SlideShare a Scribd company logo
1 of 15
How to Prevent IT
Agreements from
Causing Data Security
Breaches
William A. Tanenbaum
Head, IP & Technology Transactions Group
Role of IT in Data Security Breaches
• 2013 Trustwave Global Security Report on 450 database breaches found that:
– 63% due to third-party IT providers
– IT providers’ practices caused security deficiencies easily exploited by hackers
• Provider’s subcontractors are a common cause of breaches
• Risks are increasing because the following lead to increased avenues for security
attacks:
– Cloud (which is not longer a disruptive technology)
– Complex and evolving IT infrastructures with BYOD, mobile, etc.
– Multi-vendor IT environment
– Hidden sub-contracting and sub-outsourcing
– Connected devices and Internet of Things
2
Consequences of Security Breaches
• Immediate IT remediation costs
• Costs of revising IT infrastructure
• Costs of payments to beneficiaries
• Notification requirements under state law
• Proceedings by State Attorneys General
• Defending class action suits as private remedy for data security
failures
• Reputation harm
• Reduced economic returns
3
Common Causes of IT Security
Problems
• Cost of IT emphasized over potential cost of security failure
• Providers are inappropriately forced, by price evaluations, to offer reduced
security
• Security protection is “baked in” to IT vendor’s product and service costs
• IT staff does not have early role in procurement/outsourcing process
• Lack of validation of providers’ RFP security responses
• Provider security team does has not counterpart on customer team
• Summary: Evaluation of proposed provider focus on costs and operational
SLAs > security
4
What do to with Existing Contracts
• Conduct review of provisions (including SLAs) in existing IT and
outsourcing agreements -- gap analysis
• Audit business practices against contractual requirements
• Audit old contract provisions against updated security policies
• Identify potential deficiencies
• Remediate through renegotiation (using liability as leverage)
• Determine and implement what is needed from beneficiary
side
5
What do to with New Contracts
(Overview)
• Include up-to-date provisions in new agreements
• Provisions that you should audit/review are the same that
should be in agreements going forward
6
Addressing Security Protection
through Better Contracts
• Determine appropriate data security standards based on policies, regulatory
environment and obligations to beneficiaries and others
• Determine appropriate objective security standards
• Determine how to embody security compliance in IT/outsourcing
agreements
• Improve RFP and RFP evaluation process (and use leverage of RFP)
– (and use an NDA)
• Use down-select process to drill down into provider’s security capabilities
• Add specific security exhibit to contract
7
Contractual Provision Checklist
• What will providers be required to do?
– Enact data security program
• Safeguards, procedures, controls for data, especially PII/customer data
– Comply with existing future regulatory requirements
• Design in future requirements
– Comply with current ISO/IEC and other relevant standards
• PCI/DISS requirements; PCI certification
– Comply with customer policies
• RFP establish and responses commit to adherence
• Customer to establish proper criteria
8
Contractual Provisions (2)
• Comply with customer access, use, security tiers, etc.
• Control and approve subcontractors
– “hidden” outsourcing by providers for peak data loads
• Appropriate encryption levels
• Cybersecurity-specific SLAs, SOWs, etc.
• SLA credits should not be exclusive remedies
• “Declared Direct Damages” to prevent unrecoverable consequential damages,
including data restoration
• Combine DR with Force Majeure
• Restrict remote data access
• Control authorized access
9
Contractual Provisions (3)
•Allow security audits and ethical hacking
•Data Manager as well as Project Manager?
•Do or will you have a Chief Data Officer?
10
New Approach to Security Attacks
• Current approach: have contractual security obligations and provide
penalties for failures
• However, penalties (called service credits) are generally capped
• Further, service credits may be only remedy
• Why this may not solve problem
• Solution: difference approach
– Model on bank/FBI cooperation against persistent attacks
– Switch from fighting over contract obligations to supplementing with
cooperation to gather information and use lessons learned to improve
security
Risk to plan is greater than contract litigation
11
Questions and Answers
William A. Tanenbaum
Head, IP & Technology Transactions Group
“Lawyer of the Year” in IT in NY in 2013
wtanenbaum@kayescholer.com
212-836-7661
12
William A Tanenbaum, Partner, Kaye Scholer
13
Bill Tanenbaum is the Head of the law firm Kaye Scholer’s multidisciplinary, multi-office IP &
Technology Transactions Group, which is ranked in the First Tier at the National Level by US News
& World Report/Best Lawyers. Bill was named “Lawyer of the Year 2013” in IT in NY by Best
Lawyers in America. He is ranked in Band One in Technology & Outsourcing in NY by Chambers,
America’s Leading Lawyers for Business, which found that he “built one of New York City’s most
outstanding transactional IT practices.” IP Law Experts Guide named Bill as “The Recommended IT
Lawyer in New York.” (Only a single attorney is designated in each state.) He is past President of
the International Technology Law Association and currently a VP of the Society for Information
Management (NY), a CIO industry association where he serves as the only lawyer on the Board.
Clients and peer attorneys say he is “one of the best IP attorneys I have worked with” (LMG
CleanTech Guide); “smart, practical, tactical and highly strategic,” “an effective
negotiator” (Chambers); “intellectual yet pragmatic” and “among the foremost IT licensing
experts and a leading authority on related issues such as data security, privacy and social media”
(World’s 250 Leading Patent and Technology Lawyers). His practice areas include outsourcing, IT,
offensive and defensive IP strategies, vendor management, data security and data flows, IT and IP
aspects of corporate transactions, technology agreements and licensing, Big Data in procurement
and supply chain management, and sustainability. He graduated from Brown University (Phi Beta
Kappa) and Cornell Law School.
14
Copyright ©2014 by Kaye Scholer LLP, 425 Park Avenue, New York, NY 10022-3598. All rights reserved. This publication is intended as a general guide only. It does not contain
a general legal analysis or constitute an opinion of Kaye Scholer LLP or any member of the firm on the legal issues described. It is recommended that readers not rely on this
general guide but that professional advice be sought in connection with individual matters. Attorney Advertising: Prior results do not guarantee future outcomes.
Offices Worldwide
15

More Related Content

What's hot

Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counselDan Michaluk
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy PresentationSarah Cortes
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 

What's hot (20)

Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 

Viewers also liked

Viewers also liked (13)

Data Breaches
Data BreachesData Breaches
Data Breaches
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Java Tutorial
Java TutorialJava Tutorial
Java Tutorial
 
Java basic
Java basicJava basic
Java basic
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Core java complete notes - Contact at +91-814-614-5674
Core java complete notes - Contact at +91-814-614-5674Core java complete notes - Contact at +91-814-614-5674
Core java complete notes - Contact at +91-814-614-5674
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
Core java slides
Core java slidesCore java slides
Core java slides
 
Java tutorial PPT
Java tutorial PPTJava tutorial PPT
Java tutorial PPT
 

Similar to How to Prevent IT Agreements from Causing Data Breaches

Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersLivin Jose
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 

Similar to How to Prevent IT Agreements from Causing Data Breaches (20)

Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centers
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 

More from William Tanenbaum

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualWilliam Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction William Tanenbaum
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost William Tanenbaum
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...William Tanenbaum
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...William Tanenbaum
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementWilliam Tanenbaum
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingWilliam Tanenbaum
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...William Tanenbaum
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumWilliam Tanenbaum
 

More from William Tanenbaum (20)

Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Next Generation Outsourcing: Revenue vs. Cost Reduction
Next Generation Outsourcing:  Revenue vs. Cost Reduction Next Generation Outsourcing:  Revenue vs. Cost Reduction
Next Generation Outsourcing: Revenue vs. Cost Reduction
 
Next Generation Outsourcing: Revenue vs. Cost
Next Generation Outsourcing:  Revenue vs. Cost Next Generation Outsourcing:  Revenue vs. Cost
Next Generation Outsourcing: Revenue vs. Cost
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...
 
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...IP Outsourcing  Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
IP Outsourcing Problems... Tanenbaum, wtanenbaum@kayescholer.com Kaye Schole...
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile ComputingSocial Business =Cloud + Big Data + Social Media + Mobile Computing
Social Business =Cloud + Big Data + Social Media + Mobile Computing
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
Key Intellectual Property Issues In Todays Outsourcing William A Tanenbaum So...
 
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A TanenbaumConvergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
Convergence Of Mainstream Business Big Data And Clean Tech William A Tanenbaum
 

How to Prevent IT Agreements from Causing Data Breaches

  • 1. How to Prevent IT Agreements from Causing Data Security Breaches William A. Tanenbaum Head, IP & Technology Transactions Group
  • 2. Role of IT in Data Security Breaches • 2013 Trustwave Global Security Report on 450 database breaches found that: – 63% due to third-party IT providers – IT providers’ practices caused security deficiencies easily exploited by hackers • Provider’s subcontractors are a common cause of breaches • Risks are increasing because the following lead to increased avenues for security attacks: – Cloud (which is not longer a disruptive technology) – Complex and evolving IT infrastructures with BYOD, mobile, etc. – Multi-vendor IT environment – Hidden sub-contracting and sub-outsourcing – Connected devices and Internet of Things 2
  • 3. Consequences of Security Breaches • Immediate IT remediation costs • Costs of revising IT infrastructure • Costs of payments to beneficiaries • Notification requirements under state law • Proceedings by State Attorneys General • Defending class action suits as private remedy for data security failures • Reputation harm • Reduced economic returns 3
  • 4. Common Causes of IT Security Problems • Cost of IT emphasized over potential cost of security failure • Providers are inappropriately forced, by price evaluations, to offer reduced security • Security protection is “baked in” to IT vendor’s product and service costs • IT staff does not have early role in procurement/outsourcing process • Lack of validation of providers’ RFP security responses • Provider security team does has not counterpart on customer team • Summary: Evaluation of proposed provider focus on costs and operational SLAs > security 4
  • 5. What do to with Existing Contracts • Conduct review of provisions (including SLAs) in existing IT and outsourcing agreements -- gap analysis • Audit business practices against contractual requirements • Audit old contract provisions against updated security policies • Identify potential deficiencies • Remediate through renegotiation (using liability as leverage) • Determine and implement what is needed from beneficiary side 5
  • 6. What do to with New Contracts (Overview) • Include up-to-date provisions in new agreements • Provisions that you should audit/review are the same that should be in agreements going forward 6
  • 7. Addressing Security Protection through Better Contracts • Determine appropriate data security standards based on policies, regulatory environment and obligations to beneficiaries and others • Determine appropriate objective security standards • Determine how to embody security compliance in IT/outsourcing agreements • Improve RFP and RFP evaluation process (and use leverage of RFP) – (and use an NDA) • Use down-select process to drill down into provider’s security capabilities • Add specific security exhibit to contract 7
  • 8. Contractual Provision Checklist • What will providers be required to do? – Enact data security program • Safeguards, procedures, controls for data, especially PII/customer data – Comply with existing future regulatory requirements • Design in future requirements – Comply with current ISO/IEC and other relevant standards • PCI/DISS requirements; PCI certification – Comply with customer policies • RFP establish and responses commit to adherence • Customer to establish proper criteria 8
  • 9. Contractual Provisions (2) • Comply with customer access, use, security tiers, etc. • Control and approve subcontractors – “hidden” outsourcing by providers for peak data loads • Appropriate encryption levels • Cybersecurity-specific SLAs, SOWs, etc. • SLA credits should not be exclusive remedies • “Declared Direct Damages” to prevent unrecoverable consequential damages, including data restoration • Combine DR with Force Majeure • Restrict remote data access • Control authorized access 9
  • 10. Contractual Provisions (3) •Allow security audits and ethical hacking •Data Manager as well as Project Manager? •Do or will you have a Chief Data Officer? 10
  • 11. New Approach to Security Attacks • Current approach: have contractual security obligations and provide penalties for failures • However, penalties (called service credits) are generally capped • Further, service credits may be only remedy • Why this may not solve problem • Solution: difference approach – Model on bank/FBI cooperation against persistent attacks – Switch from fighting over contract obligations to supplementing with cooperation to gather information and use lessons learned to improve security Risk to plan is greater than contract litigation 11
  • 12. Questions and Answers William A. Tanenbaum Head, IP & Technology Transactions Group “Lawyer of the Year” in IT in NY in 2013 wtanenbaum@kayescholer.com 212-836-7661 12
  • 13. William A Tanenbaum, Partner, Kaye Scholer 13 Bill Tanenbaum is the Head of the law firm Kaye Scholer’s multidisciplinary, multi-office IP & Technology Transactions Group, which is ranked in the First Tier at the National Level by US News & World Report/Best Lawyers. Bill was named “Lawyer of the Year 2013” in IT in NY by Best Lawyers in America. He is ranked in Band One in Technology & Outsourcing in NY by Chambers, America’s Leading Lawyers for Business, which found that he “built one of New York City’s most outstanding transactional IT practices.” IP Law Experts Guide named Bill as “The Recommended IT Lawyer in New York.” (Only a single attorney is designated in each state.) He is past President of the International Technology Law Association and currently a VP of the Society for Information Management (NY), a CIO industry association where he serves as the only lawyer on the Board. Clients and peer attorneys say he is “one of the best IP attorneys I have worked with” (LMG CleanTech Guide); “smart, practical, tactical and highly strategic,” “an effective negotiator” (Chambers); “intellectual yet pragmatic” and “among the foremost IT licensing experts and a leading authority on related issues such as data security, privacy and social media” (World’s 250 Leading Patent and Technology Lawyers). His practice areas include outsourcing, IT, offensive and defensive IP strategies, vendor management, data security and data flows, IT and IP aspects of corporate transactions, technology agreements and licensing, Big Data in procurement and supply chain management, and sustainability. He graduated from Brown University (Phi Beta Kappa) and Cornell Law School.
  • 14. 14
  • 15. Copyright ©2014 by Kaye Scholer LLP, 425 Park Avenue, New York, NY 10022-3598. All rights reserved. This publication is intended as a general guide only. It does not contain a general legal analysis or constitute an opinion of Kaye Scholer LLP or any member of the firm on the legal issues described. It is recommended that readers not rely on this general guide but that professional advice be sought in connection with individual matters. Attorney Advertising: Prior results do not guarantee future outcomes. Offices Worldwide 15

Editor's Notes

  1. Question: Is your service provider’s data security better than yours?