This course will give non-lawyers an overview of some of the legal issues typically raised by contracts with outsourced service providers and cloud computing companies for Australian organisations. It is designed specifically for information security practitioners to help them identify possible issues but will be of interest to procurement teams and others with any involvement with negotiating or assessing the risks involved with entering third party technology contracts.
A lot has been written about out-sourcing and computing contracts and this course will synthesise this available information, together with the presenter’s own experiences in contract negotiations. Common contractual issues – such as caps on liability, service levels, records management, termination rights and end of term arrangements – will be considered, together with issues raised specifically by these sorts of contracts including vendor due diligence, audit rights, data ownership, data sovereignty and sub contract and assignment rights. Particular attention will be given to service level agreements and transition out provisions.
Please note: We have a separate course which focuses on privacy issues in cloud contracts Cloud Computing Contracts: Privacy Acts Compliance
- 2.5-hours of tuition
- 100% up-to-date material
- Comprehensive course notes including additional reference materials
- Interactive training session
To participate in the session you will require a computer, headset and a good internet connection. Once your registration has been confirmed, we will forward you the link to the session.
This on-line course covers the following:
- Contract law basics
- Pre-contractual considerations
- Jurisdiction & governing law
- Service levels
- Liability and indemnity provisions
- Data ownership and sovereignty
- Forensics, discovery and FOI obligations
- Record Management
- End of term arrangements
This course is directed at technology and information security professionals. It should also be of interest to procurement teams and anyone involved in making technology purchase decisions. It is of relevance to risk managers, auditors, internal legal counsel and anyone interested in understanding and managing risk from the supply chain.
Presenter - Dr Jodie Siganto
Jodie Siganto graduated as a lawyer from the University of Queensland and after 8 years in private practice became in-house counsel for Tandem Computers followed by roles with Unisys Asia and Dell based in Singapore. She returned to Australia in 2000, co-founding Bridge Point Communications (specialists in data networking and security). She is currently a director of IT Security Training Australia, an (ISC)² educational affiliate, specializing in the delivery and development of privacy, IT security and network related training courses around Australia. She is also a partner in technology law firm Ringrose Siganto. Jodie has completed a PhD at QUT which examined the Privacy Commissioner’s exercise of powers in relation to NPP 4 (now APP 11) and the extent to which that is supportive of industry practice. Jodie is a regular speaker at industry events and a keen researcher participating in projects such as the mapping of some of the unique traits of information security practitioners in Australia and investigating the Australian cyber security skills shortage.