Americas

  • United States

Asia

Oceania

Mitigating Risk in Shrink-Wrap and Click-Wrap Agreements

Opinion
Aug 08, 20112 mins
Data and Information Security

Over the next few posts, I will be talking about the various methods (or lack thereof) used by businesses in addressing shrink-wrap, Web-wrap, and click-wrap agreements. These agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or as part of the installation of a piece of software. They may also be encountered as part of the documentation provided with new software or a hardware component. Businesses seldom read these terms in any detail, generally view them as non-negotiable, and accept them as a necessary evil.

The fact is, these types of agreements can present significant legal and business issues. They can place a business’ sensitive data at risk, expose the business to liability, compromise the business’ ownership of its own intellectual property, and cause the business to pay additional, unforeseen fees.

There are essentially three methods of addressing the risk of shrink-wrap agreements: blind acceptance, knowing acceptance, and mitigation. In this post, discuss the blind acceptance (aka “ostrich”) approach.

Blind acceptance refers to the practice of looking at a proposed use of a product, ensuring its falls within the common elements of shrink-wrap products identified above (e.g., low fees, non-critical use, off-shelf, well established, potentially trialed, etc.), and electing to proceed with the purchase without further consideration. Few sophisticated organizations take this approach. It would require the purchaser to proceed without regard for the risk – abandoning any effort at due diligence.

Next time, we will discuss the second approach: knowing acceptance.

michaeloverly

Michael R. Overly is a partner and intellectual property lawyer with Foley & Lardner LLP where he focuses on drafting and negotiating technology related agreements, software licenses, hardware acquisition, development, disaster recovery, outsourcing agreements, information security agreements, e-commerce agreements, and technology use policies. He counsels clients in the areas of technology acquisition, information security, electronic commerce, and on-line law.

Mr. Overly is a member of the Technology Transactions & Outsourcing and Privacy, Security & Information Management Practices. Mr. Overly is one of the few practicing lawyers who has satisfied the rigorous requirements necessary to obtain the Certified Information System Auditor (CISA), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP), Certified Risk and Information System Controls (CRISC) and Certified Outsourcing Professional (COP) certifications.

The opinions expressed in this blog are those of Michael R. Overly and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

More from this author