Protecting your Managed Services Practice: Are you at Risk?

Slides:



Advertisements
Similar presentations
Peter Francis Partner at FAL Lawyers Peter Francis Partner at FAL Lawyers.
Advertisements

Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Presented by: David S. Bland LeBlanc Bland, P.L.L.C St. James Pl., Suite 360 Houston, Texas (713) MANAGING RISKS THROUGH CONTRACTUAL.
Intellectual Property Considerations in Joint Development Agreements Presented by H. Eric Fisher, Ph.D. Eckert Seamans Cherin & Mellott, LLC Continuing.
Fosterswift.com PROTECTING AGAINST THE UNKNOWN : How to Successfully Review IT Contracts to Increase Your Rights and Avoid Potential Liability Samuel Frederick.
Professional Behaviour
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Session 3 – Information Security Policies
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Mergers & Acquisitions For Managed Service Providers Robert J. Scott Scott & Scott, LLP
Cern.ch/knowledgetransfer. Knowledge Transfer | Accelerating Innovation Charlyne Rabe CONTRACTS FOR TECHNOLOGY TRANSFER Charlyne RABE KT Legal Advisor.
Consultancy.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
G17: Recordkeeping for Business Activities Carried out by Contractors Patrick Power, Manager Government Recordkeeping Programme Archives New Zealand.
Middleware Promises Warranties that Don’t Indemnities that Won’t Stephen Rubin, Esquire
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Implications of the Markets in Financial Instruments Directive (“MIFID”) Richard Thompson.
Technology-Business-Legal Some Critical Intersections Getting Started Legally IP Protection Licensing Mark J. Sever, Jr., Esquire Deborah A. Hays, Esquire.
May 27, 2010 IP Committee Meeting ‘Quick Hit’: IP Due Diligence from the Seller’s Perspective.
A high-level and hands-on approach for organizations to deal with counterfeiting and piracy. Jan Corstens WIPO Moscow
Alliance Agreements Business Alliance Mahidol University International College.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Protecting Your Software and Other Technology: Trademarks, Trade Secrets, Copyrights and Patents.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Strategic Alliances How to Structure, Negotiate, and Implement Successful Alliances February 11, 2003 Debra J. Dorfman Copyright © 2003 by Hale and Dorr.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Custom Software Development Intellectual Property and Other Key Issues © 2006 Jeffrey W. Nelson and Iowa Department of Justice (Attach G)
Developing Value through Intellectual Property November 6, 2013 SALT LAKE CITY 1 Developing Value through Intellectual Property Loren R. Hulse Partner,
ETHICS, POLICY & SECURITY ISSUES
Elements of a Workable Intellectual Property Policy OPIC IP Roundtable Noel Courage Bereskin & Parr November 21, 2007.
Guide - Recordkeeping for business activities carried out by contractors Natalie Dewson Senior Advisor Government Recordkeeping Programme Archives New.
RPA1 Standard Bidding Documents for the Supply and Installation of Information Systems General Conditions of Contract and Special Conditions of Contract.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
LEGAL ISSUES IN CLOUD COMPUTING
Preparing your Managed Services Business for Sale Robert J. Scott Managing Partnerwww.scottandscottllp.com Scott & Scott, LLP.
 2015 Lando & Anastasi, LLP Do Patents Matter? And other IP Issues and Opportunities Peter C. Lando February 21, 2015.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Moscow, Russia, 10 September 2012 HSE Intellectual Property Policy Aliya Ermakova, Head of IP Department, Innovation and Enterprise Office, HSE
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Intellectual Property at USC October 27, 2003 Dr. Michael Muthig.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
February,  On October 23, 2015 the Commodity Futures Trading Commission (“CFTC”)approved National Futures Association’s (“NFA”) interpretive notice.
Key Legal Considerations for Agencies Wake Forest Business School Charlotte Campus June 12, 2013.
Hot Topics in Technology Transactions Presented by: Robert J. Scott
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
Service Design.
Mark Kaufmann. Objectives Share and discuss common tips and traps and ways to address Identify strategies for various vendor “ploys” Reality Check Negotiations.
Intellectual Property The Underdog of the Business World For More Details Please Visit:
Ogletree, Deakins, Nash, Smoak & Stewart PC
MANAGING intellectual property ASSETS
Intellectual Property Owner’s Manual
Preparing Your Managed Services Business for Sale
UNCITRALThird International Colloquium on Public-Private Partnerships (PPPs) October 2017, Vienna Experts for Chapter IV October 2017.
Information Security based on International Standard ISO 27001
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity compliance for attorneys
Model Contract for Health
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Legal Requirements for a Startup In the Startup Business Environment in India, a startup needs to keep track of the Regulatory Environment, Tax Regimes,
Presentation transcript:

Protecting your Managed Services Practice: Are you at Risk?

Sources of Risk Competitors Customers Vendors and Channel partners Employees Other

Risk Management Effective risk management relies on an integrated approach to identifying and addressing the various sources of risk and on implementing consistent, intuitive, and easily repeatable processes to manage and mitigate the risk Three primary tools to manage risk: –Policies and procedures –Contracts –Intellectual Property (IP) registration and enforcement

Risk Sources and Responses: Competitors Primary risk focus: IP – brand dilution and loss of business Primary response: Registration, monitoring and enforcement of trademarks and copyrightable content Secondary response: Internal policies and appropriate contractual terms with employees and vendors regarding any trade secrets

Risk Sources and Responses: Customers Primary risk focus: Professional liability and contract disputes Primary response: Clear and consistent service agreements that specify both parties’ obligations and manage expectations. Agreements should include, among many other things: –Detailed descriptions of service levels –Provisions for indemnification and limitation of liability that are consistent with insurance coverage –Force majeure clause that is appropriate for MSPs Secondary response: Professional liability coverage that is tailored to MSPs and the MSP industry

Risk Sources and Responses: Customers (continued) Secondary Risk focus: IP – liability and/or loss of business Primary response: Where appropriate, service agreements also should specify ownership rights regarding any copyrightable content developed during the course of the relationship Secondary response: Confidentiality, anti-reverse engineering, and other contract provisions to prevent loss of trade secrets

Risk Sources and Responses: Vendors and Channel Partners Primary risk focus: IP liability and contract disputes Primary response: Regular, periodic inventory of software deployed internally and on behalf of customers to ensure compliance with applicable agreements Secondary response: Careful review of and, where appropriate, negotiations to revise applicable agreements

Risk Sources and Responses: Vendors and Channel Partners (continued) Secondary risk focus: IP – loss of business Primary response: Confidentiality and other contract provisions to prevent loss of trade secrets Secondary response: Appropriate internal policies and procedures to control vendors’ access to trade secrets and development projects

Risk Sources and Responses: Employees Primary risk focus: IP – liability and/or loss of business Primary response: Employees should be bound under agreements including provisions for confidentiality (both as to internal and client materials) and competition during and following employment Secondary response: Internal policies and procedures should be developed, implemented, distributed and updated on a regular basis, covering, among many other things: –Appropriate use of and access to IT infrastructure –Appropriate use of licensed software –Appropriate access to and disclosures regarding trade secrets

Other Risk Sources Weather and natural disasters: –MSP-appropriate force majeure provision to manage risks from client to client –Written and regularly reviewed and updated policies and procedures for disaster recovery –Insurance Third parties: –Written and regularly reviewed and updated policies and procedures for site security and employee access –Technological countermeasures for remote network intrusions –Insurance

An Integrated Approach Ensuring consistency across all risk management responses is as important as the details pertaining to each risk source –Example: Strong protections for trade secrets in relationships with customers and vendors may be worthless if the secrets are not adequately protected internally, both in terms of policies for access and use as well as physical and technological safeguards –Another example: Insurance is always a good idea, but its value is diminished if customers receive no benefit

QUESTIONS?