Out-Law Analysis 8 min. read
30 Sep 2022, 12:57 pm
It is understandable that much of the focus for financial institutions negotiating cloud contracts will be on ensuring compliance with the regulatory requirements they are subject to, but there are other contract issues that need their attention too.
Outside of contracting for the regulatory rules, issues around licensing, liability, service levels and intellectual property are among those that need careful consideration when banks, insurers and other financial services firms seek to derive the benefits of cloud solutions.
While firms can reasonably expect that contract terms will be more bespoke in the context of a private cloud arrangement, they may find it more difficult to negotiate the terms set by cloud providers in the context of public cloud arrangements or for commoditised software-as-a-service (SaaS) solutions – where a financial institution cannot reasonably expect to get full-blown outsourcing provisions for a discount price.
In these scenarios, it is vital that firms select the most important issues to them to negotiate over and consider what leverage they have to get what they want.
Firms need to consider their current and future business requirements to make sure that the scope of their cloud license is appropriate, in terms of providing for the right to use the solution in all the territories they need.<
Consideration should also be given to who needs to access the service – groupwide rights should be secured where necessary and rights for third party service providers who do things on a firm’s behalf may also need to be secured.
The purpose for which a firm can use the service and underlying licence should be made clear too – thought should be given to whether “internal business purposes” covers the intended use, or whether a broader scope of use is needed.
Financial institutions can expect cloud providers to offer their standard service offering rather than anything bespoke. However, firms may be able to negotiate out unilateral rights for the service provider to amend the service offering – or at least secure provisions that say the provider will not amend the service offering in a way that degrades it, or where they do that the firm has a right to terminate the contract.
Yvonne Dunn
Partner
Firms will want to avoid loose “targets” or “reasonable endeavours” obligations
In relation to service levels, if firms are in a position to negotiate with the service provider over its standard offering, the main things to consider are how firm the commitment is to meet the service level agreements (SLAs). Firms will want to avoid loose “targets” or “reasonable endeavours” obligations. In most cases, the SLA the firm will care about most is “availability” – firms cannot control things like an internet network outage, but there are a number of things to consider. These include:
Many service providers will not commit to proactively reporting on SLAs, so the financial institution may have to track this themselves and make claims for service credits if necessary.
Often there is a real imbalance between the cost of the solution and the risks that would arise if things went wrong. This can make negotiations over liability difficult.
At its most basic, this is about risk sharing and how much risk the service provider is prepared to take – their position will often be that they don’t want to be liable for any more than the annual charges. It can also be difficult to get service providers to accept liability outside of the cap. This feels particularly jarring in the case of loss of data, which we often see excluded altogether by suppliers, in cases where in our view it is actually the supplier’s primary obligation under the arrangement – such as where it is contracted to host the data.
Provisions governing liability in relation to loss of data also need careful scrutiny. The service provider may state that their obligation is limited to restoring from last backup – it is important to know who is actually responsible for taking backups, and how frequently this happens.
We are starting to see more service providers agreeing to ‘super caps’ for data protection liability – it is very rare for this to be accepted on an unlimited basis in the context of SaaS contracts. Other areas that financial institutions will want to consider for higher liability caps, if not accepted on an unlimited basis, are breach of confidentiality or third party intellectual property rights.
Some service providers are asking financial institutions to accept unlimited liability in areas that perhaps are not always felt to be “the norm”. A good example of this is breach of the service provider’s acceptable use policy – however, depending on the nature of the SaaS solution, it may be justifiable for the financial institution to accept this level of liability. We have seen this becoming more common in the provision by SaaS providers of platforms for use by customers.
While financial institutions have regulatory obligations to address termination rights in their cloud contracts, service providers will also come to the table with their own ‘wish list’ of termination rights.
We have seen service providers try to negotiate broader termination rights than many financial institutions are comfortable with – including termination for convenience. We have had some success in getting those removed from the contract and the right to terminate pared down to only where the customer does not pay the charges.
However, depending on the nature of the services, the service provider may insist on a right to terminate for the financial institution’s material breach. Firms can try to argue back that the primary obligation of the customer is to pay charges, and that this can be covered with a specific termination right, but some service providers will also be concerned about misuse of intellectual property rights, for example, and say that damages are not a sufficient remedy for a breach of licensing provisions. If firms have to agree to this, the best way to mitigate the risk is by negotiating longer notice periods and opportunities to remedy the breach before termination rights can be triggered.
Linked to termination is suspension. Often cloud contracts will contain provisions allowing the service provider to suspend access to the application, usually for triggers that overlap with the termination rights. One of the more common grounds for suspension is where the financial institution is in breach of the acceptable use policy – this will normally relate to the financial institution threatening the security of the service provider or other customers of the service provider.
Suspension rights are likely to be a requirement of the service provider, but it is possible for firms to negotiate opportunities to remedy, requirements on the service provider to consider reasonable alternatives to suspension, and commitments to reinstate the service immediately upon resolution of the issue.
The service provider is likely to require the financial institution to agree to adhere to its acceptable use policy. This is pretty standard, and will include things like the financial institution agreeing not to engage in illegal activities, distribute malware, or try to gain unauthorised access, for example.
It is typical, in relation to intellectual property provisions in SaaS or public cloud contracts, for the financial institution to be asked by the service provider to warrant that it owns or has all necessary rights to use its content and that the content will not breach the acceptable use policy.
It is also standard for the financial institution to seek to ensure that the contract specifies that it continues to own content it uploads to the cloud service, and for the cloud service provider to retain ownership of all aspects of its cloud services.
The cloud service provider will also seek broad rights to manage claims for infringement against it – including being able to substitute an alternative solution or terminate the contract. Firms should seek to ensure that substitution rights are qualified by reference to there being no material loss of functionality.
Firms should expect to obtain less warranty protection in the context of cloud solutions than they can do in other large IT procurements. However, where the cloud system is more crucial to the financial institution or more bespoke, more than basic warranty protection would be appropriate.
Either way, financial institutions should look to include warranties that the service will comply with applicable law and operate in accordance with the service description, that use of the service by the customer will not infringe the IP rights of any third party, and that the service will not include any malware or viruses etc. Firms should watch out for statements that the service is provided on an ‘as is’ basis or similar – they are paying for the service, and so should be entitled to a basic level of protection at least.
The force majeure provisions in cloud contracts should be scrutinised carefully by financial institutions in the context of the arrangement. They should:
It is important that the financial institution checks the governing law and jurisdiction clause to determine where it is able to enforce the terms of the contract, if an issue arises in the future.
Some SaaS contracts will be governed by US law and US courts, which will make enforcement more challenging and likely more costly. Some cloud contracts also force arbitration on the parties, which may limit the ability of certain customers to make a claim in their local courts.