Welcome & Introductions

Size: px
Start display at page:

Download "Welcome & Introductions"

Transcription

1 Addressing Data Privacy and Security Compliance in Cloud Computing Benjamin Hayes, Director of Legal Services, Data Privacy Compliance North America Accenture Copyright 2011 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Welcome & Introductions Benjamin Hayes, CIPP, CIPP/C, CIPP/G, CIPP/IT, CIPP/E Director of Legal Services, Data Privacy Compliance North America Accenture, LLP Copyright 2011 Accenture All Rights Reserved. 2 1

2 What does Accenture do? $31B company 250,000+ employees in 64 countries 3 lines of business: Management Consulting Business Process Outsourcing Technology / System Integration Copyright 2011 Accenture All Rights Reserved. 3 Agenda Introductions Data Privacy Legal Regulatory Update The Data Privacy legal landscape Recently enacted data privacy laws Cloud Computing Data Protection Compliance Considerations Overview: The Current Landscape Compliance Challenges Allocation of Responsibility Practical Considerations in working with Cloud Suppliers Discussion Copyright 2011 Accenture All Rights Reserved. 4 2

3 Data Privacy Legal Landscape Copyright 2011 Accenture All Rights Reserved. 5 Scope and substance of data privacy laws The privacy legal landscape Data Privacy laws address: the way in which companies and government bodies may collect, use, store, disclose, share, transfer and otherwise process personal data about individuals. Personal Data = any information about an identified or identifiable individual Duties of Companies when holding, using and sharing personal data of any individual, whether as a data owner or a service provider Rights of individuals in relation to their personal data e.g., right to access. Powers of supervisory government body to oversee and enforce the law, conduct investigations, impose sanctions for violations. Copyright 2011 Accenture All Rights Reserved. 6 3

4 3 Models for Privacy Laws General laws apply to all collection, use and disclosure of personal data (the omnibus model ) - Customers - Employees - Business contacts Sectoral laws apply only to specific business sectors like health care, financial services - Most broadly adopted in US and Asia No regulation - Privacy laws began in US/Europe and have spread to other parts of the world, but not universal Copyright 2011 Accenture All Rights Reserved. 7 Privacy Laws Around the World The privacy legal landscape 8 Copyright 2011 Accenture All Rights Reserved. 8 4

5 Major Data Privacy Legal Changes New laws: India (IT security regulations) Malaysia Mexico Peru China Philippines Changes / enhancements to existing laws: EU (E-Privacy Directive implementation) Taiwan South Korea Proposed additional changes: EU (changes to EU DP framework) Copyright 2011 Accenture All Rights Reserved. 9 Recently Enacted Data Privacy Laws APAC Taiwan, South Korea, China, India Comprehensive data privacy laws being adopted by countries which previously had none. Taiwan (effective November, 2011) - Aligns to EU standards, with variations on consent requirement. South Korea (effective September 30, 2011) - Similar to EU, but more restrictions on data exports (addl. guidance expected); restrictions on the use of CCTV. China - Jiangsu province (effective January 1, 2012) - EU-style law only in the province of Jiangsu the first comprehensive DP law at any level in China. Copyright 2011 Accenture All Rights Reserved. 10 5

6 Recently Enacted Data Privacy Laws: India Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 Effective as of May, 2011 Issued under the authority of 2001 IT Act, as amended Applies only to sensitive personal information name (and any other data) in conjunction with: Financial account data Health information Passwords / biometric data Sexual orientation Initially thought to apply to data brought to India for processing, outsourcing was excluded from the regulations scope by Government clarification (Aug 2011). Copyright 2011 Accenture All Rights Reserved. 11 Recently Enacted Data Privacy Laws South America Mexico, Peru Mexico - Similar to Canada, the law basically aligns with EU standards, but does not include data export restrictions. - Data security regulations released Dec., 2011 Peru - The law basically aligns to EU standards, including restrictions on trans-border data flows. - No data breach notification requirements. Copyright 2011 Accenture All Rights Reserved. 12 6

7 Significant changes to EU Data Protection (Privacy) Directive planned January, the European Commission has issued a DRAFT Data Protection Regulation which would replace the existing EU Data Protection Directive Most of the current substance of the DP Directive will remain in force, but with several added requirements: Data security breach notification required to clients or to individuals within 24 hours Service Providers ( data processors ) would be directly regulated with regard to security and certain other provisions. Opt-in consent required (particularly for marketing) in many cases where it is not required currently Companies larger than 250 employees required to have data privacy officer with certain responsibilities. Copyright 2011 Accenture All Rights Reserved. 13 Trends in the new laws General trend is to embrace EU-style fair information practices (FIPs), but move away from EU-style data export restrictions (with some exceptions). Sometimes called the Canadian Model More attention to data security, but less technically prescriptive laws. More focus on independent standards regimes like ISO and PCI Data Security Standard. Growing acceptance of the Accountability Model which would articulate general principles of privacy laws, but would leave it to companies and third-party standards-setting bodies to create detailed program standards. Greater focus on Privacy by Design responsibility to build data privacy functionality into software and other technology. Copyright 2011 Accenture All Rights Reserved. 14 7

8 Cloud Computing Overview of the Current Landscape & Compliance Challenges Copyright 2011 Accenture All Rights Reserved. 15 A Working Definition of Cloud Computing Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud model allows for flexibility and scalability. There are three service models and four deployment models. Copyright 2011 Accenture All Rights Reserved. 16 8

9 3 Cloud Service Models Cloud Software as a Service (SaaS) Cloud provider hosts software so it doesn t need to be installed or managed and hardware doesn t need to be purchased for it Cloud Platform as a Service (PaaS) Black-box services with which developers can build applications on top of the computing infrastructure Cloud Infrastructure as a Service (IaaS) Processing, storage, network capacity, and other fundamental computing resources are rented Copyright 2011 Accenture All Rights Reserved Cloud Deployment Models Public cloud sold to the public; mega-scale infrastructure Private cloud enterprise owned or leased (e.g., co-location services) Hybrid cloud composition of two or more clouds Community cloud shared infrastructure for a specific community Copyright 2011 Accenture All Rights Reserved. 18 9

10 Compliance Challenges Data Security, Availability Compliance with strict technology standards (e.g., HIPAA, PCI, Spain, Italy, Romania) Data ownership Allocation of responsibility for security Exposure of data to government subpoenas (Patriot Act, India) Data retention and destruction issues Quality of service guarantees Attraction to hackers-especially for public clouds Possibility for massive outages vs. data availability requirements Copyright 2011 Accenture All Rights Reserved. 19 Compliance Challenges Who is subject to the law? Most privacy laws apply to classes of entities, instead of classes of data. The effect is that service providers are typically not governed directly by privacy laws, but by service contracts with data owners (clients). Cloud particularly public cloud service contracts are not designed to be highly negotiated. Indeed, for most customers they are not intended nor will they be negotiated at all. Where does this leave the data owner who must satisfy privacy and security requirements under X law, to which the cloud supplier is not subject? Copyright 2011 Accenture All Rights Reserved

11 Compliance Challenges (cont.) How the EU Views Cloud Computing Mere hosting, even without logical access to data, is still considered processing under EU privacy laws. Insistence on standard EU Model Clauses or Safe Harbor to create a lawful basis for non-eu data storage. Concern and suspicion about access by foreign (e.g. U.S., India, China) governments to data stored in non-eu cloud. Some EU regulators taking the view that EU businesses should use EU-only clouds. Required already under certain public sector rules. Under new proposed EU rules, non-eu cloud providers might be subject to extraterritorial EU laws when hosting EU data. Copyright 2011 Accenture All Rights Reserved. 21 Cloud Computing Allocation of Responsibility Copyright 2011 Accenture All Rights Reserved

12 How is Cloud different than traditional hosting? In traditional hosting, an entire application and its data reside on known physical machines. - In cloud computing, application and data are on known virtual servers, but physical location is dynamic and always changing. In traditional hosting, host plays an active role in configuration and/or maintenance of the application and its data responsible for backups, network security, etc. - (IaaS / PaaS) Cloud is more self-service for application owners many optional functions and components, but nothing works until configured and activated by the application owner. Example: backup no backup will occur unless the data controller chooses and provisions a backup mechanism; then provider is responsible for executing it Copyright 2011 Accenture All Rights Reserved. 23 The effect of virtualization on the roles of the parties Virtualization means that applications and data are split up across many physical servers. Applications and data can only be reassembled by the virtualization layer, without access to the VL the data is viewable only as unreadable 1s and 0s. In IaaS and PaaS cloud models, system administrators may not have access to client-controlled virtualization layers the effect is no access to data. Important to understand exactly what access and where it occurs cloud provider has. The implication is that Cloud providers (other than SaaS) have no ability to control application-level security (e.g. access rights, authentication, encryption, logging, data quality, etc.) these functions must be established and maintained by the manager of the application. SaaS is different in this model the cloud provider is also responsible for application-layer security. Copyright 2011 Accenture All Rights Reserved

13 Cloud requires a reallocation of responsibilities: Substantive Data Privacy requirements (Fair Information Practices) must be met entirely by data controllers in IaaS / PaaS models. Shared responsibility in SaaS but who is responsible for software design? Any security requirement that can be executed at the application or database level (e.g., authentication, access logs, encryption, password complexity, etc.) are responsibility of application manager. Justice is blind the law requires that things be done, but is not particular as to who does them IaaS / PaaS providers are left with a residuary of physical, facilities, network and hardware responsibilities, as well as logging and access controls for helpdesk and admin super-users. Copyright 2011 Accenture All Rights Reserved. 25 System Component Responsibility and Control by Cloud Type On Premise Infrastructure as a Service Platform as a Service Software as a Service User Managed Application Application Architecture System Software Database Operating System Physical security User Managed Application Application Architecture System Software Database Operating System Physical security User Managed Application Application Architecture System Software Database Operating System Physical security Cloud Application Application Architecture System Software Database Operating System Physical security Cloud Servers Storage Servers Storage Cloud Servers Storage Servers Storage Network Network Network Network Encryption Encryption Encryption Encryption Copyright 2011 Accenture All Rights Reserved

14 Common Fallacies Encrypting data absolves the cloud supplier of any responsibility for security If the application is stored on the cloud, data typically cannot be encrypted during use by the application Cloud host admin personnel or help desk often have some type of access (more common in PaaS than IaaS, very common in SaaS) All compliance can occur at the application level HIPAA, Spain, Italy, others have physical, hardware and other security requirements that can only be met by a data host. Copyright 2011 Accenture All Rights Reserved. 27 Perspective from a Cloud System Integrator Copyright 2011 Accenture All Rights Reserved

15 Accenture s position as a reseller of third-party cloud services Cloud Terms of Service Client requirements Copyright 2011 Accenture All Rights Reserved. 29 What is the problem? Public Cloud 1.0 business model (c. 2009) did not address clients legal compliance needs. Standard terms for cloud services are typically insufficient to meet clients regulatory requirements for regulated data, and are presented as non-negotiable -Result: regulated data could not be placed into the cloud. Situation began to change in 2011 This is now changing as some cloud suppliers see privacy and security compliance as a competitive differentiator More willingness to accept EU Model Clauses, to certify to independent security standards, to Copyright 2011 Accenture All Rights Reserved

16 Accenture s Solution the Mother of All Security Schedules (MOASS) For use only with IaaS and PaaS providers Based on 33 privacy and security laws in 29 countries Derived from the superset of security requirements Does not address PCI Data Security Standard (payment card data) Does not include requirements that can be executed as part of application management these are the responsibility of the application manager (either the client or the system integrator) Includes EU Model Clauses, a HIPAA Business Associate Agreement, and terms drawn from laws in most major economies. Suppliers who agree to terms can be said to comply with their portion of responsibilities under most privacy laws. Copyright 2011 Accenture All Rights Reserved. 31 A pragmatic approach to compliance in the cloud Copyright 2011 Accenture All Rights Reserved

17 Practical considerations Understand the landscape Going into the cloud with eyes open means: Understand that the cloud is a more self-service service model than traditional hosting or ASP services. Chances are excellent that your company will retain most of the responsibility for application-related compliance requirements. Do not expect to devolve a significant number of compliance responsibilities or a significant amount of liability for data breaches to the cloud. Do not expect a high degree of visibility into the technical operations of your cloud. Bottom line: cloud is low-cost, commoditized computing power that can create powerful business cases for its use, but you re largely on your own when it comes to compliance. Copyright 2011 Accenture All Rights Reserved. 33 Practical considerations Understand the data Identify: -- what data will be moved to the cloud? -- what law(s) is it subject to? -- which requirements can be performed at the application level, or using a la carte PaaS services? Whatever cannot be managed directly by the data controller / application manager must be flowed down to the cloud host by contract: -- Physical security -- Hardware requirements -- Access, authentication, logging, and workstation controls for cloud admin / helpdesk personnel with access to data Copyright 2011 Accenture All Rights Reserved

18 Practical Consideration - Understand the proposed cloud Where are the data centers? -- You don t need a street address just what countries? What supplier personnel can obtain access to production data and under what circumstances? -- Where (what countries) are these people based? What do standard terms and conditions include? -- EU Model Clauses or Safe Harbor? -- Attestations concerning specific security measures to be followed? -- Audit rights? If standard terms do not address all compliance requirements, will supplier agree to alter standard terms? -- If not, STOP. If you have unmet compliance responsibilities and the supplier won t accommodate them in the contract, change suppliers or explore hybrid cloud options. Does the supplier have credible audit reports it is willing to share, or will it allow you to perform a security review? What SLAs will the cloud commit to regarding uptime, availability of data, portability, etc? Copyright 2011 Accenture All Rights Reserved. 35 Practical Consideration - Manage expectations about flow-downs Recognize that cloud suppliers will not negotiate terms like other subcontractors: Willingness to negotiate terms at all may be tied to minimum monthly spend commitments Full rights of audit for data security are not likely to be agreed Unlimited liability for data breaches is basically impossible Important to understand what terms supplier has accepted with other clients and whether there is any opportunity to negotiate if terms do not appear to support your compliance requirements. Copyright 2011 Accenture All Rights Reserved

19 Resources Discussion Copyright 2011 Accenture All Rights Reserved. 37 Contact Information Contact: Ben Hayes Director of Legal Services, Data Privacy Compliance North America Copyright 2011 Accenture All Rights Reserved

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

IT Attestation in the Cloud Era

IT Attestation in the Cloud Era IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction

More information

Cloud Computing, SaaS and Outsourcing

Cloud Computing, SaaS and Outsourcing Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Business Technology Briefing: Fear of Flying, And How You Can Overcome It Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

EU data security and privacy trends

EU data security and privacy trends EU data security and privacy trends Top issues for HR and global mobility 26 29 October 2014 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst

More information

EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS

EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

SCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E

SCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

2014 Luxury & Fashion Industry Conference for Multinationals

2014 Luxury & Fashion Industry Conference for Multinationals 2014 Luxury & Fashion Industry Conference for Multinationals Privacy, Data Protection, and the Impact of Social Media and Online Behavioral Advertising on the Industry Anna Gamvros, Hong Kong Francesca

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Use of data processor (external business unit)

Use of data processor (external business unit) Published with the support of: Code of conduct for information security www.normen.no Use of data processor (external business unit) Supporting document Fact sheet no 10 Version: 4.0 Date: 12 Feb 2015

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement Law Seminars International December 9, 2014 Peter J. Kinsella 303/291-2328 The information provided in this presentation

More information

Use of data processor (external business unit)

Use of data processor (external business unit) Published with the support of: Code of conduct for information security www.normen.no Use of data processor (external business unit) Supporting document Fact sheet no 10 Version: 3.0 Date: 15 Dec 2010

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

Technology and data privacy Global perspectives

Technology and data privacy Global perspectives Technology and data privacy Global perspectives Anna Gamvros, Partner, Hong Kong Barbara Li, Partner, Beijing Ryan Berger, Partner, Vancouver 13 September 2018 Agenda Asia privacy developments HK and China

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1 Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1

By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1 By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1 The question is no longer: How do I move to the cloud? Instead, it s Now that I m in the cloud, how do I make sure

More information

Hot Topics in Privacy

Hot Topics in Privacy Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics

More information

Hot Topics in Privacy

Hot Topics in Privacy Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics

More information

Accelerate GDPR compliance with the Microsoft Cloud

Accelerate GDPR compliance with the Microsoft Cloud Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with

More information

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT

VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

CONSIDERATIONS BEFORE MOVING TO THE CLOUD CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Empowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms

Empowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms Empowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms Floris van den Dool, Managing Director, Security Lead EALA, Accenture Christian Franzen, Senior

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

PRIVACY POLICY. Personal Information We Collect

PRIVACY POLICY. Personal Information We Collect PRIVACY POLICY Bloomberg Finance L.P. and its operating agent Bloomberg L.P. (together, "the Bloomberg Group") respect the privacy rights of our users and are strongly committed to protecting your privacy.

More information

Privacy Policy. Act shall mean the Information Technology Act, 2000 and Rules thereunder as amended from time to time.

Privacy Policy. Act shall mean the Information Technology Act, 2000 and Rules thereunder as amended from time to time. Privacy Policy The Clearing Corporation of India Ltd. (CCIL) adheres to the stringent principles governing its operations as a Financial Market Infrastructure regulated by the Reserve Bank of India (RBI).

More information

Data Localization. Data Localization

Data Localization. Data Localization Data Localization Society of Corporate Compliance & Ethics Compliance & Ethics Institute 2016 Presenter: Web Hull Data Localization - Web.Hull@icloud.com 1 Data Localization It s All about Protecting the

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Cloud First Policy General Directorate of Governance and Operations Version April 2017 General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...

More information

Magento GDPR Frequently Asked Questions

Magento GDPR Frequently Asked Questions Magento GDPR Frequently Asked Questions Whom does GDPR impact? Does this only impact European Union (EU) based companies? The new regulation provides rules that govern how companies may collect and handle

More information

ECSA Assessment Report

ECSA Assessment Report ECSA Assessment Report Company Test Cloud Company Name of the cloudservice textcloud.com Website of the cloudservice 11.textcloud.com Project number #10652 Projectname Dummyproject Print date 2015-12-01

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics

20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics Global Privacy and Data Protection: Practical Risk Assessment and Governance 9 October 2013 Robert Bond, BA, CCEP, HonMIEx Head of Data Protection and Info Security, Speechly Bircham Marti Arvin, CHC-F,

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Managing IT in a Cloudy World

Managing IT in a Cloudy World 10:30 12:10 May 7, 2018 Room 240 Complex 112 th Annual Conference May 6-9, 2018 St. Louis, Missouri Moderator/Speakers: Allison E. Bradsher (Moderator) Chief Financial Officer, City of Raleigh, NC Phil

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Smart Software Licensing tools and Smart Account Management Privacy DataSheet

Smart Software Licensing tools and Smart Account Management Privacy DataSheet Smart Software Licensing tools and Smart Account Management Privacy DataSheet This Privacy DataSheet describes the processing of personal data (or personal identifiable information) by Smart Software Licensing

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Privacy Policy. Optimizely, Inc. 1. Information We Collect

Privacy Policy. Optimizely, Inc. 1. Information We Collect Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently

More information

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED

More information

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010 JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor

More information

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

How icims Supports. Your Readiness for the European Union General Data Protection Regulation How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection

More information

Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls. Stuart James & Delizia Diaz. Intellectual Property & Technology Webinar

Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls. Stuart James & Delizia Diaz. Intellectual Property & Technology Webinar Intellectual Property & Technology Webinar Cloud Computing - Reaping the Benefits and Avoiding the Pitfalls Stuart James & Delizia Diaz 37 Offices in 18 Countries Birmingham Wednesday, 11 July 2012 Speakers

More information

Managing SaaS risks for cloud customers

Managing SaaS risks for cloud customers Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost

More information

An Introduction to the ISO Security Standards

An Introduction to the ISO Security Standards An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY

More information

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA-HITECH: Privacy & Security Updates for 2015 South Atlantic Regional Annual Conference Orlando, FL February 6, 2015 1 HIPAA-HITECH: Privacy & Security Updates for 2015 Darrell W. Contreras, Esq., LHRM Gregory V. Kerr, CHPC, CHC Agenda 2 OCR On-Site

More information

OSIsoft PI Cloud Services Privacy Statement

OSIsoft PI Cloud Services Privacy Statement OSIsoft PI Cloud Services Privacy Statement Last updated: December 2016 Scope This notice applies to the use of those services and any other OSIsoft services that display or link to this notice. These

More information

All Aboard the HIPAA Omnibus An Auditor s Perspective

All Aboard the HIPAA Omnibus An Auditor s Perspective All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes

More information

Public vs private cloud for regulated entities

Public vs private cloud for regulated entities Public vs private cloud for regulated entities DC2: Restricted use The cloud is for everyone but not for everything 2 Opportunity enabler DC2: Restricted use Flexibility SAAS Public Accessibility Agility

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Core Elements of HIPAA The Privacy Rule establishes individuals privacy rights and addresses the use and disclosure of protected health information ( PHI ) by covered entities and business associates The

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Introductory guide to data sharing. lewissilkin.com

Introductory guide to data sharing. lewissilkin.com Introductory guide to data sharing lewissilkin.com Executive Summary Most organisations carry out some form of data sharing, whether it be data sharing between organisations within the group or with external

More information

GDPR Compliant. Privacy Policy. Updated 24/05/2018

GDPR Compliant. Privacy Policy. Updated 24/05/2018 GDPR Compliant Privacy Policy Updated 24/05/2018 Overview This privacy policy is in compliance with the General Data Protection Act which aims to empower all EU citizens data privacy and to reshape the

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

GDPR Workflow White Paper

GDPR Workflow White Paper White Paper The European Union is implementing new legislation with the objective of protecting personal data of citizens within the EU and giving them more control over how their data is used. Hefty fines

More information

Safeguards on Personal Data Privacy.

Safeguards on Personal Data Privacy. Safeguards on Personal Data Privacy. Peter Koo Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Maverick Tam Associate Director, Enterprise Risk Services Deloitte Touche Tohmatsu Deloitte ERS

More information

GDPR - Are you ready?

GDPR - Are you ready? GDPR - Are you ready? Anne-Marie Bohan and Michael Finn 24 March 2018 Matheson Ranked Ireland s Most Innovative Law Firm Financial Times 2017 International Firm in the Americas International Tax Review

More information

Privacy Law Doing Business In Canada

Privacy Law Doing Business In Canada Privacy Law Doing Business In Canada Does Canada Have Privacy Legislation? Federal Legislation Canada has a comprehensive legal framework that governs the collection, retention, use and disclosure of the

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Top Five Privacy and Data Security Issues for Nonprofit Organizations

Top Five Privacy and Data Security Issues for Nonprofit Organizations Top Five Privacy and Data Security Issues for Nonprofit Organizations Julia K. Tama, Esq. Jeffrey S. Tenenbaum, Esq. Association of Corporate Counsel Nonprofit Organizations Committee Legal Quick Hit MAY

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON

New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON The Spanish government has enacted a new regulation that further

More information

Data Privacy and Cybersecurity

Data Privacy and Cybersecurity Data Privacy and Cybersecurity Key Contacts Timothy C. Blank Boston +1 617 728 7154 Dr. Olaf Fasshauer National Munich +49 89 21 21 63 28 Joshua H. Rawson New York +1 212 698 3862 Translate Page In an

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information