SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
The Business Case for
Cloud: Critical Legal,
Business & Diligence
Considerations
Presented by
Janine Anthony Bowen, Esq., CIPP/US
jbowen@jack-law.com
(678) 823-6611
December 7, 2012
Janine Anthony Bowen, Esq., CIPP/US
          Your Presenter

                                                       • With 2 degrees in Industrial Engineering
                                                         from Clemson University and almost a
                                                         decade working in technology
                                                         companies, Janine is an engineer-
                                                         turned-lawyer who knows technology,
                                                         intellectual property, and the law well.

                                                       • She specializes in helping her clients
                                                         negotiate technology deals with Fortune
                                                         500 companies.




©2012 Jack Attorneys & Advisors. All Rights Reserved                                                2
And JACK does what…

• Jack Attorneys & Advisors is the technology law boutique of choice
  for clients seeking an expert, pragmatic, high touch experience. We
  specialize in technology, privacy, cloud computing, mobile,
  intellectual property, and commercial contracts.
What’s the Cloud, really?




           http://www.fatcow.com/data-center/photos - You are allowed to copy, distribute, transmit the work and to adapt the work.
           Attribution is not required. You are prohibited from using this work in a stand alone manner.




©2012 Jack Attorneys & Advisors. All Rights Reserved                                                                                  4
Agenda


       I.           Business Considerations
       II.          Evaluation Considerations
       III. Privacy & Security Considerations
       IV. Contractual Considerations
       V. Concluding Thoughts




©2012 Jack Attorneys & Advisors. All Rights Reserved   5
Business Benefits of Cloud
          Computing

          • Cost
            Avoidance/Deferral

          • Improved
            Organizational Agility

          • Focus on Core
            Business rather than IT




©2012 Jack Attorneys & Advisors. All Rights Reserved   6
Cost Avoidance/Deferral – You Decide

          • Gartner says…IaaS isn’t less expensive, but it increases
            operational agility (1)
          • Computerworld says…Prepare for the real costs of cloud
            computing (2)
             – Moving and storing data, integrating apps from multiple
               vendors, testing software, rent & utilities
          • CIO says…CFOs and cloud computing have a love-hate
            relationship (3)
             – Variable pricing messes up cash flow projections
             – Capex vs. Opex
          • Booz Allen Hamilton says…savings range from 50% to 75% (4)
          • CloudU says…savings from 13% to 25% (5)




©2012 Jack Attorneys & Advisors. All Rights Reserved                     7
Cost Avoidance/Deferral – You Decide
          (cites)
           (1)       Lydia Leong, research VP at Gartner Group
                     http://www.formtek.com/blog/?p=2696, January 12th, 2012

           (2) “Preparing for the real costs of cloud computing” Computerworld
           http://www.computerworld.com/s/article/359383/The_Real_Costs_of_Cloud_C
           omputing

           (3) “Why CFOS and Cloud Computing Have a Love-Hate Relationship” CIO
           Magazine
           www.cio.com/article/print/702074

           (4) “The Economics of Cloud Computing”
           http://www.boozallen.com/media/file/Economics-of-Cloud-Computing.pdf

           (5) “Cloudonomics: The Economics of Cloud Computing”
           http://broadcast.rackspace.com/hosting_knowledge/whitepapers/Cloudonomics
           -The_Economics_of_Cloud_Computing.pdf


©2012 Jack Attorneys & Advisors. All Rights Reserved                                   8
Total Cost of Ownership
          Cost of Cloud

        • Cloud providers give
          transparent pricing based on
          different usage metrics – RAM,
          storage, bandwidth, among
          others
        • Pricing is frequently fixed per
          unit of time. Customers gain
          certainty over pricing and are
          then able to readily calculate
          costs based on several different
          usage estimates

        Source: Cloudonomics: The Economics of Cloud Computing, CloudU
        http://www.rackspace.com/knowledge_center/cloudu/curriculum


©2012 Jack Attorneys & Advisors. All Rights Reserved                     9
Total Costs of Ownership
          Hidden Cost of On-Premise Technology

         • The direct costs that accompany running a server: power,
           floor space, storage, and IT operations to manage those
           resources.
         • The indirect costs of running a server: network and storage
           infrastructure and IT operations to manage the general
           infrastructure.
         • The overhead costs of owning a server: procurement and
           accounting personnel, not to mention a critical resource in
           short supply: IT management and its attention.


        Source: Cloudonomics: The Economics of Cloud Computing, CloudU
        http://www.rackspace.com/knowledge_center/cloudu/curriculum


©2012 Jack Attorneys & Advisors. All Rights Reserved                     10
Improved Organizational Agility

       • Use of Public Clouds or Virtual Private Clouds give
         organizations the ability to scale up or down when necessary

       • IT expense can be matched to:
          – Seasonal or cyclical requirements
            – Organizational growth or decline
       • Mobile workforce/workplace solutions may improve
         organizational productivity

       • Cloud environments support experimentation and ability to
         fail with low penalty




©2012 Jack Attorneys & Advisors. All Rights Reserved                    11
Focus on Core Business

       • Organizations can focus on
         building the business they
         know

       • Organizations can leverage
         the best of breed in IT (and
         not try to be best of breed
         themselves)

       • Potentially better disaster
         recovery strategies utilizing
         cloud-based options




©2012 Jack Attorneys & Advisors. All Rights Reserved   12
Evaluating Cloud Options




©2012 Jack Attorneys & Advisors. All Rights Reserved   13
Preliminaries

       • The onus is on the customer to perform extensive
         evaluation of a cloud provider before entering into
         the relationship.
       • The nature of the cloud relationship drives the
         requirements of evaluation. Considerations
         include:
            – The criticality of the cloud implementation
            – The sensitivity of the data/processes being
              outsourced to the cloud provider
            – The scale of the implementation


©2012 Jack Attorneys & Advisors. All Rights Reserved           14
Checklist for Cloud Readiness

       •Business Drivers
                – Do you have staff working remotely?
                – Do you have plans to increase your IT infrastructure needs?
                – Is your infrastructure reaching end of life?
                – Are you constrained in terms of Capital Expenditure?
                – Does your organization have a high level of software
                  test/development?
                – Does your organization struggle to obtain IT talent internally?
                – Is 24*7 support important for your organization?

        Source: Appendix in “You Want to Put my Database Where? CloudU
        http://www.rackspace.com/knowledge_center/cloudu/curriculum


©2012 Jack Attorneys & Advisors. All Rights Reserved                                15
Checklist for Cloud Readiness

      •Technical Drivers
               – Is your application workload highly variable?
               – Do you need automatic infrastructure scaling and
                 provisioning?
               – Do you have a need for complex IT redundancy and
                 resiliency that you struggle to obtain internally?
               – Have you faced issues around IT security?




              Source: Appendix in “You Want to Put my Database Where? CloudU
              http://www.rackspace.com/knowledge_center/cloudu/curriculum


©2012 Jack Attorneys & Advisors. All Rights Reserved                           16
List of Potential Cloud Provider
          Evaluation Criteria

       Functionality of solution                       Pricing

       Uptime                                          Response time

       Quality of service                              Data Security/Privacy

       Backup and disaster recovery                    Customization capability

       Ability to personalize                          Integration with existing systems
       Data access                                     Customer service/support

       Adapted from “Evaluating SaaS Solutions: A Checklist for Small and Mid-sized Enterprises”
       http://www.saugatech.com/thoughtleadership/TL_October2009_Eval_SAP.pdf




©2012 Jack Attorneys & Advisors. All Rights Reserved                                               17
Evaluation Considerations:
          Disaster Recovery
            • How are backup systems architected?
               – Complete redundancy? Multiple redundancies? Duplicate
                 systems? Real-time backup?
            • Where are backup systems located geographically?

            • Are third party backup systems utilized (partially/totally)?

            • How long would a catastrophic event at a data center affect
              system availability?

            • Concerns for physical assets based on geography

            • Ultimately, whose responsibility is it anyway?




©2012 Jack Attorneys & Advisors. All Rights Reserved                         18
Evaluation Considerations:
          Transition Issues – Lock In

       • All the typical software
         migration issues
       • Plus:
          – Data ownership
             •Raw data
             •Resultant information
          – Professional services
            to migrate to new
            provider




©2012 Jack Attorneys & Advisors. All Rights Reserved   19
Privacy and Security




©2012 Jack Attorneys & Advisors. All Rights Reserved   20
4 Immutable Laws of Cloud Security
      • “These are things that will always be, things that will never change,
        and it is a state of being.”

           – First is an understanding that if your data is hosted in the cloud, you no
             longer directly control its privacy and protection.
           – when your data is burst into the cloud, you no longer directly control
             where the data resides or is processed.
           – if your security controls are not contractually committed to, then you may
             not have any legal standing in terms of the control over your data or your
             assets.
           – if you don't extend your current security policies and controls in the cloud
             computing platform, you're more than likely going to be compromised
           – Tari Schreider, HP chief architect of HP Technology Consulting and IT
             Assurance Practice.
           “Security and the Cloud: The Great Reconciliation”, eCommerce Times, 14 May 2012
           http://www.ecommercetimes.com/story/Security-and-the-Cloud-The-Great-
              Reconciliation-75094.html


©2012 Jack Attorneys & Advisors. All Rights Reserved                                          21
Issues with Cloud Computing:
          Privacy and Security
         • Data location issues
         • Location of users accessing data
         • Movement and storage of data
         • Use of subcontractors
         • Use of multiple platforms
         • Lack of transparency
           and control
         • Data breach issues
         • Data destruction issues
         • Ability to impose security and
           privacy requirements


©2012 Jack Attorneys & Advisors. All Rights Reserved   22
Regulatory Landscape:
          Data Privacy Compliance

       • State Information Security Laws
       • State Data Breach Laws
       • Gramm Leach Bliley
       • HIPAA/HITECH Act
       • Electronic Communications
         Privacy Act (Gov’t Access to
         Data)
       • USA PATRIOT Act (Gov’t
         Access to Data)



©2012 Jack Attorneys & Advisors. All Rights Reserved   23
Contractual Requirements:
          Gap Analysis




©2012 Jack Attorneys & Advisors. All Rights Reserved   24
Customer Needs vs. Vendor Offerings
                                Customer                           Public Cloud
                                Requirement
                                Response to data       Standardized offering, use of sub-
                                security incidents     processors and other limits may delay
                                                       discovery of breaches, and ability to
                                                       provide information regarding extent of
                                                       breach

                                Audit rights           Typically not available, especially not
                                                       for sub-processors

                                Proper disposal        No guarantee all data will be found and
                                and destruction of     erased or returned
                                data

                                Change Control         Provider may make changes without
                                                       notice or consent




©2012 Jack Attorneys & Advisors. All Rights Reserved                                             25
Customer Needs vs. Vendor Offerings

                                        Customer                 Public Cloud
                                       Requirement
                                       Established      Incorporation of additional
                                       Contract Terms   online terms, subject to change
                                                        by provider

                                       Provider has   Extremely limited liability
                                       some liability
                                       exposure for
                                       breaches and
                                       non-compliance

                                       Controls on      Standardized offering with use
                                       data and         of cloud provider controls
                                       security
                                       standards




©2012 Jack Attorneys & Advisors. All Rights Reserved                                      26
Liability Considerations – Vendor
          Perspective

       • For vendor, risk of data security breach is greatest risk
       • Multi-tenancy enables single breach incident to affect
         thousands of customers
       • Vendors must think through worst-case scenarios, and
         reevaluate as company grows and evolves
            – Types of harm
            – Damages available
            – Settlement values
            – Insurance coverage




©2012 Jack Attorneys & Advisors. All Rights Reserved                 27
Cloud is here to stay, so…

     • Plan for success and
       plan for failure.
     • Know and mitigate your
       business and
       technology risk.
     • There are no silver
       bullets, shortcuts, or
       easy answers.




©2012 Jack Attorneys & Advisors. All Rights Reserved   28
Q&A
          Contact Me

       • Janine Anthony Bowen, Esq., CIPP/US
          jbowen@jack-law.com
          www.linkedin.com/in/jdabowen

       • 678-823-6611

       • Twitter - @cloudlawyer

       • www.jack-law.com

       • Facebook – www.facebook.com/JackAttorneys

      JACK Attorneys & Advisors: Technology/IP Law & the Business of Technology - Quite Simply, We Get It.
©2012 Jack Attorneys & Advisors. All Rights Reserved                                                         29
©2012 Jack Attorneys & Advisors. All Rights Reserved   30

Mais conteúdo relacionado

Mais procurados

Helicopter Assessments - Improve your Customer Data Security!
Helicopter Assessments - Improve your Customer Data Security!Helicopter Assessments - Improve your Customer Data Security!
Helicopter Assessments - Improve your Customer Data Security!Dahamoo GmbH
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Livingstone Advisory
 
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Livingstone Advisory
 
The Replacement Rystem
The Replacement RystemThe Replacement Rystem
The Replacement RystemJohn Cachat
 
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery Axcient
 
Cloud con -financial-services---case-study-keynote-panel-slide
Cloud con -financial-services---case-study-keynote-panel-slideCloud con -financial-services---case-study-keynote-panel-slide
Cloud con -financial-services---case-study-keynote-panel-slidesatya evvus
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the gameLivingstone Advisory
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Axcient
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 
Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Lori Mankin
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologyCisco Canada
 
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011Eric D. Boyd
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionKurt Madel
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...Health Level Seven
 
Learning & Talent In The Cloud
Learning & Talent In The CloudLearning & Talent In The Cloud
Learning & Talent In The CloudDavid Wilson
 
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...Dion Hinchcliffe
 
Economics of the cloud
Economics of the cloudEconomics of the cloud
Economics of the cloudAvtex
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 

Mais procurados (20)

Helicopter Assessments - Improve your Customer Data Security!
Helicopter Assessments - Improve your Customer Data Security!Helicopter Assessments - Improve your Customer Data Security!
Helicopter Assessments - Improve your Customer Data Security!
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
 
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
Why the systemic risks in Enterprise Cloud Computing could cripple your busin...
 
The Replacement Rystem
The Replacement RystemThe Replacement Rystem
The Replacement Rystem
 
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery
 
Cloud con -financial-services---case-study-keynote-panel-slide
Cloud con -financial-services---case-study-keynote-panel-slideCloud con -financial-services---case-study-keynote-panel-slide
Cloud con -financial-services---case-study-keynote-panel-slide
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011
Understanding the Value of the Cloud - Centare Lunch & Learn - June 2, 2011
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General Session
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 
Cloud Adoption Toolkit
Cloud Adoption ToolkitCloud Adoption Toolkit
Cloud Adoption Toolkit
 
Learning & Talent In The Cloud
Learning & Talent In The CloudLearning & Talent In The Cloud
Learning & Talent In The Cloud
 
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...
Enterprise 2.0 Summit 2012 Closing Keynote - Next-Generation Ecosystems And i...
 
Economics of the cloud
Economics of the cloudEconomics of the cloud
Economics of the cloud
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
Brokerage presentation dec_susteit
Brokerage presentation dec_susteitBrokerage presentation dec_susteit
Brokerage presentation dec_susteit
 

Destaque

Florida surety assoc presentation 5-11-2010
Florida surety assoc presentation 5-11-2010Florida surety assoc presentation 5-11-2010
Florida surety assoc presentation 5-11-2010jreedcpa
 
Waspada Nasional 13 Agustus 2009
Waspada Nasional 13 Agustus 2009Waspada Nasional 13 Agustus 2009
Waspada Nasional 13 Agustus 2009epaper
 
W2 P Brugervejledning 1 1
W2 P Brugervejledning 1 1W2 P Brugervejledning 1 1
W2 P Brugervejledning 1 1guestf0923c
 
Back2 School Paola Powerpoint
Back2 School Paola PowerpointBack2 School Paola Powerpoint
Back2 School Paola Powerpointfran81503
 
Mortgage Market Meltdown V2
Mortgage Market Meltdown V2Mortgage Market Meltdown V2
Mortgage Market Meltdown V2Andre Williams
 
Meeting with investors of may 2013
Meeting with investors of may 2013Meeting with investors of may 2013
Meeting with investors of may 2013TIM RI
 
Results presentation
Results presentationResults presentation
Results presentationTIM RI
 
April 2011 Newsletter
April 2011 NewsletterApril 2011 Newsletter
April 2011 NewsletterKabir Luthra
 
Ll strategic plan update eng br gaap (sec)
Ll strategic plan update   eng br gaap (sec)Ll strategic plan update   eng br gaap (sec)
Ll strategic plan update eng br gaap (sec)TIM RI
 
Epaper5 Maret Aceh
Epaper5 Maret AcehEpaper5 Maret Aceh
Epaper5 Maret Acehepaper
 
130710 aceh
130710 aceh130710 aceh
130710 acehepaper
 
Welcome to Ms.P.'s Spanish II class
Welcome to Ms.P.'s Spanish II classWelcome to Ms.P.'s Spanish II class
Welcome to Ms.P.'s Spanish II classpotasz
 
Edisi 14
Edisi 14Edisi 14
Edisi 14epaper
 
21mei nas
21mei nas21mei nas
21mei nasepaper
 

Destaque (20)

Florida surety assoc presentation 5-11-2010
Florida surety assoc presentation 5-11-2010Florida surety assoc presentation 5-11-2010
Florida surety assoc presentation 5-11-2010
 
BAHCS Top Ten Services
BAHCS Top Ten ServicesBAHCS Top Ten Services
BAHCS Top Ten Services
 
Waspada Nasional 13 Agustus 2009
Waspada Nasional 13 Agustus 2009Waspada Nasional 13 Agustus 2009
Waspada Nasional 13 Agustus 2009
 
W2 P Brugervejledning 1 1
W2 P Brugervejledning 1 1W2 P Brugervejledning 1 1
W2 P Brugervejledning 1 1
 
SE Michigan PowerShell Users Group - Regex Part1
SE Michigan PowerShell Users Group -  Regex Part1SE Michigan PowerShell Users Group -  Regex Part1
SE Michigan PowerShell Users Group - Regex Part1
 
Back2 School Paola Powerpoint
Back2 School Paola PowerpointBack2 School Paola Powerpoint
Back2 School Paola Powerpoint
 
Hi, I'm Rafie
Hi, I'm RafieHi, I'm Rafie
Hi, I'm Rafie
 
Ebenezer
EbenezerEbenezer
Ebenezer
 
Mortgage Market Meltdown V2
Mortgage Market Meltdown V2Mortgage Market Meltdown V2
Mortgage Market Meltdown V2
 
Meeting with investors of may 2013
Meeting with investors of may 2013Meeting with investors of may 2013
Meeting with investors of may 2013
 
Results presentation
Results presentationResults presentation
Results presentation
 
April 2011 Newsletter
April 2011 NewsletterApril 2011 Newsletter
April 2011 Newsletter
 
Ll strategic plan update eng br gaap (sec)
Ll strategic plan update   eng br gaap (sec)Ll strategic plan update   eng br gaap (sec)
Ll strategic plan update eng br gaap (sec)
 
Epaper5 Maret Aceh
Epaper5 Maret AcehEpaper5 Maret Aceh
Epaper5 Maret Aceh
 
130710 aceh
130710 aceh130710 aceh
130710 aceh
 
Thermal polysaccharide
Thermal polysaccharideThermal polysaccharide
Thermal polysaccharide
 
Welcome to Ms.P.'s Spanish II class
Welcome to Ms.P.'s Spanish II classWelcome to Ms.P.'s Spanish II class
Welcome to Ms.P.'s Spanish II class
 
Edisi 14
Edisi 14Edisi 14
Edisi 14
 
21mei nas
21mei nas21mei nas
21mei nas
 
Airport survey results
Airport survey resultsAirport survey results
Airport survey results
 

Semelhante a Critical Legal, Business & Diligence Considerations for Cloud Computing

Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012Jonathan Houston
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing NowHudson IT
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing Loughtec
 
Implementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsImplementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsTom Stiehm
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssRex Wang
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventNexon Asia Pacific
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
Cloud computing Introductory Session
Cloud computing Introductory SessionCloud computing Introductory Session
Cloud computing Introductory SessionAbhinav Parmar
 

Semelhante a Critical Legal, Business & Diligence Considerations for Cloud Computing (20)

Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Implementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsImplementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projects
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
Jobs in the Cloud
 Jobs in the Cloud Jobs in the Cloud
Jobs in the Cloud
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC Event
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Cloud computing Introductory Session
Cloud computing Introductory SessionCloud computing Introductory Session
Cloud computing Introductory Session
 

Mais de Janine Anthony Bowen, Esq.

The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameJanine Anthony Bowen, Esq.
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 

Mais de Janine Anthony Bowen, Esq. (7)

Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Cloud Computing - Public Sector Opportunity
Cloud Computing - Public Sector OpportunityCloud Computing - Public Sector Opportunity
Cloud Computing - Public Sector Opportunity
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Critical Legal, Business & Diligence Considerations for Cloud Computing

  • 1. The Business Case for Cloud: Critical Legal, Business & Diligence Considerations Presented by Janine Anthony Bowen, Esq., CIPP/US jbowen@jack-law.com (678) 823-6611 December 7, 2012
  • 2. Janine Anthony Bowen, Esq., CIPP/US Your Presenter • With 2 degrees in Industrial Engineering from Clemson University and almost a decade working in technology companies, Janine is an engineer- turned-lawyer who knows technology, intellectual property, and the law well. • She specializes in helping her clients negotiate technology deals with Fortune 500 companies. ©2012 Jack Attorneys & Advisors. All Rights Reserved 2
  • 3. And JACK does what… • Jack Attorneys & Advisors is the technology law boutique of choice for clients seeking an expert, pragmatic, high touch experience. We specialize in technology, privacy, cloud computing, mobile, intellectual property, and commercial contracts.
  • 4. What’s the Cloud, really? http://www.fatcow.com/data-center/photos - You are allowed to copy, distribute, transmit the work and to adapt the work. Attribution is not required. You are prohibited from using this work in a stand alone manner. ©2012 Jack Attorneys & Advisors. All Rights Reserved 4
  • 5. Agenda I. Business Considerations II. Evaluation Considerations III. Privacy & Security Considerations IV. Contractual Considerations V. Concluding Thoughts ©2012 Jack Attorneys & Advisors. All Rights Reserved 5
  • 6. Business Benefits of Cloud Computing • Cost Avoidance/Deferral • Improved Organizational Agility • Focus on Core Business rather than IT ©2012 Jack Attorneys & Advisors. All Rights Reserved 6
  • 7. Cost Avoidance/Deferral – You Decide • Gartner says…IaaS isn’t less expensive, but it increases operational agility (1) • Computerworld says…Prepare for the real costs of cloud computing (2) – Moving and storing data, integrating apps from multiple vendors, testing software, rent & utilities • CIO says…CFOs and cloud computing have a love-hate relationship (3) – Variable pricing messes up cash flow projections – Capex vs. Opex • Booz Allen Hamilton says…savings range from 50% to 75% (4) • CloudU says…savings from 13% to 25% (5) ©2012 Jack Attorneys & Advisors. All Rights Reserved 7
  • 8. Cost Avoidance/Deferral – You Decide (cites) (1) Lydia Leong, research VP at Gartner Group http://www.formtek.com/blog/?p=2696, January 12th, 2012 (2) “Preparing for the real costs of cloud computing” Computerworld http://www.computerworld.com/s/article/359383/The_Real_Costs_of_Cloud_C omputing (3) “Why CFOS and Cloud Computing Have a Love-Hate Relationship” CIO Magazine www.cio.com/article/print/702074 (4) “The Economics of Cloud Computing” http://www.boozallen.com/media/file/Economics-of-Cloud-Computing.pdf (5) “Cloudonomics: The Economics of Cloud Computing” http://broadcast.rackspace.com/hosting_knowledge/whitepapers/Cloudonomics -The_Economics_of_Cloud_Computing.pdf ©2012 Jack Attorneys & Advisors. All Rights Reserved 8
  • 9. Total Cost of Ownership Cost of Cloud • Cloud providers give transparent pricing based on different usage metrics – RAM, storage, bandwidth, among others • Pricing is frequently fixed per unit of time. Customers gain certainty over pricing and are then able to readily calculate costs based on several different usage estimates Source: Cloudonomics: The Economics of Cloud Computing, CloudU http://www.rackspace.com/knowledge_center/cloudu/curriculum ©2012 Jack Attorneys & Advisors. All Rights Reserved 9
  • 10. Total Costs of Ownership Hidden Cost of On-Premise Technology • The direct costs that accompany running a server: power, floor space, storage, and IT operations to manage those resources. • The indirect costs of running a server: network and storage infrastructure and IT operations to manage the general infrastructure. • The overhead costs of owning a server: procurement and accounting personnel, not to mention a critical resource in short supply: IT management and its attention. Source: Cloudonomics: The Economics of Cloud Computing, CloudU http://www.rackspace.com/knowledge_center/cloudu/curriculum ©2012 Jack Attorneys & Advisors. All Rights Reserved 10
  • 11. Improved Organizational Agility • Use of Public Clouds or Virtual Private Clouds give organizations the ability to scale up or down when necessary • IT expense can be matched to: – Seasonal or cyclical requirements – Organizational growth or decline • Mobile workforce/workplace solutions may improve organizational productivity • Cloud environments support experimentation and ability to fail with low penalty ©2012 Jack Attorneys & Advisors. All Rights Reserved 11
  • 12. Focus on Core Business • Organizations can focus on building the business they know • Organizations can leverage the best of breed in IT (and not try to be best of breed themselves) • Potentially better disaster recovery strategies utilizing cloud-based options ©2012 Jack Attorneys & Advisors. All Rights Reserved 12
  • 13. Evaluating Cloud Options ©2012 Jack Attorneys & Advisors. All Rights Reserved 13
  • 14. Preliminaries • The onus is on the customer to perform extensive evaluation of a cloud provider before entering into the relationship. • The nature of the cloud relationship drives the requirements of evaluation. Considerations include: – The criticality of the cloud implementation – The sensitivity of the data/processes being outsourced to the cloud provider – The scale of the implementation ©2012 Jack Attorneys & Advisors. All Rights Reserved 14
  • 15. Checklist for Cloud Readiness •Business Drivers – Do you have staff working remotely? – Do you have plans to increase your IT infrastructure needs? – Is your infrastructure reaching end of life? – Are you constrained in terms of Capital Expenditure? – Does your organization have a high level of software test/development? – Does your organization struggle to obtain IT talent internally? – Is 24*7 support important for your organization? Source: Appendix in “You Want to Put my Database Where? CloudU http://www.rackspace.com/knowledge_center/cloudu/curriculum ©2012 Jack Attorneys & Advisors. All Rights Reserved 15
  • 16. Checklist for Cloud Readiness •Technical Drivers – Is your application workload highly variable? – Do you need automatic infrastructure scaling and provisioning? – Do you have a need for complex IT redundancy and resiliency that you struggle to obtain internally? – Have you faced issues around IT security? Source: Appendix in “You Want to Put my Database Where? CloudU http://www.rackspace.com/knowledge_center/cloudu/curriculum ©2012 Jack Attorneys & Advisors. All Rights Reserved 16
  • 17. List of Potential Cloud Provider Evaluation Criteria Functionality of solution Pricing Uptime Response time Quality of service Data Security/Privacy Backup and disaster recovery Customization capability Ability to personalize Integration with existing systems Data access Customer service/support Adapted from “Evaluating SaaS Solutions: A Checklist for Small and Mid-sized Enterprises” http://www.saugatech.com/thoughtleadership/TL_October2009_Eval_SAP.pdf ©2012 Jack Attorneys & Advisors. All Rights Reserved 17
  • 18. Evaluation Considerations: Disaster Recovery • How are backup systems architected? – Complete redundancy? Multiple redundancies? Duplicate systems? Real-time backup? • Where are backup systems located geographically? • Are third party backup systems utilized (partially/totally)? • How long would a catastrophic event at a data center affect system availability? • Concerns for physical assets based on geography • Ultimately, whose responsibility is it anyway? ©2012 Jack Attorneys & Advisors. All Rights Reserved 18
  • 19. Evaluation Considerations: Transition Issues – Lock In • All the typical software migration issues • Plus: – Data ownership •Raw data •Resultant information – Professional services to migrate to new provider ©2012 Jack Attorneys & Advisors. All Rights Reserved 19
  • 20. Privacy and Security ©2012 Jack Attorneys & Advisors. All Rights Reserved 20
  • 21. 4 Immutable Laws of Cloud Security • “These are things that will always be, things that will never change, and it is a state of being.” – First is an understanding that if your data is hosted in the cloud, you no longer directly control its privacy and protection. – when your data is burst into the cloud, you no longer directly control where the data resides or is processed. – if your security controls are not contractually committed to, then you may not have any legal standing in terms of the control over your data or your assets. – if you don't extend your current security policies and controls in the cloud computing platform, you're more than likely going to be compromised – Tari Schreider, HP chief architect of HP Technology Consulting and IT Assurance Practice. “Security and the Cloud: The Great Reconciliation”, eCommerce Times, 14 May 2012 http://www.ecommercetimes.com/story/Security-and-the-Cloud-The-Great- Reconciliation-75094.html ©2012 Jack Attorneys & Advisors. All Rights Reserved 21
  • 22. Issues with Cloud Computing: Privacy and Security • Data location issues • Location of users accessing data • Movement and storage of data • Use of subcontractors • Use of multiple platforms • Lack of transparency and control • Data breach issues • Data destruction issues • Ability to impose security and privacy requirements ©2012 Jack Attorneys & Advisors. All Rights Reserved 22
  • 23. Regulatory Landscape: Data Privacy Compliance • State Information Security Laws • State Data Breach Laws • Gramm Leach Bliley • HIPAA/HITECH Act • Electronic Communications Privacy Act (Gov’t Access to Data) • USA PATRIOT Act (Gov’t Access to Data) ©2012 Jack Attorneys & Advisors. All Rights Reserved 23
  • 24. Contractual Requirements: Gap Analysis ©2012 Jack Attorneys & Advisors. All Rights Reserved 24
  • 25. Customer Needs vs. Vendor Offerings Customer Public Cloud Requirement Response to data Standardized offering, use of sub- security incidents processors and other limits may delay discovery of breaches, and ability to provide information regarding extent of breach Audit rights Typically not available, especially not for sub-processors Proper disposal No guarantee all data will be found and and destruction of erased or returned data Change Control Provider may make changes without notice or consent ©2012 Jack Attorneys & Advisors. All Rights Reserved 25
  • 26. Customer Needs vs. Vendor Offerings Customer Public Cloud Requirement Established Incorporation of additional Contract Terms online terms, subject to change by provider Provider has Extremely limited liability some liability exposure for breaches and non-compliance Controls on Standardized offering with use data and of cloud provider controls security standards ©2012 Jack Attorneys & Advisors. All Rights Reserved 26
  • 27. Liability Considerations – Vendor Perspective • For vendor, risk of data security breach is greatest risk • Multi-tenancy enables single breach incident to affect thousands of customers • Vendors must think through worst-case scenarios, and reevaluate as company grows and evolves – Types of harm – Damages available – Settlement values – Insurance coverage ©2012 Jack Attorneys & Advisors. All Rights Reserved 27
  • 28. Cloud is here to stay, so… • Plan for success and plan for failure. • Know and mitigate your business and technology risk. • There are no silver bullets, shortcuts, or easy answers. ©2012 Jack Attorneys & Advisors. All Rights Reserved 28
  • 29. Q&A Contact Me • Janine Anthony Bowen, Esq., CIPP/US jbowen@jack-law.com www.linkedin.com/in/jdabowen • 678-823-6611 • Twitter - @cloudlawyer • www.jack-law.com • Facebook – www.facebook.com/JackAttorneys JACK Attorneys & Advisors: Technology/IP Law & the Business of Technology - Quite Simply, We Get It. ©2012 Jack Attorneys & Advisors. All Rights Reserved 29
  • 30. ©2012 Jack Attorneys & Advisors. All Rights Reserved 30