Posted

There is no doubt cloud computing has delivered multiple benefits to the IT organization. However, without proper management and controls, these benefits could become a non-trivial expense to the organization. In a Wall Street Journal article earlier this year The Hidden Waste and Expense of Cloud Computing, Clint Boulton outlines the pitfalls of buying too much and not tightly controlling what is bought. ISG just released a Cloud Comparison Index which is described in Stanton Jones’ blog posting and makes many of the same points.

As Boulton rightly points out, after the cloud purchase is made, another big cost management opportunity remains: managing demand and shutting down compute resources when they’re not being used. Paying for unused resources can turn a good financial decision into a bad one.

Continue reading

Posted

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the term “export” in each agency’s regulations to allow cloud storage of information in servers located in foreign countries if the information is appropriately encrypted. These changes, if ultimately adopted, would substantially alleviate concerns that companies seeking to take advantage of the efficiencies of cloud computing could run afoul of export controls. However, it would still be important for cloud users and cloud storage providers to ensure that appropriate encryption is being used.

For more information, please see our Client Alert, Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data.

Posted

This is the second of two postings that discuss SaaS pricing. In the earlier posting, we discussed the underlying economics of SaaS solutions and their implications for how SaaS services are priced. This posting identifies some key considerations in negotiating pricing for SaaS services that can help lower total subscription costs.

Committed Growth vs. Incremental Purchases

As a general matter, the higher the volume you commit upfront to a SaaS provider over the contract term, the higher the discount you can negotiate. However, this carries a risk that your projected growth may not materialize and you’ll wind up paying for a higher volume of service than you need. As a result, it is important to use the negotiation process to assess the level of upfront commitment to future growth that achieves the optimal balance between high discount levels and the risk of paying for more than you need.

Continue reading

Posted

Software as a Service (SaaS) is growing rapidly as an alternative to licensing on-premises software for corporate customers. As reported by Forbes earlier this year, analysts are forecasting that global SaaS revenues will reach $10.6B in 2016, representing a 21% increase over projected 2015 spending levels. By 2018, 27.8% of the worldwide enterprise applications market is projected to be SaaS based.

SaaS solutions are attractive to customers because they substantially reduce the upfront investment and risk associated with licensing and implementing on-premises software and avoid the ongoing costs of maintaining the infrastructure and implementing upgrades for the licensed software. In a SaaS solution, those costs and risks are transferred to the supplier.

SaaS combines elements of software licensing, outsourcing and hosting into an integrated solution. The pricing models for SaaS solutions have certain distinct characteristics that are driven by the economics of those solutions and differentiate SaaS pricing from pricing models for software licensing, outsourcing and hosting services.

Posted

As more and more companies of all sizes ranging across a wide spectrum of industries have been exposed to network and data security breaches in recent years, the market for insurance products dedicated to cover cyber risks has grown just as fast. With policies sold under names like “cyberinsurance,” “privacy breach insurance,” “media liability insurance” and “network security insurance,” the market for this coverage often seems chaotic, with premiums and terms varying dramatically from one insurer to the next.

For more information, please read our Client Alert.

Posted

By Richard E. Nielsen


On May 15, 2015, the New York Department of Taxation and Finance determined in Advisory Opinion TSB-A-15(2)S that the sale of certain cloud computing services were not subject to New York State sales and use tax.  The Advisory Opinion is noteworthy because of the Department’s position on the taxability of licensing prewritten software. 

  1. The Opinion was based on the unique facts of the taxpayer. The taxpayer (“Supplier”) offered Software as a Service (“SaaS”).  No specific servers of the Supplier were dedicated to any particular customer, the customers had no physical access to the servers, and the Supplier decided which of its servers would be used for each customer.  Customers were not charged by the Supplier for operating system software, and all charges were based on hourly rates and the amount of computing power consumed.  Customers were not charged any fixed fees for the service.

Posted

You’ve managed to agree the deal; all that’s left is to sign the documents.  That’s the easy bit, correct?  So you might think, but it is important to be careful not to slip up at this final stage, particularly when contracting with foreign entities and considering using electronic signatures.

Which law applies when contracting with overseas entities?

In the recent case of Integral Petroleum SA v Scu-Finanz AG [2015] EWCA Civ 144 the English Court of Appeal considered whether a supply contract governed by English law and entered into by two Swiss oil companies was binding.  The defendant successfully argued that the contract was not binding as it had been signed only by one representative of the Swiss company, rather than two representatives, as required by Swiss law.

Posted

As the range of technology employed by the UK’s leading banks widens, the balance between cost-effectiveness and manageability of solutions becomes increasingly difficult to strike. 

Background

The banking sector in the UK has grown significantly through acquisition and amalgamation. The result is a market dominated by banking groups, which have not yet had the time, finances or inclination to set about harmonising the underlying IT infrastructure of their respective component parts. The table below highlights some of the key retail bank elements of the UK’s major clearing banks, alongside which it is necessary to consider the various additional investment bank, private client, credit card and other major business unit components that sit within the same group.

Posted

Part 2: How are Limits of Liability Evolving, with Respect to the Issue of Data Breaches?

Ten years ago, most “buyers/customers” expected their suppliers to absorb unlimited contractual liability if the supplier was responsible for a breach affecting the customer’s data. Today, while customers may continue to insist upon such a position at the beginning of negotiations, they frequently expect that market-leading suppliers will ask for some sort of limit to the supplier’s potential liability for data breaches.

When customers are forced to negotiate a liability cap applicable to breaches of data (including PII and PHI), they usually insist that such liability cap be an amount that is greater than the “standard” limit of liability under the Agreement (i.e., greater than the standard financial cap applicable other contract breaches).

Posted

Part 1: Contractual Protections With Respect to Data Breaches

Given the unrelenting, it seems, news reports of cyber attacks and data breaches affecting customer records and data, the issue of what are the appropriate contractual provisions that should govern data breaches in a contract between customers and suppliers remains timely, sticky, and constantly-evolving. Below are several observations regarding contractual language and protections with respect to data breaches, where a supplier has access to and/or could cause or allow a customer’s data to be breached.

  • Customers continue to insist upon strict terms and conditions requiring their suppliers to protect the customer’s confidential information, including with respect to the customer’s (i) data (i.e., information stored in equipment and software), (ii) Personally Identifiable Information (PII), and (iii) Protected Health Information (PHI).