Petya Petrova - Fotolia
Yes, you should worry about intellectual property whenever you use any "as a service" tool, not just software as a service (SaaS) tools. Read the terms of service (TOS) carefully. Some services can help; for example, TOS;DR, a user rights service that ranks site terms and privacy policies. Make sure the TOS doesn't require you to give up your company's or users' rights to anything you upload. Also make sure you're allowed to upload what you want to upload. For example, Google Analytics does not allow you to upload any user's personally identifiable information.
Be careful when using Flurry Analytics, a SaaS platform for mobile analytics. Flurry is free, which should set off all sorts of alarms if you're concerned about privacy. Flurry is free for application developers to incorporate because the company uses and sells aggregated stats from your application. For the most part, this won't be a major issue because they say they will always use aggregated statistics. But there's nothing to stop them from having one of those aggregated statistics involve a major portion of your user base.
Make sure that your service agreement protects your company from your cloud provider's legal mistakes. Let's say that a third party sues your cloud provider for intellectual property infringement. Where does that leave your company, which has been using -- via the cloud provider -- the third party's product? Be safe by making sure there's a protection clause in the contract.
Intellectual property is complex and subject to many different interpretations. Think of the technology research that could have been funded with money spent on intellectual property lawsuits in the software industry. In this area, it pays to get legal advice during contract negotiations.
Jan Stafford, SearchCloudApplications.com's executive editor, contributed to this article.
Protect intellectual property when working with solution providers
Protect the cloud from patent trolls
Making the case for cloud-based tools
Dig Deeper on Cloud access management and application security
Related Q&A from Chris Moyer
Event-driven computing means no IaaS provisioning and no data center to run. Can I migrate all enterprise apps to be event-driven? Continue Reading
What is runtime as a service and how does it differ from platform as a service and infrastructure as a service? Continue Reading
The DevOps model is taking off as cloud adoption grows. But what exactly are the key responsibilities of a DevOps team in the enterprise? Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.