ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
|
|
- Gary Maxwell
- 8 years ago
- Views:
Transcription
1 ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
2 European Privacy Seal Kirsten Bock Independent Centre for Privacy Protection ULD Unabhaengiges Landeszentrum fuer Datenschutz Schleswig-Holstein, Germany ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
3 Privacy Seal Schleswig-Holstein IT product audit Scope: regional privacy and IT-security regulations Voluntary but regulated by law Legal and technical evaluation checked by independent certification body Criteria based on legal regulations 31 accredited experts More than 40 certifications since 2003 ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
4 Certified Products Welfare & employment administration Firewall Data and file destruction SAP testing tools Distributed storage of radiographs Remote file server (encrypted data) PDA system for hospitals Parking using mobile phone Windows Update Service ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
5 EuroPriSe Project Project funding: 1,3 Mio by EU Duration: June 07 November 08 Consortium: 9 Partner from 8 EU-Countries Aim: Introduction of a European Privacy Seal certifying that an IT product or service can be deployed in compliance with European data protection regulations BORKING CONSULTANCY ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
6 EuroPriSe Objective A certificate, based on a transparent and revisable procedure supervised by independent authorities or trustees Uniform criteria based on the European Privacy Directives valid throughout the European Member States A positive incentive to develop and deploy privacy compliant and privacy enhancing products and services on the market ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
7 EuroPriSe Advantages Compliance Acceptance Trust Market advantage ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
8 EuroPriSe Procedure IT-Product or Service Admitted Experts check Product or Service Granting of Privacy Seal Accredited Certification Body checks Evaluation Report ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
9 EuroPriSe Criteria Compliant deployment incl. configuration and documentation Principles: Legitimacy of data processing Right of the data subject Transparency & audit ability Data economy Data avoidance Data security European Data Protection Directive (95/46/EC) and Directive on privacy and electronic communications (2002/58/EC) Recognition of established standards in IT security (e.g. Common Criteria (ISO 15408:2005) and IT security management (e.g. ISO ff.) ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
10 EuroPriSe Experts Expert admittance procedure Proof of qualification: legal and/or technical Training & work specimens Proof reliability and independence Publication of trained experts and area of qualification in public register list 1st Expert Workshop in Vienna November 20, 2007 ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
11 European Privacy Seal Board Accreditation and coordination of certification bodies Ensure and sustain consistent procedures on certification & evaluation Ensure and sustain uniform criteria ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
12 Thank you! Questions? Contact: Kirsten Bock ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS Who do you Trust? A Look at Privacy Seals Christine A. Varney Partner Hogan & Hartson LLP Washington, D.C.
More informationAll rights reserved. 2011, EuroPriSe/ULD
January 2011 Position paper on certifiability of online behavioural advertising systems according to EuroPriSe Follow-up EuroPriSe - European Privacy Seal at the Unabhängiges Landeszentrum für Datenschutz
More informationCloud Computing - Starting Points for Privacy and Transparency
Computing - Starting Points for Privacy and Transparency Ina Schiering Ostfalia University of Applied Science Wolfenbüttel, Germany IFIP Summerschool: Privacy and Identity Management for Life, Helsingborg,
More informationShort Public Report. on the IT product and IT-based service. ProCampaign 2.0
Short Public Report on the IT product and IT-based service ProCampaign 2.0 1. Name and version of the IT product and IT-based service: IT product: ProCampaign, version 2.0 IT-based service: ProCampaign,
More informationPII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
More informationTrust. The essential ingredient for innovation. Thomas Langkabel National Technology Officer Microsoft Germany
Trust The essential ingredient for innovation Thomas Langkabel National Technology Officer Microsoft Germany How do we understand innovation? Innovation is the conversion of knowledge and ideas into new
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS Privacy The USA Model Joel Winston Division of Privacy and Identity Protection September 26, 2007 ÉE E 29
More informationCloud Service Providers Overcoming security and compliance barriers
Cloud Service Providers Overcoming security and compliance barriers Dr Theodoros Stergiou, CEng, CPMM Security Solutions Product Manager & Cloud Security Officer Agenda A brief introduction Security barriers
More informationData protection legislation influence on cloud computing from local as well as EU perspective
mag. Andrej Tomšič Deputy Information Commissioner Information Commissioner Data protection legislation influence on cloud computing from local as well as EU perspective CLASS conference 2012 I Cloud Assisted
More informationThe Regulatory framework and VoIP. Merijn Schik, DG INFOSOC
The Regulatory framework and VoIP Merijn Schik, DG INFOSOC Disclaimer This presentation is personal to its author and does not necessarily reflect the official position of the Commission No inferences
More informationIdentification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationOffice Exchange SharePoint Lync
Office Exchange SharePoint Lync Comprehensive tools to do your best work Enterprise-grade cloud services Office 365 is A HIGHLY CONFIGURABLE, but not a customizable solution. MICROSOFT DATA CENTER
More informationEuropean Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT
European Cloud Computing Cloud standards Strategy Ken Ducatel DG CONNECT The Cloud Computing Strategy The European Commission's strategy 'Unleashing the potential of cloud computing in Europe' Adopted
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS CONFERENCE
29e CONFÉRE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIV ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS CONFERE Standards Briefing
More informationSSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
More informationBSI Baseline Protection Manual - How to measure IT-Security -
BSI Baseline Protection Manual - How to measure IT-Security - Thomas Biere Federal Information Security Agency, Germany Prejudices against IT-Security! IT-Security - causes a lot of expenses - is too expencive
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
More informationCloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationCompliance, Incentives and Penalties: Hot Topics in US Health IT
Compliance, Incentives and Penalties: Hot Topics in US Health IT Table of Contents Introduction... 1 The Requirements... 1 PCI HIPAA ARRA Carrot and Stick How does third party assurance fit into the overall
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationCONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
More informationPublic Procurements. Where rules are defined. Tirana May27-28, 2013. ADRIARadNet 2nd Meeting
Where rules are defined Tirana May27-28, 2013 1 Suggested manuals INTERACT Point Vienna Public procurement in IPA cross-border cooperation programmes with EU Member States in shared management - Version
More informationMatthias Hauss- SRC Security Research & Consulting GmbH October 2011. PCI DSS Requirements in the Context of European Data Protection Law
Matthias Hauss- SRC Security Research & Consulting GmbH October 2011 PCI DSS Requirements in the Context of European Data Protection Law About SRC Two pillars: Card-based Payment Systems and IT security
More informationInformation Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
More informationWith Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
More informationNIST-Workshop 10 & 11 April 2013
NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationISO 9001 Quality Management System Lead Auditor Training (IRCA)
ISO 9001 Quality Management System Lead Auditor Training (IRCA) Course Description BSI s Quality Management Systems (QMS) Auditor/Lead Auditor Training Course (ISO 9001) course teaches the principles and
More informationTable of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
More informationGOVERNMENT HOSTING. Cloud Service Security Principles Memset Statement. www.memset.com
GOVERNMENT HOSTING Cloud Service Security Principles Memset Statement Summary - March 2014 The Cabinet Office has produced a set of fourteen Cloud Service Security Principles to be considered when purchasers
More informationSecurity Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
More informationEuropean Cloud. Computing Strategy. State of play: 1-2014. Ken Ducatel DG CONNECT
European Cloud State of play: 1-2014 Computing Strategy Ken Ducatel DG CONNECT What is at stake? Cloud as a growth engine Boost GDP : 940 bn cumulative impact for 2015-2020 250bn in 2020 Boosts productivity
More informationINFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
More informationMOBILE AGENT BANKING SYSTEM PRODUCT BENEFITS AND FEATURES
MOBILE AGENT BANKING SYSTEM PRODUCT BENEFITS AND FEATURES Version 1.1 January 2013 INTRODUCTION This document provides at one glance all the features of maviance Mobile Microfinance System. It aims to
More informationUnderstanding ISO 27018 and Preparing for the Modern Era of Cloud Security
Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Presented by Microsoft and Foley Hoag LLP s Privacy and Data Security Practice Group May 14, 2015 Proposal or event name (optional)
More informationHow Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationCUSTOMER MANAGEMENT IN THE CLOUD
CUSTOMER MANAGEMENT IN THE CLOUD SPEED UP YOUR BUSINESS WITH CRM2HOST. COST-EFFICIENT, FLEXIBLE, INTUITIVE AND SECURE. Business requirements steadily grow. You need efficient processes and central information
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationMobile Application Development Platform Comparison
Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison
More informationCloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)
More informationHow To Write A Pca Dss Compliance Solution For Gameplan Group Ltd
PCI Compliance reporting solution This document describes GamePlan s PCI DSS compliance solution and its ability to assist organisations to be compliant with the regulatory requirements of the Payment
More informationCOCIR contribution to the public consultation on Personal Data Protection in the EU 1
COCIR contribution to the public consultation on Personal Data Protection in the EU 1 European Coordination Committee of the Radiological, Electromedical and Healthcare IT Industry Bd. A. Reyers 80, 1030
More informationEARTHLINK BUSINESS. Simplify the Complex
EARTHLINK BUSINESS IT Simplify the Complex IS YOUR IT VENDOR A TRUSTED BUSINESS PARTNER? With all of the hype surrounding virtualization, cloud computing, and managed services, how do you assess the best
More informationSAP RAPID DEPLOYMENT FOR APPLICATION LIFECYCLE MANAGEMENT WAVE TEST MANAGEMENT INFORMATION SHEET FOR SERVICE DELIVERY
SAP RAPID DEPLOYMENT FOR APPLICATION LIFECYCLE MANAGEMENT WAVE TEST MANAGEMENT INFORMATION SHEET FOR SERVICE DELIVERY In the context of application lifecycle management testing is a significant phase to
More informationSecure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems
Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile
More informationboth the Employer and Contractor teams access and administer contracts in a common environment available 24hrs per day, 365 days per year
CEMAR is a simple to deploy, web-based solution to contract management and reporting with a minimum 99.5% availability. CEMAR achieves compliance through tailored workflow that: covers NEC3 ECC, TSC, PSC,
More informationFTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
More informationOB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
More informationImplementation of the EU Innovative Doctoral Training Principles at the University of Rome La Sapienza
Implementation of the EU Innovative Doctoral Training Principles at the Mattia Crespi PhD Steering Commission UZDOC - Doctoral Studies in Uzbekistan Structuring doctoral training in Europe First Study
More informationANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationAn Agile and Scalable Mobile Workplace
Innovapptive Technology Thought Leadership - Executive Report An Agile and Scalable Mobile Workplace Innovapptive SAP Mobile Hosting Solutions Brief Innovapptive s SAP Mobile Hosting Solutions for SAP
More informationRun SAP for Savings and Speed in the Cloud Presentation for ASUG, September 28, 2011
Run SAP for Savings and Speed in the Cloud Presentation for ASUG, September 28, 2011 2011 RUNE2E, llc Mike Culver Amazon Web Services Ray Kelly RunE2E, LLC SAP Solutions & Services from RunE2E Gold Channel
More informationClinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
More informationTIPS FOR SELECTING AN ELECTRONIC HEALTH RECORD FOR YOUR PRACTICE 2009
TIPS FOR SELECTING AN ELECTRONIC HEALTH RECORD FOR YOUR PRACTICE 2009 It is important to understand that if you wish to participate in incentive payments offered by the federal government, you will need
More informationPrivacy aspects of Cloud Computing
Privacy aspects of Cloud Computing Survey of Dell and Intel (2012) 1500 interviewed persons of small companies: 28% are against Cloud Computing 35% are not familiar with the topic tremendous fear for sensible
More informationEAaaS Cloud Security Best Practices
EAaaS Cloud Security Best Practices A Technical White Paper by Sennovate Inc Jan 2013 EAaaS Cloud Security Best Practices Page 1 Introduction: Cloud security is an ever evolving subject that is difficult
More informationDRAFT. Erasmus+ Application Form for Accreditation - Call: 2014
- Accreditation of youth volunteering organisations General Information This form is to be filled out by organisations wishing to be accredited under the Erasmus+ programme. Please see the Erasmus+ Programme
More informationOnline/Cloud Services Trust challenges & eidentity-aspects
Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast
More informationCRM starter for the Chemical Industry. Industry-specific fixed-price package
CRM starter for the Chemical Industry Industry-specific fixed-price package CRM starter for the Chemical Industry Description & Scope Best-Practices process model for the chemical industry based on SAP
More informationSecurity Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
More informationNew Relic EU Data Protection Whitepaper
New Relic EU Data Protection Whitepaper November 2015 New Relic, Inc. 188 Spear Street San Francisco, CA 94105 1 Table of Contents I. Introduction II. Purpose III. Overview of Directive 95/46/EC IV. New
More informationAustralian Social Work Education and Accreditation Standards (ASWEAS) 2012. Guideline 1.3: Guidance on RPL, articulation and credit transfer
Australian Social Work Education and Accreditation Standards (ASWEAS) 2012 Guideline 1.3: Guidance on RPL, articulation and credit transfer Guideline 1.3: Guidance on RPL, articulation and credit transfer
More informationMAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2
MAKING WORK-AT-HOME WORK FOR YOUR COMPANY: PART 2 AGENDA IMPLEMENTING WORK-AT-HOME MANAGING YOUR PROGRAM RESOLVING COMMON ISSUES QUESTIONS IN REVIEW THE BUSINESS CASE FOR WORK-AT-HOME: Saves money Increases
More informationThe Art of Intervenability for Privacy Engineering
The Art of Intervenability for Privacy Engineering Marit Hansen Deputy Privacy and Information Commissioner Schleswig-Holstein, Germany marit.hansen@datenschutzzentrum.de Workshop Data Protection, Privacy,
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
Brewster New York 10509 What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an
More informationWork With Genesis Insurance Company
IN F O R M AT ION TEC HNOLOGY (IT ) SECURIT Y AT GEN ES I S security peace of mind You re covered. Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information
More informationEuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure!
Cloud Computing is the future! For sure! But secure! ISO/IEC JTC1 national day 2011 The EuroCloud Network EuroCloud Europe was founded on Jan., 22 nd 2010 in Paris Today EuroCloud is present in 27 European
More informationSSL User Authentication with the HTTP Security Server
SSL User Authentication with the HTTP Security Server Authored By: Lewis Colascione/Udi Ben-Reuven Date: April 2000 Purpose: To describe and document how to configure SSL User Authentication Credits: Version:
More informationof 28 September 2007 (Status as of 1 April 2010)
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Ordinance on Data Protection Certification (DPCO) 235.13
More informationSmart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Deliverable: Work Package Document WP3.7 D.3.7.2. FINAL
More informationHow companies leverage quality and quality certifications to achieve competitive advantage
How companies leverage quality and quality certifications to achieve competitive advantage Eize de Boer Systems & Services Certification International Business Development Manager Pharma Supply Chain for
More informationDruva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud
Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationCloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security
More informationQuality is Advantage
Quality is Advantage Administering Windows Server 2012 Course duration: 36 academic hours Exam Code: 70-411 This version of this course is built on the final release version of Windows Server 2012. Learn
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationCertum QCA PKI Disclosure Statement
CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia
More informationVacancy notice for Traineeships (4) in the Agency for the Cooperation of Energy Regulators (ACER) REFERENCE: ACER/TRAINEE/2014/AUTUMN
Vacancy notice for Traineeships (4) in the Agency for the Cooperation of Energy Regulators (ACER) REFERENCE: ACER/TRAINEE/2014/AUTUMN 1. WE ARE The Agency for the Cooperation of Energy Regulators (hereinafter
More informationVodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
More informationPrivacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh Hanan.Abulebdeh@ed.gov System Owner: Ganesh Reddy Ganesh.Reddy@ed.gov Office of Federal Student
More informationRAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
More informationFrom paper to electronic data
From paper to electronic data Bioindustrypark, October 10, 2013 Dr Alessandra Grande Ivrea GxP Test Facility QA Manager, Head Global BMT QA Research & Development Quality Assurance MerckSerono RBM Outline
More informationRecommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
More information(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
More informationClassification: Computer Information Technology Specialist II (CITS II) Information Security Unit Title Code: V08005 Pay Range: 33
Classification: Computer Information Technology Specialist II (CITS II) Information Security Unit Pay Range: 33 POSITION SUMMARY: The position provides professional and advanced technical expertise as
More informationComputing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure
Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure November 2011 18.11.2010 1 CIO s challenges 2010. Challenges of many CIOs in 2010: IT budgets approx. 20%
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationSection 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
More informationWhat are the compliance challenges of Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: COMPLIANCE What are the compliance challenges of Microsoft Office 365? Microsoft
More informationVendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
More informationCompliance and Unified Communication
Compliance and Unified Communication January 2015 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how
More informationKeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
More informationA Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
More information