Presentation is loading. Please wait.

Presentation is loading. Please wait.

Foundational Topics Overview

Similar presentations


Presentation on theme: "Foundational Topics Overview"— Presentation transcript:

1 Foundational Topics Overview
April 2015

2 DAY 1 MORNING – FOUNDATIONAL TOPICS
Agenda DAY 1 MORNING – FOUNDATIONAL TOPICS Welcome & Agenda Review Introductions Introduction to DoD ESI Information Technology (IT) Industry Overview & Ecosystem Intellectual Property (IP) Introductory Concepts Privity / Software Publisher & Reseller Contracting Methods Software Publisher Products and Services & Source Code Escrow

3 CORE ELEMENTS OF A SOFTWARE LICENSE AGREEMENT
Agenda DAY 1 AFTERNOON – Preparing for the Acquisition – Team Approach Preparing for Negotiations – Strategic Guidance CORE ELEMENTS OF A SOFTWARE LICENSE AGREEMENT License Grant

4 CORE ELEMENTS OF A SOFTWARE LICENSE AGREEMENT (cont.)
Agenda DAY 2 CORE ELEMENTS OF A SOFTWARE LICENSE AGREEMENT (cont.) Pricing and License Models Warranty Maintenance and Support General Provisions Panel Discussion / Open Topics from the Class & Parking Lot Exercise

5 DoD ESI Team / Instructor Introductions
Dee Wardle | Software Licensing SME, Contract Support to DoD ESI 30+ year expert in software licensing for DoD Services and Agencies mostly with the U.S. Army. Former Software Division Chief for the Computer Hardware Enterprise Software & Solutions (CHESS) Program and Program Executive Office Enterprise Information Systems (PEO EIS). Served Federal SmartBUY Programs and the DoD ESI Program. Suzi Ellison| Enterprise Agreements Manager Over 25 years of engineering, acquisition and leadership experience with U.S. Navy combat systems and subsystems. Navy Lead SPM for DoD ESI. Program Manager for the IT Umbrella Program. Experienced in system acquisition and life cycle planning of Navy programs including all phases of program management, budget preparation and execution. John Zettler | Pricing & Contract SME, Contract Support to DoD ESI 30+ years in government contract costing, pricing, and program financial management, with particular expertise in IT services and enterprise software acquisition. Six years at Oracle Federal and two years at Informix Federal. Pricing, Business Approval, and Contracts experience across six different vertical industries.

6 DoD ESI Team / Instructor Introductions
Dan McMullan | Acquisition Planning Lead - Contract Support to DoD ESI 10 years military service with USMC; 15 years with DON as contracting officer specializing in IT acquisition. Supported DoD ESI since 2008. BuySide principal since July 2014. Chris Panaro | Managing Partner BuySide Partners, LLC - Contract Support to DoD ESI 25+ years in drafting and negotiating IT contracts, formerly with systems integrators and software development firms. Helping IT buyers since 1999. Supported DoD ESI since 2002.

7 Time Management Guidelines
Many topics to cover in short amount of time We strive to stay on time We encourage questions and interactivity Recognize that fellow students have different roles, level of experience, and interests Time Czar will announce cut off points Off-topic or abundance of questions can be handled via: Defer to Future Section Parking Lot > Open Time Defer to Panel Discussion After Class on Day 1 Follow-up Conference Call Webinar Topic Future Workshop on Key Topic

8 Introduction to the DoD Enterprise Software Initiative (ESI)

9 DoD ESI Key Introductory Points
Formed in 1998 by DoD CIOs / Oversight by DoD CIO Serve as the central group of subject matter experts to negotiate with software publishers and their resellers on behalf of the DoD Staffed with software product managers from across the DoD services with specialization in a particular software company or product category Expanded to IT Hardware & Services in early 2000s Teamed with GSA SmartBUY Policies:  DFARS, AFARS, OMB, DoD 8000 and many more All Major Software Enterprise License Agreements build off the DoD ESI agreements Cost avoidance of $5 Billion+ off GSA schedule pricing

10 DoD ESI’s Mission

11

12

13 Contractual Architecture Using GSA FSS and DoD ESI BPA
The GSA Federal Supply Schedule contains foundational terms and conditions that apply to the licensing of commercial software. GSA FSS General Terms and Conditions C-1: Master End User License Agreement (EULA) ESI BPA A1. Start with ESI EULA A2. Add Acceptable vendor Terms A3. Enter the ESI Version of the EULA; or B1. Start with the vendor’s EULA B2. Attach ESI Addendum & Remove Objectionable Terms B3. Enter the vendor’s Version of the EULA with an ESI Addendum The following chart summarizes the contractual structure utilized by DoD ESI leveraging three key components of the contractual documents involved in a COTS software license: Based on comments from prior attendees, the instructor should reinforce the priority of GSA terms and conditions. A BPA can enhance, but can not contradict or remove GSA Ts and Cs. It is also important to emphasize the affect of adding a BPA and an order to an underlying GSA contract. The combined terms of all three levels constitute ‘the contract’. Although Ts and Cs could be used potentially as bargaining chips for a better price, caution must be used to avoid removing a GSA term or removing other desirable Ts and Cs previously negotiated into the BPA. One example cited in a class discussion was potentially giving up the right to transfer licenses across affiliates in exchange for a lower price. While that approach could be used, the loss of flexibility afforded by the right to transfer might be more valuable than the lower price. Order License Grant License Type Quantity Price Award / Delivery Order The Ordering document incorporates all FSS, BPA and Master EULA Terms into the Order. The Ordering document focuses on the license grant, type, quantity and price. Changes in an Order may only enhance the terms of FSS and BPA and may not dilute them.

14 Organizational Structure
If you’d like to see a product or service added to the catalog of ESI BPAs, please contact DoD ESI Co-Chair

15 Note: FITARA & Gov EULA Template
Training Strategy for DoD ESI Note: FITARA & Gov EULA Template

16 FOUNDATIONAL CONCEPTS (Before Diving into the Contractual Impacts)

17 1.0 The IT Industry

18 Overview: Industry Overview / Spend Analysis
Services Hardware Software Global Spending (Gartner Outlook)* 2013 $809B** $300B $922B 2014 $840B $320B $963B % ‘14 39% 15% 46% Federal Government Spending (est. using same % as Global Spending)*** 2014 $32B $13B $37B % ‘14 39% 15% 46% * Does not Include Telecommunications Spending ** Includes Devices and Data Center Spending *** Fed IT Spending ($82B in 2014) expected to decrease by 2-3% per year next few years

19 Overview: Industry Overview / Ecosystem
The Key Players & Roles (Licensee; Buyer) Publishers Customers Resellers System Integrators Escrow Agents Software Partners Hardware Partners Hosting Partners Industry Analysts SaaS / Cloud (Licensor; OEM)

20 2.0 Intellectual Property

21 Overview: Intellectual Property – Protection Methods
Legal Protection Four Ways to Protect IP Patents protect rights for inventions, up to 20 years. Trademarks protect words, names, symbols for as long as they are being used in business. Copyrights protect works of authorship (e.g. writing, music, art, software) tangibly expressed. Trade Secrets protect competitive advantages. Books, music, movies, franchise, pharmaceutical. The U.S. Patent and Trademark web site provides further definition and some examples for each of the four categories as follows: Patents provide rights for up to 20 years for inventions in three broad categories: Utility - protect useful processes, machines, articles of manufacture, and compositions of matter. Some examples: fiber optics, computer hardware, medications. Design - guard the unauthorized use of new, original, and ornamental designs for articles of manufacture. The look of an athletic shoe, a bicycle helmet, the Star Wars characters are all protected by design patents. Plants - are the way we protect invented or discovered, asexually reproduced plant varieties. Hybrid tea roses, Silver Queen corn, Better Boy tomatoes are all types of plant patents. Trademarks protect words, names, symbols, sounds, or colors that distinguish goods and services. Trademarks, unlike patents, can be renewed forever as long as they are being used in business. The roar of the MGM lion, the pink of the Owens-Corning insulation, and the shape of a Coca-Cola bottle are familiar trademarks. Copyright protects works of authorship, such as writings, music, and works of art that have been tangibly expressed. The Library of Congress registers copyrights which last the life of the author plus 50 years. Gone With The Wind (the book and the film), Beatles recordings, and video games are all works that are copyrighted. Trade Secrets are information that companies keep secret to give them an advantage over their competitors. The formula for Coca-Cola is the most famous trade secret. Software Industry Examples Software algorithms Logos, icons, corporate name Source code, screen layouts Customer lists

22 Overview: Intellectual Property Protection Methods for Software
Examples of Source Code & Object Code Publisher Product Development / R & D Source Code (Human Readable – Secret Recipe) Import.javax.servlet.http.Http.Servlet.Request; Conversion Binary code Binary opened in terminal output Object Code (Machine Readable) Physically Protected Licensed Software Version

23 Who Owns These IP Rights?
Overview: Intellectual Property - Ownership Rights THE GOVERNMENT ALWAYS OWNS ITS DATA Who Owns These IP Rights? Developer Development Tools = Developer Property (ala Toolbox) Publisher Resale May Be Restricted Rights Can Be Jointly Owned If jointly owed, buyer gets “Royalty Free, World-wide, Perpetual right to use” Customer (e.g. Core COTS SW Application Licensed for Commercial Use) (Design, Development, Test & Deployment) COTS Hybrid or Derivative Works Custom Development (Work for Hire)

24 Book to screenplay example
Overview: Intellectual Property – Derivative Works Sample Book to screenplay example Book Screenplay Movie Nothing Lasts Forever Roderick Thorp Screenplay by Lawrence Gordon Joel Silver Produced by Steven E. de Souza & Jeb Stuart Extra credit – Name the Movie!! Derivative Work: Requires original author’s approval to write a screenplay based on the book or to make a movie based on her book. Would a movie about sharks terrorizing swimmers infringe on the IP in Jaws? Would a restaurant named Mickey Dee’s with yellow arches infringe on McDonald’s IP? What makes one piece of work a derivative of another? How do these examples work in the software industry?

25 3.0 Publisher & Reseller Contracting Methods

26 Contracting with a Publisher and/or its Resellers
Who is authorizing the use of the software? Privity of Contract (defined) A relationship between two parties that is recognized by law. A connection or bond between parties to a particular transaction. The relationship that exists between two or more parties to an agreement. Contract law requires "privity of contract" between parties to enable either of them to enforce contract promises against the other party. With whom are you entering a contract? 26

27 Contracting Methods & Impacts on Privity of Contract
Privity with the Publisher No Privity with the Publisher DIRECT SALES INDIRECT SALES Publisher Publisher Publisher Publisher Field Sales Inside Sales On-line Sales Tele-sales VAR/Distributor System Integrator Hardware Vendor Customer Customer Customer Customer Explain privity for the layman and the contractual implications of dealing with resellers and others in between the end user and the publisher Examples of Contract Provisions Where Privity Matters: License Grants Transferability of Licenses Source Code Escrow Ownership of Derivative Works Warranty Level 3 Support IP Indemnification

28 Publisher Model / Contracting Methods
GSA’s Approach to Publishers, Resellers & Privity 1 2 GSA GSA Publisher Letter of Supply Publisher Reseller GSA deals directly with Publishers when possible, thereby creating privity with them. GSA also deals directly with Resellers and often accepts letters of supply as a means of tying Reseller promises to Publishers. GSA Focus: FAR, Statutory, Regulatory (non-business terms) Since GSA does not consider most of the IP related Ts and Cs to be within their scope of responsibility, the FSS agreements with Publishers do not address those topics – or the Publisher ensures IP related Ts and Cs in FSS agreements are favorable to Publisher.

29 Publisher Model / Contracting Methods
ESI’s Approach to Publishers, Resellers & Privity 2B. If the Publisher will not sign the EULA, ESI seeks privity with Publisher for the key IP related terms in a document signed by Publisher. 1 2 2B. IP Agreement ESI ESI Publisher EULA EULA Jointly Signed Incorporate Agreement between Pub and Reseller 4 Publisher Reseller 2A. ESI seeks to have the Publisher sign along with the Reseller. 1. ESI seeks to have Publishers sign EULAs to ensure direct privity for all promises in EULAs. 2. ESI enters BPAs directly with Resellers. 4. If Publisher will not sign a document creating privity for IP issues, ESI seeks to incorporate the Publisher agreement with its Resellers into the ESI EULA with the Resellers. Obtain a copy of the agreement between the Publisher and its Resellers where Publisher authorizes Resellers to sell licenses, extend warranties, etc. Attach that agreement to the EULA with the Reseller and add a paragraph that incorporates it into the EULA. This is reasonable evidence of Publisher’s intentions.

30 Publisher Model / Contracting Methods
Competition Among Resellers ESI When a single brand is selected and a J&A is obtained, competition is achieved by soliciting bids from multiple Resellers. This competition is far less advantageous to the government than competition among Publishers. Reseller 1 Reseller 1 Reseller 1 Reseller 1 Resellers Competition Among Publishers Publisher 1 VS. Publisher 2 VS. Publisher 3

31 Publisher Model / Contracting Methods
Why are resellers used? Federal Perspective Sellers’ Perspective Agents and Dealers Some Resellers use agents or dealers to fulfill orders and request that the government pay the agent or dealer. This introduces two potential problems: Privity is further removed from the Publisher The agent or dealer may not have a contract with the government or a CAGE code to enable payment. ESI seeks to avoid dealing with agents or dealers. Resellers might use them for order fulfillment, but the Reseller (or preferably the Publisher) must remain responsible for promises in the EULA and must take payment. GSA Reseller Agent / Reseller Publisher

32 Reseller & Publisher Relations- Pricing / Discounts
Publishers may: Offer same discounts to all resellers. Be consistent and level the playing field. Reward the Reseller with the best sales execution. Offer volume discounts to top resellers. Resellers usually: Compete on their “pass-through” Get additional discounts on larger deals as “one-off” deals. Get exclusive treatment when they “find” the sale. Get same price from Publisher in response to RFP. 32

33 Example of Publisher Discount to Reseller & Reseller Pricing to Customers
1. List Price from Publisher = $10,000 4. Reseller Mark-ups & Prices A 20% on $6,000 = $7,200 B 15% on $6,000 = $6,900 2. Discounts are extended by Publisher to Resellers A,B & C C 20% on $5,500 = $6,600 Assume all resellers get a 40% discount. A $10,000 list order is offered to all resellers at $6,000 cost. Reseller A adds 20%, sells at $7,200; Reseller B adds 15%, sells at $6,900. If Reseller C qualifies for a volume discount, may get an additional 5% discount. Reseller C with $5,500 purchase cost can sell at $6,600 and still make 20%. A Conclusion: Reseller C is able to earn a 20% mark-up and win with low price because of a volume discount from the Publisher. B 3. Standard discount to Resellers A & B = 40% so price to A & B = $6,000 C 4. Volume Discount to Reseller C = 45% so price to C = $5,500

34 Revenue Recognition – a Frequently Used Objection
Revenue of PUBLICLY TRADED software companies is closely scrutinized by the SEC. (Rule change forthcoming in 2017) Private companies have no basis to use rev rec. as an excuse to avoid discounting. For a publicly traded Software Publisher to recognize revenue immediately upon sale (and not ratably over time) certain conditions must be met. Signed contract or formal agreement, with a fixed price, non-refundable provisions, and a high probability of collection. Software must be delivered in usable format, accessible to end user. No significant modifications required, no promise of future functionality, no promise of future products, and no deal-altering contingencies. Software performance guarantee limited to standard warranty and acceptance that software will perform according to Publisher’s documentation. Implementation and consulting service performance cannot be tied to acceptance, return, or payment for the software licenses.

35 Revenue Recognition – a Frequently Used Objection
VSOE – Vendor Specific Objective Evidence – is a revenue recognition mechanism to prevent inconsistent pricing and discounting from favoring certain classes of revenue. Funneling revenue to software licenses by giving disproportionately high discounts on services or maintenance can make the company look more valuable than it is. Why should you care? Rev rec is often used as a negotiating tactic to say no to requests for discounts and certain Ts and Cs. Very few software sales people or executives understand VSOE. It is often a smokescreen. Two easy responses Ask for specifics about how your discount or term violates VSOE. Ask why your deal can’t be one of the 20% permitted to be outside of VSOE range.

36 VSOE – Vendor Specific Objective Evidence
General Rule – 80% of the time, the price must be within a band that is plus or minus 15% of the average price range for a product Upper VSOE Limit $1150 +15% Actual average high price $1000 Actual overall Average price $800 Actual average low price $500 Lower VSOE Limit $425 -15%

37 4. Products & Services (What are you Buying? )

38 Products & Services: SOFTWARE CORE COMPONENTS & RELEVANT AGREEMENTS
LICENSED PRODUCTS MAINTENANCE & SUPPORT SERVICES EULA Maintenance & Support Agreement Contracted Assurances Agreement Professional Services Agreement (or) OUTSOURCING (e.g. Cloud/SaaS) Service Level Agreement Note: The type of product you are buying impacts the agreement structure and terms

39 Products & Services: Product Categories - Overview
COTS LICENSED PRODUCTS* SYSTEMS PROGRAMMING & TOOLS BUSINESS APPLICATIONS DATABASES Operating Systems Utility Programs Software Development Kits Middleware Enterprise / Complex Shrink Wrap / Ready to Use Processing Storage Some Assembly Required Note: ratio of money spent 1-4 vs. 1-15 Windows Linux Oracle Fusion Middleware IBM WebSphere JBoss Enterprise Open Source Microsoft Office SAP Logistics Siebel CRM Oracle Microsoft SQL Server IBM DB2 Sybase (SAP) Open Source * Software can also be custom built. The focus of this course is the COTS licensed software.

40 Open Source and Other Proprietary Software Licenses
Open Source (OS) and Other Proprietary Software (OPS) (together referred to as Third Party Software - TPS) can be obtained with the primary software application (PS) being licensed in two ways: As separately licensed software, e.g., Mozilla Firefox (OS) or Oracle Database (TPS) As embedded software The embedded software case creates potential liability for the Government. Separately licensed Embedded software Licensee PS OS /OPS (TPS) PS OS/OPS (TPS) Licensee

41 Open Source Code and Other Proprietary Software
Why Embedded Software Matters to You Today most proprietary software includes embedded OS and some has embedded OPS. (OS and OPS are referred to collectively as TPS for convenience). The Primary Software (PS) IP owner (Publisher) made the choice to embed TPS in its product. In some cases, the PS Publisher doesn’t know how much OS or OPS is in its PS. Most PS Publishers do not address the issue of TPS in their EULAs. Those who do address it usually try to pass the risks associated with TPS to the Government. The PS Publisher should retain the risks associated with the decision to include TPS (or the lack of attention to it). A Few Issues that Must be Addressed Improperly licensed TPS could lead to third party claims of infringement. Improperly licensed TPS could lead to third party claims for license fees. The Government generally has no recourse with TPS Publishers for product defects. OS carries a risk of little or no support and its licenses usually require a license holder to share enhancements. Embedded in proprietary applications. Some Open Source apps (or lines of code) are incorporated into products published by commercial software companies who copyright their applications and sell licenses to their IP. Here is how the Open Source Initiative’s mission statement defines it today: “Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The promise of open source is better quality, higher reliability, more flexibility, lower cost, and an end to predatory vendor lock-in.” The concept behind open source software grew out of the practice of early programmers sharing code-writing solutions for mutual benefit. The term “open source”—first used by the software industry in 1998—generally refers to software whose source code is developed in a collaborative fashion by unrelated parties and made available to the public under the widely accepted terms of the GNU General Public License. Do not confuse “open source” with “free” software. In fact, the term open source was adopted to eliminate confusion with any negative connotations of free software. As the open source community describes it, “Think ‘free’ as in ‘freedom’, not as in ‘free beer’.” Although this can be a very complex topic, mainstream open source is governed by the Open Source Initiative (OSI)—using well-accepted practices. OSI requires free open source licenses to software developers with very liberal re-use and distribution rights—protecting against end users being restricted from an ability to modify source code for their purposes. 41

42 Open Source & Other Proprietary Software Clauses
ESI recommended Clauses to Address TPS Concerns Make sure the EULA includes the following covenants from the Publisher: Disclosure of all third party software (TPS) including Open Source. Publisher has the right to use the TPS in the way it has been used with Publisher’s IP. PS Publisher indemnifies the Government against additional licenses or license fees required to use the PS or TPS. Publisher warrants performance of its IP and the TPS included with its IP. The Government assumes no obligation to share enhancements or derivative works of PS or TPS. Other OS Considerations No Maintenance and Support Infrastructure Since Open Source is collaboratively developed and peer reviewed, there might be no formal infrastructure for providing fixes, patches, enhancements and updates. “Encapsulation” can be used to isolate Open Source code from copyrighted IP. Maintenance Since Open Source is collaboratively developed and peer reviewed, there may be no formal infrastructure for providing fixes, patches, enhancements and updates. Support Similarly, there may be no formal support organization available to assist users with diagnosing and fixing software problems. License rights and Intellectual Property Open Source licenses may require Publishers to share enhancements or derivative works with the Open Source community. Encapsulation is a technique used to isolate core Open Source code from copyrighted IP to avoid mixing them and losing IP rights. Make sure the EULA includes the following covenants from the Publisher: Disclosure of all third party software included with the licensed software, including Open Source, No additional licenses or fees required to use the licensed or third-party software. No obligation to share enhancements or derivative works of the licensed software or any included third party software. ESI White Paper Available

43 4. Products & Services Software Source Code Escrow

44 Overview KEY RECAP POINTS
Source Code is the ___________ readable form of software written by the _________. ________ Code is machine readable form. Buyers don’t get the ________ code when licensing COTS software. WHEN SOURCE CODE IS NEEDED BY BUYERS Under certain circumstances - e.g., Publisher goes into bankruptcy or stops maintaining the software. ONE WAY TO GAIN ACCESS TO THE SOURCE CODE An escrow agreement with a neutral third party gives Publishers and buyers assurance that their respective interests are protected. The escrow agreement specifies the events which could trigger the release of the Source Code to the buyer.

45 Source Code Escrow—Balancing Interests
Escrow Agent 4. Costs / Fees: Set Up Code Test & Validation Annual Renewal Escrow Agreement Executed 4. Escrow Agreement Executed 4. Source Code Deposited (including Updates / Validated) 5. Source Code (Released by Trigger Event) 6. Object Code Delivered 3. Publisher Licensee / Beneficiary EULA Entered 2. Escrow Required in RFP 1. Escrow Agreement Executed 4. The licensee’s right to the released Source Code is usually limited to a right to use it to maintain and enhance their production system. Note: Different versions of Escrow Agreements exist. Ensure terms are beneficial to buyers/licensees.

46 Source Code Escrow Considerations
Custom Software < 2 Years in the market Mission Critical Low market share Low number of installations Software Type & Mission COTS > 5 years in the market Not mission critical High market share Large number of installations Publisher Longevity & Stability >5 years.………. >15% of Sales.… High.……....…… Moderate.……… High..…………… Balanced Years in Business ..…......< 2 years < 5% of sales ..……….…. Low ..……….… High ..………….. Low ….. High license v. service Net Income Earnings per Share Price-to-Earnings Ratio D&B Rating License v. Service Revenue

47 4. Products and Services: Maintenance & Support

48 Maintenance & Support – Basic Elements
Services Designed to provide customer access to the ongoing enhancements and fixes created .by the Publisher Established to report software deficiencies or malfunctions and to receive corrections or fixes. Fixes & Patches to Bugs (1.0.1) - (Publisher develops; customer applies.) Updates (1.1) Upgrade / New Release / Version (2.0) Support Levels and Process (Who receives, diagnoses, and fixes problems?) Issue Severity Levels Response Times Maintenance fees are used by Publishers to fund development of fixes and new releases. Most Publishers offer increasing levels of support at increasing prices.

49 Software Versions – Nomenclature & Numbering
Description Numbering Scheme Upgrade /New Version New functionality and improved features. (Always ensure that a new version is covered under annual maintenance, at no charge.) Usually represented by a new number in front of the decimal point. (i.e. 3.0 becomes 4.0) Update A release with enhanced features and consolidation of all prior bug fixes. Often represented by a change one place to the right of the decimal point. (i.e. 4.1 becomes 4.2) Bug Fix/Maintenance Release/Patch Corrects issues, errors, and bugs in previous release of the same version. Often represented by a change two decimal places to the right of the version number. (i.e becomes 4.2.2) Note: EULA should address: Reinstatement fees, version lock, and new product license fees

50 Excerpts from Full-Day Workshop on Cloud and SaaS
4. Products and Services: Outsourcing / Cloud and Software as a Service (SaaS) Excerpts from Full-Day Workshop on Cloud and SaaS

51 Hosting / ASP / MSP Models Cloud Iaas, PaaS, SaaS
Outsourcing Hosting / ASP / MSP Models Cloud Iaas, PaaS, SaaS

52 Timeline to Cloud/SaaS
One of the topics raised in a previous class is the issue of vendor lock, meaning the government needs to be wary of buying too many related items from a single vendor, thereby making it more difficult to break away from that vendor—and giving the vendor too much bargaining power over the government, thereby impacting the ability to get the best price through competition. The following comments are provided in response to the concerns about vendor lock. The government may be overly concerned with vendor lock. Most software is not commoditized or as fungible as desks or vehicles or other items the government buys. For major process software or certain mission critical software, the government would be better off following commercial best practices by entering into a true partnership with a selected vendor. The vendor qualification process and procurement process should still be very rigorous, but treating the vendor and its products as interchangeable with everyone else is probably not a good practice. In a SaaS environment, the vendor lock concerns are more difficult to manage by the nature of the offering. On the other hand, switching costs are theoretically lower because of the utility nature of the arrangement.

53 Cloud Deployment Models
Public Off premise at provider General public Users’ concerns and purposes vary Private On or off premise Limited to a single organization Used by various business units Community On or off premise Multiple, related organizations Users share the same concerns Hybrid On or off premise Determined by each cloud Users’ concerns and purposes vary Gretchen

54 What Does it Mean to Deploy to the Cloud?
True or False—cloud computing and SaaS are synonymous. True or False—a perpetual license can be deployed to the cloud. Cloud computing requires which of the following? Internet connections Virtualization SaaS licenses Remote data storage A special operating system Well, sort of. In a technical sense, they are two different things--the cloud is a set of technologies (see question 3) and SaaS is a business model; however, most people would say they are synonymous. It is common practice to acquire SaaS licenses which are, by definition, deployed in the cloud—so they generally go hand in hand—but there are several variations on the theme. For example, some Publishers have their own cloud offerings including all infrastructure and services along with their applications. Some Publishers partner with third parties whose roots were in application hosting( providing infrastructure expertise). The combined offering is a SaaS license in a cloud. Some of the larger and complex ERP Publishers tend to offer this type of cloud or SaaS arrangement. Another variation is for a customer to have their own private cloud--an ‘on premise’ infrastructure--with a subscription license from a Publisher. This demonstrates how the two terms—cloud and SaaS—can actually represent two separate elements of an IT environment. True—although people generally think of SaaS or subscription licenses as the only type of license deployed in a cloud, there is no reason a perpetual license could not be deployed—especially in the private cloud scenario mentioned above. Most cloud deployments involve SaaS because the two concepts have essentially merged into a single concept. SaaS now includes all elements of the environment including the software application. It could be said all the listed items are part of the cloud. While it could be argued a cloud could consist simply of an internet connection to an application hosted remotely and offered on a subscription basis, the current state of the industry recognizes all of the listed items are part of a cloud or SaaS offering.

55 The Cloud’s Impact on Licensing
On Premise Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Infrastructure (as a Service) Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Platform (as a Service) Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Software (as a Service) Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking You Manage You Manage You Manage Managed By Vendor Managed By Vendor Managed By Vendor

56 Licensing Considerations – Perpetual versus SaaS
Factor Perpetual License SaaS License Payment One-time payment at delivery Usually subscription based License Duration Into perpetuity – a permanent fixture Use while subscription is current – like a utility Physical Custody Yes No Customizations At Licensee discretion At Licensor discretion Security Depends on Licensee or subcontractor Depends on Licensor skills Data Ownership Licensee owns data & has custody & control Licensee owns data but may not have custody or control SLAs Vendor response to issues only Vendor response to issues and to system availability Hosting Location Usually on premises but can be outsourced Usually off premises Upgrades Applied at Licensee’s discretion Applied at Licensor’s discretion

57 Why Use the Cloud? Aside from the OMB mandate, what are key business reasons for deploying to the cloud? Cost Reduction Greater Mobility Heightened Security Speed & Flexibility Easier Collaboration Each of these factors may be valid, but we should examine them in detail.

58 Pricing Comparison Example – SaaS Versus Perpetual
Perpetual Price Technology Stack SaaS Price Issues $1 million Application $250K per year What happens after year 4? $ 150K per year Data Management $100K per year There are potential savings in each of these categories with SaaS because of shared resources and virtualization BUT Does the Government already own any of these resources? Are they available for this application? If so, will those resources go away or be deployed for another application? If not, will the Government pay twice? What happens when there are multiple SaaS licenses with multiple vendors ? $ 200K Runtime $ 150K $ 100K Middleware $ 75K $ 50K O/S $ 40K Virtualization $ 300K Servers Storage $ 100K allocated per year Networking $75K $100K allocated per year Facilities

59 Other Factors to Consider About Cloud Benefits
Flexibility Switching SaaS vendors could be less costly than switching perpetual vendors, but… …would it be as easy to switch providers as it would be to switch ERP SaaS vendors? What about customizations? What about control over the timing of upgrades? Is virtualization limited to the cloud? How do you put a price on flexibility gained or lost?

60 Other Factors to Consider About Cloud Benefits
Heightened Security Even if all infrastructure is outsourced, does it make sense to outsource data security? Is data outside of the Government’s custody as secure as data that is in the Government’s custody? What about security of the Vendor’s premises? What about their supply chain? Analytical Approaches A consistent approach to analyzing prices and internal costs is a mandatory prerequisite to gauging cost savings. Should savings be measured on a deal basis or a collective basis?

61 Key Cloud/SaaS License Considerations
SLAs Dependence on the Vendor makes SLA clauses extremely important Ensure measureable performance standards for system up time and issue response are clear. Upgrades If the timing of upgrades is important, include the right to delay upgrades at your discretion. Customizations If you know customizations will be required, ensure there is a clause addressing your right to have customizations in your instance of the software. Some licenses claiming to be SaaS are not true SaaS applications. One large software Publisher requires customers to download software instead of remotely accessing it – and they require system access for monitoring. Government funding might impact multi-year subscriptions. What happens to your SaaS app if year 2 funding disappears? The key factors in answering the cost savings question are these: Vendors can achieve economies of scale in infrastructure and facilities with multiple customers, but with a large entity like DoD, is that a realistic source of savings? Vendors offering cloud and SaaS are arguably more expert at IT since it is their core business. They have the right skillsets and expertise in all relevant technologies. See: Federal Cloud Compliance Committee for Recommended Clauses

62 Excerpts from Full-Day Workshop on Strategic Negotiations
5. PREPARING FOR THE ACQUISITION Building a Team; Creating a Negotiating Strategy. Excerpts from Full-Day Workshop on Strategic Negotiations

63 Acquisition Process Flow
ACQUISITION LIFE-CYCLE Build and Manage the Team Requirements / Market Research Strategize Issue Solicitation Evaluation & Negotiation Contract Management / Issue Resolution Contract Deliverable Acceptance

64 5.1 BUILDING THE TEAM

65 The Government Team & Their Involvement in the Process

66 Key Software License Negotiation Players
Software & Services Sellers Publishers Resellers Integrators Reconcile with Ecosystem graphic and players – or are we trying to make a different point with this slide? E.g. who is involved in the typical negotiation? Define vendors or use another term – it is too generic – this may be better showing two sides of the negotiation – the vendors’ side and the DoD side DoD PM & Technical Team Software Product Managers Contracting Officers Government Software & Services Buyers

67 Sales Process Software Sales Process DoD Acquisition Process
As Aligned to DoD Acquisition Process Software Sales Process DoD Acquisition Process Identify Customer Requirement Provide Product Data "Sell" the Customer on Products Determine How Much Customer Can/Will Pay Identify and Work any $ or Terms Issues Determine Acquisition Vehicle Negotiate Price and Ts & Cs Execute Order Ensure all Programs Delivered Determine Requirement Exists Gather Data on Requirements Fit and Products Establish Best Solution for Requirement Establish Budget and Funding Sources Establish "Must Have" Ts & Cs and $ Ceiling Determine Contract to be Used Negotiate Price and Ts & Cs Obtain Approvals and Sign Contract Order Accept Products Note: There are hundreds of variables in each Process

68 5.3 PREPARE THE NEGOTIATING STRATEGY
Excerpts from Full-Day Workshop on Negotiations Strategy

69 Preparing a Negotiating Strategy
Evaluate the parties Recurring negotiation versus one-offs Is competition still a factor or has the vendor been selected? Relative strength and leverage of the parties Establishing face-off strategies (roles to be served) Establish objectives & alternatives / Term Sheet Assign target values (desired outcome – objective) for both qualitative and quantitative issues Create one or two back-up positions for every important issue For example, Ts and Cs might require alternative language Is there a BATNA in case it is needed? Identify and prioritize the issues Assuming a commercial transaction, price is only one issue Take a comprehensive view of the issues from the perspective of both parties

70 Preparing a Negotiating Strategy
Assessing your strengths and weaknesses How solid is our information? Are there time limits to reach agreement? Are there negotiating limits imposed by law or regulation? Conduct a senior management review This will ensure integrity of the strategy It will also ensure management buy-in Find Zones of Agreement Establish a walk away position or Reservation Price for each objective Use the back-up positions to create a zone of potential agreement Prepare strategies for mutual discovery of zones of agreement

71 Reservation Price and The Zone of Agreement
Desired selling price - 800 NO AGREEMENT POSSIBLE ZONE OF AGREEMENT Maximum purchase price - 700 Minimum selling price - 400 NO AGREEMENT POSSIBLE Desired purchase price – 300

72 Executing and Concluding the Negotiation
Logistics Selecting the venue – the Paris Treaty story Presenting desired outcomes Selecting a spokesperson Who goes first – does it really matter? Tactics Using conditional agreements to make progress – If I do X will you do Y? Using “intervenors” and “ratifiers” Asking questions for fact-finding Caucusing & Concessions Finalizing the agreement Documenting positions and agreements (or tentative agreements) Closing the deal – getting to a final document with signatures

73 Key Contract Drafting and Construction Principles
People leave their jobs often – write for the replacement who has to figure out the intent of the original drafters / parties; Package documents up for presentation to the Judge or jury in future litigation; Use contract template in RFQ/RFP with buyer-focused or project success terms; deviations are to be noted in the proposal / response and used as an evaluation factor; competitive process is the greatest moment of leverage to impose the terms that benefit the buyer (who has the money); OR first drive to a term sheet of business terms; agree in principle; add legal terms after business terms are finalized Write using plain English; When buying deliverables, point to samples to align the parties’ expectations and to be used in the acceptance process

74 Key Contract Drafting and Construction Principles
No (or minimal) assumptions Don’t ignore contradictions in language – resolve them Don’t leave in clauses that are irrelevant or not permitted by FAR – take them out or change them Make sure you have all documents and reconcile them to each other Don’t allow for web links to be referenced that can be changed Don’t ignore the boilerplate or assume that it is standard and reasonable language that serves your best interest Include recorded and digital items with relevant information or promises (voice mail, , YouTube videos, product tutorials, testimonials, case studies, social media, etc…)

75 Recap, Questions and Parking Lot Items


Download ppt "Foundational Topics Overview"

Similar presentations


Ads by Google