Technical Information GDPR. May 2018

Size: px
Start display at page:

Download "Technical Information GDPR. May 2018"

Transcription

1 Technical Information GDPR May 2018

2 1 DATA PRIVACY - TECHNICAL INFORMATION This document details the technical components of our BluePoint GDPR compliant privacy information. If you haven t read our Privacy Information main document describing Legal Basis and your rights please do so now. Please consult the References section of this document for a link. It s important to understand what we store, what we do with it, who can see it, how we secure it, how long we hold it and where we store it. 1.1 WHAT WE STORE BluePoint is at its heart a Visitor Management Service (aka Software), so we need to store information about people. What we store depends on your role within the system Web User (Visitors and Contractors who can sign in) You can sign into BluePoint but are not a member of a site. You may have been invited to a site with your specified. We store the following information; About You Your name Your Company (if specified. We might guess this from your domain) Your Job Title (if you specified it. If you sign in using LinkedIn, we obtain this from your LinkedIn profile) Your photo (if you specify it, or if you have checked-in to a BluePoint site that requires photos). Your mobile number (optionally) Your support contact number Any secondary notification addresses. Your unique BluePoint Pass code Your password / OAuthv2 tokens About Site Activity The Appointments / Deliveries / Contractor Access Requests you ve been a part of. Metrics of your activity on BluePoint sites o Check-In times o Time on site (entry and exits) o Any assets signed out while on site o Any inductions (Health and Safety induction, NDAs etc) General Activity Changes to your profile and security Site User (Hosts or Operators) You can sign into BluePoint and are a member of a site. We store the following information, in addition to the above Web User fields; Your site contact number Security metadata your permissions on site

3 All activity on site based on your role (e.g. Receptionists; all data check-ins performed, etc) Ad-hoc Visitor You have been invited to a site as a Visitor without an address and cannot sign into BluePoint. We store the following information; Your name Your company name Your photo (at check-in, on sites that require it). Metrics for your Visit o Check-In time o Time on site (entry and exits) o Any assets signed out while on site Note: this cannot be used to uniquely identify you in real terms. 1.2 WHAT WE DO WITH IT This section describes what we (BluePoint system and support staff) do with your personal data we hold Web User (Visitors and Contractors who can sign in) Allows us to identify you and log into BluePoint. Allow us to send you invitations as a new Host or Operator. Record your Appointment / Delivery / Contractor activity in BluePoint sites Call you for support purposes (never marketing) on your Support Contact number Site Users (Hosts or Operators) In addition to the Web User data processing above; Allow you to perform authorised tasks on Site. Determine who can see you on site (see Who can see it ). Show you in Chat to other site users in scope Ad-hoc Visitor We don t do anything with your data, only store it for use at check-in. 1.3 WHAT OTHERS DO WITH IT Who else can view and process your personal data within BluePoint Web User (Visitors and Contractors who can sign in) Unless specified otherwise, your , mobile number and support contact are not visible. You can be invited by anyone with your full address You can be viewed by Operators in the Site(s) you are visiting or have visited o Only the Operators of the Tenancy you visited, or the Operators above them (for example, the Front of Desk team who welcomed you initially) You can be viewed by Hosts for your Appointments, and their delegates You can be viewed by whomever created your Appointment (note it might not be your Host)

4 o They can see your address in their Contacts and can request access to your mobile number, if you ve set one. Your Company administrators can view your BluePoint Activity and full contact details. No one can access (without your permission); Your address, unless they invite you using it Your mobile number Site Users (Hosts or Operators) Unless specified otherwise, your , mobile number and support contact are not visible. These are in addition to Web Users above. Other Site Users in your Tenancy can view you Operators in your Site(s) can view your name and Site Contact details o Limited to Operators above your tenancy, for example Site main reception teams. You can explicitly set to expose your and mobile to your tenant colleagues, your company colleagues and others in your site. By default, this is hidden Ad-hoc Visitor Site Receptionists use this data to identify and welcome you on site. 1.4 RETENTION PERIOD Appointments, Deliveries, Contractor Access Requests and related data are retained for 1 year by default, unless specified otherwise by the Data Controller. Your account / identity will be stored indefinitely until you choose to delete it, if applicable. You can invoke your Right to Restrict at any time. 1.5 HOW WE SECURE IT All data is stored securely in European Microsoft Azure data centres across a mixture of Azure SQL and CosmosDb. We use active breach detection, at rest encryption and complex authentication credentials with limited IP endpoint access, rotating monthly. All data is transmitted using SSL TLS bit encryption over HTTPS. We perform PEN tests on an annual basis using our excellent partners at RedScan the latest test results are available on request. For more information please download our BluePoint Security Design. 1.6 WHERE WE STORE IT We store all our data from go.bluepoint.uk.com in Microsoft s West Region data centre based in Northern Ireland. Some system telemetry does go to the East Coast region data centre in the United States, but this contains no personal data.

5 1.7 DATA BREACHES We actively monitor our infrastructure and storage for signs of data breach. If we suspect a breach, we will immediately investigate and raise details of the breach to the Intellectual Commissioners Office (ICO) within 72 hours. If you are affected by the breach you will be contacted automatically. If you suspect a breach of your personal data, please contact any of our personnel via our usual channels, such as support@bluepoint.uk.com. 1.8 TERMS AND ABBREVIATIONS BluePoint Activities Visit Visitor Appointment Contractor Access Request Delivery Check-In Any workflow that can be started in BluePoint; such as a new Appointment, a new Delivery or a new Contractor Access Request. When a visitor turns up on a BluePoint site. An individual invited to a BluePoint site. The container for one or more Visitors. A system used to permit Contractors to a Site. The BluePoint Delivery system The action of being identified on a BluePoint site for an Appointment / CAR. 1.9 REFERENCES Digital Forge Ltd. (2018, May). BluePoint Security Design. Digital Forge Ltd. (2018, May). Privacy Information. Retrieved from BluePoint: Information Commissioners Office. (2018, May). Guide to the General Data Protection Regulation. Retrieved from ICO.: Microsoft. (2017, January). Windows Azure Trust Centre. Retrieved from Microsoft Azure:

Privacy Information GDPR. May 2018

Privacy Information GDPR. May 2018 Privacy Information GDPR May 2018 1 PRIVACY INFORMATION The information below describes everything you need to know about the data we store and process about you. This statement complies with the latest

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Privacy Policy. Effective date: 21 May 2018

Privacy Policy. Effective date: 21 May 2018 Privacy Policy Effective date: 21 May 2018 We at Meetingbird know you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn

More information

Site Builder Privacy and Data Protection Policy

Site Builder Privacy and Data Protection Policy Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Lichfield Cruising Club 2000 Ltd. Privacy Policy

Lichfield Cruising Club 2000 Ltd. Privacy Policy Who we are We are Lichfield Cruising Club 2000 Ltd. A private company limited by guarantee, Company Registration Number 4102591 (England and Wales). We are a private boat club, our Registered Office Address

More information

GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY. A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018

GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY. A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018 GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY 25 2018 A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018 A 7-step practical guide to achieving and maintaining

More information

GDPR Compliant. Privacy Policy. Updated 24/05/2018

GDPR Compliant. Privacy Policy. Updated 24/05/2018 GDPR Compliant Privacy Policy Updated 24/05/2018 Overview This privacy policy is in compliance with the General Data Protection Act which aims to empower all EU citizens data privacy and to reshape the

More information

File Transfer and the GDPR

File Transfer and the GDPR General Data Protection Regulation Article 32 (2): In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from

More information

GDPR- the new General Data Protection Regulations. Staff PDM- 2 nd May 2018

GDPR- the new General Data Protection Regulations. Staff PDM- 2 nd May 2018 GDPR- the new General Data Protection Regulations Staff PDM- 2 nd May 2018 What, when, how... It will supersede the Data Protection Act 1998. It sets out new regulations about the sharing of personal data

More information

KantanMT.com. Security & Infra-Structure Overview

KantanMT.com. Security & Infra-Structure Overview KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...

More information

Privacy Notice Website/ Electronic Mailing List

Privacy Notice Website/ Electronic Mailing List Privacy Notice Website/ Electronic Mailing List This Privacy Notice informs you what to expect when we collect, use, retain and disclose your personal information when accessing www.door84.co.uk. It is

More information

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website,  , call or write to us. Privacy Policy Background This policy explains when and why we collect personal information about you; how we use it, the conditions under which we may disclose it to others and how we keep it secure.

More information

Gmail Integration for Salesforce and Dynamics 365

Gmail Integration for Salesforce and Dynamics 365 Gmail Integration for Salesforce and Dynamics 365 PRIVACY POLICY LAST MODIFIED: MARCH 12, 2019 2019 Introduction Welcome to Gmail Integration for Salesforce and Dynamics 365, a service provided by Akvelon,

More information

Due Diligence March 2018 Page 1 of 6. Company

Due Diligence March 2018 Page 1 of 6. Company Page 1 of 6 Company Company details Services offered Selectapension Limited, Selectapension House, Eridge Road, Crowborough, East Sussex, TN6 2SL, 01892 669494, www.selectapension.com. Registered in England

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

EIT Health UK-Ireland Privacy Policy

EIT Health UK-Ireland Privacy Policy EIT Health UK-Ireland Privacy Policy This policy describes how EIT Health UK-Ireland uses your personal information, how we protect your privacy, and your rights regarding your information. We promise

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

INTERNATIONAL SOS. Information Security Policy. Version 2.00

INTERNATIONAL SOS. Information Security Policy. Version 2.00 INTERNATIONAL SOS Information Security Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: August 2009 Updated: April 2018 2018 All copyright in these materials are

More information

PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD

PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD PRIVACY NOTICE ST BENEDICT S HOSPICE SUNDERLAND, LTD Registered Charity No: 1019410 Company Registration No: 02803974 VAT Number: 268486844 Registered Offices: St Benedict s Hospice & Centre for Specialist

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Membership Privacy Notice. 31 August 2018

Membership Privacy Notice. 31 August 2018 Membership Privacy Notice 31 August 2018 HOW WE USE YOUR INFORMATION Why we use your personal data: We typically use your personal information to comply with our legal obligations (such as checking your

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

Define Your Office 365 External Sharing Strategy

Define Your Office 365 External Sharing Strategy Define Your Office 365 External Sharing Strategy Tuesday, April 24, 2018 12:00-1:00 PM Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com

More information

NIPPON VALUE INVESTORS DATA PROTECTION POLICY

NIPPON VALUE INVESTORS DATA PROTECTION POLICY NIPPON VALUE INVESTORS DATA PROTECTION POLICY INTRODUCTION Nippon Value Investors KK and Nippon Value Investors, Inc. (together NVI ) are committed to protecting the privacy of individuals whose data they

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Privacy Policy. (GDPR compliance)

Privacy Policy. (GDPR compliance) Privacy Policy (GDPR compliance) Summary This privacy policy sets out the data processing practices carried out by MSE Meeting Rooms. We process personal information through the use of the telephone, a

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

Data Protection Privacy Notice

Data Protection Privacy Notice PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,

More information

Down Under Centre Employment Hub - Privacy Policy Introduction

Down Under Centre Employment Hub - Privacy Policy Introduction Down Under Centre Employment Hub - Privacy Policy Introduction Your Privacy is of the utmost importance, we are therefore committed to safeguarding your personal information. That starts with helping you

More information

DLB Privacy Policy. Why we require your information

DLB Privacy Policy. Why we require your information At Etive Technologies Limited (Etive) which operates Digital Log Book, (DLB). We are committed to protecting the privacy of our customers and the responsible management of personal information in accordance

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

Organization information. When you create an organization on icentrex, we collect your address (as the Organization Owner), your

Organization information. When you create an organization on icentrex, we collect your  address (as the Organization Owner), your Privacy policy icentrex Sweden AB Privacy Policy Updated: November 3, 2017 This privacy policy is here to help you understand what information we collect at icentrex, how we use it, and what choices you

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

8. AUTOMATED DECISION MAKING DURING DATA PROCESSING FURTHER INFORMATION FURTHER INFORMATION AND GUIDANCE CONTACT US...

8. AUTOMATED DECISION MAKING DURING DATA PROCESSING FURTHER INFORMATION FURTHER INFORMATION AND GUIDANCE CONTACT US... Contents 1. DEFFINITIONS... 2 2. INTRODUCTION... 2 3. WHO WE ARE... 2 4. JUSTIFICATION FOR PROCESSING PERSONAL DATA... 2 5. LAWFUL BASIS FOR COLLECTING AND PROCESSING PERSONAL DATA... 3 5.1 LEGITIMATE

More information

CONNX SECURITY OVERVIEW

CONNX SECURITY OVERVIEW CONNX SECURITY OVERVIEW ConnX is a web-based application which can be installed in a variety of technical environments. This purpose of this document is to advise you on the security aspects that are provided

More information

Just-Property Ltd GDPR Client Data Register

Just-Property Ltd GDPR Client Data Register GDPR Client Data Register Company Name Contact Justin Coughlan Role Managing Director Email jcoughlan@just-property.ie Contact number 01 631 52 51 1. Point of Contact with responsibility for Data Protection

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Plus500UK Limited. Website and Platform Privacy Policy

Plus500UK Limited. Website and Platform Privacy Policy Plus500UK Limited Website and Platform Privacy Policy Website and Platform Privacy Policy Your privacy and trust are important to us and this Privacy Statement (Statement) provides important information

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Number: Passing Score: 800 Time Limit: 120 min. Microsoft

Number: Passing Score: 800 Time Limit: 120 min.  Microsoft 70-339 Number: 70-339 Passing Score: 800 Time Limit: 120 min Microsoft 70-339 Managing Microsoft SharePoint Server 2016 (Beta) Version 1.0 Exam A QUESTION 1 You are the administrator for a SharePoint 2016

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Privacy by Design and Privacy by Default

Privacy by Design and Privacy by Default Privacy by Design and Privacy by Default Suk Kim, VP, General Counsel, Urban Airship, Inc. Amanda Gratchner, Principal, IdeaLegal, LLC Alex Wall, Privacy Counsel, Marketo, Inc. The General Data Protection

More information

HENLEY LIVE PRIVACY NOTICE

HENLEY LIVE PRIVACY NOTICE HENLEY LIVE HENLEY LIVE PRIVACY NOTICE ABOUT US This Privacy Notice explains the nature of the personal information that the University and the Henley Business School processes for the purposes of the

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Want to change the communications you get from us?

Want to change the communications you get from us? What is a privacy and cookie policy? At St Anne s Community Services, we are committed to keeping the trust and confidence of everyone who is in contact with us. It is important that you know we record

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

Number: Passing Score: 800 Time Limit: 120 min. Microsoft Managing Microsoft SharePoint Server 2016 (Beta) Version 1.

Number: Passing Score: 800 Time Limit: 120 min. Microsoft Managing Microsoft SharePoint Server 2016 (Beta) Version 1. 70-339 Number: 70-339 Passing Score: 800 Time Limit: 120 min Microsoft 70-339 Managing Microsoft SharePoint Server 2016 (Beta) Version 1.0 Exam A QUESTION 1 You are the administrator for a SharePoint 2016

More information

MAID2CLEAN (FRANCHISE) LIMITED

MAID2CLEAN (FRANCHISE) LIMITED Privacy Notice - www.maid2clean.co.uk website 1. About this notice This policy notice describes how we collect and process personal data when an individual ( data subject ) uses our website www.maid2clean.co.uk,

More information

Grand Orange Lodge of Ireland Privacy Notice

Grand Orange Lodge of Ireland Privacy Notice Grand Orange Lodge of Ireland Privacy Notice Introduction The Grand Orange Lodge of Ireland is registered with the Information Commissioner s Office for the purposes of compliance with the Data Protection

More information

Website Privacy Notice

Website Privacy Notice This privacy notice explains the processing of personal data on the website of Assurity Consulting Ltd (including the entity of Assurity Consulting Holdings Ltd). Assurity Consulting Ltd is committed to

More information

The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment

The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment 1. INTRODUCTION 1.1 This Privacy Impact Assessment (PIA) CCTV and BWC is recommended in The Surveillance Camera Code

More information

Smile IT Ltd Privacy Policy. Hello, we re Smile IT Ltd. We offer computer and network support to businesses and home computer users.

Smile IT Ltd Privacy Policy. Hello, we re Smile IT Ltd. We offer computer and network support to businesses and home computer users. Smile IT Ltd Privacy Policy Hello, we re Smile IT Ltd. We offer computer and network support to businesses and home computer users. At Smile IT we value our clients and we re committed to protecting your

More information

Connect Authenticate

Connect Authenticate Connect Authenticate Streamlined, Secure Credentials If you have a password manager, you re not alone. Technology has made it easier to do our jobs and improve our operations, but at the same time it means

More information

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

PII Policies and Procedures

PII Policies and Procedures PII Policies and Procedures HEALTHCARE BENEFIT SERVICES INC. Kirk Peters HEALTHCARE BENEFIT SERVICES INC. 2061 BOCA RATON BLVD. SUITE 202 BOCA RATON, FL Table of Contents What is PII... 2 PII Overview...

More information

Data Protection Impact Assessment (DPIA) Last Updated: 21 June, 2018

Data Protection Impact Assessment (DPIA) Last Updated: 21 June, 2018 Data Protection Impact Assessment (DPIA) Last Updated: 21 June, 2018 About CareMonkey CareMonkey is an online and mobile platform for Forms, Medical Records and Field Trip Management. CareMonkey is designed

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Understand & Prepare for EU GDPR Requirements

Understand & Prepare for EU GDPR Requirements Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,

More information

DRAFT Privacy Statement (19 July 2017)

DRAFT Privacy Statement (19 July 2017) DRAFT Privacy Statement (19 July 2017) European Reference Networks for Rare, Low Prevalence and Rare Diseases Clinical Patient Management System (CPMS) 1. What is the ERN Clinical Patient Management System?

More information

PORTICO PRIVACY NOTICE

PORTICO PRIVACY NOTICE PORTICO PRIVACY NOTICE Portico is committed to protecting and respecting your privacy. We take your privacy very seriously and we ask that you read this Privacy Notice carefully as it contains important

More information

Redkite Data Protection and Privacy Statement

Redkite Data Protection and Privacy Statement Redkite Data Protection and Privacy Statement March 2018 Version Control Date Version No. By whom 28 November 2017 1.0 D. Arber 09 January 2018 1.1 D. Arber 30 March 2018 1.2 D. Arber Table of Contents

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

DATA PROTECTION POLICY. Introduction:

DATA PROTECTION POLICY. Introduction: DATA PROTECTION POLICY Introduction: Data: FOTA is a charity which supports the delivery of the Duke of Edinburgh s Award (DofE), Junior Award Scheme for Schools and other accredited learning programmes

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit

EU GDPR & ISO Integrated Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso integrated-documentation-toolkit EU GDPR & https://advisera.com/eugdpracademy/eu-gdpr-iso-27001-integrated-documentation-toolkit Note: The documentation should preferably be implemented in the order in which it is listed here. The order

More information

Layer Security White Paper

Layer Security White Paper Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY

More information

RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM

RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM BACKGROUND In 2014 RFIDentikit launched its Accreditation & Pass Management system, ALLOWME, to run seamlessly alongside its RFID Pass Scanning, sister

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016

Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

Welcome! Ready To Secure Access to Your Microsoft Applications?

Welcome! Ready To Secure Access to Your Microsoft Applications? Welcome! Ready To Secure Access to Your Microsoft Applications? During the Webinar Audio In presentation mode until end Control Panel View webinar in full screen mode Feel Free to submit written questions

More information

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture: DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should

More information

TeamViewer 12 Manual Management Console. Rev

TeamViewer 12 Manual Management Console. Rev TeamViewer 12 Manual Management Console Rev 12.1-201704 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of content 1 About the TeamViewer Management Console 4 1.1 About the Management

More information

Security Best Practices. For DNN Websites

Security Best Practices. For DNN Websites Security Best Practices For DNN Websites Mitchel Sellers Who am I? Microsoft MVP, ASPInsider, DNN MVP Microsoft Certified Professional CEO IowaComputerGurus, Inc. Contact Information msellers@iowacomputergurus.com

More information

Privacy Policy. Information we collect about you

Privacy Policy. Information we collect about you Privacy Policy Briefly.co.za ( we, and us ) respects the privacy of its users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. This Privacy Policy describes

More information