Emphasizing Robust Contracts with Cloud Providers Amid Recent Alleged Breach at Oracle

Warner Norcross + Judd
Contact

Warner Norcross + Judd

Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have exfiltrated six million records from Oracle's Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) systems, potentially affecting over 140,000 tenants globally. The purported breach includes sensitive data such as Java KeyStore files and encrypted passwords. Oracle has officially denied these claims, stating that there has been no breach of Oracle Cloud and that no Oracle Cloud customers experienced a breach or lost any data.

If you signed the Oracle Cloud Services Agreement with minimal negotiation, then the terms are not favorable to address this potential situation. While Oracle implements standard security measures and complies with applicable data protection regulations, the agreement places significant responsibility on customers for their data's content and compliance. Additionally, Oracle's liability in the event of a data breach is notably limited and the agreement is silent on payment of costs associated with a data breach.

Regardless of the breach's validity, this situation underscores the critical importance of implementing strong contractual protections when engaging with cloud service providers who have access to your data. We recommend the following measures to safeguard your organization's interests:

  1. Data Security Obligations: Ensure contracts explicitly define the provider's responsibilities for data protection, including compliance with relevant regulations and standards.
  2. Incident Notification Requirements: Mandate prompt notification from providers in the event of any security incidents that could impact your data.
  3. Access Controls and Audits: Include clauses that grant your organization the right to audit the provider's security practices and require adherence to stringent access controls.
  4. Liability and Indemnification: Clearly outline the provider's liability in the event of a data breach and include indemnification provisions to protect your organization from potential losses.
  5. Data Ownership and Usage: Specify that your organization retains ownership of all data and delineates permissible uses by the provider to prevent unauthorized exploitation.

By proactively establishing these contractual safeguards, you can significantly mitigate risks associated with third-party data handling and reinforce your organization's security posture.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Warner Norcross + Judd

Written by:

Warner Norcross + Judd
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Warner Norcross + Judd on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide