You signed a long-term deal. It would be embarrassing if, in a few years after signing, the pricing is significantly higher or your service levels are significantly lower than market. Benchmarking provisions are intended to provide a mechanism for ensuring that your pricing and/or service levels are within market (taking into consideration the unique factors applicable to your deal). Set out below are some of the key components of a meaningful benchmarking provision.
NEWS FOR LAWYERS AND SOURCING PROFESSIONALS
In this contract corner, we consider the concepts of “good faith” in commercial contracts under English law.
The General Position Under English Law
The notion of good faith is a complex and evolving concept under English law, and it has important implications for those drafting commercial contracts. In contrast to many other civil (e.g., France and Germany) and common (e.g., United States and Australia) law jurisdictions, there is no general doctrine of good faith either in negotiating or in performing a contract. Instead, parties are free to pursue their own self-interests, so long as they do not act in breach of contract. However, the notion of good faith can still impact commercial contracts in three main ways:
We have all heard the horror stories: system implementation deals costing 300% more than the original budget, go-live dates for development projects being way past the scheduled dates, and deliverables that do not meet the customer’s expectations. These are the stories that keep us lawyers up at night. So what can we do in the contract to incent timely, on-budget performance by the vendor? First, there is no substitute for a detailed and well-thought-out requirements document, which provides the roadmap that shapes the design, build, and deployment. Then, while there is no magic bullet, there are numerous contractual mechanisms to be considered that are designed to provide guideposts and checkpoints to enable success.
Set out below are 10 contractual mechanisms for providing meaningful performance commitments and consequences if the commitments are not met. Maybe you will not need to invoke these mechanisms, but having firm rules may help drive good behavior (you know the old adage, “good fences make good neighbors”). As is always the case, the appropriate mechanisms to be used are deal specific, and not all deals or relationships require the full spectrum of contractual commitments set out below (but some do!).
For years, there has been a persistent trend toward outsourcing retirement plan recordkeeping and other administrative responsibilities. Although historically more prevalent for defined contribution plans, this outsourcing trend has been accelerating for defined benefit plans thanks, in part, to the prevalence of frozen plans (i.e., no more benefit accruals) and the potential for administrative cost savings. But service providers will be quick to remind plan fiduciaries that lightening the administrative load does not include transferring fiduciary duties. When selecting and monitoring a service provider, one key issue facing retirement plan fiduciaries is their duty with respect to the privacy and security of plan participant data.
As we previously discussed, managing and administering retirement plans also mean managing and protecting an extensive trove of personal data. Although there is no overarching privacy law governing retirement plans, fiduciaries must adhere to the “prudent expert” standard of care in fulfilling their duties, and, in the current environment, it can be expected that courts will be sympathetic to assertions that privacy and security of plan participant data are within the scope of those duties. Given that fiduciaries are personally liable for their fiduciary breaches and considering the cost of a data breach can be in the millions of dollars, the sensible course of action for retirement plan fiduciaries is to be continuously diligent and attentive regarding data privacy and security. This extends to diligence and care in the structuring of the outsourcing agreement.
The Clearing House (the oldest banking association and payments company in the United States) recently released a model agreement as a voluntary starting point to facilitate data sharing between financial institutions and fintech companies.
The model agreement is intended to provide a standardized foundation that speeds up data access agreement negotiations; as the Clearing House notes, “[L]egal agreements between banks and fintechs have sometimes taken 12 months or more to be developed and finalized and have become a significant bottleneck to API adoption.” Additionally, the model agreement is designed to reflect the Consumer Financial Protection Bureau’s consumer protection principles on data sharing and aggregation, providing confidence to the contracting parties that the terms address key regulatory issues.
The importance of cybersecurity in the autonomous vehicle setting is well known, but nuance and complexity will be on our LiDAR (a pulsed laser that measures ranges) where the rubber meets the road.
The Challenging, Shifting Landscape
Cybersecurity is one of the key issues of the digital age, typically in the context of security and privacy of confidential or personal data. Cybersecurity is particularly challenging and important for technologies such as self-driving cars, where the real world and the digital, connected world meet and where cyber breaches could result in danger to life and property.
Autonomous vehicles are still in their infancy. Significant uncertainty surrounds this rapidly evolving ecosystem. Standards and regulations are still in a state of flux, and the “rules of the game” are still unclear: how, and how long, will human drivers/operators continue to be involved (along with their proclivity for risky, unpredictable and gullible behavior)? At this relative stage of immaturity, market participants are developing their own divergent solutions that will eventually need to seamlessly integrate, increasing the potential for cyber vulnerabilities. However, the opportunity (for both innovators and society at large) is clear, as smart, interconnected vehicles and systems promise remarkable improvements in efficiency and safety. The race is on.
When we represent customers in outsourcing and managed services transactions, we spend a significant amount of time drafting the exhibits for transition, which is typically a major project in and of itself. In order to help clients think about the major components of transition, we often provide the following checklist of common workstreams to facilitate our discussion.
- Governance – Governance is an overarching workstream that spans all phases of transition. A key component is the formation of a transition management office that is responsible for managing the overall transition (including performance and risk management) and coordinating with the company’s governance organization.
- Planning – Detailed design and implementation planning is critical to ensuring timelines are integrated and met, with all dependencies considered. Plans typically include the responsibilities of each party, anticipated completion dates, and acceptance criteria.
As a follow-up to our recent post on third-party contract due diligence in outsourcing deals, this post focuses on how customers in outsourcing deals handle the disposition of legacy third-party contracts—one of the thorniest and most work-intensive work streams—once diligence has concluded.
The due diligence review of existing third-party contracts is a critical component of any outsourcing deal. For the company that is outsourcing part of its business functions to a third party, reviewing existing third-party contracts for certain key terms is an important part of the outsourcing process. Organization, attention to detail, and diligence are keys to a successful third-party contract review process.
The terms that need to be reviewed will be based on the scope of the outsourcing agreement, e.g., will contracts be assigned, terminated, or made available for the outsourcing provider to use. Once the deal constructs are established, Excel can be a useful tool to guide the review of the third-party contracts, by allowing the reviewer to insert the applicable language from each contract into the appropriate row or column. The Excel chart will become a reference guide for the key provisions and provide an overview and comparison between the third-party contracts.
When an inventor of technology who is also a university employee wants to commercialize university-developed technology, it is customary for the university and the inventor to “spin out” the technology via a license agreement to a newly created company (a licensee company) that sets forth the terms of the license, including any necessary milestones for advancing the technology, restrictions on the use of the technology, and the royalties and other financial terms applicable to the licensing and commercialization of the technology.