Close Menu

    Sign Up for updates

    Get the latest news from QUATRO HIVE about law, policy, technology and innovation.

    By signing up, you agree to our terms and privacy policy agreement.

    Trending Now

    Pixels with a Price: Who Owns Your Images in the Age of AI Editing?

    October 29, 2025

    #SheInspires: Anurita Das, Co-Founder and CEO, Genovation Solutions

    October 24, 2025

    RBI issues draft norms to enable banks to fund acquisitions

    October 24, 2025
    Email WhatsApp LinkedIn Instagram Facebook
    LinkedIn Instagram Facebook
    Quatro Hive
    •  LOGIN
    SIGN UP
    • Experts Speak
      • #FinGurus
      • #NextStar
      • #SheInspires
      • #DesiDisruptors
      • #TheSpotlight
    • Dialogues
      • #CyberClout
      • #FinGurus
      • #NextStar
      • #SheInspires
      • #DesiDisruptors
      • #TheSpotlight
    • Directory
      • Tech Solution Providers
      • Universities
    • Resource Library
      • HiveBuzz
      • BuzzQ
      • Bulletin
    • News
      • Industry Updates
      • Media
    • Events & Partnerships
    • Sign Up
    • Login
    Quatro Hive
    Home » Risk Allocation in Technology Contracts: Lessons from the Evolving Cybersecurity Landscape
    #SheInspires

    Risk Allocation in Technology Contracts: Lessons from the Evolving Cybersecurity Landscape

    December 18, 2024By Mehak Gupta
    Share
    Facebook Twitter LinkedIn WhatsApp
    • December 18, 2024

    As Chanakya Pandit states in his Neeti Sūtras: utsāhavatāṁ śhatravopi vaśhībhavanti and Nirutvāhād daivaṁ patita– “With sufficient effort, even poor destiny can be transformed into good fortune, and without proper effort, even good destiny can be converted into misfortune.”

    This ancient wisdom of Bhagavad Gita, Chapter 18 and verse 14 holds a modern lesson: the need for vigilance and action through robust risk allocation strategies in technology contracts to shield against potential harm. The rise of sophisticated cyber threats such as data breaches, ransomware, and cloud outages has reshaped the contractual landscape, demanding adequate action through a forward- looking approach.

    Cybersecurity Failures: What We’ve Learned the Hard Way

    As technology evolves, so do the risks, necessitating contractual flexibility, foresight and adequate action. Each cybersecurity incident brings critical learnings for all stakeholders in the digital ecosystem. For example, the Target Corporation breach in 20132, which was one of the classic security breaches, required Target to pay approximately USD 18Mn for settlement after hackers infiltrated systems through a third-party vendor. The aftermath of this attack wasn’t just a security disruption but customers losing faith.

    While the attack focused on Target, the compromise started with a third-party vendor. Companies need to remember that all their third- party vendors must be just as secure as their own system and highlight the importance of third-party risk assessments for both customers and managed service providers. If Target had properly segregated its network and closed the gaps, a cyber-attack of this magnitude would have been much harder.

    The decision in MOVEit Cyberattack (2023) where criminals exploited a vulnerability in Progress Software’s MOVEit file transfer app, used by thousands of organisations worldwide, further illustrates the growing need for clear cybersecurity clauses in technology contracts.

    Contracts should focus on detailed risk allocation and liability clauses that address potential breaches clear frameworks for audit rights, breach notification procedures, regular updating and patching of software vulnerabilities and indemnification for breaches. Additionally, organisations should enforce strict compliance with global data protection standards to ensure their partners and service providers do the same.

    SmartTech, Smarter Threats: What the Big Breaches Teach Us

    As cybersecurity threats continue to advance, businesses must adopt a proactive, dynamic approach to crafting contracts that anticipate and mitigate risks. We can take notes from some legal precedents that shaped the understanding of risk allocation and accordingly implement best practices.

    Equifax Data Breach (2017) is one of the most significant data breaches in history, where Equifax compromised the sensitive data of 147 million individuals due to unpatched software vulnerabilities. The company faced regulatory penalties and lawsuits, culminating in a $700 million settlement. The key lesson that can be learned from this case is that technology contracts must clearly assign responsibility for patch management, vulnerability monitoring, and compliance with cybersecurity standards. Comprehensive indemnity clauses should hold vendors accountable for breaches originating from their systems, ensuring the contracting party is protected from financial losses.

    In addition to the above, there is another recent case that underscores the importance of ensuring proper data encryption and access control mechanisms by contractually implementing industry-standard security measures to prevent unauthorized data access and strict compliance with data privacy laws.

    In the case of CoWin Data Leak (2023), a Telegram bot leaked personal data from India’s CoWIN vaccination portal, including Aadhaar and passport numbers. A similar lesson was learnt from another data leak case in the Middle East Bank, where a breach exposed Bank clients’ personal and financial details, including sensitive intelligence information. The primary takeaway from these cases is to include clauses to maintain confidentiality with severe penalties for breaches, regular security audits, data breach notification procedures in technology contracts, and end-to-end encryption.

    Another pivotal lesson emerged from AWS Outages where an Amazon Web Services outage disrupted businesses globally, raising questions about the adequacy of the Service Level Agreements (“SLAs”). While AWS offered credits for downtime, many customers suffered significant indirect losses that were excluded under the limitation of liability clauses. The central lesson derived from this incident is that businesses must negotiate robust SLAs that include precise uptime guarantees, penalties for non-performance and broader coverage for consequential damages in critical use cases. Legal counsels should also push for balanced limitation of liability clauses, avoiding blanket exclusions of indirect losses.

    Adding to the discussion on risk allocation, another important aspect is to ensure both parties to the contract carry adequate insurance policies, with clear terms for premium payment and claims management. In the case of Zurich American Insurance Co. v. Sony Corporation (2014), Sony sought insurance coverage for lawsuits resulting from a data breach but was denied its claim due to policy exclusions for “intentional acts” from CGL. An important learning is that companies across all areas of the industry should consider cyber insurance policies to ensure that they are adequately protected in the event of a data breach.

    Similarly, in the Cosmos Bank Attack in 2018, a cyberattack siphoned INR94 crores from the Pune headquartered India Cosmos Bank via malware installed in its servers. An essential lesson from this incident is to ensure 24/7 threat detection and incident response mechanisms, along with ensuring clarity on the insurance coverage and insurance policy commitment being made.

    Another critical dimension to consider in risk allocation is the growing threat of ransomware attacks and how they intersect with force majeure provisions in contracts. As these attacks become increasingly sophisticated and disruptive, both clients and service providers must ensure their agreements explicitly address whether ransomware events qualify as force majeure. The ambiguity in traditional clauses has led to significant disputes, as seen in Merck & Co. v. Ace American Insurance Co. (2022), where the court ruled that the ransomware attack did not fall under a war exclusion clause. Such cases underscore the importance of specifying responsibilities, liabilities, and performance obligations during cyber incidents. Tailored force majeure provisions, combined with robust cybersecurity protocols and clear incident response measures, are indispensable in navigating the evolving risk landscape effectively.

    Merck v. Ace also serves as a warning to policyholders as Insurers are reviewing and scrutinizing policy language considering increased financial hits on claims related to cyberattacks. Organisations must evaluate policy language before binding to ensure that they fully understand the scope of what they are purchasing, and flag and consider any changes that may limit, restrict, or otherwise change their coverage.

    Securing the Future – One Contract at a Time

    The lessons derived from these cases serve as a guiding light and a clarion call for organisations to embrace a proactive, rather than reactive, approach to cybersecurity risks. In a rapidly evolving digital landscape, investing in preventive measures is far more prudent than grappling with the consequences of negligence. Organisations must prioritize implementing recognized cybersecurity certifications and standards such as ISO 27001 or SOC 2 as a baseline for cybersecurity, drafting tailored indemnities, securing comprehensive cyber insurance, and developing robust incident response plans. Periodic reviews of contracts, stringent employee training programs, limitation of liability clauses, and unwavering regulatory compliance should form the bedrock of their risk allocation strategies. Together, these measures will not only fortify contractual resilience but also safeguard the trust, reputation, and operational continuity of organisations in the face of ever-escalating cyber threats.

    Author

    • Mehak Gupta
      Mehak Gupta

      View all posts
    Cyber Threats Cybersecurity risk allocation technology contracts
    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Share. Facebook Twitter LinkedIn WhatsApp

    Related Posts

    Pixels with a Price: Who Owns Your Images in the Age of AI Editing?

    October 29, 2025By QH Editorial Team

    India’s Data Centre Policy Landscape : Balancing Incentives with Complexity

    October 27, 2025By Akshat Pande, Sadhak Sharma

    Power Plays: How the SCO Summit Could Transform BRICS’ Energy & Tech Leadership

    October 23, 2025By QH Editorial Team
    ads
    Experts Speak

    Pixels with a Price: Who Owns Your Images in the Age of AI Editing?

    October 29, 2025

    India’s Data Centre Policy Landscape : Balancing Incentives with Complexity

    October 27, 2025

    Power Plays: How the SCO Summit Could Transform BRICS’ Energy & Tech Leadership

    October 23, 2025

    From Farm to Fork: Can Agritech Solve India’s ₹1.5 Lakh Crore Food Waste Problem?

    October 15, 2025
    ads
    Stay In Touch
    • Twitch
    • WhatsApp
    • LinkedIn
    • Instagram
    • Facebook

    Quatro Hive is a media and knowledge platform built on four pillars which are law, policy, technology and innovation. In collaboration with key industry players, we are dedicated to cultivating a new era of innovation across industries.

    Address: D-65, Ground Floor, #ZBC-042, Defence Colony, New Delhi – 110024
    Email Us: reach@quatrohive.com
    Contact: +91 11 4121 2828, +91 9311 398 140

    Dribbble WhatsApp LinkedIn Instagram Facebook
    Quick Links
    • Experts Speak
    • Dialogues
    • Directory
    • HiveBuzz
    • BuzzQ
    • Bulletin
    • Industry Updates
    • Media
    • Events & Partnerships
    Newsletter

    Sign Up for updates

    Get the latest news from QUATRO HIVE about law, policy, technology and innovation.

    By signing up, you agree to our terms and privacy policy agreement.

    • Terms and Conditions
    • Privacy Policy
    © 2025 Quatro Hive.

    Type above and press Enter to search. Press Esc to cancel.

    Welcome Back!

    Login below or Register Now.

    Forgot Password?

    Register Now!

    Already registerd? Login.

    Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
    Join the Conversation!

    Sign up for our weekly newsletter. Smart stories, zero fluff, straight to your inbox.