SlideShare uma empresa Scribd logo
1 de 12
Satya S. Narayan
SNarayan@rroyselaw.com
Phone: 650.521.5745
July 29, 2013
Legal Challenges for Big Data Companies
Volume
12 tb of tweets converted per day
Velocity
5 million trade events analyzed per day
to detect fraud
Variety
100s of live video feeds monitored to
target points of interest
Veracity
Connecting different data points to
facilitate decision making
BIG
DATA
“Big Data is a term that describes large volumes of high
velocity, complex, and variable data that requires advanced techniques
and technologies to enable the
capture, storage, distribution, management, and analysis of the
information.” - TechAmerican Foundation.
 Data privacy and security
 Compliance issues
 Service levels
 Reliability and other warranties
 Indemnification and Limitations of Liability
Key Legal Concerns
 Personal information “is any information about an individual maintained by
an agency, including (1) any information that can be used to distinguish or
trace an individual„s identity, such as name, social security number, date
and place of birth, mother„s maiden name, or biometric records; and (2)
any other information that is linked or linkable to an individual, such as
medical, educational, financial, and employment information." – National
Institute of Standards and Technology
 Data handling permissions; usage restrictions
 End user’s permission
 Fair Credit Reporting Act
 Consumer’s right to correct personal information
 Do Not Track v. Do Not Collect debate
 Is de-identification/ anonymization of data done properly to prevent re-
identification
 Whose privacy policy should apply?
 Is Customer’s privacy policy too restrictive?
 What permissions does Customer need to obtain from end users?
Data Privacy
 “Reasonable/ appropriate” security measures – not good enough
 Whose privacy policy and security policy should apply?
 Customer’s data security questionnaires and data privacy
schedules
 Security audits
 Data security related potential costs and can these costs be
shared?
 Data security breach costs
 Implementation costs of new security measures
 Security audit costs
 To what extent should Customer be responsible for data security
and privacy issues?
 Who bears the risk of a “no-fault” breach?
Data Security
 What is the Provider’s role in data-related compliance?
 Data privacy and security
 E-discovery and document preservation
 Regulatory compliance in specific industries (for
example, pharma and automotive industries; banks)
Compliance issues
 What performance guarantees should a Provider give?
 Uptime, throughput, mean-time-to-
restore, latency, and bandwidth guarantees
 Customer may ask for warranties
 Criticality of service to Customer’s end-user
interactions
 Limitations/ exclusions (for example, Provider’s hosting
provider’s failures)
 Remedies
 Service credits; fixing the issue; contract termination
 Are your remedies exclusive?
 Is payment of service credits automatic?
 Customer duties and responsibilities
Service Levels
 Warranties
 Data accuracy and completeness?
 Software performance?
 Warranties implied by law
 Exclusions
 Disclaimer
Reliability and Other Warranties
 Provider indemnification:
 Breach of privacy or security?
 Third-party intellectual property infringement?
 Customer’s customer issues (for example, from a
breach of a service level)?
 Exclusions
 Should the Customer indemnify the Provider?
 Limitations on Provider’s liability:
 Consequential damages disclaimer (for example, lost
profits of Customer arising from a data security breach)
 Caps on liability
 Exclusions from liability limitations
 Insurance
Indemnification & Limitations of Liability
 Post-termination transition/ migration assistance
 Return of Customer data
 Source code/technology escrow
 Business continuity/exit plans
 Change of control consent/ notice
Additional Customer Asks
As a Provider, pay close attention to:
 obtaining adequate data permissions
 proper de-identification/ anonymization of data
 specifying a uniform security standard
 specifying uniform service levels and remedies
 assessing risks and developing a playbook for
warranty, indemnity, and liability negotiations; identify
your maximum risk undertaking threshold
 obtain adequate insurance
 watch for new FTC and privacy legislation and guidance
Concluding Comments
PALO ALTO
1717 Embarcadero Road
Palo Alto, CA 94303
LOS ANGELES
11150 Santa Monica Blvd.,
Suite 1200
Los Angeles, CA 90025
SAN FRANCISCO
135 Main Street,
12th Floor
San Francisco, CA 94105
Satya S. Narayan
SNarayan@rroyselaw.com
Phone: 650.521.5745
Royse Law Practice Areas
Corporate Securities
Tax
Mergers & Acquisitions
Fund Services
Intellectual Property
Technology Transactions
Labor & Employment
Immigration
Litigation
Estate, Trust & Wealth Strategy
Real Estate
International

Mais conteúdo relacionado

Mais procurados

Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Jason Glass, CFA, CISSP
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
sallychiu
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011
bodekn
 

Mais procurados (20)

California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems Overview
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Half the Picture
Half the PictureHalf the Picture
Half the Picture
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Task 3
Task 3Task 3
Task 3
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Verittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of CapabilitiesVerittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of Capabilities
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011
 

Destaque

Destaque (6)

Big Data and Its Impacts on the Legal Profession
 Big Data and Its Impacts on the Legal Profession Big Data and Its Impacts on the Legal Profession
Big Data and Its Impacts on the Legal Profession
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 

Semelhante a Legal challenges of big data

Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
guestd7fc9c
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 

Semelhante a Legal challenges of big data (20)

#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 

Mais de Roger Royse

Mais de Roger Royse (20)

Startup Law ACBA.pptx
Startup Law ACBA.pptxStartup Law ACBA.pptx
Startup Law ACBA.pptx
 
Startup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptxStartup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptx
 
2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.ppt2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.ppt
 
Funding 101 02022022.pptx
Funding 101 02022022.pptxFunding 101 02022022.pptx
Funding 101 02022022.pptx
 
Royse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptxRoyse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptx
 
Idea to ipo funding 101 royse - august 11 2020
Idea to ipo funding 101   royse - august 11 2020Idea to ipo funding 101   royse - august 11 2020
Idea to ipo funding 101 royse - august 11 2020
 
Idea to ipo venture capital startup royse - may 10 2020
Idea to ipo venture capital startup   royse - may 10 2020Idea to ipo venture capital startup   royse - may 10 2020
Idea to ipo venture capital startup royse - may 10 2020
 
Legal overview star camp royse - may 2020 4839-7571-5260-1
Legal overview star camp   royse - may 2020 4839-7571-5260-1Legal overview star camp   royse - may 2020 4839-7571-5260-1
Legal overview star camp royse - may 2020 4839-7571-5260-1
 
M&A Tax for 2019
M&A Tax for 2019M&A Tax for 2019
M&A Tax for 2019
 
199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)
 
Crowdfunding crypto - ic os march 12 2018
Crowdfunding   crypto - ic os march 12 2018Crowdfunding   crypto - ic os march 12 2018
Crowdfunding crypto - ic os march 12 2018
 
Federal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and HatchFederal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and Hatch
 
Federal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax WorkshopFederal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax Workshop
 
Top 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs MakeTop 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs Make
 
SAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent AllocationsSAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent Allocations
 
The Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee TestimonyThe Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee Testimony
 
The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...
 
InBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for AcceleratorInBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for Accelerator
 
Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)
 
Code Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock SalesCode Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock Sales
 

Último

Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Último (20)

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Legal challenges of big data

  • 1. Satya S. Narayan SNarayan@rroyselaw.com Phone: 650.521.5745 July 29, 2013 Legal Challenges for Big Data Companies
  • 2. Volume 12 tb of tweets converted per day Velocity 5 million trade events analyzed per day to detect fraud Variety 100s of live video feeds monitored to target points of interest Veracity Connecting different data points to facilitate decision making BIG DATA “Big Data is a term that describes large volumes of high velocity, complex, and variable data that requires advanced techniques and technologies to enable the capture, storage, distribution, management, and analysis of the information.” - TechAmerican Foundation.
  • 3.  Data privacy and security  Compliance issues  Service levels  Reliability and other warranties  Indemnification and Limitations of Liability Key Legal Concerns
  • 4.  Personal information “is any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual„s identity, such as name, social security number, date and place of birth, mother„s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." – National Institute of Standards and Technology  Data handling permissions; usage restrictions  End user’s permission  Fair Credit Reporting Act  Consumer’s right to correct personal information  Do Not Track v. Do Not Collect debate  Is de-identification/ anonymization of data done properly to prevent re- identification  Whose privacy policy should apply?  Is Customer’s privacy policy too restrictive?  What permissions does Customer need to obtain from end users? Data Privacy
  • 5.  “Reasonable/ appropriate” security measures – not good enough  Whose privacy policy and security policy should apply?  Customer’s data security questionnaires and data privacy schedules  Security audits  Data security related potential costs and can these costs be shared?  Data security breach costs  Implementation costs of new security measures  Security audit costs  To what extent should Customer be responsible for data security and privacy issues?  Who bears the risk of a “no-fault” breach? Data Security
  • 6.  What is the Provider’s role in data-related compliance?  Data privacy and security  E-discovery and document preservation  Regulatory compliance in specific industries (for example, pharma and automotive industries; banks) Compliance issues
  • 7.  What performance guarantees should a Provider give?  Uptime, throughput, mean-time-to- restore, latency, and bandwidth guarantees  Customer may ask for warranties  Criticality of service to Customer’s end-user interactions  Limitations/ exclusions (for example, Provider’s hosting provider’s failures)  Remedies  Service credits; fixing the issue; contract termination  Are your remedies exclusive?  Is payment of service credits automatic?  Customer duties and responsibilities Service Levels
  • 8.  Warranties  Data accuracy and completeness?  Software performance?  Warranties implied by law  Exclusions  Disclaimer Reliability and Other Warranties
  • 9.  Provider indemnification:  Breach of privacy or security?  Third-party intellectual property infringement?  Customer’s customer issues (for example, from a breach of a service level)?  Exclusions  Should the Customer indemnify the Provider?  Limitations on Provider’s liability:  Consequential damages disclaimer (for example, lost profits of Customer arising from a data security breach)  Caps on liability  Exclusions from liability limitations  Insurance Indemnification & Limitations of Liability
  • 10.  Post-termination transition/ migration assistance  Return of Customer data  Source code/technology escrow  Business continuity/exit plans  Change of control consent/ notice Additional Customer Asks
  • 11. As a Provider, pay close attention to:  obtaining adequate data permissions  proper de-identification/ anonymization of data  specifying a uniform security standard  specifying uniform service levels and remedies  assessing risks and developing a playbook for warranty, indemnity, and liability negotiations; identify your maximum risk undertaking threshold  obtain adequate insurance  watch for new FTC and privacy legislation and guidance Concluding Comments
  • 12. PALO ALTO 1717 Embarcadero Road Palo Alto, CA 94303 LOS ANGELES 11150 Santa Monica Blvd., Suite 1200 Los Angeles, CA 90025 SAN FRANCISCO 135 Main Street, 12th Floor San Francisco, CA 94105 Satya S. Narayan SNarayan@rroyselaw.com Phone: 650.521.5745 Royse Law Practice Areas Corporate Securities Tax Mergers & Acquisitions Fund Services Intellectual Property Technology Transactions Labor & Employment Immigration Litigation Estate, Trust & Wealth Strategy Real Estate International