Legal Project Management: A Tool for Corporate Counsel Topic #1

Size: px
Start display at page:

Download "Legal Project Management: A Tool for Corporate Counsel Topic #1"

Transcription

1 Legal Project Management: A Tool for Corporate Counsel Topic #1 Ann Marie McDonald, PMP CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012

2 Definitions Project : A temporary endeavour undertaken to create a unique product, service or result * Legal terms: a matter or a case Project Management : The application of knowledge, skills, tools and techniques to project activities to meet the project requirements * * Project Management Institute A Guide to The Project Management Body of Knowledge

3 PM in Action: PM divides projects into phases: Define scope of work what are the objectives Project plan defines tasks, team, stakeholders, milestones, deliverables, deadlines, communications, risks Budget / Cost Executing in accordance with project plan Monitoring and Control review against scope, budget, deadlines throughout Close post project review with client

4 PM Considerations: Key Project considerations: Scope, time, cost, quality, risk, communication, human resources Project plans : outline project blueprint Work breakdown structures: outline who will do the work & when

5 Application of PM to Legal Work Why? The economy Most legal projects have processes/steps A proven business approach to managing work LPM: applies structured format of PM to legal work Achieves better alignment between price & value of legal services Greater predictability on legal costs & results

6 LPM & Corporate Counsel Better budgeting More certainty on external legal spending Enhanced risk management Better RFP discipline Clarifies desired outcome at beginning Enhanced communication / collaboration between corporate counsel & outside counsel

7 Questions? Ann Marie McDonald McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.

8

9 Risk Management: Identifying and Reducing Legal Liability Risks Topic #2 Matthew T. Hayes CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012

10 Risk Management Risk exposure to the chance of injury or loss; a hazard or dangerous chance effect of uncertainty on objectives (CSA-ISO31000) Risk Management identification, assessment, and prioritization of risks coordinated activities to direct and control an organization with regard to risk (CSA-ISO31000)

11 Risk Process

12 Risk Identification Legal Risks Unrewarded Regulatory, Tax, Environmental, Health & Safety Rewarded Contract, Acquisitions, Business Activity

13 Risk Identification Identification of the Legal Risk Business Operations Regulatory Historical (claims history) Financial statements Experts Acts and regulations Permit inventory

14 Risk Identification Example Environmental Phase I Report - Inventory of hazardous substance - History of releases - Business operations - Property ownership - Inventory of contaminated property

15 Risk Analysis Causes and sources of risk Internal and external Positive and negative consequences Who bears the risk? Likelihood that those consequences can occur

16 Risk Evaluation Considers the results of the risk analysis What are significant risks? High probability - High Cost Low probability - Low Cost Select risk

17 Risk Treatment Take the risk to pursue the opportunity Avoid the risk Change the probability Change the consequence Share the risk

18 Risk Treatment Example - Insurance - Coverage Analysis does the coverage cover the risk? - Examples Typical exclusions for faulty workmanship, pollution, territorial limits, Errors & Omission - Reduce coverage duplication - Speciality policy Boiler & Machinery, E&O, Contractors E&O, D&O - Business Interruption insurance - Builders Risk

19 Risk Treatment Example - Contract - Indemnities Counter-party risk assessment - Agreements to insure Certificate of insurance, policy wording, and deductible(sir) Additional insured, waiver of subrogation, cross-liability, cancellation - Limitation of liability clauses - Liquidated Damages (New Brunswick) - Audit clauses - Protection of intellectual property - Control

20 Risk Treatment Internal Controls Team of experts approach Audit and outside experts Reporting structure Training Recognizing the risk

21 Questions? Matthew Hayes

22 McInnes Cooper s presentation s are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.

23 Cloud Computing & BYOD: Issues for Corporate Counsel Nick Whalen (in coordination with David Fraser) CCCA, NB Chapter, Law Firm Series, Part III November 30, 2012

24 Cloud computing Distributed computing architecture in which data & applications reside on servers separate from the user & accessed via the Internet Applications & data generally accessible from anywhere, provided you are connected Numerous intended benefits + some downsides Several Cloud models

25 Back to the beginning? Personal Corporate

26 Legal Issues In Cloud Computing 1. Privacy 2. Contracting 3. HR

27 1. Privacy: Issues & Benefits Issues: - Loss of direct custody / control of information - Jurisdictional movement - Take it or leave it service agreements - Loss of portability Benefits: - Professional management - Data is not easily lost in Cloud

28 Forbidden Due to Privacy Issues? Risk Management: accountability & security - Understand where you stand now - Understand increased or decreased risks associated with cloud computing - Can increase in risk (if any) be managed? - Are you currently managing risk/will cloud computing help you better manage risk?

29 Managing Privacy Issues PIPEDA: - original custodian remains responsible for personal information regardless of management - cannot outsource or delegate (s ) : An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party

30 Jurisdiction Provincial Variances: MB, SK, ON, NB, NL, PE: do not limit public sector outsourcing NS, BC, ALTA: Public sector only QC: not prohibited; notification may be required No private sector laws prohibit using cloud computing OSFI Guideline B-10 regulates it as an outsourcing

31 USA Patriot Act Realities Canadian law mirrors most USA Patriot Act provisions (Anti-Terror, CSIS) Canada has a secret court allowing ex parte applications for warrants Canada has warrantless wiretap powers for international communications Significant Canada US cooperation

32 Privacy Diligence in the Cloud Original custodian should take a risk-based approach to fulfilling responsibilities to protect & safeguard personal information: - sensitivity of the information? risk to the data? role of jurisdiction in that risk?

33 2. Contracting Match diligence level to importance of what is being outsourced Ease of migration on / off the service Realistic assessment: Current situation vs. service being offered Benchmark against status quo vs. nirvana Improvements to costs/ privacy/ security/ service levels? Increased risks to privacy/ security/ control/ internal expertise/ IT morale? Mitigation?

34 Contracts Wish List

35 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service

36 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent

37 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security

38 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation

39 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms

40 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms 6. Migration of your information at the end of term; no retention of your information

41 Contracts Wish List 1. Limited use of your data to your purposes only; data should be held in trust for customer; no IP grants except as needed to provide service 2. No disclosures without consent & obligation to resist orders to disclose information without consent 3. Liquidated damages for any disclosure without consent; full indemnity only vs. limitations of liability re: privacy & security 4. Obligation to cooperate with you in any regulatory investigations; will not deal with any regulators re: your information without your participation 5. Define scope of current implement of safeguards to protect information; commitment to provide improved security offered to other customers on same terms 6. Migration of your information at the end of term; no retention of your information 7. Disaster recovery plans

42 3. HR Issues Does Cloud require updated policies re: use of the company IT infrastructure? How do employee privacy expectations apply to a cloud resource? Employees may circumvent processes which are hard to learn, or decrease their ability to do perform tasks can this process be successfully ported to the cloud?

43 BYOD: Bring Your Own Device Use of personal devices for company business / connected to company IT infrastructure Some level of BYOD is inevitable Not just fanboys Increases costs: $170k per 1000 devices* * Aberdeen Group, CIO magazine, April 2012

44 BYOD: Legal Issues Discoverability Employee forfeiture of certain rights Rights to destroy data on device Rights to copy data on device Recent case law re: employee privacy expectation: R. v. Cole, 2012 SCC 53

45 BYOD: Policy Considerations Employees typically responsible for technical support, warranties & repairs to BYOD hardware Employer may manage data plans to leverage group discounts IT s right to wipe the device Impact of sharing BYOD or sale of BYOD by employee Devices meet specified technical standards & requirements to enforce password & encryption rules Scope: Smartphones, tablets, all personal computing devices? IT s right to access all data on the device Reasonable expectations of loyalty & good faith service vs. employee s reasonable expectation of privacy & ownership in data on own device.

46 R. v Cole, 2012 SCC 53 Teacher with work-issued laptop computer; policy allowed incidental personal use of laptop computer During routine maintenance tech found hidden folder with nude / partially nude photographs of underage female student Notified principal & copied photos to a CD; principal seized laptop & copied temporary Internet files onto a second disc, then handed laptop & 2 discs over to police Police - without a warrant reviewed contents, created a mirror image of the hard drive for forensic purposes & charged teacher with possession of child pornography & unauthorized use of a computer Defence: searches violated Charter s.8

47 R. v Cole: Police search Computers reasonably used for personal purposes whether found in the workplace or the home contain information that is meaningful, intimate, & touching on the user s biographical core Canadians reasonably expect privacy in information contained on work computers, at least if personal use is permitted / reasonably expected Workplace policies & ownership are relevant but not determinative Court must consider the totality of the circumstances to determine whether privacy is a reasonable expectation in the particular situation A reasonable though diminished expectation of privacy is still a reasonable expectation of privacy protected by Charter s. 8 thus is subject to state intrusion only under the authority of a reasonable law

48 R. v Cole Statutory duty to maintain a safe school environment & by necessary implication a reasonable power to seize & search school-board issued laptop Police could not rely on same power Court did not consider intricacies of employer search & seizure; could imply commercial workplaces without a statutory duty involving vulnerable groups may not enjoy blanket search & seizure power OK for school to report findings to police BUT police could & should have obtained a warrant Information remained subject to accused s reasonable and subsisting expectation of privacy

49 R. v Cole: BYOD Lessons Heightened privacy expectation in BYOD s vs. workplace device Government employers: Policy permitting unreasonable search & seizure will offend employee s Section 8 rights Non-government employers: collection, use & disclosure of private internet search histories & non-work related information on BYOD hardware may not be reasonable & doing so would violate PIPEDA If no duty akin to maintain a safe school environment, may be no corresponding right to intrude on workplace privacy of employees, even in workplace owned computers Policies explicitly addressing balance risk of information theft vs. employee rights more likely to be upheld

50 Questions? Nick Whalen David Fraser

51 McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.

52 Avoiding & Managing Disputes: Tools for Corporate Counsel Eric LeDrew CCCA, NB Chapter, Law Firm Series, Part II November 30, 2012

53

54

55

56 Managing Disputes

57 Managing Disputes While Working DRB Model Board Mandatory referral Likely NOT binding

58 Managing Disputes After Work Finished Comprehensive Dispute Resolution System in every contract

59

60

61

62 Questions? Eric LeDrew

63 McInnes Cooper s presentations are prepared for information only and are not intended to be either a complete description of any issue or the opinion of our firm. McInnes Cooper should be consulted regarding any situation to which any topic discussed herein might apply.

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005 Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

The cloud thing: Privacy and cloud computing

The cloud thing: Privacy and cloud computing The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

MEDIATECH APPLICATION

MEDIATECH APPLICATION MEDIATECH APPLICATION FOR PURPOSES OF THE INSURANCE COMPANIES ACT (CANADA), THIS DOCUMENT WAS ISSUED IN THE COURSE OF LLOYD S UNDERWRITERS AND LIBERTY MUTUAL INSURANCE COMPANY S INSURANCE BUSINESSES IN

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

INDEX. bonded contract, 289 insureds, 243. misrepresentation, 291 obtaining, 242

INDEX. bonded contract, 289 insureds, 243. misrepresentation, 291 obtaining, 242 INDEX B non-conforming tender, 284 boiler and machinery insurance, performance bond 241 default by the obligee, 288 coverage, 243 failure to notify, 289 definition of the accident, 245 material variation

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

Mobile App Developer Agreements

Mobile App Developer Agreements Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records

Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records CMA POLICY Data Sharing Agreements: Principles for Electronic Medical Records/Electronic Health Records I. INTRODUCTION This document is intended to provide some interim guidance with respect to the main

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES A CONSULTATION REPORT OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS STANDING COMMITTEE 3 ON MARKET INTERMEDIARIES

More information

INDEPENDENT CONTRACTOR AGREEMENT THE UNIVERSITY OF MANITOBA. (the University ) - and - (the Contractor )

INDEPENDENT CONTRACTOR AGREEMENT THE UNIVERSITY OF MANITOBA. (the University ) - and - (the Contractor ) CAR Form No. I ICA Contract No. INDEPENDENT CONTRACTOR AGREEMENT AGREEMENT made as of the most recent date set out on page 6 hereof. BETWEEN: THE UNIVERSITY OF MANITOBA (the University ) - and - (the Contractor

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION

SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Protecting Saskatchewan data the USA Patriot Act

Protecting Saskatchewan data the USA Patriot Act Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

Credit Union Liability with Third-Party Processors

Credit Union Liability with Third-Party Processors World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with

More information

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability

More information

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015 Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University

More information

ACL Training and Consulting Services Terms

ACL Training and Consulting Services Terms ACL Training and Consulting Services Terms These ACL Training and Consulting Services Terms (the Services Terms ) apply to the training courses and/or consulting services provided by ACL Services Ltd.

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

RISK MANAGEMENT IN CONTRACTS

RISK MANAGEMENT IN CONTRACTS RISK MANAGEMENT IN CONTRACTS There are many circumstances in which an Institution will contract with another party including service contracts, sales agreements, leases, practicum placement and affiliation

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

CHARITY LAW BULLETIN NO. 302

CHARITY LAW BULLETIN NO. 302 CHARITY LAW BULLETIN NO. 302 FEBRUARY 27, 2013 EDITOR: TERRANCE S. CARTER GOING MOBILE: LEGAL CONSIDERATIONS FOR MOBILE APP DEVELOPMENT By Colin J. Thurston * A. INTRODUCTION Canadian charities and not-for-profit

More information

Credit Union Code for the Protection of Personal Information

Credit Union Code for the Protection of Personal Information Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve

More information

General Terms and Conditions

General Terms and Conditions Cloud Computing and Internet Services General Terms and Conditions 1 Definitions In this agreement: "The company" Triple C Cloud Computing Ltd.; "The customer" the receiver of services from the company;

More information

BOLT Software Technology Terms of Use Last Updated: November 4, 2015

BOLT Software Technology Terms of Use Last Updated: November 4, 2015 BOLT Software Technology Terms of Use Last Updated: November 4, 2015 1. Introduction; License Thank you for using the Bolt Software Technology ( we, our or Bolt ) Software As A Service ( SaaS ) available

More information

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013 CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

VOLVO CONSTRUCTION EQUIPMENT. CARETRACK LICENCE (Version 3 April 2010)

VOLVO CONSTRUCTION EQUIPMENT. CARETRACK LICENCE (Version 3 April 2010) CARETRACK LICENCE () This licence is issued by VOLVO CONSTRUCTION EQUIPMENT DIVISION, VOLVO GROUP UK LTD incorporated and registered in England and Wales with company number 2190944, whose registered office

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy, Security, and Risk Management in the Cloud Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (the "Agreement") is made as of the day of, 2015 ( Effective Date ), by and between ("Company"), located at and ("Subscriber"), located at. Both

More information

CENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT

CENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT CENTRAL SAVINGS BANK BUSINESS INTERNET BANKING AGREEMENT This Business Internet Banking Agreement ( Agreement ) contains the terms and conditions governing your use of Central Savings Bank s ( Bank ) Business

More information

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred

More information

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012

More information

3. Consent for the Collection, Use or Disclosure of Personal Information

3. Consent for the Collection, Use or Disclosure of Personal Information PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),

More information

Cloud Computing: Trust But Verify

Cloud Computing: Trust But Verify Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet

More information

Legal Cloud Computing: Concepts and Ramifications

Legal Cloud Computing: Concepts and Ramifications Legal Cloud Computing: Concepts and Ramifications April 27, 2010 Sébastien Lapointe, Holmested & Associés s.e.n.c. Legal Aspects of Cloud Computing Normal businesses using cloud computing ( CC ) face a

More information

Accountable Privacy Management in BC s Public Sector

Accountable Privacy Management in BC s Public Sector Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY

More information

Zurich Public Sector Solution

Zurich Public Sector Solution Zurich Public Sector Solution Solutions for an Evolving Public Sector Managing risk for a Public Sector entity has taken on an unprecedented level of complexity. Consider for a moment the evolving risks

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

Overview. What are operational policies? Development, adoption, implementation

Overview. What are operational policies? Development, adoption, implementation Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview

More information

REPAIR SERVICES AND PROCESSING FEES.

REPAIR SERVICES AND PROCESSING FEES. BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT ) FORM A LEGAL AGREEMENT BETWEEN YOU INDIVIDUALLY, OR IF YOU ARE AUTHORIZED

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

The Manitoba Child Care Association PRIVACY POLICY

The Manitoba Child Care Association PRIVACY POLICY The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information

More information

CyberEdge Insurance Proposal Form

CyberEdge Insurance Proposal Form Note to the Proposer Signing or completing this proposal does not bind the Proposer, or any individual or entity he or she is representing to complete this insurance. Please provide by addendum any supplementary

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,

More information

Insights and Commentary from Dentons

Insights and Commentary from Dentons dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more

More information

SmartBizLoans.com Terms and Conditions of Service

SmartBizLoans.com Terms and Conditions of Service SmartBizLoans.com Terms and Conditions of Service PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS OF USE BEFORE USING THIS WEB SITE. BY ACCESSING THIS WEBSITE YOU AGREE TO BE BOUND BY THE TERMS AND

More information

CONSULTING SERVICES AGREEMENT THE CORPORATION OF THE CITY OF GUELPH, an Ontario municipality. ( City ) and. an Ontario. ( Consultant").

CONSULTING SERVICES AGREEMENT THE CORPORATION OF THE CITY OF GUELPH, an Ontario municipality. ( City ) and. an Ontario. ( Consultant). Page 1 of 13 CONSULTING SERVICES AGREEMENT This consulting services agreement is between: THE CORPORATION OF THE CITY OF GUELPH, an Ontario municipality ( City ) and, an Ontario ( Consultant"). The parties

More information

In the Agreement, "we", us" and "our" refer to Computerisms. "you" or "your" refers to the Client.

In the Agreement, we, us and our refer to Computerisms. you or your refers to the Client. Web Hosting Agreement! This Agreement covers the terms and conditions under which Computerisms provides web-hosting services to the agreeing party. As an organization or individual applying for web-hosting

More information

Privacy Management Program Toolkit Health Custodians Personal Health Information Act

Privacy Management Program Toolkit Health Custodians Personal Health Information Act Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Service Description: Dell Backup and Recovery Cloud Storage

Service Description: Dell Backup and Recovery Cloud Storage Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Drawing Lines in the Cloud: Jurisdictional Access to Data. Nancy Libin Mary Ellen Callahan

Drawing Lines in the Cloud: Jurisdictional Access to Data. Nancy Libin Mary Ellen Callahan Drawing Lines in the Cloud: Jurisdictional Access to Data Nancy Libin Mary Ellen Callahan OVERVIEW Introduction to Cloud Computing Definition Benefits and Risks How does the physical location of data or

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

The HR Skinny: Effectively managing international employee data flows

The HR Skinny: Effectively managing international employee data flows The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study

More information

INSURANCE REQUIREMENTS (A) This insert applies to the following State Contracts:

INSURANCE REQUIREMENTS (A) This insert applies to the following State Contracts: INSURANCE REQUIREMENTS (A) This insert applies to the following State Contracts: General Conditions of the Construction Contract Design/Bid/Build (SC-6.23), or Contractors Agreement Design/Bid/Build (SC-6.21),

More information

Managing Outsourcing Arrangements

Managing Outsourcing Arrangements Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS

More information

MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION

MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION 1. APPLICANT INFORMATION 1. Name of Organization or Legal Entity (Applicant) including any subsidiaries: (please show complete name as you

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

Managing General Agents (MGAs) Guideline

Managing General Agents (MGAs) Guideline Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission

More information

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Telstra Corporation Limited ABN 33 051 775 556 Standard Terms and Conditions of Purchase Order

Telstra Corporation Limited ABN 33 051 775 556 Standard Terms and Conditions of Purchase Order Telstra Corporation Limited ABN 33 051 775 556 Standard Terms and Conditions of Purchase Order APPLICATION These Terms and Conditions apply to the Purchase Order unless the Purchase Order refers to a formal

More information

TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE

TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE Welcome to the Textura Construction Payment Management ( CPM ) System. By clicking

More information

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B.

PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. PRIVACY, ANTI-SPAM AND YOUR BUSINESS: WHERE DO WE STAND? Presented by: Cameron Mitchell B.A., LL.B. Privacy The focus of my presentation will be on two thing that have made marketing and contacting clients

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

GUIDANCE NOTE ON OUTSOURCING

GUIDANCE NOTE ON OUTSOURCING GN 14 GUIDANCE NOTE ON OUTSOURCING Office of the Commissioner of Insurance Contents Page I. Introduction.. 1 II. Application...... 1 III. Interpretation.... 2 IV. Legal and Regulatory Obligations... 3

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

Evolving Issues for Healthcare IT Contracting

Evolving Issues for Healthcare IT Contracting Evolving Issues for Healthcare IT Contracting By: Alan L. Friel This client advisory is based in part on an article appearing in FierceHealthIT. The emergence of mega-suite vendors, more use of the cloud,

More information

Speakers. Michael R. Overly, Partner, Yusuf Cassim, Senior Corporate Counsel & VP,Charles Schwab & Co., Inc. Foley & Lardner LLP

Speakers. Michael R. Overly, Partner, Yusuf Cassim, Senior Corporate Counsel & VP,Charles Schwab & Co., Inc. Foley & Lardner LLP 1 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago, IL 60654 312.832.4500

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013 1 TERMS OF USE As of February 3, 2013 The following terms and conditions of use ( Terms of Use ) form a legally binding agreement between you (an entity or person) and Southwest Airlines Co. ( Southwest

More information

Table of Contents. Acknowledgement

Table of Contents. Acknowledgement OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...

More information