The Legal Implications of Commercial & Corporate Real Estate Digital Transformation
Potential risks, liabilities and contractual nuances should be a primary concern for commercial and corporate real estate owners who seek Digital Transformation. Owners should consider how laws related to data, privacy and cybersecurity frame the scope of Digital Transformation.
Assessment of applicable legal boundaries can help owners develop a framework for a transformation that incorporates risk avoidance and preservation of opportunities during third party contract negotiations. Additionally, attention to such legal implications can improve organizational agility and flexibility by enabling the development of a cache of legal documents designed to simplify and incorporate third party services without extensive negotiation or unnecessary assumption of risk.
An owner may contemplate a Digital Transformation that includes activities like the collection and analysis of data, which are subject to local, state, or federal regulation. As with any entrepreneurial endeavor, owners should understand a new regulatory environment prior to entry. For example, a portfolio real estate owner may determine that it will upgrade all security systems to incorporate advanced analytics, machine learning and third party facial recognition services. The property owner could face potential liability if portfolio tenants are healthcare providers and the system operate in a way that violates patients’ rights under HIPAA. Failure to observe regulatory requirements could result in fines and potential criminal liability. As part of a Digital Transformation, an owner may want to evaluate the unique circumstances of existing properties, tenants and agreements to identify whether any regulatory schemes could limit the collection and retention of data or other digital activities as well as an effort to avoid regulatory risk determine whether a digital benefit is outweighed by cost of compliance.
Owners should examine the impact of new technologies in contract negotiations and recognize that technology will advance rapidly during the term of existing and future agreements. A digitally resilient approach to contract negotiation could focus on the management of interests, activities and relationships of the parties to the contracts with respect to the creation, collection, interpretation and sharing of data arising from or with respect to the property or parties subject to agreement. Prudent owners should consider contractual provisions that will account for the occurrence of data incidents like a cyber attack or data leak, in commercial financing documents, purchase and sale agreements, and leases. Simple tweaks to widely accepted standard language can provide significant protection, if a data incident occurs, by eliminating ambiguity that could result in costly litigation. For example, parties to a purchase and sale agreement could agree that failure of either party to perform because of a data incident is not a default of the contract and that the parties agree to cooperate and proceed to closing in such an event.
Owners with Digital Transformations that incorporate third party services require contracts that allow the sharing of customer or tenant data, without additional liability, or loss of control. To avoid negotiation bottlenecks an owner may develop a standardized collection of service contracts including non-disclosure, privacy, indemnification and agency agreements with third party service providers to test relationships during short-term feedback loops. Without the ability to engage in feedback loops and share data quickly and security, an owner may struggle to keep up with the pace of digital markets.
Cybersecurity should be a top priority of any Digital Transformation strategy. While traditional cyber risk assessments focus on the value of data, the significant business interruption that accompanies a data incident like a cyber attack or a data leak has the potential to severely disrupt real estate operations and obligations. Perhaps even more significant, however, are the security risks that may accompany the utilization of systems that automate and control real world places.
As technology evolves, many owners will implement building control systems to reduce costs and optimize efficiency. Significant concerns abound regarding security of IoT devices. Unlike cyber attacks on data, attacks on building control systems can result in real world consequences including disruption, damage and death. Owners should consider threats to building control and automation systems as categorically similar to public infrastructure and utility threat, and invest significant time and resources into the deployment of systems that are designed to be secure. For example, a developer or property owner may want to carefully assess whether remote control and automation of systems like fire suppression, elevators, door locks and other critical components offsets the potential negative impacts that could occur if such systems are manipulated. Furthermore, great efforts should be taken to monitor and maintain the security and integrity of such systems to avoid unwanted and unintended consequences.
Cyber Insurance and Practical Approaches
Fortunately, many of the existing and emerging cyber risks are covered by cybersecurity insurance policies. Digital Transformation should include careful study of available cybersecurity policies and appropriate policy limits. Owners will want to be sure that appropriate third party policies are in place to effect more complete coverage of potential loses. Additionally, owners may avoid potential liability by focusing on the practical aspects of technology deployments. For example, many Owners utilize security cameras to monitor parking pay machines. It’s likely that at many of these locations such surveillance cameras are positioned in a way that captures an image of an individual’s credit card being inserted into the pay station. It’s unlikely, however, that many of the Owners of such properties have considered whether the orientation, resolution, and frame rate of a security camera, and how such security footage is stored create any sort of significant liability. In fact, it’s unlikely to even cross a property owner or manager’s mind, until law enforcement identifies the existence of such protected information on the Owner’s system after an attack, when significant third-party liability to the card holders has been created. From a practical perspective however, the significant expenses of this type of data loss could have been avoided by practical consideration of how and where building technology is deployed.
This Week’s Sponsor
RestorePoint, a Palo Alto Networks Platinum Partner, was part of the first wave of Traps Certified MSSP partners in North America. Traps, Palo Alto Network’s Advanced Endpoint Protection, replaces traditional antivirus with Multi-Method Prevention that pre-emptively blocks known and unknown cyber threats from compromising endpoints. To learn more, please visit us at www.restorepoint.net/traps.
MEET OUR 2018 ADVISORY COUNCIL CHAIRS
The 2018 Advisory Council will aid in the quest for providing high-quality education on the most significant topics to ever impact the commercial and corporate real estate industry!
VISIT Realcomm | IBcon for the complete Advisory Council.
SAVE THE DATE and join us onJune 5-7, 2018 at The Cosmopolitan of Las Vegas
UPCOMING REALCOMM WEBINARS
Commercial and Corporate Real Estate Cyber Risk - Developing a Comprehensive Strategy - 10/25/2018
Hardly a day goes by that we don’t hear about a Cyber breach. The most recent of scale was Equifax, the credit reporting agency in which credit information of 143 million of its clients was breached. While most of the incidents we hear about involve data or financial theft, there is a looming threat…our built infrastructure. This infrastructure includes everything from power plants to dams, but also includes the millions of buildings we use every day to work, shop, learn, recreate, manage our health and more. The threats range from unwanted building access to pirating of video surveillance and everything in between. This webinar will focus on the entire spectrum of Commercial and Corporate Real Estate cyber challenges, solutions and strategies.
Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on technology, automated business solutions, intelligent buildings and energy efficiency for the commercial and corporate real estate industry. As CEO, Jim interacts with some of the largest companies globally pertaining to some of the most advanced and progressive next generation real estate projects under development.
Tom Shircliff is a co-founder and principal of Intelligent Buildings, a nationally recognized smart real estate professional services company that was started in 2004. Intelligent Buildings provides planning and implementation of next generation strategy for new buildings, existing portfolios and urban communities. Tom is a speaker and collaborator with numerous universities and national laboratories, a gubernatorial appointee for energy strategy and policy and founding Chairman of Envision Charlotte, a Clinton Global Initiative.
As CIO at Meridian Capital, Sandy Jacolow oversees the firm’s nationwide innovation and technology initiatives that support the company’s brokerage, investment sales and retail leasing businesses and growth activities.
Ron Victor is a Silicon Valley based technology entrepreneur with 20 years of experience and expertise launching new ventures at start-ups and fortune 1000 technology companies. To-date he has enabled raising more than $30Million in start-up capital for multiple start-ups in silicon-valley. Ron has founded and led three companies to-date with successful exits. His latest venture is IoTium Inc. – a Silicon Valley start-up that provides a secure, cloud-managed, easy-to-deploy software defined network infrastructure for all IoT verticals.
Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conducting detailed security surveys and assessments of corporate offices, power generation plants, and facilities related to national critical infrastructure. Coleman has also managed numerous security system installation and upgrade projects. He holds a Master of Science, Computer Information Systems degree from Northwestern University and a Bachelor of Science, Electrical Engineering degree from the University of Michigan. He is also CPP (Certified Protection Professional) and CISSP (Certified Information Systems Security Professional). Coleman also holds the following Professional / Civic Affiliations: ASIS (Member of American Society for Industrial Security), Chairman of the ASIS Information Technology Security Council, and is an active member of the ASIS Security Architecture and Engineering Council.