SlideShare a Scribd company logo
1 of 12
Satya S. Narayan
SNarayan@rroyselaw.com
Phone: 650.521.5745
July 29, 2013
Legal Challenges for Big Data Companies
Volume
12 tb of tweets converted per day
Velocity
5 million trade events analyzed per day
to detect fraud
Variety
100s of live video feeds monitored to
target points of interest
Veracity
Connecting different data points to
facilitate decision making
BIG
DATA
“Big Data is a term that describes large volumes of high
velocity, complex, and variable data that requires advanced techniques
and technologies to enable the
capture, storage, distribution, management, and analysis of the
information.” - TechAmerican Foundation.
 Data privacy and security
 Compliance issues
 Service levels
 Reliability and other warranties
 Indemnification and Limitations of Liability
Key Legal Concerns
 Personal information “is any information about an individual maintained by
an agency, including (1) any information that can be used to distinguish or
trace an individual„s identity, such as name, social security number, date
and place of birth, mother„s maiden name, or biometric records; and (2)
any other information that is linked or linkable to an individual, such as
medical, educational, financial, and employment information." – National
Institute of Standards and Technology
 Data handling permissions; usage restrictions
 End user’s permission
 Fair Credit Reporting Act
 Consumer’s right to correct personal information
 Do Not Track v. Do Not Collect debate
 Is de-identification/ anonymization of data done properly to prevent re-
identification
 Whose privacy policy should apply?
 Is Customer’s privacy policy too restrictive?
 What permissions does Customer need to obtain from end users?
Data Privacy
 “Reasonable/ appropriate” security measures – not good enough
 Whose privacy policy and security policy should apply?
 Customer’s data security questionnaires and data privacy
schedules
 Security audits
 Data security related potential costs and can these costs be
shared?
 Data security breach costs
 Implementation costs of new security measures
 Security audit costs
 To what extent should Customer be responsible for data security
and privacy issues?
 Who bears the risk of a “no-fault” breach?
Data Security
 What is the Provider’s role in data-related compliance?
 Data privacy and security
 E-discovery and document preservation
 Regulatory compliance in specific industries (for
example, pharma and automotive industries; banks)
Compliance issues
 What performance guarantees should a Provider give?
 Uptime, throughput, mean-time-to-
restore, latency, and bandwidth guarantees
 Customer may ask for warranties
 Criticality of service to Customer’s end-user
interactions
 Limitations/ exclusions (for example, Provider’s hosting
provider’s failures)
 Remedies
 Service credits; fixing the issue; contract termination
 Are your remedies exclusive?
 Is payment of service credits automatic?
 Customer duties and responsibilities
Service Levels
 Warranties
 Data accuracy and completeness?
 Software performance?
 Warranties implied by law
 Exclusions
 Disclaimer
Reliability and Other Warranties
 Provider indemnification:
 Breach of privacy or security?
 Third-party intellectual property infringement?
 Customer’s customer issues (for example, from a
breach of a service level)?
 Exclusions
 Should the Customer indemnify the Provider?
 Limitations on Provider’s liability:
 Consequential damages disclaimer (for example, lost
profits of Customer arising from a data security breach)
 Caps on liability
 Exclusions from liability limitations
 Insurance
Indemnification & Limitations of Liability
 Post-termination transition/ migration assistance
 Return of Customer data
 Source code/technology escrow
 Business continuity/exit plans
 Change of control consent/ notice
Additional Customer Asks
As a Provider, pay close attention to:
 obtaining adequate data permissions
 proper de-identification/ anonymization of data
 specifying a uniform security standard
 specifying uniform service levels and remedies
 assessing risks and developing a playbook for
warranty, indemnity, and liability negotiations; identify
your maximum risk undertaking threshold
 obtain adequate insurance
 watch for new FTC and privacy legislation and guidance
Concluding Comments
PALO ALTO
1717 Embarcadero Road
Palo Alto, CA 94303
LOS ANGELES
11150 Santa Monica Blvd.,
Suite 1200
Los Angeles, CA 90025
SAN FRANCISCO
135 Main Street,
12th Floor
San Francisco, CA 94105
Satya S. Narayan
SNarayan@rroyselaw.com
Phone: 650.521.5745
Royse Law Practice Areas
Corporate Securities
Tax
Mergers & Acquisitions
Fund Services
Intellectual Property
Technology Transactions
Labor & Employment
Immigration
Litigation
Estate, Trust & Wealth Strategy
Real Estate
International

More Related Content

What's hot

Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Jason Glass, CFA, CISSP
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems OverviewRuss Holmes
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankThomas Lee
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Financial Poise
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notCheapSSLsecurity
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Half the Picture
Half the PictureHalf the Picture
Half the PictureThomas Lee
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Verittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of CapabilitiesVerittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of CapabilitiesGeorge Mark
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011bodekn
 

What's hot (20)

California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems Overview
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Half the Picture
Half the PictureHalf the Picture
Half the Picture
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Task 3
Task 3Task 3
Task 3
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Verittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of CapabilitiesVerittas Risk Advisors, Inc - Overview of Capabilities
Verittas Risk Advisors, Inc - Overview of Capabilities
 
Records stored at third parties 081011
Records stored at third parties 081011Records stored at third parties 081011
Records stored at third parties 081011
 

Viewers also liked

Big Data and Its Impacts on the Legal Profession
 Big Data and Its Impacts on the Legal Profession Big Data and Its Impacts on the Legal Profession
Big Data and Its Impacts on the Legal ProfessionLawCrossing
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014MOTC Qatar
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyAlex G. Lee, Ph.D. Esq. CLP
 

Viewers also liked (6)

Big Data and Its Impacts on the Legal Profession
 Big Data and Its Impacts on the Legal Profession Big Data and Its Impacts on the Legal Profession
Big Data and Its Impacts on the Legal Profession
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 

Similar to Legal Challenges for Big Data Companies

Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxAdarsh748147
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)AltheimPrivacy
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Caseprivacytalks
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 

Similar to Legal Challenges for Big Data Companies (20)

#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
The Privacy Dividend Business Case
The Privacy Dividend   Business CaseThe Privacy Dividend   Business Case
The Privacy Dividend Business Case
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 

More from Roger Royse

Startup Law ACBA.pptx
Startup Law ACBA.pptxStartup Law ACBA.pptx
Startup Law ACBA.pptxRoger Royse
 
Startup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptxStartup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptxRoger Royse
 
2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.ppt2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.pptRoger Royse
 
Funding 101 02022022.pptx
Funding 101 02022022.pptxFunding 101 02022022.pptx
Funding 101 02022022.pptxRoger Royse
 
Royse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptxRoyse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptxRoger Royse
 
Idea to ipo funding 101 royse - august 11 2020
Idea to ipo funding 101   royse - august 11 2020Idea to ipo funding 101   royse - august 11 2020
Idea to ipo funding 101 royse - august 11 2020Roger Royse
 
Idea to ipo venture capital startup royse - may 10 2020
Idea to ipo venture capital startup   royse - may 10 2020Idea to ipo venture capital startup   royse - may 10 2020
Idea to ipo venture capital startup royse - may 10 2020Roger Royse
 
Legal overview star camp royse - may 2020 4839-7571-5260-1
Legal overview star camp   royse - may 2020 4839-7571-5260-1Legal overview star camp   royse - may 2020 4839-7571-5260-1
Legal overview star camp royse - may 2020 4839-7571-5260-1Roger Royse
 
M&A Tax for 2019
M&A Tax for 2019M&A Tax for 2019
M&A Tax for 2019Roger Royse
 
199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)Roger Royse
 
Crowdfunding crypto - ic os march 12 2018
Crowdfunding   crypto - ic os march 12 2018Crowdfunding   crypto - ic os march 12 2018
Crowdfunding crypto - ic os march 12 2018Roger Royse
 
Federal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and HatchFederal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and HatchRoger Royse
 
Federal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax WorkshopFederal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax WorkshopRoger Royse
 
Top 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs MakeTop 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs MakeRoger Royse
 
SAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent AllocationsSAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent AllocationsRoger Royse
 
The Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee TestimonyThe Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee TestimonyRoger Royse
 
The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...Roger Royse
 
InBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for AcceleratorInBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for AcceleratorRoger Royse
 
Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)Roger Royse
 
Code Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock SalesCode Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock SalesRoger Royse
 

More from Roger Royse (20)

Startup Law ACBA.pptx
Startup Law ACBA.pptxStartup Law ACBA.pptx
Startup Law ACBA.pptx
 
Startup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptxStartup Legal Imperatives - Royse.pptx
Startup Legal Imperatives - Royse.pptx
 
2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.ppt2020-02-11 Tax Issues for Startups final.ppt
2020-02-11 Tax Issues for Startups final.ppt
 
Funding 101 02022022.pptx
Funding 101 02022022.pptxFunding 101 02022022.pptx
Funding 101 02022022.pptx
 
Royse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptxRoyse - Tax Planning for Technology Transactions.pptx
Royse - Tax Planning for Technology Transactions.pptx
 
Idea to ipo funding 101 royse - august 11 2020
Idea to ipo funding 101   royse - august 11 2020Idea to ipo funding 101   royse - august 11 2020
Idea to ipo funding 101 royse - august 11 2020
 
Idea to ipo venture capital startup royse - may 10 2020
Idea to ipo venture capital startup   royse - may 10 2020Idea to ipo venture capital startup   royse - may 10 2020
Idea to ipo venture capital startup royse - may 10 2020
 
Legal overview star camp royse - may 2020 4839-7571-5260-1
Legal overview star camp   royse - may 2020 4839-7571-5260-1Legal overview star camp   royse - may 2020 4839-7571-5260-1
Legal overview star camp royse - may 2020 4839-7571-5260-1
 
M&A Tax for 2019
M&A Tax for 2019M&A Tax for 2019
M&A Tax for 2019
 
199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)199 a deduction (00186520xc0cb4)
199 a deduction (00186520xc0cb4)
 
Crowdfunding crypto - ic os march 12 2018
Crowdfunding   crypto - ic os march 12 2018Crowdfunding   crypto - ic os march 12 2018
Crowdfunding crypto - ic os march 12 2018
 
Federal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and HatchFederal Tax reform in 2017: Trump, Ryan and Hatch
Federal Tax reform in 2017: Trump, Ryan and Hatch
 
Federal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax WorkshopFederal Fiduciary Income Tax Workshop
Federal Fiduciary Income Tax Workshop
 
Top 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs MakeTop 10 Legal Mistakes Startups & Entrepreneurs Make
Top 10 Legal Mistakes Startups & Entrepreneurs Make
 
SAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent AllocationsSAFEs and LLCs issue re: Contingent Allocations
SAFEs and LLCs issue re: Contingent Allocations
 
The Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee TestimonyThe Future of Farming: Ag Subcommittee Testimony
The Future of Farming: Ag Subcommittee Testimony
 
The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...The Future of Farming: Technological Innovations, Opportunities, and Challeng...
The Future of Farming: Technological Innovations, Opportunities, and Challeng...
 
InBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for AcceleratorInBIA Slides - Legal Issues for Accelerator
InBIA Slides - Legal Issues for Accelerator
 
Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)Current Tax Reform Proposals (2017)
Current Tax Reform Proposals (2017)
 
Code Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock SalesCode Sec.304 Related Party Stock Sales
Code Sec.304 Related Party Stock Sales
 

Recently uploaded

PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 

Legal Challenges for Big Data Companies

  • 1. Satya S. Narayan SNarayan@rroyselaw.com Phone: 650.521.5745 July 29, 2013 Legal Challenges for Big Data Companies
  • 2. Volume 12 tb of tweets converted per day Velocity 5 million trade events analyzed per day to detect fraud Variety 100s of live video feeds monitored to target points of interest Veracity Connecting different data points to facilitate decision making BIG DATA “Big Data is a term that describes large volumes of high velocity, complex, and variable data that requires advanced techniques and technologies to enable the capture, storage, distribution, management, and analysis of the information.” - TechAmerican Foundation.
  • 3.  Data privacy and security  Compliance issues  Service levels  Reliability and other warranties  Indemnification and Limitations of Liability Key Legal Concerns
  • 4.  Personal information “is any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual„s identity, such as name, social security number, date and place of birth, mother„s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." – National Institute of Standards and Technology  Data handling permissions; usage restrictions  End user’s permission  Fair Credit Reporting Act  Consumer’s right to correct personal information  Do Not Track v. Do Not Collect debate  Is de-identification/ anonymization of data done properly to prevent re- identification  Whose privacy policy should apply?  Is Customer’s privacy policy too restrictive?  What permissions does Customer need to obtain from end users? Data Privacy
  • 5.  “Reasonable/ appropriate” security measures – not good enough  Whose privacy policy and security policy should apply?  Customer’s data security questionnaires and data privacy schedules  Security audits  Data security related potential costs and can these costs be shared?  Data security breach costs  Implementation costs of new security measures  Security audit costs  To what extent should Customer be responsible for data security and privacy issues?  Who bears the risk of a “no-fault” breach? Data Security
  • 6.  What is the Provider’s role in data-related compliance?  Data privacy and security  E-discovery and document preservation  Regulatory compliance in specific industries (for example, pharma and automotive industries; banks) Compliance issues
  • 7.  What performance guarantees should a Provider give?  Uptime, throughput, mean-time-to- restore, latency, and bandwidth guarantees  Customer may ask for warranties  Criticality of service to Customer’s end-user interactions  Limitations/ exclusions (for example, Provider’s hosting provider’s failures)  Remedies  Service credits; fixing the issue; contract termination  Are your remedies exclusive?  Is payment of service credits automatic?  Customer duties and responsibilities Service Levels
  • 8.  Warranties  Data accuracy and completeness?  Software performance?  Warranties implied by law  Exclusions  Disclaimer Reliability and Other Warranties
  • 9.  Provider indemnification:  Breach of privacy or security?  Third-party intellectual property infringement?  Customer’s customer issues (for example, from a breach of a service level)?  Exclusions  Should the Customer indemnify the Provider?  Limitations on Provider’s liability:  Consequential damages disclaimer (for example, lost profits of Customer arising from a data security breach)  Caps on liability  Exclusions from liability limitations  Insurance Indemnification & Limitations of Liability
  • 10.  Post-termination transition/ migration assistance  Return of Customer data  Source code/technology escrow  Business continuity/exit plans  Change of control consent/ notice Additional Customer Asks
  • 11. As a Provider, pay close attention to:  obtaining adequate data permissions  proper de-identification/ anonymization of data  specifying a uniform security standard  specifying uniform service levels and remedies  assessing risks and developing a playbook for warranty, indemnity, and liability negotiations; identify your maximum risk undertaking threshold  obtain adequate insurance  watch for new FTC and privacy legislation and guidance Concluding Comments
  • 12. PALO ALTO 1717 Embarcadero Road Palo Alto, CA 94303 LOS ANGELES 11150 Santa Monica Blvd., Suite 1200 Los Angeles, CA 90025 SAN FRANCISCO 135 Main Street, 12th Floor San Francisco, CA 94105 Satya S. Narayan SNarayan@rroyselaw.com Phone: 650.521.5745 Royse Law Practice Areas Corporate Securities Tax Mergers & Acquisitions Fund Services Intellectual Property Technology Transactions Labor & Employment Immigration Litigation Estate, Trust & Wealth Strategy Real Estate International