Perhaps the biggest challenge in relation to subcontracting is the requirement for the financial institution to approve subcontractors. In large outsourcings, securing that right in the contract is usually fine, but in the commoditised world of SaaS it doesn’t work for the service provider – they will say that they have a one-to-many service and they cannot tolerate a position where one customer stops them using a subcontractor that they want to use for their overall service to customers.
In the UK, the Prudential Regulation Authority rules state that the financial institution must have the right to “object to” a material sub-outsourcing and/or terminate the contract where the sub-outsourcing would have adverse effect on the arrangement. SaaS providers will, therefore, argue that the regulations do not require a financial institution to have “approval” rights over subcontracting. Instead, they will agree to notify subcontracting to the financial institution and, if the financial institution objects, they will sometimes agree to discuss and try to resolve the situation, but failing that they offer the financial institution the option to terminate.
While this approach is compliant from a regulatory point of view in respect of the subcontracting requirements, it doesn’t particularly help in practice. This is because the financial institution faces being left without a solution because they are forced to terminate, which in turn will trigger other regulatory concerns around operational resilience and being able to maintain a service to customers. That also brings into focus provisions around exit assistance, discussed below.
In practice it seems unlikely that a major cloud service provider will engage a subcontractor that will cause such an adverse reaction to a financial institution – and the chances are that if one financial institution feels this way, others will too, which would be likely to encourage a rethink.
Data and security
In relation to data, there are a number of provisions in cloud contracts that financial institutions should focus on.
Regulatory provisions require that the financial institution is aware of the location of its data at all times. That applies where the data is at rest or in transit. There is a potential tension between cloud providers, keen to be able to be flexible in relation to where data is hosted and processed, and the increasing regulation around data location. Financial institutions need to make sure that the data location regulatory requirements they are subject to are reflected in their contracts with cloud service providers.
Often the contract will contain an agreed “zone” for the data which the service provider will agree to stay within, and the financial institution can then give permission for data to be hosted or processed within that zone.
Another important issue is data sovereignty – the right of the financial institution to control disclosure of and access to its data – in the cloud context, the financial institution needs to understand in what circumstances third parties may be able to require access to its data and to try to control that through the contract.