You are on page 1of 42

A Guide to IT Contracting:

Checklists, Tools and Techniques

By

Michael R. Overly

Matthew A. Karlyn

Companion CD

4812-1128-2702.1
Chapter 1: Non-Disclosure Agreements

Checklist

FORM AND TYPE OF AGREEMENT o Other exceptions


 Company’s form or vendor’s form  Procedure for disclosure for
 Unilateral (one-way) NDA subpoena/court order
 Mutual (two-way) NDA  Opportunity to obtain injunctive relief
 Notification of potential or actual breach
DEFINITIONS  No obligation to disclose
 Precise purpose for NDA  No ownership transfer
 Definition of “Confidential Information”  No removal of proprietary notices
 Protection of intellectual property
GENERAL REQUIREMENTS  Term
 Marking requirements o IP
 Obligation to return and/or destroy o PII
 Obligations of confidentiality o Other protection beyond term
o Reasonable Care  Information handling requirements
o Consistent with internal practices  Encryption/other protection for highly
 Internal disclosure of information sensitive information
o Employees  Residual knowledge
o Agents
o Subcontractors TECHNIQUES
o Others  Avoid use of NDA as final/ongoing
 Exceptions to confidentiality agreement
o No fault or wrongdoing of receiving  Avoid commencement of services before
party definitive agreement
o Received from third party  Receipt of competitor’s information
o Independently developed

4812-1128-2702.1
Chapter 2: Professional Services Agreements

Checklist

PRELIMINARY CONSIDERATIONS o Intellectual property infringement


 Due diligence process o Violation of applicable laws
 Form of Professional Services Agreement o Personal injury and property damage
o Breach of confidentiality
GENERAL REQUIREMENTS o Procedures to permit supplier control
 Term – open ended or limited of claim
 Termination provisions o No settlement without customer
o Material breach of agreement consent
o Insolvency / cessation of business o Exclusion from limitation of liability
o For cause  Limitation of liability
 Acceptance testing o Mutual
o Procedures o Exclude indemnity obligations
o Criteria o Exclude gross negligence and willful
o Remedies at no cost misconduct
o Timeframe for failures to correct o Exclude confidentiality and data
o Payment of fees linked to milestones security breaches
and testing completion o Tie cap to all fees paid under
 Personnel requirements agreement
o Minimum skill requirements  Intellectual property ownership
o Interview process o License to use pre-existing materials
o Naming of key personnel o Who owns IP developed under the
o Replacement procedures; no charge agreement
for overlap and ramp-up o If supplier owns, restrictions on use
o Efforts to ensure consistency of (competitors)
personnel o Identification of third party IP and
o Turnover penalties fees associated with third party IP
o Supplier has sole responsibility for  Change order process
personnel  Confidentiality and information security
 Use and identification of subcontractors o Simple provision (basic information)
 Warranties o Detailed provision (sensitive
o Material compliance of services information)
o Compliance with applicable laws o Information security requirements
o Workmanlike manner depending on nature of data
o Timeliness  Force majeure
o Disabling devices o Ensure proper scope
o No IP owned by third parties o Avoid over broad provisions to
o Compliance with data security and include staffing problems,
privacy laws unavailability of materials and
 Indemnification failure of third parties

4812-1128-2702.1
o Right to terminate o Payment of fees tied to performance
o No payment for services not o Holdback if payment based on
rendered passage of time
 Non-solicitation of supplier’s employees o Travel and expenses tied to
 Insurance tailored to customer’s customer’s policies
requirements o Financial audit rights
 Fees and costs
o All fees expressed in contract, SOW RELATIONSHIP TO OTHER AGREEMENTS
or change order  All contract terms in a single agreement
o Payment schedule for all fees  If multiple agreements, ensure termination
o Fixed fee vs. time and materials rights across agreements
o Overall cap for time and materials  Acceptance testing of services linked to
projects acceptance testing of related software and
o Ensure estimates are accurate hardware
o Specify percent over estimate to be  Limitation of liability caps account for
paid by supplier fees paid across agreements
o Specify percent over estimate to be
share by both parties
o Rate card for future services
o Allocation of taxes (customer pays
only for tax on services received)

4812-1128-2702.1
Chapter 3: Statements of Work

Checklist

PRELIMINARY CONSIDERATIONS o Intellectual property infringement


 Due diligence process o Violation of applicable laws
 Form of Professional Services Agreement o Personal injury and property damage
o Breach of confidentiality
GENERAL REQUIREMENTS o Procedures to permit supplier control
 Term – open ended or limited of claim
 Termination provisions o No settlement without customer
o Material breach of agreement consent
o Insolvency / cessation of business o Exclusion from limitation of liability
o For cause  Limitation of liability
 Acceptance testing o Mutual
o Procedures o Exclude indemnity obligations
o Criteria o Exclude gross negligence and willful
o Remedies at no cost misconduct
o Timeframe for failures to correct o Exclude confidentiality and data
o Payment of fees linked to milestones security breaches
and testing completion o Tie cap to all fees paid under
 Personnel requirements agreement
o Minimum skill requirements  Intellectual property ownership
o Interview process o License to use pre-existing materials
o Naming of key personnel o Who owns IP developed under the
o Replacement procedures; no charge agreement
for overlap and ramp-up o If supplier owns, restrictions on use
o Efforts to ensure consistency of (competitors)
personnel o Identification of third party IP and
o Turnover penalties fees associated with third party IP
o Supplier has sole responsibility for  Change order process
personnel  Confidentiality and information security
 Use and identification of subcontractors o Simple provision (basic information)
 Warranties o Detailed provision (sensitive
o Material compliance of services information)
o Compliance with applicable laws o Information security requirements
o Workmanlike manner depending on nature of data
o Timeliness  Force majeure
o Disabling devices o Ensure proper scope
o No IP owned by third parties o Avoid over broad provisions to
o Compliance with data security and include staffing problems,
privacy laws unavailability of materials and
 Indemnification failure of third parties

4812-1128-2702.1
o Right to terminate o Payment of fees tied to performance
o No payment for services not o Holdback if payment based on
rendered passage of time
 Non-solicitation of supplier’s employees o Travel and expenses tied to
 Insurance tailored to customer’s customer’s policies
requirements o Financial audit rights
 Fees and costs
o All fees expressed in contract, SOW RELATIONSHIP TO OTHER AGREEMENTS
or change order  All contract terms in a single agreement
o Payment schedule for all fees  If multiple agreements, ensure termination
o Fixed fee vs. time and materials rights across agreements
o Overall cap for time and materials  Acceptance testing of services linked to
projects acceptance testing of related software and
o Ensure estimates are accurate hardware
o Specify percent over estimate to be Limitation of liability caps account for fees
paid by supplier paid across agreements
o Specify percent over estimate to be
shared by both parties
o Rate card for future services
o Allocation of taxes (customer pays
only for tax on services received)

4812-1128-2702.1
Chapter 4: Idea Submission Agreements

Checklist

UNDERSTANDING RISK OF SUBMISSIONS


 Determine whether you collect
“submissions”
 Implement an Idea Submission Agreement
 Determine if purchase or license
agreement is required
 No compensation for submissions (unless
provided in an agreement)
 No confidentiality of submissions (except
under an NDA or as required by an Idea
Submission Agreement)
 No submission of ideas without Idea
Submission Agreement (e.g. via email)

KEY PROVISIONS OF IDEA SUBMISSION


AGREEMENT
 Simple agreement or “full blown”
agreement
 No compensation
 No confidential treatment
 Writing requirement
 Demonstration of IP rights
 No obligation to return
 No obligation to provide any confidential
information to the other party
 Ability to contest IP rights in submissions

REVERSE SUBMISSIONS
 Avoid broad feedback provisions

4812-1128-2702.1
Chapter 5: Cloud Computing Agreements

Checklist

SERVICE LEVELS o Indemnification obligations


 Uptime o Infringement of IP rights
 Response time o Breach of advertising / publicity
 Problem response and resolution restrictions
 Remedies  Overall liability cap as a multiple of fees

DATA SECURITY LICENSE / ACCESS GRANT AND FEES


 Protection against security vulnerabilities  Broad permitted use
 Disaster recovery and business continuity  Avoid limitation to internal business
requirements purposes
 Frequency of data backups  Application to affiliates, subsidiaries,
 Use of / return of data outsourcers and others
 Format for return of data  Consider pricing
 Review of security policies
 Physical site visit TERM
 SAS 70 audit  Free ability to terminate
 Limitations on right to use data  Consider limited notice period
 Consider limited termination fee (if
INSURANCE justified by vendor’s upfront costs)
 Cyber liability policy
 Technology errors and omissions WARRANTIES
 Electronic and computer crime  Data security
 Unauthorized computer access  Redundancy / disaster recovery / business
 Avoid only general liability policy continuity
 Performance in accordance with
INDEMNIFICATION specifications
 For breach of confidentiality and security  Services provided timely and in
requirements compliance with best practices
 For infringement claims  Provision of training as needed
 No limitation on types of IP covered  Compliance with laws (both the software
 Consider limitation to U.S. patents and personnel)
 No sharing of client data
LIMITATION OF LIABILITY  Software will not infringe
 Application to both parties  Software will not contain viruses
 Exclusions (from both consequential  No pending / threatened litigation
exclusion and cap on direct damages)  Sufficient authority
o Breaches of confidentiality
o Claims for which the vendor is PUBLICITY / USE OF TRADEMARKS
insured  No media announcement unless agreed

4812-1128-2702.1
 No use of customer marks without
permission
NOTIFICATION FOR SECURITY ISSUES
 Customer gets sole control over
notification
 Reimbursement for costs and expenses

ASSIGNMENT
 Ability to assign freely
 Assignee assumes responsibilities under
the agreement

PRE-AGREEMENT VENDOR DUE


DILIGENCE
 Questionnaire to vendors to include
questions regarding
o Financial condition
o Insurance
o Existing service levels
o Capacity
o Physical and digital security
o Disaster recovery and business
continuity processes
o Redundancy
o Ability to comply with applicable
laws

4812-1128-2702.1
Chapter 6: Joint Marketing Agreements

Checklist

PRE-ENGAGEMENT CONSIDERATIONS o No pending or threatened litigation


 Scope of engagement  Broad warranty disclaimer
 Non-disclosure agreement  No guarantee of revenue (unless
appropriate)
MARKETING OBLIGATIONS
 Exhibit with precise marketing obligations NO AGENCY
 Mutual agreement  Agent relationship not intended
 Responsibility for expenses – shared
LIMITATIONS OF LIABILITY
REFERRAL ARRANGEMENTS  Common limitation of liability exclusions
 Definition of who is a referral o Breaches of confidentiality
 Referral period (anything outside of period o Claims for which the vendor is
is not a referral) insured
 Compensation to referring party o Indemnification obligations
 Audit rights o Infringement of IP rights
 Disclaimer of all other liability
CONFIDENTIALITY
 Protection of all confidential information INDEMNIFICATION
exchanged  Limited to violations of law and misuse of
 Overrides any NDA entered into in pre- IP
engagement
TERM AND TERMINATION
INTELLECTUAL PROPERTY ISSUES  Renewal after stated term
 Any software or products are provided as  Free ability to terminate
is Termination for breach
 Return of software / products at end of
relationship
 Narrow license for any materials or
information shared
 License for use of trademarks and names
 Approval for trademark / name usage
 Reservation of IP rights
 Residual knowledge / feedback clause

WARRANTIES AND DISCLAIMERS


 Basic warranties
o Ability to enter into agreement
o Compliance with applicable laws
Chapter 7: Software Development Kit (SDK) Agreements

Checklist

CONTENT OF SDK
 APIs LIMITATIONS OF LIABILITY
 Sample code  Complete limitation
 Sample documentation  Exclusion of consequential damages
 Other data and information  No recovery of direct damages
 Ensure IP protected  Stop gap if unenforceable

SCOPE OF LICENSE INDEMNIFICATION


 Scope  Developer indemnification of company for
 Internal development all claims against company related to
 Internal testing developer’s use of SDK
 Distributable
 What agreement applies to distribution EXPORT AND IMPORT
 Developer rights  Developer’s compliance with all export
and import laws
OWNERSHIP  Indemnification for claims against
 Company owns SDK materials company
 Modifications and derivatives
ACQUISITION BY FEDERAL GOVERNMENT
 Company ownership of suggestions and
feedback  Protection of IP

CONFIDENTIALITY TERM AND TERMINATION


 Testing of third party software products  Term?
 No representations or warranties as to  Termination for convenience
compatibility Termination for breach / bankruptcy
 Confidentiality of SDK

SUPPORT
 Not generally provided
 If provide, precise obligations
 No representations or warranties with
respect to support services
 As is and as available

WARRANTY DISCLAIMERS
 No warranties
 No liability of company
 As is, as available

4812-1128-2702.1
Chapter 8: OEM Development Agreements

Checklist

CONTENT OF JDA  Commissio


 Avoid joint IP ownership n
 Accounting risk  Revenue
 License and disclosure risk share of OEM product sales
 Disagreement on future direction  Caution
 Threat to pre-existing IP regarding fixed fees
 Third party misuses or infringes
 Liability for co-developer acts CHANGE OF CONTROL
 Only perform services from
SCOPE OF SERVICES agreement
 Define scope of development and services  Change of order approval
 Attached statement of work
OEM CUSTOMER OBLIGATIONS
ACCEPTANCE  State assumptions of agreement
 OEM’s short inspection for deliverables  Include obligations of OEM
 Timely notice or acceptance
MARKETING
OWNERSHIP  Marketing rights and obligations
 One party owns IP, other licenses it  Sales efforts
 Approval for OEM to own IP related to  No direct marketing by OEM
pre-existing IP  License rights to trademarks

EXCHANGE OF IP END USER LICENSE AGREEMENT


 IP provided to/from OEM  Use standard agreement
 Rarely give source code to OEM  Between company and end user
 Provide development services  Insert key provisions

CONFIDENTIALITY AUDIT RIGHTS


 No “poison pill” confidentiality  Company right to audit OEM
 No non-compete provisions  Company right to inspect OEM systems
 Retain right to use feedback from OEM
 Use developed IP without disclosing pre- WARRANTIES
existing confidential information from  OEM not developing similar IP
OEM  Mutually agreeable operation of
deliverables
COMPENSATION, FEES AND REVENUE  Customer modifications
SHARING  Misuse of deliverables
 Clear  Disclaim implied warranties
statement of company compensation  Disclaim express warranties not in
 Service fees agreement
CONTRACT NEGOTIATIONS
SUPPORT AND MAINTENANCE  Review of OEM form by legal counsel
 OEM provides first tier support  Advice of legal counsel
 Company provides second tier support  Business and legal terms negotiated
 Company supports OEM if issues arise contemporaneously
LIMITATION OF LIABILITY  No discussion with OEM lawyers
 Disclaimer  Basic term sheet
 Cap on direct damages  Company creates own redlines
 Misuse of company’s IP excluded  Password-protected documents
 Breaches of confidentiality  Sending documents outside the company
 Willful misconduct  Open provisions by OEM
 Negotiation by telephone
INDEMNIFICATION  E-mail access during telephone
 IP provided by OEM to company negotiations
 Third party IP infringement claims  Discussion of issues internally during
 Breach of agreement negotiation
 Violation of applicable laws
 Negligence
 Wrongful acts by OEM
 Mutual indemnification

TERMINATION
 Uncured breach by OEM
 No substantial misconduct by company
 Brief sell-off period of OEM
Chapter 9: HIPAA Compliance

Checklist

HIPAA/HITECH COMPLIANCE  Contractual binding of subcontractors


 HITECH Act
 Civil and criminal penalties HIPAA SECURITY RULE
 Expanded definition of Bas  Administrative, physical and technical
safeguards
WHO ARE BAS  Specific standards of implementation
 Working on or behalf of CEs  Gap analysis for shortfalls
 Providing PHI data to CEs  HHS recommends technical safeguards
 Vendors contracting with CEs  Subcontractor agreements
 Information security due diligence
FAIL TO COMPLY WITH HIPAA questionnaire
 CMPs: $100-$10,000/violation
 Criminal penalties STATUTORY LIABILITY
 Mandatory HHS investigation and  Amending noncompliant BAAs
assessment  Renegotiate with CEs
 Civil actions by state AGs  BAAs increase in complexity
 Indemnifying CEs
SECURITY BREACH NOTIFICATION  Required notification of breach on
 Must notify CEs of unsecured PHI behalf of CEs
breaches  Responsibility for costs of breach
 CEs must notify individuals  Draft form amendments to BAAs
 CE may need to notify HHS and local  Minimize negotiation terms not
media required by law
 BAs bear burden to prove reasonable  Reflect new obligations of BAs, but
delay in notification protect from liability for subcontractor
 Security breaches of unsecured PHI breaches
include unauthorized acquisition,
access, use or disclosure of PHI ADDITIONAL HIPAA
 Unsecured PHI is not encrypted or REQUIREMENTS
destroyed  Comply
 CEs must notify patients within 60 with new minimum necessary
days after discovery of breach standards
 Date of discovery or date breach  Use of a
should have been discovered limited data set?
 Information BAs provide to CEs  Ongoin
following breach g assessment of what is minimum
 Contractual obligations of BAs to necessary
notify on behalf of CEs  CEs
 Compliance with state laws must account to individuals of
 BAs’ internal policy for notification disclosures from EHR
 Monitor  Insurance covers costs from breach?
developing HHS advice
 No STEPS FOR SECURITY RULE
direct or indirect remunerations to BAs COMPLIANCE
for EHR or PHI  Perform gap analysis
 Making o Administrative safeguards
recommendations for products or o Physical safeguards
services o Technical safeguards
STEPS FOR BREACH NOTIFICATION  Make written policies and procedures
COMPLIANCE for each standard above
 Analyze existing policies and  Seek legal review of policies
procedures  Train employees on requirements
 State breach notification
requirements? AMENDMENT OF BAAs
 Designate person to ensure  Draft template amendments
breach investigation and determine if  CE may conduct due diligence of BA
breach occurred  Negotiate broad indemnification or
 Outside legal counsel cost-allocation provisions
 No unreasonable delay in  Terms in existing service agreements
reporting conflict with BAA?
 Impacted individuals identified  Amend subcontractor agreements
 Impacted individuals reported to
CE INVENTORY HIPAA-RELATED
 Employees trained on reporting POLICIES
breaches and handling PHI  Current policies facilitate compliance?
 Sanctions for employees  Accounting for disclosures made from
 Can BA-controlled PHI be an EHR?
secured?  Minimum necessary
o Encrypted disclosures/limited data set?
o Destroyed  Prohibition on sale of EHRs or PHI?
 Amend existing reporting policies  Conditions on marketing
 Seek outside legal review of communications?
amendments  Training procedures for personnel?
 Risk prevention and mitigation  Review sanctions for employee
strategies violations
 Decrease risk of breach?
Chapter 10: Key Issues and Guiding Principles for
Negotiating a Software License or OEM Agreement
Checklist

INITIAL MATTERS  No access to source code


 Customer executes mutual NDA  Customer must use standard end
 NDA only addresses confidentiality user license agreement
 Use company’s standard license  Licensee has no ownership interest
agreement in company’s software
 Give customer proposed agreement
early PRICING
 Customer should return redline of  Commensurate with scope of license
agreement before negotiation begins granted
 No calls to “talk over the agreement”  No single-price broad licenses
before redlines  Specify uses for software in fixed price
 Respond to customer’s redline with license
company’s redline  Annual maintenance fee
 Accept customer’s revisions or  Major new versions and new software
propose alternative language products
 Show customer’s form to legal counsel  Company retains audit rights
 No negotiating revisions without legal
counsel LIMITATIONS OF LIABILITY
 No discussion of agreement with  Includes exclusion of consequential
customer’s attorneys damages and cap on direct damages
 Create basic term sheet  If mutual, exclude customer misuse of
 Never rely on redlines produced by company software and IP
customer or third party  Cap on company’s overall damages
 Require editable Word documents  Breaches of confidentiality and willful
 Be cautious in mailing documents misconduct exclusions
outside company
 Defer negotiation of open provisions WARRANTIES
 Negotiate telephonically  Requires material compliance with
 Business and legal teams need e-mail company’s documentation
access during negotiations  No longer than 90 days
 Defer negotiation for questions  Exclusive remedy for breach is repair
requiring internal consideration  Implied warranties
 Written warranties not included in
LICENSE/OWNERSHIP SCOPE agreement
 Non-exclusive
 Non-transferable SUPPORT AND MAINTENANCE
 Non-sublicensable  Support vs. maintenance
 No irrevocable licenses  No new versions or new functionality
 Required development activities? in support

4812-1128-2702.1
 No material alterations to standard TERM AND TERMINATION
support program  Consistency between license type
 Priced annually and term of support
 Automatic renewal of support term  Initial term with automatic year-
 No commitment to support after 5 to-year renewal
years  Licenses immediately terminate
 No agreements to provide “free”  Licenses to end users do not
professional services terminate with customer agreement
 Initial fixed fees become “then current  Misuse terminates perpetual
rates” license
 Opportunity to cure before
PAYMENT termination for cause
 Based
on objective and easily identifiable INFRINGEMENT INDEMNIFICATION
event  Company liability unlimited
 Testing/  Legal counsel drafts indemnification
acceptance language reviewed by legal  Company controls defense/settlement
counsel  “Standing alone”
 License  Approved list of countries/jurisdictions
fees not subject to refund
 Monthl
y invoices
 No
fixed fee arrangements

4812-1128-2702.1
Chapter 11: Drafting OEM Agreements (Where the Company is the

OEM)

Checklist

SCOPE OF ENGAGEMENT SUPPORT AND TRAINING


 Agreement covers all relevant activities  Train
 NDA prior to substantive discussions personnel adequately
 Describe coordination efforts  Ensure
 Who will contact customers? supplier cooperation
 “Private label”?  Specify service levels

CUSTOMER TERMS CONFIDENTIALITY


 Controlling liability  Strong clause in agreement
 Appropriate license
 Terms and conditions IP ISSUES
 Absolve of liability  Standard commercial licenses
 Appropriate drafting  Terms and conditions
 Returning products
TERRITORY  Reserve rights explicitly
 Geographic restrictions  No transfer or assignment
 Clear identification of restrictions
WARRANTIES / DISCLAIMERS
HARDWARE PRODUCTS  Authority to enter agreement
 How order will be placed  Non-infringement
 How order will be filled  Free of known defects
 Timing of orders  Unaware of litigation
 Return procedures  Freedom from viruses
 Warranty claims  Freedom from disabling code
 Non-binding order projections  Compliance with relevant codes
 Price reduction incentives
LIMITATIONS OF LIABILITY
EXCLUSIVITY  Direct and consequential damages
 Address exclusivity explicitly  Last three months of fees paid
 Specific revenue commitments  Injury to persons
 Remedy is not breach of contract
 Broad termination rights INDEMNIFICATION
 IP infringement claims
SUPPLIER PRODUCT CHANGES  Supplier violation of applicable law
 Obligation to coordinate with company  Products liability
 IP infringement claims caused by OEM
 Limited jurisdictions

4812-1128-2702.1
TERM AND TERMINATION
 Specific initial term
 Agreement to renew company’s option
 Automatic renewal
 Company right to terminate without cause
 Revenue commitments?
 Breach of agreement
 Sell-off period
 Continue to support existing customers

22

4812-1128-2702.1
Chapter 12: Collecting Basic Deal Information

Checklist

BASIC PRINCIPLES  Vendor uses offshore partners/affiliates?


 Marshal basic information  Vendor uses subcontractors? If so, who?
 Value of proposed transaction?  Location for vendor performance?
 Term of agreement?  Vendor provides hosting services?
 Criticality of technology to business?
 Unique regulatory issues? INTELLECTUAL PROPERTY
 Other foundational information?  Will the customer want to own vendor-
 Circulate a “deal memo” created IP?
 Circulate a “term sheet”  Vendor cannot share with competitors?
 Vendor cannot share with industry?
DESCRIBE THE ENGAGEMENT  Vendor has access to sensitive IP?
 What is the deal about?
 Business advantage from contract? PERSONAL INFORMATION
 Use non-technical English  Vendor
access to personally identifiable
USEFUL LIFE information?
 Anticipated duration of contract  What
 Desired renewal terms information is at risk?
 Duration of services rendered  Financial
 License for years or perpetual? account information?
 Renewal rights  Health
 Costs for renewal information?
 Social
EXPECTED FEES security numbers?
 Compensation to vendor  Legal and
 Breakdown of first year fees regulatory requirements
o License  Transmission across international borders
o Professional services
INFORMATION SECURITY
o Implementation
o Customization  Vendor access to sensitive customer
data?
o Hardware
 Cloud computing based service?
o Telecommunication
 Hosting service?
 If no fees, good faith estimate
 Is vendor sole custodian of customer data?
 When to use customer’s form
UNIQUE ISSUES
PERFORMANCE
 Vendor’s financial situation is suspect
 Customer-facing application?
 Vendor is subject of litigation
 Location for service performance?
 Vendor had recent security breach
 Offshore vendor?

4812-1128-2702.1
 Performance constraints
 Substantial regulatory/compliance issues

24
4812-1128-2702.1
Chapter 13: Reducing Security Risks in Information Technology

Contracts

Checklist

TRADE SECRETS POLICIES AFTER INFRINGEMENT


 Stamp with “CONFIDENTIAL”  Audit rights
 Control physical access  “Phone-home” features
 Use time stamps and ID logs  Swift action upon infringement
 Strong password requirements  Terms for end of license
 Encryption o Uninstall program code
 Firewalls o Destroy electronic copies
 Prohibited use of USB drives o Return physical copies
 Isolate development and testing  Insure against IP infringement
environments
EMPLOYEE TRAINING
COPYRIGHT  Need to
 Establish and communicate policy protect software
 Mark with © symbol  How to
 Mark with year of first publication protect software
 Mark with name of legal owner  Responsibil
 Include textual marking in source code ities for protection during and after
 U.S. copyright registration employment
 Register with U.S. Customs  Exit interviews

JOINT IP CONTRACTUAL PROTECTIONS


 “Clean room” protocols  Proprietary information of former
 Isolate independent IP from joint IP employer
 Assignment
EMBEDDED OPEN SOURCE  Prohibited use or disclosure of
 Policy against embedding open source confidential information
 Advance planning for correct embedding  Noncompete agreements
if at all  Nonsolicitation agreements

INTERNAL PROCEDURES NONEMPLOYEES AND


 Archive copies of each software version SUBCONTRACTORS
 Verify company’s right to use other IP  Confidentiality agreements
 Enforce security policies  Need-to-know basis
 Appropriate use of computers  Work-for-hire agreements
 Appropriate use of mobile devices  Assignment of all IP ownership rights
 Passwords
SOFTWARE DISTRIBUTION
 Only distribute object code, but if not:

4812-1128-2702.1
o Source code obfuscator  Identify installations of software
 Embed signature in code  Retain certification copies for 5 years

LICENSE AGREEMENTS FOREIGN JURISDICTIONS


 End User License Agreement  Distribute with care
 Require acceptance of EULA
 Licensing in writing SOURCE CODE LICENSES
 State clear terms and conditions  Escrow the source code
 No limited liability for misappropriation  Limit release conditions
 Breach results in breach of contract  Prohibit installation on network computer
 Breach results in IP infringement  Licensee keeps copies in locked safe
 Specify narrow uses for IP  Prohibit copying onto removable media
 No selling/transferring embedded software  Limit personnel who can access code
 Prohibit reverse engineering  Third party: require written authorization
 Prohibit decompiling  No competitor access to code
 Prohibit discovering source code  Keep logs of source code
 Prohibit discovering trade secrets  Use no open source software
 Disclosure of accompanying documents  Indemnify company from all infringement
 Explicit statement of confidentiality  Warranties apply to unmodified software
 Prohibit IP rights in derivative works
NDAS  License to company for derivative works
 Standard NDA for initial discussions  Total assignment of all IP is better
 After code delivery, license  Require specific security measures
 Perpetual trade secret confidentiality  Right to audit licensee’s use
 Strict confidentiality requirements
AUDIT RIGHTS  Limited jurisdictions
 Include audit rights  Limited remote access
 Written certification by licensee officer  Risk of a “deemed export”

4812-1128-2702.1
Chapter 14: Web Site Assessment Audits

Checklist

SITE EVALUATION VISITOR UPLOADS


 Target audience?  Submission agreement
 Accessibility to all users?  Visitor accepts liability associated with
 Users in U.S. or abroad? upload
 Process transactions?  Chat/discussion room disclaimers
 Products or services sold? Attorney for Plaintiff
 Forms?  Windermere Holdings, LLC and
 Enter data or access database?  Cross-Defendant Thomas Kinkade
Attorney for Plaintiff
DOMAIN NAMES  Windermere Holdings, LLC and
 Proper registration  Cross-Defendant Thomas Kinkade DMCA
 Proper entity listed as owner requirements
 Trademark due diligence o Permit operator to terminate service
 Search for “cybersquatters” o Do not interfere with protection of IP
 Using domain brokers o Agent to notify if infringement
 File Agent name at Copyright Office
USE OF THIRD PARTY TRADEMARKS
 Written permission prior to use INTERNET LAWS
 Written permission for quotations  Spamming
 Meta tags  Sales
 White text on white background  Advertising
 Microscopic type  COPPA

HYPERLINKS TERMS AND CONDITIONS


 Trademark or logo symbols  Accessible from home page
 Interstitial notice in Terms and Conditions  Accessible by link
 Written linking agreement  Methods to determine visitor assent
 No implicit endorsements o Required online registration
 No representations about linked sites o Required acceptance
 No framing without permission o Prominent notice
 Written permission for deep-linking o Basic notice
 Changes to legal notices
CONTENT  Applicable law and venue
 Development agreement  Arbitration clause
 Agreements with independent contractors
 Employment agreements DATA SECURITY AND PRIVACY
 Other agreements regarding the site  Privacy policy?
 Website has right to use content  Accessible from home page
 Third party content providers  Links to Terms and Conditions
 Photographs  Employees follow policy
 Third party online privacy certification
 Agreement with hosting provider
 Firewall

INSURANCE
 Intellectual property infringement
 Invasion of privacy
 Defamation
 Personally identifiable information
 Protected health information
 Personal financial information
 Misuse of information by site
 Misuse of information by employee

ADDITIONAL CONCERNS
 Record of modifications to T&C
 Copyright notice on site

4812-1128-2702.1
Chapter 15: Critical Considerations for Protecting IP in a Software

Development Environment

Checklist

KEY ISSUES ADMINISTRATIVE SECURITY


 Definitions  Written Privacy Policy
 Risk of contracting  NDAs for personnel with access
 Trade secrets
VENDOR DUE DILIGENCE  Written security plan
 Put vendors on notice  Encryption
 Security standards  Procedures for removable media
o Gramm-Leach-Bliley  Permission settings and restrictions
o HIPAA Security Rule/HITECH Act  Separate networks with respect to access
o FFIEC Guidance  Permanent logs of any access
o States  No unauthorized access to Client Data
o Federal Trade Commission  No installation or removal of programs
 Diligence should cover:  Require reasonable security
o Criminal convictions  Vendors abide by regulatory framework
o Litigation  Document access by Vendors
o Regulatory and enforcement
o Breaches of security TECHNICAL SECURITY
o Breaches of health information  Enable use of firewalls
o Adverse audits  Ensure secure Internet access
o Use of parties outside U.S.  Consider disconnecting computers
 Standardized questionnaire  Encryption
o Corporate responsibility  Procedures for data in transit
o Insurance coverage  Separate testing from production
o Financial condition
o Personnel practices PERSONNEL SECURITY
o Information security policies  All aware of security requirements
o Physical security  Client can request removal of personnel
o Logical security  Pre-screening
o Disaster recovery  Control over access
 Business continuity  Review of materials taken outside

TREATMENT OF DATA SUBCONTRACTORS


 Maintain data as confidential  Identified
in writing
 Liability for unauthorized disclosures
 Client right
 No data removed by Vendor
to approve/reject
 Vendor
accepts liability

4812-1128-2702.1
 Mirror PSA  Employees follow policy
 Third party online privacy certification
SCAN FOR THREATS  Agreement with hosting provider
 Prohibit install  Firewall
 Accessible by link
 Methods to determine visitor assent INSURANCE
o Required online registration  Intellectual property infringement
o Required acceptance  Invasion of privacy
o Prominent notice  Defamation
o Basic notice  Personally identifiable information
 Changes to legal notices  Protected health information
 Applicable law and venue  Personal financial information
 Arbitration clause  Misuse of information by site
 Misuse of information by employee
DATA SECURITY AND PRIVACY
 Privacy policy? ADDITIONAL CONCERNS
 Accessible from home page  Record of modifications to T&C
 Links to Terms and Conditions  Copyright notice on site

4812-1128-2702.1
Chapter 16: Click-Wrap, Shrink-Wrap, and Web-Wrap Agreements

Checklist

WHERE’S THE AGREEMENT o No remedy for misuse of


 Identify all relevant contract terms confidential information
 Keep accurate copies of the agreements  Beware broad audit rights
 Record the date of acceptance o Abusive audits
o Contingent fee audits
RISKS AND ISSUES o Access to company facilities and
 Business assessment of risks posed systems without adequate contractual
 Understand as-is nature of software or protections
service o Access by undefined third party
o No warranties agents of vendor
o No indemnities  Assess risks of use of resellers
o Very limited liability, if any, for the o Additional contract to review
vendor o Splitting of responsibility
 Customer has unlimited liability for both o Potential finger pointing between
direct and consequential damages vendor and reseller
 Identify contractual provisions that could
place customer intellectual property at risk TECHNIQUES
o Feedback clauses  Blind Acceptance
o Train personnel not to reveal or  Knowing Acceptance
disclose proprietary information or o Identify all terms
intellectual property o Conduct brief review and assessment
 Avoid placing sensitive information at risk o Adequately document
o No confidentiality protection  Mitigation
o No real liability for breaching o Process for review
confidentiality o Development of form amendment
Chapter 17: Transactions Involving Financial Services Companies as

the Customer

Checklist

FORM AND TYPE OF AGREEMENT o Audit rights


 Company’s form or vendor’s form o Testing, including penetration testing
o Right to SAS 70 Type II or similar
DEFINITIONS audits (e.g., SSAE 16)
 Definition of “Confidential Information” o Requirements for secure deletion and
o Personally identifiable information data removal
o Trading and account information  Background checks
o “Insider information”  Indemnification for breach of
 Definition of “aggregated data,” if confidentiality.
applicable.  Breaches of confidentiality and
indemnifications obligations excluded
GENERAL REQUIREMENTS from limitations of liability.
 Include all standard requirements  Audit rights
discussed elsewhere in this book for the o Security
particular type of contract under o Contract performance
consideration o Confirm charges and fees
 Strong confidentiality clause o Regulators
o Perpetual protection for personal  Termination for regulatory issues
information  Reject vendor audit rights in favor of
o Ongoing protection for trade secrets offsite record review
 Compliance with customer’s privacy  Review pricing and tying arrangements
policy, including updates between and among products and services
 Control over notices for data breaches  Compliance of software and services with
o Reimbursement for costs, notice, relevant laws and regulations
investigation, identity theft insurance o Right to updates without charge
 Avoid data aggregation rights  Limit subcontractors
o Obligation to cleanse/scrub the data o Offshore
o As-is o Due diligence
o Indemnity for failure to cleanse and o Potential separate NDA
all use of data
 Information security TECHNIQUES
o Best industry practices  Be ready to explain the unique legal and
o Compliance with applicable laws and regulatory requirements
regulations  Be familiar with the FFIEC Handbook
o Prompt reporting of potential or  Review checklist of regulatory
actual breaches considerations at the end of this chapter
o Maintain and provide log files and  Make your own checklist of key issues
other forensic evidence
Chapter 18: Maintenance and Support Agreements

Checklist

FEE PREDICTABILITY AVAILABILITY


 Price Locked for a Fixed Term  Support available 24/7 if needed
 After Rate of Price Increases Capped at
CPI PROBLEM ESCALATION
 Support Escalation Matrix
TERM
 Minimum Period of Support SERVICE LEVELS
 Escalation Matrix Response Time Service
TERMINATION AND RESUMPTION OF Level
SUPPORT  Service Credits for Service Level Failures
 Ability to Resume Support After Earlier
Expiration or Termination LIMITATIONS OF LIABILITY

SPECIFICATIONS
 Support Obligations Tied to
“Specifications” Rather Than
“Documentation”
Chapter 19: Source Code Escrow Agreements

Checklist

WHAT TYPE OF ESCROW?  Identify all relevant fees and the


 Two Party responsible party
 Three Party  Include right to request verification
 Self-Escrow services from the escrow
o Include cost shifting to vendor if
RELEASE CONDITIONS verification fails
 Insolvency of vendor  On the occurrence of a release condition,
 Filing of voluntary or involuntary include right for customer to use and
bankruptcy proceedings that remain modify the software to provide its own
undismissed support
 General assignment for the benefit of
creditors TECHNIQUES
 Ceasing to provide support and  In critical applications, include right for
maintenance services the customer to use a consultant to verify
 Breach of the license agreement. the source code is well written and
documented.
KEY ISSUES TO BE ADDRESSED IN o Non-Disclosure Agreement with
SOFTWARE LICENSE consultant
 Requirement that source code be escrowed o Termination right for customer in the
 Identify approved escrow agent event of adverse findings
 Definition of “source code”  Consider requiring the vendor to deposit
 Identify release conditions names and contact information of key
 Require vendor to update the source code developers in the escrow.
to reflect current version of the software  Ensure the escrow company is well
established and financial viable.
Chapter 20: Integrating Information Security Into the Contracting

Life-Cycle

Checklist

USE THE THREE TOOLS FOR BETTER o All reasonable measures to secure
INTEGRATING INFORMATION SECURITY and defend systems
INTO THE CONTRACT LIFE-CYCLE o Use of industry standard anti-virus
software
 Pre-Contract Due Diligence o Vulnerability testing
 Key Contractual Protections o Immediate reporting of actual or
 Information Security Requirements suspected breaches
Exhibit o Participation in joint audits
o Participation in regulatory reviews
PRE-CONTRACT DUE DILIGENCE  Indemnity against claims, damages, costs
 Develop a Form Due Diligence arising from a breach of security
Questionnaire  Responsibility for costs associated with
 Ensure the Questionnaire covers all key providing breach notifications to
areas consumers; control of timing and content
 Use the Questionnaire as an early means of notice
of identifying security issues  Forensic Assistance
 Use the Questionnaire to conduct an o Duty to preserve evidence
“apples-to-apples” comparison of o Duty to cooperate in investigations
prospective vendors o Duty to share information
 Audit Rights
KEY CONTRACTUAL PROTECTIONS o Periodic audits to confirm
 Fully Fleshed-Out Confidentiality Clause compliance with the agreement and
 Warranties applicable law
o Compliance with best industry o Provision of any SAS 70 or similar
practices; Specify the relevant audits
industry  Limitation of Liability should exclude
o Compliance with applicable laws and breaches of confidentiality from all
regulations (e.g., HIPAA, GLB, etc.) limitations and exclusions of liability
o Compliance with third party  Post-Contract Policing
standards (e.g., PCI DSS, Payment
Application Data Security Standard). INFORMATION SECURITY
o Compliance with customer’s privacy REQUIREMENTS EXHIBIT
policy.  Where appropriate, develop an exhibit,
o Prohibition against making data statement of work, or other contract
available offshore attachment describing specific required
o Responses to Due Diligence information security measures
Questionnaire are true and correct  Use of wireless networks
 General Security Obligations  Removable media
 Encryption
 Firewalls
 Physical security
Chapter 21: Software Development Kit Agreements

Checklist

KEY CONTRACTUAL PROTECTIONS -- o Include failsafe language to limit all


LICENSORS damages
 Think through what should be included in  The licensee should indemnify the licensor
the SDK and clearly define it. from any and all damages that may flow
o Provide no more intellectual property from the licensee’s use of the SDK
than is necessary  The licensee should be liable for
o Be cautious about disclosing trade compliance with all applicable import and
secret information export laws
 Define the scope of the license being  Include language to prevent intellectual
granted property issues in licenses to the
o Consider identifying the permitted government
licensee products and services for  Address term and termination
which the SDK may be used. o In general, termination for
 The licensor’s intellectual property should convenience should be included in
be clearly protected. all SDK Agreements.
o Licensor should own all rights in the
SDK and any derivative works based KEY CONTRACTUAL PROTECTIONS --
on the SDK LICENSEES
o Include a “feedback” clause  The agreement should make clear whether
 Include a strong confidentiality clause any fees are contemplated. If not, the
o Typically only protects the licensor’s agreement should state no fees are due.
information  Beware of wide-ranging audit rights for
 Consider including a compatibility testing the licensor, particularly when the
requirement agreement contains no substantive
o Define how testing will proceed confidentiality protections.
o Consider a seal or certification  All provisions relating to intellectual
program for the licensee’s products property ownership should be reviewed to
and services determine whether they pose a threat to the
o Avoid liability to the licensee’s licensee’s intellectual property
customers by requiring the licensee
to disclaim the licensor’s liability to
the customers
o Protect the licensor’s trademarks
 Include any applicable support obligations
 Disclaim all express and implied
warranties
 Disclaim all liability

4812-1128-2702.1
Chapter 22: Distribution Agreements

Checklist

LICENSE GRANT  Ensure that distributor cannot misrepresent


 Consider necessity and scope or otherwise make false statements
o Exclusivity regarding product
o Territorial limitation
o Hybrid of exclusive and territory PRODUCT PRICING
o Quotas  Determine price of product and royalty
 Reservation clause payments
 Non-Competition clause  Collecting fees
 Intellectual property license o Initial license
 Termination in the event of a breach o Add-on services
o Subscriptions
END USER LICENSE AGREEMENT  Shipping costs and taxes
 Which agreement will govern use of  Expenses incurred in distribution
distributed product  Invoicing and collection of fees
 Process for getting agreement to customer  Distributor’s periodic reports:
 Who may accept agreement on o Sales
manufacturer’s behalf o Marketing
 Who owns the customer that purchases the o Audit payments
product  Maintain records after termination of
distribution agreement
DEVELOPMENT OF THE PRODUCT
 Identify parties’ representatives CONFIDENTIALITY
 Describe process for setting meetings
 Draft development plan with technical TERM OF AGREEMENT
aspects of product design  Ensure survivorship of certain contractual
 Agree ahead of time how parties will clauses
allocate expenses o Warranties
o Indemnification
OBLIGATIONS OF THE PARTIES o Risk of Loss
 Distribution and sale of the product o Limitation of Liability
 Training distributor’s employees o Intellectual Property
 Customer support
 Marketing of product
o Marketing materials
o Marketing plans
o Press releases
 Assign primary marketing contact for each
party
Chapter 23: Data Agreements

Checklist

KEY CONTRACTUAL PROTECTIONS  Warranties


 Include basic contractual protections o Rights to grant the license
common to all technology agreements o The vendor has no knowledge of
o Confidentiality infringement claims
o Limitation of liability o Reasonable efforts to ensure
o Termination rights timeliness and accuracy of data
 Ensure the scope of the license is broad o Reasonable efforts to notify the
enough to include all intended uses, both customer of known errors in the data
those existing at the time the contract is  Include an indemnification against
signed and reasonably anticipated in the infringement claims based on the
future customer’s licensed use of the data
 Pre-negotiate fees for increasing the scope  Negotiate broad termination rights,
of the license including termination for convenience,
 Avoid overreaching audit rights wherever possible
o Limit frequency of audits  The contract should specify the manner
o Limit the type of records that can be and format of delivery for the data
reviewed  The customer should ensure it has the
o Limit the duration of the audit unilateral right to renew the contract for at
o Include protections relating to third least a few years
party audits (e.g., require auditors to  The agreement should include price
sign an NDA and to be mutually protection for the initial term and first few
agreed upon by the parties). renewal terms
o Limit costs recoverable for third
party auditors
o Reject requests from the vendor to
recover internal personnel costs

4812-1128-2702.1
Chapter 24: Service Level Agreements

Checklist

COMMON PROVISIONS IN TERMS &  Performance credits


CONDITIONS o Specify amount or percentage
 Root Cause Analysis o Total category allocation pools
o Identify reasons for failure o Specify parameters, including timing
o Develop Corrective Action Plan and notice requirements
o Implement preventative corrections  Presumptive Service Levels
 Cost and efficiency reviews  Exceptions to Service Levels
 Continuous improvements to Service  Supplier responsibilities
Levels  Additions, deletions, and modifications to
 Termination for failure to meet Service Service Levels
Levels  “Earnback” of performance credits
 Cooperation  Map the form of Service Levels. Include:
o Title
COMMON PROVISIONS IN SERVICE o Measurement window
LEVEL AGREEMENTS AND o Actual Service Level or Expected
ATTACHMENTS and Minimum Service Levels
 Measurement window o Calculation for how Service Level is
 Reporting requirements derived
 Maximum monthly at-risk amount
Chapter 25: Critical Considerations For Records Management And

Retention

Checklist

SCOPE ELECTRONIC RECORDS


 Applicability to all types and formats of  Authorized storage locations
records  Retention, archiving and destruction of e-
 Applicability to all affiliates, divisions and mails
business units  Retention, archiving and destruction of
 Risk assessment voicemail
 Third-party contractors and outsourcers  Security and encryption where required
 Active vs. inactive records (e.g. protected health information,
sensitive financial information, laptops
RETENTION SCHEDULE and removable media, etc.)
 Detailed list of records categories
 Employee surveys and interviews ADMINISTRATION
 Organized by department/business unit  Designated records manager
 Retention periods based on applicable law  Input and approval by Board and senior
 Retention periods based on operational management
needs  Confidentiality of employee personnel and
 Retention periods based on statutes of medical records
limitation  Approved methods for destroying paper
 Citations to applicable laws and electronic records
 Periodic (e.g. annual) review and update  Procedures for distribution to and training
of employees
LITIGATION HOLDS  Auditing compliance with the policy
 Responsibility for issuing litigation holds  Off-site storage of inactive paper records
 Litigation hold notice
 IT department involvement in litigation
hold process
 Notification of outside vendors and
outside counsel
 Employees obligated to notify
management of pending or foreseeable
claims
 Termination of litigation hold
 E-discovery procedures
 Data map
Chapter 26: Website Development Agreements

Checklist

CRITERIA TO CONSIDER WHEN  Consequences if “check point” not met:


SELECTING A WEBSITE DEVELOPER o Extension
 Developer’s experience and qualifications o Monetary penalties
 Identify parties and their relationship o Termination
 Extent of allowable subcontracting o Delay
 Whether to include both designing and o Acceleration
hosting
 Implications of co-branding or joint TERM AND TERMINATION
development  Initial Term
 Maintenance, hosting, and co-location
BASIC OBJECTIVES services
 Specifications for website  Requirements for developer:
o Statements of work o Return company property
o Technology and equipment to be o Transfer software to company
supplied o Turn over documents
 Change management process o Confidentiality assurances
 List competing websites and extent to o Receipts for reimbursements
which your website is based on them  Final statement from developer and
 Required functions company that work was completed
 Maintenance and updating requirements  Termination without consent for material
 Define developer rights of access breach of contract

INTELLECTUAL PROPERTY OWNERSHIP OTHER PROVISIONS


 Obtain proper licenses and assignments  Fees, charges and expenses
 Project management
SOFTWARE REQUIREMENTS  Acceptance testing
 Ensure “open use” software  Warranties
 Determine rights to software, and whether  Identifications
to sublicense or separately license  Content of website
 Acquire disclosures from developer  Linking issues
 Identify who owns the software  Insurance
 Address disabling devices  Reports, records, and audits
 Training, education, and troubleshooting
SCHEDULES AND TIMETABLES
 Disputes
 Start date
 Trademarks and copyright
 Anticipated termination date
 Privacy
 Intermediate “check points”
 Terms of use
 Process for modifying schedule
Chapter 27: Social Media Policies

Checklist

KEY STEPS  Set guidelines for outbound


 Understand your company’s need for a communications. Employees should:
Social Media policy. o Exercise care in drafting all
 Acknowledge that the definition of Social communications, whether personal
Media is a moving target – so define the or professional. Pause before
term broadly. posting.
 Describe the overall scope of the Social o Never post inappropriate content.
Media policy and how it relates to other o In general, employees should not
company policies. hold themselves out as representative
 Set guidelines for internal computer use of company when posting Social
generally. Employees should know that: Media content.
o If it is done on a work machine, it o Establish approval and moderating
belongs to the company. process for employees who wish to
o Content produced on work machines hold selves out as representative of
is not private. company (e.g., writing a
o Content may be monitored. professional blog).
 Employees should ask questions, and
ultimately sign the policy.
Chapter 28: Software License Agreements

Checklist

ASK YOURSELF: o Prohibition on right to assign


 Business purpose and goals
 Criticality
 Fees and costs
 Implementation time

TERMS TO INCLUDE
 License and Restrictions
 Acceptance testing
 Third party software
 Fees
 Warranties
 Indemnification
 Limitation of liability
 Specifications
 Confidentiality and security
 Maintenance and support
 Announcements and publicity
 Term and termination
 Additional terms:
o Force majeure

You might also like