Compliance Monitoring of Third-Party Applications in Online Social Networks

Size: px
Start display at page:

Download "Compliance Monitoring of Third-Party Applications in Online Social Networks"

Transcription

1 Compliance Monitoring of Third-Party Applications in Online Social Networks Florian Kelbert, Imperial College London Alexander Fromm, Technical University of Munich

2

3

4

5

6 Problem

7 Problem How to ensure that data is used in correspondence with policies?

8 Problem How to ensure that data is used in correspondence with policies?

9 Problem How to ensure that data is used in correspondence with policies?

10 Problem How to ensure that data is used in correspondence with policies?

11 Problem How to ensure that data is used in correspondence with policies?

12 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours

13 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app

14 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app You may not disclose confidential information to a third party without the prior explicit consent of Tumblr.

15 To start with...

16 To start with... Social Networks are trusted

17 To start with... Social Networks are trusted

18 To start with... Social Networks are trusted Third Party Applications are not

19 To start with... Social Networks are trusted Third Party Applications are not Thousands of apps and developers

20 Overview

21 Overview User Data OSN Operator (trusted)

22 Overview User Data OSN Operator (trusted)

23 Overview User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

24 Overview Applications (untrusted) User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

25 Overview Applications (untrusted) PaaS / SEE (trusted) User Data 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

26 Overview Applications (untrusted) User Data Libraries PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

27 Overview Applications (untrusted) Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

28 Overview Applications (untrusted) 2. Request Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

29 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

30 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

31 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

32 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) Policy Database Coordinator OSN Operator (trusted)

33 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

34 Overview 7. Request Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

35 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

36 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

37 Overview 7. Request 8. Response Applications (untrusted) User Data 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

38 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

39 Some details follow...

40 Some details follow... Policy Provisioning

41 Some details follow... Policy Provisioning

42 Some details follow... Policy Provisioning

43 Policy Provisioning

44 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date

45 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date

46 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours

47 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours

48 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action:

49 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action: process(data)

50 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: Action: <inhibit>

51 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>

52 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints

53 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints

54 Some details follow... Policy Provisioning Application Deployment

55 Some details follow... Policy Provisioning Application Deployment

56 Some details follow... Policy Provisioning Application Deployment

57 Application Deployment

58 Application Deployment Analysis of binary app to find

59 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN

60 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing

61 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them

62 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for

63 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for Data flow tracking Policy decisions

64 Some details follow... Policy Provisioning Application Deployment Event signaling for data flow tracking policy decisions

65 Event Signaling

66 Event Signaling Signal invocations of data sources data sinks

67 Event Signaling Signal invocations of data sources data sinks to decision engine:

68 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink?

69 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

70 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

71 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

72 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

73 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

74 Evaluation

75 Evaluation Between 15% and 41% performance overhead

76 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy

77 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy Problem: Real-world apps are not available

78 Summary

79 Summary Protection from data misuse is possible

80 Summary Protection from data misuse is possible Critical requirements

81 Summary Protection from data misuse is possible Critical requirements User awareness

82 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties

83 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties

Data Warehouse Risk Assessment (GDPR)

Data Warehouse Risk Assessment (GDPR) Data Warehouse Risk Assessment (GDPR) The new data protection law is effective from 25.05.2018. Individuals will have more control of their personal data and organisations will have to implement a risk

More information

LBI Public Information. Please consider the impact to the environment before printing this.

LBI Public Information. Please consider the impact to the environment before printing this. LBI Public Information. Please consider the impact to the environment before printing this. DGPC Framework People Executive management commitment Engaged management team Integrated governance organization

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

ISO27018 a step toward cloud standardisation? GuidelinesCambria

ISO27018 a step toward cloud standardisation? GuidelinesCambria ISO27018 a step toward cloud standardisation? GuidelinesCambria 32pt) Palo Alto Mark Webber, Partner Fieldfisher January 2015 Brussels / Düsseldorf / Hamburg / London / Manchester / Munich / Palo Alto /Paris

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Cloud Computing Briefing Presentation. DANU

Cloud Computing Briefing Presentation. DANU Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities

More information

1.2 This Privacy Policy applies to the games provided by GAMESTURE sp. z o. o. (GAMESTURE, We, Our company)

1.2 This Privacy Policy applies to the games provided by GAMESTURE sp. z o. o. (GAMESTURE, We, Our company) 1. Privacy 1.1 This Privacy Policy explains how information is collected and utilized by GAMESTURE sp. z o. o. seated in ul. Grodziska 8, 60-363 POZNAŃ 1.2 This Privacy Policy applies to the games provided

More information

HYPERFAST BROADBAND. Acceptable Usage Policy (GCAUP)

HYPERFAST BROADBAND. Acceptable Usage Policy (GCAUP) Acceptable Usage Policy (GCAUP) Acceptable Usage Policy grainconnect.com Contents 1. General Information 3 2. The Policy 3 2 1. General Information 1.1 Grain s relationship with other networks and ultimately

More information

Representation-Independent Data Usage Control

Representation-Independent Data Usage Control Representation-Independent Data Usage Control Alexander Pretschner, Enrico Lovat, Matthias Büchler Karlsruhe Institute of Technology, Germany {pretschner,lovat,buechler}@kit.edu Abstract. Usage control

More information

Public Sector Cloud Service Adoption: The Nigerian Case

Public Sector Cloud Service Adoption: The Nigerian Case Public Sector Cloud Service Adoption: The Nigerian Case Dr. Olayinka David-West & Immanuel Umukoro Department of Operations, Marketing and Information Systems Email: ydavid-west@lbs.edu.ng Outline v Introduction

More information

Security as a Architectural Concern, Chrome Arch, and NFP Measurement Reid Holmes

Security as a Architectural Concern, Chrome Arch, and NFP Measurement Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Security as a Architectural Concern, Chrome Arch, and NFP Measurement Reid Holmes

More information

Module 5: Performance Issues in Shared Memory and Introduction to Coherence Lecture 9: Performance Issues in Shared Memory. The Lecture Contains:

Module 5: Performance Issues in Shared Memory and Introduction to Coherence Lecture 9: Performance Issues in Shared Memory. The Lecture Contains: The Lecture Contains: Data Access and Communication Data Access Artifactual Comm. Capacity Problem Temporal Locality Spatial Locality 2D to 4D Conversion Transfer Granularity Worse: False Sharing Contention

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product

More information

Formal Methods in Software Engineering. Lecture 07

Formal Methods in Software Engineering. Lecture 07 Formal Methods in Software Engineering Lecture 07 What is Temporal Logic? Objective: We describe temporal aspects of formal methods to model and specify concurrent systems and verify their correctness

More information

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications

More information

IsoStack Highly Efficient Network Processing on Dedicated Cores

IsoStack Highly Efficient Network Processing on Dedicated Cores IsoStack Highly Efficient Network Processing on Dedicated Cores Leah Shalev Eran Borovik, Julian Satran, Muli Ben-Yehuda Outline Motivation IsoStack architecture Prototype TCP/IP over 10GE on a single

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

SCONE: Secure Linux Container Environments with Intel SGX

SCONE: Secure Linux Container Environments with Intel SGX SCONE: Secure Linux Container Environments with Intel SGX S. Arnautov, B. Trach, F. Gregor, Thomas Knauth, and A. Martin, Technische Universität Dresden; C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe,

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

etouches, Inc. Privacy Policy

etouches, Inc. Privacy Policy etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via

More information

When we refer to Toyota, we mean Toyota Motor Sales, USA, Inc. and its affiliated entities.

When we refer to Toyota, we mean Toyota Motor Sales, USA, Inc. and its affiliated entities. SOUTHEAST TOYOTA DISTRIBUTORS, LLC PRIVACY POLICY Last modified: September 15, 2016 The protection and proper use of information we collect about you is a responsibility we take seriously. Our primary

More information

Privacy Policy. Last Updated: August 2017

Privacy Policy. Last Updated: August 2017 Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016

Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context

More information

A Haskell and Information Flow Control Approach to Safe Execution of Untrusted Web Applications

A Haskell and Information Flow Control Approach to Safe Execution of Untrusted Web Applications A Haskell and Information Flow Control Approach to Safe Execution of Untrusted Web Applications Deian Stefan Stanford University April 11, 2011 Joint work with David Mazières, Alejandro Russo, Daniel B.

More information

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World Technology for a Changing World Architecture Assessment Case Study Single Sign on Approach Document PROBLEM: Existing portal has Sign on Capabilities based on the SQL Server database and it s not having

More information

Privacy Policy. I. How your information is used. Registration and account information. March 3,

Privacy Policy. I. How your information is used. Registration and account information. March 3, Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form

More information

A Tutorial on Runtime Verification and Assurance. Ankush Desai EECS 219C

A Tutorial on Runtime Verification and Assurance. Ankush Desai EECS 219C A Tutorial on Runtime Verification and Assurance Ankush Desai EECS 219C Outline 1. Background on Runtime Verification 2. Challenges in Programming Robotics System Drona). 3. Solution 1: Combining Model

More information

TABLE OF CONTENTS. Page

TABLE OF CONTENTS. Page TABLE OF CONTENTS Page Policy Statement... 1 What kinds of personal information do we collect?... 1 How do we collect and hold personal information?... 1 How do we hold personal information?... 2 Purposes

More information

ADMA Briefing Summary March

ADMA Briefing Summary March ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From

More information

Understanding the Platform

Understanding the Platform Understanding the Platform Contents 2 Contents Understanding the Platform... 3 Platform Architecture... 3 Services Layer...3 Understanding Jive Search... 4 About Cloud Search... 4 About On-Premise Search...5

More information

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Claes Nilsson Technology Area Group Leader Web Browsing Marcus Liwell Technology Area Group Leader

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Privacy-Preserving Photo Sharing based on Secure JPEG

Privacy-Preserving Photo Sharing based on Secure JPEG Privacy-Preserving Photo Sharing based on Secure Lin Yuan, Touradj Ebrahimi Multimedia Signal Processing Group - MMSPG Ecole Polytechnique Fédérale de Lausanne EPFL CH-1015 Lausanne, Switzerland Touradj.Ebrahimi@epfl.ch

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

Privacy Policy. Personal Data collected for the following purposes and using the following services:

Privacy Policy. Personal Data collected for the following purposes and using the following services: Privacy Policy This Application collects some Personal Data from its Users. Summary Personal Data collected for the following purposes and using the following services: Access to third party services'

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security.   m/ Product: Demo File Page No 1 https://www.dumpsplanet.com m/ Microsoft MS-101 EXAM Microsoft 365 Mobility and Security Product: Demo File For More Information: MS-101-dumps Question: 1 Your company uses Windows Defender Advanced

More information

An Access Control Model for Collaborative Management of Shared Data in OSNS

An Access Control Model for Collaborative Management of Shared Data in OSNS An Access Control Model for Collaborative Management of Shared Data in OSNS Ch. Aruna 1, G. Minni 2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 Asst. Professor, Dept.of

More information

You can find a brief summary of this Privacy Policy in the chart below.

You can find a brief summary of this Privacy Policy in the chart below. In this policy Shine TV Limited with registered office at Shepherds Building Central, Charecroft Way, Shepherds Bush, London, W14 0EE, UK (Company or we) informs you about how we collect, use and disclose

More information

Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks

Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks Alex Orso with William Halfond and Pete Manolios Georgia Institute of Technology {orso whalfond manolios}@cc.gatech.edu

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Managing SaaS risks for cloud customers

Managing SaaS risks for cloud customers Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost

More information

Data Protection and Privacy Policy PORTOBAY GROUP Version I

Data Protection and Privacy Policy PORTOBAY GROUP Version I Data Protection and Privacy Policy PORTOBAY GROUP 2018-03-07 Page 1 of 12 Contents Commitment to Data Protection and Privacy... 3 Definitions... 3 Entity Responsible for Processing... 4 Contact information

More information

Website and Marketing Privacy Policy

Website and Marketing Privacy Policy Website and Marketing Privacy Policy In this policy Endemol Shine UK and its group of companies (Company or we) informs you about how we collect, use and disclose personal data from and about you and your

More information

Beyond BYOD Mobility, Cloud and the Internet of Everything

Beyond BYOD Mobility, Cloud and the Internet of Everything Beyond BYOD Mobility, Cloud and the Internet of Everything COCCOC-2002 Donald Gunn, Program Manager Cisco IT Agenda Changing Environment Devices Security Support Cloud & Apps Questions COCCOC-2002 2015

More information

Implicit BPM Business Process Platform for Transparent Workflow Weaving

Implicit BPM Business Process Platform for Transparent Workflow Weaving Implicit BPM Business Process Platform for Transparent Workflow Weaving Rubén Mondéjar, Pedro García, Carles Pairot, and Enric Brull BPM Round Table Tarragona Contents Context Introduction 01/27 Building

More information

Data Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP

Data Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP Data Subject Access Request Procedure Page 1 Table of contents 1. Scope, Purpose and Users... 3 2. Reference Documents... 3 3. Data Subject Access Request ( DSAR )... 3 4. The Rights of a Data Subject...

More information

ALGORITHMIC TRADING AND ORDER ROUTING SERVICES POLICY

ALGORITHMIC TRADING AND ORDER ROUTING SERVICES POLICY ALGORITHMIC TRADING AND ORDER ROUTING SERVICES POLICY Please respond to: Trading Operations THE LONDON METAL EXCHANGE 10 Finsbury Square, London EC2A 1AJ Tel +44 (0)20 7113 8888 Registered in England no

More information

POLICY ON ALGORITHMIC TRADING AND ORDER ROUTING SERVICES

POLICY ON ALGORITHMIC TRADING AND ORDER ROUTING SERVICES Appendix 2 POLICY ON ALGORITHMIC TRADING AND ORDER ROUTING SERVICES [This is the LME s current proposal it may be subject to change following the feedback from the consultation.] Introduction 1. This document

More information

When and what information does Kantar Worldpanel collect?

When and what information does Kantar Worldpanel collect? Shoppix Privacy Policy [16 th march 2017] Kantar Worldpanel (herein referred to as we or us ) which operates Shoppix, recognises that your privacy is important and that you have the right to know what

More information

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines SOFTWARE as a Service PLATFORM as a Service INFRASTRUCTURE as a Service Empower Users Develop Apps Manage Machines 2013 2009 $2.9B $5.7B $6.9B $13.3B $14.0B $17.6B By 2014, cloud computing services will

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks 1 #mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks Bang Hui Lim, Dongyuan Lu Tao Chen, Min-yen Kan Web Information Retrieval / Natural Language Processing Group 1. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information

PRIVACY POLICY GUESTS WEB OR CONTACTS. The Privacy Policy is part of that govern this Website.

PRIVACY POLICY GUESTS WEB OR  CONTACTS. The Privacy Policy is part of that govern this Website. PRIVACY POLICY The Privacy Policy is part of that govern this Website. Who is responsible for the processing of your data? SERVATUR S.A. CIF: A35032200 Address: Calle Doramas, 4, 35129, Mogán (Las Palmas)

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction Stewart Watt & Co. is law firm and provides legal advice and assistance to its clients. It is regulated by the Law Society of Scotland. The personal data that Stewart

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

Privacy Policy V2.0.1

Privacy Policy V2.0.1 Privacy Policy V2.0.1 Effective date 25/5/2018 1. Introduction ParkMagic values the trust our users and customers place in us when they give us access to their Personal Information. The Privacy Policy

More information

Plus500UK Limited. Website and Platform Privacy Policy

Plus500UK Limited. Website and Platform Privacy Policy Plus500UK Limited Website and Platform Privacy Policy Website and Platform Privacy Policy Your privacy and trust are important to us and this Privacy Statement (Statement) provides important information

More information

Regulating Telemedicine: the

Regulating Telemedicine: the Regulating Telemedicine: the EU perspective ETSI ehealth workshop On telemedicine 6-7 May 2014 Céline Deswarte, Policy officer Unit Health and Well-Being European Commission i Table of Contents t 1) Legal

More information

<Document Title> INFORMATION SECURITY POLICY

<Document Title> INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY 2018 DOCUMENT HISTORY DATE STATUS VERSION REASON NAME 24.03.2014 Draft 0.1 First draft Pedro Evaristo 25.03.2014 Draft 0.2 Refinement Pedro Evaristo 26.03.2014

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Experiences with. data for use in apps

Experiences with. data for use in apps Experiences with publishing INSPIRE data for use in apps Presentation to: Author: Date: INSPIRE Conference 2014 Clemens Portele 2014 06 18 From INSPIRE Conference 2013: "How to use INSPIRE data?" INSPIRE

More information

At Sound United, we re committed to protecting and respecting your privacy.

At Sound United, we re committed to protecting and respecting your privacy. HEOS Privacy Policy At Sound United, we re committed to protecting and respecting your privacy. What is the purpose of this policy? This Policy explains when and why we collect personal information about

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

IBM Bluemix platform as a service (PaaS)

IBM Bluemix platform as a service (PaaS) Cloud Developer Certification Preparation IBM Bluemix platform as a service (PaaS) After you complete this unit, you should understand: Use cases for IBM Bluemix PaaS applications Key infrastructure components

More information

SDMS Assessor Web Portal User Manual PMKVY2.0

SDMS Assessor Web Portal User Manual PMKVY2.0 SDMS Assessor Web Portal User Manual PMKVY2.0 29 th MAY, 2017 Campus Management Corp., Campus Management, Talisma, CampusNexus, the Campus Management logo, the CampusNexus logo, and the Talisma logo are

More information

Cyberpeace A Guide to. Social Networking And Privacy Settings

Cyberpeace A Guide to. Social Networking And Privacy Settings Cyberpeace A Guide to Social Networking And Privacy Settings facebook Facebook gives the user the ability to choose his or her own privacy settings. By clicking the arrow and then the link that says Privacy

More information

Verified Volunteers. A division of Sterling Talent Solutions. Privacy Policy. Last Updated: June 21, 2016

Verified Volunteers. A division of Sterling Talent Solutions. Privacy Policy. Last Updated: June 21, 2016 Verified Volunteers A division of Sterling Talent Solutions Privacy Policy Last Updated: June 21, 2016 Verified Volunteers, a division of Sterling Talent Solutions ( Company, we, us, or our ) provide this

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Privacy Statement for DROP Connect Products and Services

Privacy Statement for DROP Connect Products and Services Privacy Statement for DROP Connect Products and Services Policy active as of February 7, 2018 This Privacy Statement for DROP Products and Services ( Privacy Statement ) describes information that Chandler

More information

Ensuring β-availability in P2P Social Networks

Ensuring β-availability in P2P Social Networks Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur R. Chowdhury*, Mahfuza Sharmin**, Reaz Ahmed*, Raouf Boutaba*, and Bertrand Mathieu Dept. of CSE, Bangladesh University of Engineering

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Making Smart Use of Geo-location Data

Making Smart Use of Geo-location Data Making Smart Use of Geo-location Data Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,

More information

Distributed and Cloud Computing

Distributed and Cloud Computing Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 9: Ubiquitous Clouds and The Internet of Things (suggested for use in 5 lectures in 250 minutes) Prepared by Kai Hwang University

More information

Streaming as a pattern. Peter Mattson, Richard Lethin Reservoir Labs

Streaming as a pattern. Peter Mattson, Richard Lethin Reservoir Labs Streaming as a pattern Peter Mattson, Richard Lethin Reservoir Labs Streaming as a pattern Streaming is a pattern in efficient implementations of computation- and data-intensive applications Pattern has

More information

Distributed File System Support for Virtual Machines in Grid Computing

Distributed File System Support for Virtual Machines in Grid Computing Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University

More information

Social Engineering Hacking the Human Element

Social Engineering Hacking the Human Element Social Engineering Hacking the Human Element cliftonlarsonallen.com Agenda Explain attacker motivations Identify Social Engineering techniques Identify sound security measures to protect critical assets

More information

SegSlice: new primitives for trustworthy computing

SegSlice: new primitives for trustworthy computing SegSlice: new primitives for trustworthy computing Sergey Bratus, PKI/Trust Lab, Dartmouth College Michael Locasto, George Mason U. Brian Schulte, George Mason U. A policy should prevent the system transitions

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the

More information

OneKey Mobile App USER GUIDE

OneKey Mobile App USER GUIDE USER GUIDE Updated in September 2017 All rights reserved. No part of this publication may be produced or transmitted in any form or by any means, including photocopying and recording, without seeking the

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions. Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

The Software Driven Datacenter

The Software Driven Datacenter The Software Driven Datacenter Three Major Trends are Driving the Evolution of the Datacenter Hardware Costs Innovation in CPU and Memory. 10000 10 µm CPU process technologies $100 DRAM $/GB 1000 1 µm

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices

More information

The Ladder to AI. Rob Thomas General Manager, IBM

The Ladder to AI. Rob Thomas General Manager, IBM The Ladder to AI Rob Thomas General Manager, IBM Analytics @robdthomas Value Clients Are Advancing Their Use of Data for Business Value Operational BI and Data Warehousing Most are here Self-Service Analytics

More information

Privacy Statement Tai Ceredigion Cyf Site Privacy Statement

Privacy Statement Tai Ceredigion Cyf Site Privacy Statement Privacy Statement Tai Ceredigion Cyf Site Privacy Statement Introduction to this Statement This Privacy statement relates to this site together with any associated software applications or devices. You

More information