SLA Webinar: Setting Expectations in SaaS

Dan Rhynhart and Lisa Casey Spaniel, attorneys with Blank Rome LLP, lead this webinar analyzing the components of a SaaS Service Level Agreement (SLA) in context with case studies of SIIA members who have encountered difficult issues that could be managed through the SLA, with recommendations for resolving and proactively avoiding such situations.

NaviSite Case Study Presenters:
Jeff Johnson, Sr. Director of Professional Services
William Toll, Sr. Director of Marketing & Strategic Alliances

Clickability Case Study Presenter:
Tom Cignarella, VP of TechOps

NaviSite Case Study: Jeff Johnson and William Toll will discuss a contract for an enterprise SaaS provider that required the development of agreements that spanned multiple internal business groups. The demands on NaviSite’s SLA’s were not only difficult to manage, but also difficult to measure. You’ll hear how they negotitated and delivered on the SLA’s required to close the opportunity and manage their ongoing service needs.

Clickability Case Study: Clickability, the global leader in on demand Web Content Management delivers mission critical web sites for a wide range of customers. VP of Technical Operations and Support, Tom Cignarella will discuss the SLA’s in place to satisfy these customers. Tom will review the background for creating the SLA’s for system availability and support, challenges faced and how it has been successfully implemented.

To advance the slides, use the arrow buttons below.

GSA Presentation on the Federal Cloud Computing Initiative

United States Government is the world’s largest consumer of information technology, spending over $76 billion annually on more than 10,000 different systems. In September 2009, the Federal Government launched the Cloud Computing Initiative and Apps.gov to streamline application adoption of cloud computing at Federal agencies. Since that time, Apps.gov has served as the Federal agency storefront for approved cloud computing applications, including business applications, cloud services, productivity apps and social media software.

While these steps have helped to speed-up Federal deployment of cloud computing, many small and medium-sized companies are still struggling to understand and capitalize on the opportunities presented by the Government’s embrace of cloud computing. In this webinar Matthew Goodrich, Project Manager for FedRAMP and Apps.gov, will outline the Cloud Computing strategy, how companies can get on the GSA schedule and participate via Apps.gov, as well as additional initiatives underway to further streamline the difficult procurement process that should make it easier for small and medium-sized companies to participate.

In this webinar you will hear from the GSA as they outline their Cloud Computing strategy, including Apps.gov, getting on the GSA schedule and more.

Speaker:
Matthew Goodrich
Project Manager, FedRAMP and Apps.gov
General Services Administration

Moderator:
Morris Panner
Chief Executive Officer
TownFlier, Inc.

To advance the slides, use the arrow buttons below.

Setting Expectations in SaaS: New SLA resource available for SIIA members!

Download: Setting Expectations in SaaS
(Available to SIIA Members only. If you are having trouble logging in, please let me know)

The sample SLA has been one of the Software Division’s most requested resources since 2007, so we’re thrilled to announce the 2010 update!

For more information on Service Level Agreements and to engage directly with the authors, check out our follow-up webinars!

June 3, 2010 | Service Level Agreements in SaaS: Handling Issues As They Arise
June 24, 2010 | Software Customization Projects: Your Contract May Not Be As Good As You Think

About the Authors

Daniel E. Rhynhart provides legal counsel to clients on a wide range of business issues. He specializes in resolving disputes arising from software development, design, implementation, integration, maintenance, support, disaster recovery, and other intellectual property issues.

Lisa Casey Spaniel concentrates her practice in intellectual property matters, software and technology licensing, technology and business agreements and transactions, electronic commerce and privacy issues, and promotions law. She specializes in software and web site development, design, implementation, integration, maintenance and support, disaster recovery and source code escrow agreements and related outsourcing, hosting, application service provider, OEM, resale and other sourcing and distribution agreements and models.

About Blank Rome LLP

Blank Rome LLP is one of America’s largest law firms. With more than 500 attorneys serving clients across the globe, Blank Rome is an international law firm representing businesses and organizations ranging from Fortune 500 companies to start-up entities. Blank Rome helps its clients in all aspects of their businesses. The Firm’s practices cover areas including business tax; commercial and corporate litigation; employment benefits and labor; financial services; bankruptcy and financial restructuring; government relations; health law; intellectual property; maritime, international trade and procurement; matrimonial; mergers & acquisitions and private equity; product liability; public companies and capital formation; public finance; real estate; trusts and estates; and white collar, internal and government investigations. Blank Rome also represents pro bono clients in a wide variety of cases and matters. More information about the firm is available at www.blankrome.com.

Social Networking surge highlights need for diligence around the basics of online security

Recent headlines involving RockYou.com’s lack of simple password requirements and Twitter’s password phishing scams help remind us that no matter how advanced technology gets we can never forget the basic fundamentals of security.

The RockYou.com issues brought to light two big things. First, the lack of security controls in place within RockYou.com’s own systems starting with passwords being stored in clear text. Second, the lack of requiring people to choose somewhat difficult passwords allowed people to put in extremely simple passwords like “12345”. Of course storing the passwords in clear text trumps the use of simple passwords, since anyone within RockYou.com, or in this case, someone able to break into the systems now has all of the passwords regardless of how simple or complex they are. What I pull out of this, besides the complete disregard for security controls at all is that if you allow people to make poor judgment decisions, they will.

Twitter recently sent an email to several users of the system telling them that Twitter had reset their password because of concern that it had been compromised due to a phishing scam. That was very nice of Twitter to take the proactive approach of contacting its users and letting them know, but their email looked like a phishing attack itself. The email was nice enough to even contain links sending people to password reset page. Again, allow people to make poor judgment decisions and they will. In this case it’s all legitimate, but next time it’s going to be an email sent from someone other than Twitter, and include links that look like helpful Twitter links, but will in fact be another phishing attack. Twitter is helping perpetuate its own issue….and people will click on the links.

So that brings me back to never forgetting the basic fundamentals of security. Everyone has to protect themselves. We are all very comfortable using computers and surfing the web, and with that comfort comes complacency. We all need to take the time to think about what it is we’re putting on the web, and take the extra steps to make sure we protect ourselves by using complex passwords, different passwords on different web sites, and changing our passwords frequently. No matter how advanced technology becomes, no matter how safe a site looks, or how comfortable we are with sites we go to the only thing protecting everything we put on the web is still a simple password.

David Lingenfelter is the Information Security Officer at Fiberlink. He is also a contributor to the MeVolution Blog. David can be reached at dlingenfelter@fiberlink.com.

Cloud Security Webinar

Security and Cloud Computing have come a long way in just a few years. Understanding these issues becomes vital as Cloud Computing expands into government and the large enterprise. New trends — like the emergence of private clouds — are changing the way companies think about their security strategy. In this webinar, you’ll hear persepectives from service providers, platforms, pure-play firms, and other players in the Cloud Security space.

Moderator:
Lars Ewe, Chief Technology Officer, Cenzic
Panelists:
Deb Banerjee, Director of Engineering, Symantec
Jim Cavalieri, Chief Security Officer, Salesforce
Steve Riley, Sr. Technical Program Manager, Amazon Web Services