New York by US News & World Report/Best Lawyers. Chambers named
Bill as one of only five lawyers in Band One in Outsourcing & Technology in New
York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global
edition. Legal500 found that he is a “Leading Authority” on Technology &
Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who
Legal: Thought Leaders 2017. Bill is a Past President of the International
Technology Law Association. He is currently a Vice President of the Society for
Information Management (SIM) (New York Chapter), and industry CIO
organization, and the only lawyer on the Board of Directors.
Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone
else;” “brings extremely high integrity, a deep intellect, fearlessness and a
practical, real-world mindset to every problem;” “efficient, solution-driven and
makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have
worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's
Who Legal).
33

More Related Content

What's hot

Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutions
Dan Michaluk
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
Sydney Wolff
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
Polsinelli PC
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Bill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CVBill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CV
Bill Waites Forensics Expert/Mgmt Consultant
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
Klemchuk LLP
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
ENC
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
CompTIA
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
Government Technology and Services Coalition
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
SecureDocs
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the CloudCourtney Fisk
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Anne ndolo
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
Rising Media, Inc.
 
GDPR for Marketers - teaser
GDPR for Marketers - teaserGDPR for Marketers - teaser
GDPR for Marketers - teaser
Lava Consult BVBA
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
Aubrey Owens
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
Roger Royse
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
Thomas Bronack
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
Cognizant
 

What's hot (20)

Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutions
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Bill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CVBill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CV
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop1115 track 3 gopalan_using our laptop
1115 track 3 gopalan_using our laptop
 
GDPR for Marketers - teaser
GDPR for Marketers - teaserGDPR for Marketers - teaser
GDPR for Marketers - teaser
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 

Viewers also liked

Thema hanzegilde scoren met stages
Thema hanzegilde scoren met stagesThema hanzegilde scoren met stages
Thema hanzegilde scoren met stages
Ilse Schrijver
 
Diarios de observacion y practica Jardin de niños la luz del saber
Diarios de observacion y practica  Jardin de niños la luz del saberDiarios de observacion y practica  Jardin de niños la luz del saber
Diarios de observacion y practica Jardin de niños la luz del saber
Tania Gonzalez
 
Revista electrónica carolina sequera
Revista electrónica carolina sequeraRevista electrónica carolina sequera
Revista electrónica carolina sequera
sequeracarolina
 
Subsecretaría de educación media superior y superior
Subsecretaría de educación media superior y superiorSubsecretaría de educación media superior y superior
Subsecretaría de educación media superior y superior
Osi Menvar
 
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
MOTIVACION EMPRENDEDORA  Y EL EMPRENDIMIENTO TECNOLÓGICOMOTIVACION EMPRENDEDORA  Y EL EMPRENDIMIENTO TECNOLÓGICO
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
Zuniga Agustin
 
The name game – chapter 12
The name game – chapter 12The name game – chapter 12
The name game – chapter 12
rexsims2
 
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
Hugo Bruneliere
 
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
SiriusCon2016 - Capella Team: Live collaborative modeling with SiriusSiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
Obeo
 
Planeacion 8 junio
Planeacion 8 junioPlaneacion 8 junio
Planeacion 8 junio
Osi Menvar
 
Roadmap - SiriusCon2016
Roadmap - SiriusCon2016Roadmap - SiriusCon2016
Roadmap - SiriusCon2016
Cédric Brun
 
staj-örnek
staj-örnekstaj-örnek
staj-örnek
burakert
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
Pew Research Center's Internet & American Life Project
 
Model of communication pdf
Model of communication pdfModel of communication pdf
Model of communication pdf
Kriztine Viray
 
Rechtschreibwörterbücher Deutsch und Serbisch
Rechtschreibwörterbücher Deutsch und SerbischRechtschreibwörterbücher Deutsch und Serbisch
Rechtschreibwörterbücher Deutsch und Serbisch
Jelena Kostic-Tomovic
 
inşaat mühendisliği şantiye staj defteri
inşaat mühendisliği şantiye staj defteriinşaat mühendisliği şantiye staj defteri
inşaat mühendisliği şantiye staj defteri
Staj Defterim
 
Accenture Technology Vision for Retail 2016
Accenture Technology Vision for Retail 2016Accenture Technology Vision for Retail 2016
Accenture Technology Vision for Retail 2016
accenture
 

Viewers also liked (16)

Thema hanzegilde scoren met stages
Thema hanzegilde scoren met stagesThema hanzegilde scoren met stages
Thema hanzegilde scoren met stages
 
Diarios de observacion y practica Jardin de niños la luz del saber
Diarios de observacion y practica  Jardin de niños la luz del saberDiarios de observacion y practica  Jardin de niños la luz del saber
Diarios de observacion y practica Jardin de niños la luz del saber
 
Revista electrónica carolina sequera
Revista electrónica carolina sequeraRevista electrónica carolina sequera
Revista electrónica carolina sequera
 
Subsecretaría de educación media superior y superior
Subsecretaría de educación media superior y superiorSubsecretaría de educación media superior y superior
Subsecretaría de educación media superior y superior
 
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
MOTIVACION EMPRENDEDORA  Y EL EMPRENDIMIENTO TECNOLÓGICOMOTIVACION EMPRENDEDORA  Y EL EMPRENDIMIENTO TECNOLÓGICO
MOTIVACION EMPRENDEDORA Y EL EMPRENDIMIENTO TECNOLÓGICO
 
The name game – chapter 12
The name game – chapter 12The name game – chapter 12
The name game – chapter 12
 
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
Neo4EMF : big models made easier! @ EclipseCon France 2014 - Ignite Talks Ses...
 
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
SiriusCon2016 - Capella Team: Live collaborative modeling with SiriusSiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
SiriusCon2016 - Capella Team: Live collaborative modeling with Sirius
 
Planeacion 8 junio
Planeacion 8 junioPlaneacion 8 junio
Planeacion 8 junio
 
Roadmap - SiriusCon2016
Roadmap - SiriusCon2016Roadmap - SiriusCon2016
Roadmap - SiriusCon2016
 
staj-örnek
staj-örnekstaj-örnek
staj-örnek
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
Model of communication pdf
Model of communication pdfModel of communication pdf
Model of communication pdf
 
Rechtschreibwörterbücher Deutsch und Serbisch
Rechtschreibwörterbücher Deutsch und SerbischRechtschreibwörterbücher Deutsch und Serbisch
Rechtschreibwörterbücher Deutsch und Serbisch
 
inşaat mühendisliği şantiye staj defteri
inşaat mühendisliği şantiye staj defteriinşaat mühendisliği şantiye staj defteri
inşaat mühendisliği şantiye staj defteri
 
Accenture Technology Vision for Retail 2016
Accenture Technology Vision for Retail 2016Accenture Technology Vision for Retail 2016
Accenture Technology Vision for Retail 2016
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contextual

The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Nicole Black
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
Shawn Tuma
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
Mohammad Mydul Islam
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
William Tanenbaum
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
Agustin Argelich Casals
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
Argelich Networks
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
Government Technology and Services Coalition
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
MMMTechLaw
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
keturahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
walterl4
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contextual (20)

Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 

More from William Tanenbaum

William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
William Tanenbaum
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
William Tanenbaum
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
William Tanenbaum
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
William Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...William Tanenbaum
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumWilliam Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsWilliam Tanenbaum
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210William Tanenbaum
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...William Tanenbaum
 

More from William Tanenbaum (13)

William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
 

Recently uploaded

Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 

Recently uploaded (20)

Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 

Date Use Rules in Different Business Scenarios: It's All Contextual

  • 1. LA / NY / SF / DC / arentfox.com Data Use Rules in Different Business Scenarios: It’s All Contextual
  • 2. Presentation Overview Corporate businesses plans lead to . . . . . . implementation of data collection and data use plans, leads to . . . . . . legal risks, calling for . . . . . . advance IT planning, and . . . litigation planning, which requires . . . – Understanding the different mindsets of Chief Technology Officer and Chief Data Officers – Collaboration between litigators and technology transaction lawyers – Understanding outsourcing and RFP process 2
  • 3. Business Scenarios to be Covered 1. Digital Redlining 2. Big Box Retail Health Clinics 3. PHI on Web-Hosted Databases 4. FCC vs. FTC 5. Terrorist Activity 6. Data Breaches and Attorneys General 3
  • 4. Business Scenarios (continued) 7. Ransomware 8. Supply Chains and Class Actions 9. Internet of Things and Privacy 10. Data Retention vs. Big Data 4
  • 5. Data is the Asset “Big Data” is real and data analytics is improved Business uses – Better internal operations – Development of new product and services – New role for outsourcing: revenue generating vs. cost savings – Data as asset for external monetization Frenemies and data sharing Collision of privacy approaches: industrial companies vs. free-wheeling Internet companies 5
  • 6. Data IP and Licenses Vexing question: who owns the data? Scope of IP protection for data Solution often = data sharing > data ownership 6
  • 7. 1. Digital Redlining Hypothetical: bank wants to offer different credit cards to different applicants based on applicant qualifications Bank buys data from external data sources Repurposing of data for use different from original collection (banking vs. advertising) Problem of “bad algorithms” Litigation risk: proceedings for “redlining” 7
  • 8. Digital Redlining (continued) Litigation – Prepare defenses for regulatory actions and for litigation Transactional aspects – Verify that audience and audience member attributes fit intended use – Verify third party has right to convey to banks for intended use supported by upstream data collection rights – Heavy negotiations over reps and indemnities and – Carve-outs are the yellow flags 8
  • 9. Learning from Litigators Tech Transactional lawyers need to learn from litigators – Draft provisions for summary judgment – Draft for arbitrators because of prevalence in tech disputes Litigators need to be aware that SOWs, SLAs are often source of disputes and are often “inherited” from draftsman who is not a lawyer – Complicates litigation and arbitration 9
  • 10. Transactional Roles for Litigators Most IT projects start with an RFP Advisable for litigator to participate in designing RFP to identify litigation risks and asks for relevant information Best if RPF maps to MSA and SOWs Collaborate with tech transactional lawyers Drafting the right arbitration clause – discovery, arbitrator qualifications and selection process, etc.) 10
  • 11. 2. Big Box Health Clinics Hypo: big box retailer sets up captive hearing clinic in order to sell hearing aids Hearing doctors need transfer of health care data from hospital, but only need subset of electronic health records Problem if transfer has to be all of nothing Does HIPAA and patient’s consent form allow transfer without second consent? 11
  • 12. Health Clinic (continued) Problem for retailer: difficult for hospital to identify and transfer only hearing-related medical information Patient/customer upset of prior irrelevant surgeries are disclosed Illustrates that all privacy is contextual 12
  • 13. Enabling Contextual Privacy Disclosures Practical problem is that takes too long for the hospital to manually separate the relevant data Companies such as Microsoft suggest solution is to use software agents (a form of AI) But: risk of bad algorithms in AI and potential difficulty of “mining” data lake of patient electronic medical records Transaction/IT risks: need good IT integrator to deal with hospital records and outsourcing AI provider Transactions must be HIPAA compliant 13
  • 14. 3. Putting PHI on Web-Hosted Databases Patient data is part of medical information posted to web-hosted databases for research or other use by third parties Does this violate consent obtained from patient – Review consent forms HIPAA implications for third party use Re-use by ongoing chain of medical research endeavors 14
  • 15. 4. More Contextual Privacy: FCC vs. FTC Opt- out/Opt-in Rules D.C. Circuit upheld FCC’s reclassification of broadband Internet access services as a Title II telecommunications service in 2014 Open Internet Order Forthcoming order will govern how broadband providers collect, use, protect and share subscriber PII 15
  • 16. FCC (continued) Privacy framework under consideration requires affirmative opt-in in order for broadband providers to share data with third parties This contrasts with FTC’s largely opt-out, case- by-case approach to privacy protection This will impact clients relying on data from broadband providers Clients must address that contextual privacy in context of opt-in for some and opt-out for other purposes 16
  • 17. 5. Terrorist Activity Hypo: client operate digital platform Terms of use give strong privacy rights Client notices suspected terrorist activity Client wants to tell Department of Homeland Security and law enforcement Chief Privacy Officer says disclosure will violate privacy terms Solution: obtain subpoena Practical note: is a terrorist going to sue for violation of privacy terms of use? 17
  • 18. Terrorism (continued) Practical note: is an alleged terrorist actually going to sue for violation of privacy terms of use? But what if the client suspicion while in good faith turns out to be wrong? – Will the “terrorist” have a cause of action notwithstanding the subpoena? 18
  • 19. 6. Outsourcing, Data Breaches and AGs Many data breaches are caused by outsource vendors using technology with insufficient cybersecurity – Problems in switch from transition to steady-state operations – Problems in updates – Problems in integrating technology from a client’s multiple vendors 19
  • 20. AGs (continued) Risk is that large database breach will lead to investigations and actions by state attorneys general Client may argue that it was the “victim” of the expert technology company it hired But repeated breaches undercut this argument 20
  • 21. AGs (continued) Litigator’s role: – Acquire understanding of outsourcing to argue that client acted in good faith but was victim of its own expert – Explain technology to AG staff that may not understand the technology fine points to that bolster client’s position – Understand the political dimension of negotiating with the AC – Retaining the right tech and cyber experts 21
  • 22. Clients and Cybersecurity Experts Which comes first, the lawyer or the forensics firm? Advising clients (and cyber firms) of the advantage of communications under attorney- client privilege Risk is that client’s IT department gets ahead of the GC’s office Litigators benefit from understanding how IT departments operate when problems arise, and how their communication with incumbent vendors can create difficulties 22
  • 23. 7. Ransomware Ransomware is not a classic database breach Data locked up -- not disclosed State database breach acts not triggered and statutory notices not required Issue: insurance carrier data lawyers “on retainer” are database breach lawyers and may not be qualified for ransomware 23
  • 24. Ransomware (continued) Client may need to fight to get insurance carrier to pay for non-panel lawyer If pay ransom, hope is that criminal is an honest criminal Evidence that ransomware is business is existence of websites on how to pay ransom Will be your introduction to bitcoins 24
  • 25. Ransomware (continued) Who will you work with? – Cyber forensics firm – Internal IT department – IT outsource provider Transactional planning – Set up IT outsourcing to operate an backup system even if primary system is locked up – Often data not software is at risk – Role of cloud computing Footer Text 25
  • 26. 8. Supply Chain and Class Actions Bad data is used in design of mass market products or process New-class products can contain bad data Result: defects in mass market products Risk: class action lawsuits Cybersecurity vs. class actions Footer Text 26
  • 27. Supply Chains and Class Actions (continued) Data-related litigation planning for class actions – Class certification (State vs. Federal requirements) – Sufficiency of injury – Plan for affirmative defenses – Pre-review of insurance coverage – Consider effect on stock price – PR planning 27
  • 28. 9. IoT and Privacy Does the use of the Internet of Things create risk of violation of privacy terms? Risk: cyber weakness in IoT technology Risk: data will be secure but use will exceed scope of consent Source of risks: – Vendors of small connected devices often do not bake security 28
  • 29. IoT (continued) Source of risks: – Vendors of small connected devices often do not bake security into the devices – Security is not upgraded – If automated system-wide security is not technologically possible or not included, then manual upgrade process is the alternative and inherently problem laden – Networked devices can be hacked – Even if devices are secure, data can be exposed during transmission – Business benefits of IoT can inadvertently result in failure to adhere to privacy terms and use can exceed the consent obtained 29
  • 30. IoT (continued) FTC guidance – In the Matter of The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things Docket No. 160331306-6306-01 – Mobile App Developers: Start with Security 30
  • 31. 10. Big Data vs. Document Retention Conflict between: – GC’s goal of tailoring document (i.e., data) retention periods to minimizing litigation risk – Marketing and business teams’ goal of retaining customer and other data for long periods in order to conduct analytics of relevant data to generate revenue Issue becomes: revenue vs. litigation risk Related issue: protecting forensic analysis 31
  • 32. Question and Answer William A. Tanenbaum Co-Head, Technology Transactions, Arent Fox LLP William.Tanenbaum@arentfox.com 32
  • 33. William A. Tanenbaum, Arent Fox LLP William A. Tanenbaum was named as one of the Top Five IT lawyers in the country by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year” in IT in New York by US News & World Report/Best Lawyers. Chambers named Bill as one of only five lawyers in Band One in Outsourcing & Technology in New York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global edition. Legal500 found that he is a “Leading Authority” on Technology & Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who Legal: Thought Leaders 2017. Bill is a Past President of the International Technology Law Association. He is currently a Vice President of the Society for Information Management (SIM) (New York Chapter), and industry CIO organization, and the only lawyer on the Board of Directors. Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone else;” “brings extremely high integrity, a deep intellect, fearlessness and a practical, real-world mindset to every problem;” “efficient, solution-driven and makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's Who Legal). 33