SlideShare a Scribd company logo
1 of 33
LA / NY / SF / DC / arentfox.com
Data Use Rules in
Different Business
Scenarios: It’s All
Contextual
William A. Tanenbaum Co-Head,
Technology Transactions
Presentation Overview
Corporate businesses plans lead to . . .
. . . implementation of data collection and data use
plans, leads to . . .
. . . legal risks, calling for . . .
. . . advance IT planning, and
. . . litigation planning, which requires . . .
– Understanding the different mindsets of Chief Technology
Officer and Chief Data Officers
– Collaboration between litigators and technology
transaction lawyers
– Understanding outsourcing and RFP process
2
Business Scenarios to be Covered
1. Digital Redlining
2. Big Box Retail Health Clinics
3. PHI on Web-Hosted Databases
4. FCC vs. FTC
5. Terrorist Activity
6. Data Breaches and Attorneys General
3
Business Scenarios (continued)
7. Ransomware
8. Supply Chains and Class Actions
9. Internet of Things and Privacy
10. Data Retention vs. Big Data
4
Data is the Asset
“Big Data” is real and data analytics is improved
Business uses
– Better internal operations
– Development of new product and services
– New role for outsourcing: revenue generating vs. cost
savings
– Data as asset for external monetization
Frenemies and data sharing
Collision of privacy approaches: industrial
companies vs. free-wheeling Internet companies
5
Data IP and Licenses
Vexing question: who owns the data?
Scope of IP protection for data
Solution often = data sharing > data
ownership
6
1. Digital Redlining
Hypothetical: bank wants to offer different
credit cards to different applicants based on
applicant qualifications
Bank buys data from external data sources
Repurposing of data for use different from
original collection (banking vs. advertising)
Problem of “bad algorithms”
Litigation risk: proceedings for “redlining”
7
Digital Redlining (continued)
Litigation
– Prepare defenses for regulatory actions and for
litigation
Transactional aspects
– Verify that audience and audience member
attributes fit intended use
– Verify third party has right to convey to banks for
intended use supported by upstream data
collection rights
– Heavy negotiations over reps and indemnities and
– Carve-outs are the yellow flags
8
Learning from Litigators
Tech Transactional lawyers need to learn from
litigators
– Draft provisions for summary judgment
– Draft for arbitrators because of prevalence in tech
disputes
Litigators need to be aware that SOWs, SLAs
are often source of disputes and are often
“inherited” from draftsman who is not a lawyer
– Complicates litigation and arbitration
9
Transactional Roles for Litigators
Most IT projects start with an RFP
Advisable for litigator to participate in designing
RFP to identify litigation risks and asks for
relevant information
Best if RPF maps to MSA and SOWs
Collaborate with tech transactional lawyers
Drafting the right arbitration clause
– discovery, arbitrator qualifications and selection
process, etc.)
10
2. Big Box Health Clinics
Hypo: big box retailer sets up captive hearing
clinic in order to sell hearing aids
Hearing doctors need transfer of health care
data from hospital, but only need subset of
electronic health records
Problem if transfer has to be all of nothing
Does HIPAA and patient’s consent form allow
transfer without second consent?
11
Health Clinic (continued)
Problem for retailer: difficult for hospital to
identify and transfer only hearing-related
medical information
Patient/customer upset of prior irrelevant
surgeries are disclosed
Illustrates that all privacy is contextual
12
Enabling Contextual Privacy Disclosures
Practical problem is that takes too long for the
hospital to manually separate the relevant data
Companies such as Microsoft suggest solution is
to use software agents (a form of AI)
But: risk of bad algorithms in AI and potential
difficulty of “mining” data lake of patient electronic
medical records
Transaction/IT risks: need good IT integrator to
deal with hospital records and outsourcing AI
provider
Transactions must be HIPAA compliant
13
3. Putting PHI on Web-Hosted Databases
Patient data is part of medical information
posted to web-hosted databases for research
or other use by third parties
Does this violate consent obtained from
patient
– Review consent forms
HIPAA implications for third party use
Re-use by ongoing chain of medical research
endeavors
14
4. More Contextual Privacy: FCC vs. FTC Opt-
out/Opt-in Rules
D.C. Circuit upheld FCC’s reclassification of
broadband Internet access services as a Title
II telecommunications service in 2014 Open
Internet Order
Forthcoming order will govern how broadband
providers collect, use, protect and share
subscriber PII
15
FCC (continued)
Privacy framework under consideration requires
affirmative opt-in in order for broadband
providers to share data with third parties
This contrasts with FTC’s largely opt-out, case-
by-case approach to privacy protection
This will impact clients relying on data from
broadband providers
Clients must address that contextual privacy in
context of opt-in for some and opt-out for other
purposes
16
5. Terrorist Activity
Hypo: client operate digital platform
Terms of use give strong privacy rights
Client notices suspected terrorist activity
Client wants to tell Department of Homeland
Security and law enforcement
Chief Privacy Officer says disclosure will violate
privacy terms
Solution: obtain subpoena
Practical note: is a terrorist going to sue for
violation of privacy terms of use?
17
Terrorism (continued)
Practical note: is an alleged terrorist actually
going to sue for violation of privacy terms of
use?
But what if the client suspicion while in good
faith turns out to be wrong?
– Will the “terrorist” have a cause of action
notwithstanding the subpoena?
18
6. Outsourcing, Data Breaches and AGs
Many data breaches are caused by outsource
vendors using technology with insufficient
cybersecurity
– Problems in switch from transition to steady-state
operations
– Problems in updates
– Problems in integrating technology from a client’s
multiple vendors
19
AGs (continued)
Risk is that large database breach will lead to
investigations and actions by state attorneys
general
Client may argue that it was the “victim” of the
expert technology company it hired
But repeated breaches undercut this
argument
20
AGs (continued)
Litigator’s role:
– Acquire understanding of outsourcing to argue
that client acted in good faith but was victim of its
own expert
– Explain technology to AG staff that may not
understand the technology fine points to that
bolster client’s position
– Understand the political dimension of negotiating
with the AC
– Retaining the right tech and cyber experts
21
Clients and Cybersecurity Experts
Which comes first, the lawyer or the forensics
firm?
Advising clients (and cyber firms) of the
advantage of communications under attorney-
client privilege
Risk is that client’s IT department gets ahead of
the GC’s office
Litigators benefit from understanding how IT
departments operate when problems arise, and
how their communication with incumbent vendors
can create difficulties
22
7. Ransomware
Ransomware is not a classic database breach
Data locked up -- not disclosed
State database breach acts not triggered and
statutory notices not required
Issue: insurance carrier data lawyers “on
retainer” are database breach lawyers and
may not be qualified for ransomware
23
Ransomware (continued)
Client may need to fight to get insurance
carrier to pay for non-panel lawyer
If pay ransom, hope is that criminal is an
honest criminal
Evidence that ransomware is business is
existence of websites on how to pay ransom
Will be your introduction to bitcoins
24
Ransomware (continued)
Who will you work with?
– Cyber forensics firm
– Internal IT department
– IT outsource provider
Transactional planning
– Set up IT outsourcing to operate an backup
system even if primary system is locked up
– Often data not software is at risk
– Role of cloud computing
Footer Text 25
8. Supply Chain and Class Actions
Bad data is used in design of mass market
products or process
New-class products can contain bad data
Result: defects in mass market products
Risk: class action lawsuits
Cybersecurity vs. class actions
Footer Text 26
Supply Chains and Class Actions (continued)
Data-related litigation planning for class
actions
– Class certification (State vs. Federal
requirements)
– Sufficiency of injury
– Plan for affirmative defenses
– Pre-review of insurance coverage
– Consider effect on stock price
– PR planning
27
9. IoT and Privacy
Does the use of the Internet of Things create
risk of violation of privacy terms?
Risk: cyber weakness in IoT technology
Risk: data will be secure but use will exceed
scope of consent
Source of risks:
– Vendors of small connected devices often do not
bake security
28
IoT (continued)
Source of risks:
– Vendors of small connected devices often do not bake
security into the devices
– Security is not upgraded
– If automated system-wide security is not technologically
possible or not included, then manual upgrade process is the
alternative and inherently problem laden
– Networked devices can be hacked
– Even if devices are secure, data can be exposed during
transmission
– Business benefits of IoT can inadvertently result in
failure to adhere to privacy terms and use can exceed
the consent obtained
29
IoT (continued)
FTC guidance
– In the Matter of The Benefits, Challenges, and
Potential Roles for the Government in Fostering
the Advancement of the Internet of Things Docket
No. 160331306-6306-01
– Mobile App Developers: Start with Security
30
10. Big Data vs. Document Retention
Conflict between:
– GC’s goal of tailoring document (i.e., data)
retention periods to minimizing litigation risk
– Marketing and business teams’ goal of retaining
customer and other data for long periods in order
to conduct analytics of relevant data to generate
revenue
Issue becomes: revenue vs. litigation risk
Related issue: protecting forensic analysis
31
Question and Answer
William A. Tanenbaum
Co-Head, Technology Transactions, Arent
Fox LLP
William.Tanenbaum@arentfox.com
32
William A. Tanenbaum, Arent Fox LLP
William A. Tanenbaum was named as one of the Top Five IT lawyers in the country
by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year”
in IT in New York by US News & World Report/Best Lawyers. Chambers named
Bill as one of only five lawyers in Band One in Outsourcing & Technology in New
York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global
edition. Legal500 found that he is a “Leading Authority” on Technology &
Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who
Legal: Thought Leaders 2017. Bill is a Past President of the International
Technology Law Association. He is currently a Vice President of the Society for
Information Management (SIM) (New York Chapter), and industry CIO
organization, and the only lawyer on the Board of Directors.
Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone
else;” “brings extremely high integrity, a deep intellect, fearlessness and a
practical, real-world mindset to every problem;” “efficient, solution-driven and
makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have
worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's
Who Legal).
33

More Related Content

What's hot

Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
Peister
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
Courtney Fisk
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to You
DATAVERSITY
 

What's hot (19)

20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Bill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CVBill WaitesForensics Expert Witness CV
Bill WaitesForensics Expert Witness CV
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
GDPR for Marketers - teaser
GDPR for Marketers - teaserGDPR for Marketers - teaser
GDPR for Marketers - teaser
 
Law Practice Management in the Cloud
Law Practice Management in the CloudLaw Practice Management in the Cloud
Law Practice Management in the Cloud
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to You
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 

Viewers also liked

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Atlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 

Viewers also liked (10)

Security awareness training ip5
Security awareness training ip5Security awareness training ip5
Security awareness training ip5
 
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contextual

Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
keturahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
walterl4
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
Jan Dhont
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
Mark Milburn
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 

Similar to Date Use Rules in Different Business Scenarios: It's All Contextual (20)

William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 

More from William Tanenbaum

IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
William Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
William Tanenbaum
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
William Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
William Tanenbaum
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210
William Tanenbaum
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
William Tanenbaum
 

More from William Tanenbaum (13)

IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
 
The IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green BuildingsThe IT and IP Revolution Hidden In Retrofits and Green Buildings
The IT and IP Revolution Hidden In Retrofits and Green Buildings
 
W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210W Tanenbaum Making The Supply Chain Sustainable 0210
W Tanenbaum Making The Supply Chain Sustainable 0210
 
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
Green Outsourcing, Energy Efficient Data Centers and Sustainable Supply Chain...
 

Recently uploaded

Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
ZurliaSoop
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
mefyqyn
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
yogita9398
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
uttamuditi
 

Recently uploaded (20)

Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companies
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Jim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docxJim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docx
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...Sanctions and types of Sanctions in Ibnternational law along with its scope a...
Sanctions and types of Sanctions in Ibnternational law along with its scope a...
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 

Date Use Rules in Different Business Scenarios: It's All Contextual

  • 1. LA / NY / SF / DC / arentfox.com Data Use Rules in Different Business Scenarios: It’s All Contextual William A. Tanenbaum Co-Head, Technology Transactions
  • 2. Presentation Overview Corporate businesses plans lead to . . . . . . implementation of data collection and data use plans, leads to . . . . . . legal risks, calling for . . . . . . advance IT planning, and . . . litigation planning, which requires . . . – Understanding the different mindsets of Chief Technology Officer and Chief Data Officers – Collaboration between litigators and technology transaction lawyers – Understanding outsourcing and RFP process 2
  • 3. Business Scenarios to be Covered 1. Digital Redlining 2. Big Box Retail Health Clinics 3. PHI on Web-Hosted Databases 4. FCC vs. FTC 5. Terrorist Activity 6. Data Breaches and Attorneys General 3
  • 4. Business Scenarios (continued) 7. Ransomware 8. Supply Chains and Class Actions 9. Internet of Things and Privacy 10. Data Retention vs. Big Data 4
  • 5. Data is the Asset “Big Data” is real and data analytics is improved Business uses – Better internal operations – Development of new product and services – New role for outsourcing: revenue generating vs. cost savings – Data as asset for external monetization Frenemies and data sharing Collision of privacy approaches: industrial companies vs. free-wheeling Internet companies 5
  • 6. Data IP and Licenses Vexing question: who owns the data? Scope of IP protection for data Solution often = data sharing > data ownership 6
  • 7. 1. Digital Redlining Hypothetical: bank wants to offer different credit cards to different applicants based on applicant qualifications Bank buys data from external data sources Repurposing of data for use different from original collection (banking vs. advertising) Problem of “bad algorithms” Litigation risk: proceedings for “redlining” 7
  • 8. Digital Redlining (continued) Litigation – Prepare defenses for regulatory actions and for litigation Transactional aspects – Verify that audience and audience member attributes fit intended use – Verify third party has right to convey to banks for intended use supported by upstream data collection rights – Heavy negotiations over reps and indemnities and – Carve-outs are the yellow flags 8
  • 9. Learning from Litigators Tech Transactional lawyers need to learn from litigators – Draft provisions for summary judgment – Draft for arbitrators because of prevalence in tech disputes Litigators need to be aware that SOWs, SLAs are often source of disputes and are often “inherited” from draftsman who is not a lawyer – Complicates litigation and arbitration 9
  • 10. Transactional Roles for Litigators Most IT projects start with an RFP Advisable for litigator to participate in designing RFP to identify litigation risks and asks for relevant information Best if RPF maps to MSA and SOWs Collaborate with tech transactional lawyers Drafting the right arbitration clause – discovery, arbitrator qualifications and selection process, etc.) 10
  • 11. 2. Big Box Health Clinics Hypo: big box retailer sets up captive hearing clinic in order to sell hearing aids Hearing doctors need transfer of health care data from hospital, but only need subset of electronic health records Problem if transfer has to be all of nothing Does HIPAA and patient’s consent form allow transfer without second consent? 11
  • 12. Health Clinic (continued) Problem for retailer: difficult for hospital to identify and transfer only hearing-related medical information Patient/customer upset of prior irrelevant surgeries are disclosed Illustrates that all privacy is contextual 12
  • 13. Enabling Contextual Privacy Disclosures Practical problem is that takes too long for the hospital to manually separate the relevant data Companies such as Microsoft suggest solution is to use software agents (a form of AI) But: risk of bad algorithms in AI and potential difficulty of “mining” data lake of patient electronic medical records Transaction/IT risks: need good IT integrator to deal with hospital records and outsourcing AI provider Transactions must be HIPAA compliant 13
  • 14. 3. Putting PHI on Web-Hosted Databases Patient data is part of medical information posted to web-hosted databases for research or other use by third parties Does this violate consent obtained from patient – Review consent forms HIPAA implications for third party use Re-use by ongoing chain of medical research endeavors 14
  • 15. 4. More Contextual Privacy: FCC vs. FTC Opt- out/Opt-in Rules D.C. Circuit upheld FCC’s reclassification of broadband Internet access services as a Title II telecommunications service in 2014 Open Internet Order Forthcoming order will govern how broadband providers collect, use, protect and share subscriber PII 15
  • 16. FCC (continued) Privacy framework under consideration requires affirmative opt-in in order for broadband providers to share data with third parties This contrasts with FTC’s largely opt-out, case- by-case approach to privacy protection This will impact clients relying on data from broadband providers Clients must address that contextual privacy in context of opt-in for some and opt-out for other purposes 16
  • 17. 5. Terrorist Activity Hypo: client operate digital platform Terms of use give strong privacy rights Client notices suspected terrorist activity Client wants to tell Department of Homeland Security and law enforcement Chief Privacy Officer says disclosure will violate privacy terms Solution: obtain subpoena Practical note: is a terrorist going to sue for violation of privacy terms of use? 17
  • 18. Terrorism (continued) Practical note: is an alleged terrorist actually going to sue for violation of privacy terms of use? But what if the client suspicion while in good faith turns out to be wrong? – Will the “terrorist” have a cause of action notwithstanding the subpoena? 18
  • 19. 6. Outsourcing, Data Breaches and AGs Many data breaches are caused by outsource vendors using technology with insufficient cybersecurity – Problems in switch from transition to steady-state operations – Problems in updates – Problems in integrating technology from a client’s multiple vendors 19
  • 20. AGs (continued) Risk is that large database breach will lead to investigations and actions by state attorneys general Client may argue that it was the “victim” of the expert technology company it hired But repeated breaches undercut this argument 20
  • 21. AGs (continued) Litigator’s role: – Acquire understanding of outsourcing to argue that client acted in good faith but was victim of its own expert – Explain technology to AG staff that may not understand the technology fine points to that bolster client’s position – Understand the political dimension of negotiating with the AC – Retaining the right tech and cyber experts 21
  • 22. Clients and Cybersecurity Experts Which comes first, the lawyer or the forensics firm? Advising clients (and cyber firms) of the advantage of communications under attorney- client privilege Risk is that client’s IT department gets ahead of the GC’s office Litigators benefit from understanding how IT departments operate when problems arise, and how their communication with incumbent vendors can create difficulties 22
  • 23. 7. Ransomware Ransomware is not a classic database breach Data locked up -- not disclosed State database breach acts not triggered and statutory notices not required Issue: insurance carrier data lawyers “on retainer” are database breach lawyers and may not be qualified for ransomware 23
  • 24. Ransomware (continued) Client may need to fight to get insurance carrier to pay for non-panel lawyer If pay ransom, hope is that criminal is an honest criminal Evidence that ransomware is business is existence of websites on how to pay ransom Will be your introduction to bitcoins 24
  • 25. Ransomware (continued) Who will you work with? – Cyber forensics firm – Internal IT department – IT outsource provider Transactional planning – Set up IT outsourcing to operate an backup system even if primary system is locked up – Often data not software is at risk – Role of cloud computing Footer Text 25
  • 26. 8. Supply Chain and Class Actions Bad data is used in design of mass market products or process New-class products can contain bad data Result: defects in mass market products Risk: class action lawsuits Cybersecurity vs. class actions Footer Text 26
  • 27. Supply Chains and Class Actions (continued) Data-related litigation planning for class actions – Class certification (State vs. Federal requirements) – Sufficiency of injury – Plan for affirmative defenses – Pre-review of insurance coverage – Consider effect on stock price – PR planning 27
  • 28. 9. IoT and Privacy Does the use of the Internet of Things create risk of violation of privacy terms? Risk: cyber weakness in IoT technology Risk: data will be secure but use will exceed scope of consent Source of risks: – Vendors of small connected devices often do not bake security 28
  • 29. IoT (continued) Source of risks: – Vendors of small connected devices often do not bake security into the devices – Security is not upgraded – If automated system-wide security is not technologically possible or not included, then manual upgrade process is the alternative and inherently problem laden – Networked devices can be hacked – Even if devices are secure, data can be exposed during transmission – Business benefits of IoT can inadvertently result in failure to adhere to privacy terms and use can exceed the consent obtained 29
  • 30. IoT (continued) FTC guidance – In the Matter of The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things Docket No. 160331306-6306-01 – Mobile App Developers: Start with Security 30
  • 31. 10. Big Data vs. Document Retention Conflict between: – GC’s goal of tailoring document (i.e., data) retention periods to minimizing litigation risk – Marketing and business teams’ goal of retaining customer and other data for long periods in order to conduct analytics of relevant data to generate revenue Issue becomes: revenue vs. litigation risk Related issue: protecting forensic analysis 31
  • 32. Question and Answer William A. Tanenbaum Co-Head, Technology Transactions, Arent Fox LLP William.Tanenbaum@arentfox.com 32
  • 33. William A. Tanenbaum, Arent Fox LLP William A. Tanenbaum was named as one of the Top Five IT lawyers in the country by Who’s Who Legal in 2016, and was previously named as “Lawyer of the Year” in IT in New York by US News & World Report/Best Lawyers. Chambers named Bill as one of only five lawyers in Band One in Outsourcing & Technology in New York, in Band Two nationally, and as a Leading Outsourcing Lawyer in its global edition. Legal500 found that he is a “Leading Authority” on Technology & Outsourcing. He was selection for inclusion in the inaugural edition of Who’s Who Legal: Thought Leaders 2017. Bill is a Past President of the International Technology Law Association. He is currently a Vice President of the Society for Information Management (SIM) (New York Chapter), and industry CIO organization, and the only lawyer on the Board of Directors. Clients endorse Bill as “a brilliant lawyer. I cannot imagine working with anyone else;” “brings extremely high integrity, a deep intellect, fearlessness and a practical, real-world mindset to every problem;” “efficient, solution-driven and makes excellent judgment calls” (Chambers); "one of the best IP lawyers I have worked with" and "knows exactly how to get a deal done” (Clean Tech and Who's Who Legal). 33