How To Know If A Cloud Service Is Right For You
|
|
|
- Ilene Atkins
- 5 years ago
- Views:
Transcription
1 Cloud Services Risks and Concerns Final Report 1/5/2014 Team Members Team Member Frank Blalark* David Carmichael Brett Chambers* James Daniel Dennis Feldman Cliff Johnston Rob Stanfield Amy Van Epps Affiliation University Registrar College of Engineering College of Liberal Arts College of Health and Human Sciences Contracts and Licensing College of Agriculture IT Security & Policy Library Science * Team leaders Executive Summary Cloud based services have become commonplace and often seem to be an easy and fast solution to meet business and personal needs. Contracts and user agreements are being entered into by the University and by individuals at the University in increasing numbers and frequency. While these services often offer capabilities needed to meet business requirements, they also contain risks which are often not obvious to the parties entering into agreements. These include fiscal, legal, security, and reliability concerns. It also appears that work and personal use of such applications is increasingly mixed in nature. To address these concerns the committee chose to list known concerns and risks, research how cloud services are being used in University business currently, identify methods for raising awareness of risks and appropriate procedures, and recommend resources that meet University approval for user consideration. Page 1
2 Scope of Investigation: The committee identified the following objectives for investigation: a) Risks and concerns with cloud based solutions This was suggested as an outcome to the MS Office Alternatives Team 5 project where they found that: To help determine the readiness of the Purdue community in terms of cloud-based solutions our survey asked about the use of other cloud-based solutions. About 80% have a Facebook account that they view and of those, 83% view it at least once a week. For itunes, 70% have an account and 77% use it at least once a month. Based on this information, we believe most people who responded are comfortable with cloud-based alternatives. The following list of considerations should to be examined for all cloud-based solutions before entering into agreements: i) Service Quality/Cost/Support/Guarantees (1) Service Level Agreements/Terms of Support (Are there warranties of services provided? Was the service vetted through a RFP that outlined requirements of service before entering agreements? What happens when service levels are broken? What communication methods exist to address and remediate service failures? How is support provided for use of product? ) (2) Vendor Lock-in (Does using a cloud service make it difficult to switch providers in the future due to proprietary formatting or service features? Is data stored in a proprietary format? Can it be recovered if a contract or agreement is terminated? How long is data accessible after agreement termination?) (3) Price containment (True cost of service? Can the benefit of using the cloud service versus using an enterprise service be measured? Are there any stipulations that the price cannot be raised at will or by a certain percentage per year? Are there hidden costs such as over-quota usage charges? Are there data retrieval/purging charges? Is the service being considered material to the operations of Purdue or the mission?) (4) Exit strategy (How does the University back out of service provider use/contract?) (5) Service Provider Reliability (Is the service provider stable as a company? Can the service provider grow to meet future needs? Is the service provider open to change requests and product enhancement requests?) ii) Legal Considerations (1) Terms of use/license (These agreements are often acknowledged by the end user of a particular product and not reviewed by the University. There are questions surrounding these agreements which need to be answered on Page 2
3 case-by-case basis. Who can change these terms? Is a new agreement required when terms change? How are service consumers notified of changes to terms? Was the service vetted through contracts and procurement office?) (2) Intellectual Property protection and laws (IP laws differ by country. Where is the provider located and what country laws apply? Who owns the data and is that spelled out in the contract/agreement?) (3) Indemnification (What service provider protections are included in contract or agreement? What Purdue responsibilities and protections are included in agreements? In the case of user-entered agreements, what end-user responsibilities are included? Can these be transferred to the University in the case of misuse by an end-user? Who is responsible for the contract/agreement once entered into?) (4) E-Discovery (How is data retrieved when needed? Can it be retrieved by court order? What is the data retention policy of the provider?) (5) Ecommerce (Does the service provide transaction capabilities? Is it compliant with University monetary practices and regulations?) (6) Regulatory reporting (Is it possible to report on or audit service for compliance? FERPA, HIPAA, SOCII) (7) Appropriate Use (Does the data produced or stored by the cloud service fall into the sensitive or restricted categories as defined by Purdue policy at If so, does the service provide adequate protections to meet compliance?) iii) Security and Privacy of Data (1) Access Management (Who can access content? Can service be managed by non-account holder? How does or can the vendor use data for analytics/marketing/resale? Can data be accessed when primary account holder is not available? How are accounts authenticated to access data? Who controls authentication?) (2) Data Protection (How is data loss prevented by cloud provider? Is data encrypted?) (3) Responsibility (What are the responsibilities of the service provider, University and service users in the event of a data breach? How is reporting handled? Are there established remediation plans and consequences?) (4) Reputation Risks (In the event of data compromise or loss what risk is there to Purdue s reputation?) (5) Logging (Does the service allow access to logs of data and service usage? What tools are available to detect improper access?) iv) Data Ownership and Management (1) Control of content (Can/does the vendor expose data to third parties? Can the data leave US based storage facilities? Can content be fully and permanently deleted? How is data recovered from the service provider in the Page 3
4 case of withdrawal of use? What are data retrieval options in case a service provider goes out of business?) (2) Data Standards (Is it possible to assign/ use own data definitions/meta-data for compliance with reporting/metrics?) (3) Platform Integration (Can data from the cloud service be used with other applications in use by the University?) (4) Worker knowledge (Will the use of this service displace enterprise workers and knowledge? Is that knowledge proprietary or easily transferable? Can such knowledge workers be easily re-integrated n the case of bringing the service back to the enterprise?) b) Identify where there are cloud-based solutions being used currently i) A detailed list of reported services in use is attached in Appendix A. It is obvious from the findings that cloud services are being heavily used at the University in all capacities of the business. The responses were limited so there is good reason to believe the attached list is not exhaustive and other services are also in common use. ii) Most services in use are not being reviewed by Procurement and Contracts. The committee recommends a strongly worded statement encouraging everyone to contact Procurement Services through a cloud service hotline before agreeing to any contract or terms of service. The details are listed in the recommendations below. iii) It is also interesting to note that there are software packages which contain cloud components such as Endnote which users may not think about. Even cell-phone backup software often stores information the cloud storage which could contain Purdue proprietary data. c) Raise awareness about the potential risks associated with cloud-based solutions i) The committee has agreed that a user education campaign should be used to raise awareness of risks and appropriate use of cloud services. A detailed plan is outlined in the recommendations below. d) Provide a concept for the creation of a list of related technical resources available i) Purdue University either provides or has contracted with providers for most service requirements. Sometimes these services are not well advertised or explained to service consumers such as data storage. Sometimes usage of external services is just a personal choice. A matrix of currently internally provided, contracted or approved services along with what solution they provide may assist consumers in making Page 4
5 better choices on picking a cloud service provider particularly when integrated with the awareness and training recommendations of this report. A brief example is included in recommendations but will need to be further developed. Recommendations Purdue currently has a webpage titled Cloud Computing Consumer Guidelines at which was last updated 11/21/11. This document contains some good information but needs to be updated with improved user-friendly wording and by breaking out some components. a) Create a website which contains the following items: i) A homepage that explains what cloud services are in simple language and why it is important to be cautious about selecting a cloud service provider. This page should include either further information or links to other pages detailing the following with an emphasis on simplicity and ease of use. ii) A list of considerations based on the report above to assist consumers in making wise choices on cloud service consumption. iii) A list of example scenarios and what should be considered in each case. (recommendation D below) iv) Training materials to include a short video or videos on cloud service selection and introducing the hotline (recommendation D below) v) Information on where to call to have questions answered or a contract/agreement examined and approved. (recommendation C below) vi) Links to data classifications, related policies, relevant documents vii) Page that lists current enterprise provided solutions, contracted solutions and preapproved services (recommendation E below) b) The following statement should be included in the above pages where appropriate: Cloud-based services, even those that may be provided free of charge, should be reviewed and approved by Procurement Services if they are to be used for conducting University business or storing any University data. Only University Procurement Services are authorized to enter into a contract on behalf of Purdue University. Individual employees and departments that wish to use a cloud-based service to conduct University business should contact Procurement Services. Page 5
6 A phone number and address for the hotline should be included with the above statement. c) Create a hotline resource A resource through Procurement Services for employees to contact with questions or to have a contract or agreement evaluated. This may be a new number and or currently in-use ones but needs to be obvious where to call on the webpages listed above in recommendation A-v. d) Create consumer education materials To be included in recommendation A-iii and A-iv above. These should be easy to understand and include information of how to evaluate cloud services, what data can be stored in these solutions, and where to go for further help. Video tutorials would be helpful to users and tend to get more attention than a long list of text. e) Create a matrix of currently provided solutions, contracted solutions and preapproved services by service type. For example - If you are considering one of the following solutions please consider using these approved resources: File Sharing (like Dropbox, Box.net, OneDrive) Name: Service Provider: For more information: Syncplicity Purdue University URL File Locker Purdue University URL Research Data Depot Purdue University URL Page 6
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Questions to ask about a cloud service. enter
Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Computing Questions to Ask
Cloud Computing Questions to Ask Pursuant to the Federal Cloud Computing Strategy 1 and the Cloud First policy, agencies are required to evaluate safe, secure cloud computing options before making any
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
Mobile App Developer Agreements
Mobile App Developer Agreements By Alan L. Friel Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT
SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT This SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT ( Agreement ) is between Drake Software, LLC ( Drake ) and Licensee (as defined below). PLEASE READ THIS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
ISAAC Risk Assessment Training
ISAAC Risk Assessment Training v2013 Information Technology Risk Management 1 Agenda Why Assess? Information Security Standards Risk Assessment Process Using ISAAC Information Technology Risk Management
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Overview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
The Second National HIPAA Summit
HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
LabArchives Electronic Lab Notebook:
Electronic Lab Notebook: Cloud platform to manage research workflow & data Support Data Management Plans Annotate and prove discovery Secure compliance Improve compliance with your data management plans,
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.
Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity Amy Mushahwar, Esq. What s New? Not That Much. Some have their heads in the cloud we prefer to stay down in the weeds and know
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Acquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect Sponsored by Netskope Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Part 1. Introduction Data Breach:
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
IT Forum 2-11-2013 UW-Madison Records Management Program. UW Archives and Records Management
IT Forum 2-11-2013 UW-Madison Records Management Program Records facilitate and sustaining day-to-day university operations. Records support organizational activities such as student admissions, research
Frequently Asked Questions: The New Computer and Software Services Tax Effective 7/31/13
Frequently Asked Questions: The New Computer and Software Services Tax Effective 7/31/13 The Department has received a number of questions about the new sales and use tax applicable to computer system
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION
Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION iinet Limited ACN 068 628 937 Phone: 13 22 58 Westnet Pty Ltd ACN 086 416 908 Phone: 1300 786 068 Adam Internet Pty Ltd ACN 055
WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES
USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES See how offering cloud and hybrid backup solutions drives business and leads customers to adopt other cloud services. If you re an IT provider, you know
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Managing Data Storage in the Public Cloud. October 2009
October 2009 Table of Contents Introduction...1 What is a Public Cloud?...1 Managing Data Storage as a Service...2 Improving Public Cloud Storage CDMI...4 How CDMI Works...4 Metadata in CDMI... 6 CDMI
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Quick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
IP Address Management: Smoothing the Way to Cloud-Based Services
White Paper IP Address Management: Smoothing the Way to Cloud-Based Services What You Will Learn Cloud computing offers many operational advantages to service providers. An important element of successful
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
APPENDIX A that is not acceptable. Arbitration settled by arbitration arbitration shall be held in New Jersey substantive law of New Jersey
APPENDIX A The attorneys in the Office of University Counsel at the University of Colorado Denver Anschutz Medical Campus review many different types of contracts on behalf of the University. Legal review
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Continued Investigation of Risks and Concerns with
August 7, 2015 Continued Investigation of Risks and Concerns with Cloud-based Solutions and Storage of Personal Data Team Members Name College/Affiliation Email Phone Linda Baer Comptroller s Office [email protected]
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure
Cyber security standard
Cyber security standard Brief description This *Standard specifies security standards that protect *ICT systems and data from unintended or unauthorized access, damage or destruction. Related policies
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
YORK REGION DISTRICT SCHOOL BOARD
WORKING DOCUMENT YORK REGION DISTRICT SCHOOL BOARD Policy and Procedure #194.0, Use of Technology Procedure #194.1, Use of Non-Board Devices Procedure #194.2, Password Management The Use of Technology
Executive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Web Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
Information Technology Internal Audit Report
Information Technology Internal Audit Report Report #2014-05 July 25, 2014 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope and Testing
Campus-wide Planning for Business Continuity and Emergency Operations
Campus-wide Planning for Business Continuity and Emergency Operations Gloria Hauck Thiele & Alan McCord University of Michigan Office of the University CIO EDUCAUSE 2000 Agenda Welcome, Overview, Icebreaker
CONSIDERATIONS BEFORE MOVING TO THE CLOUD
CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits
Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015
Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015 James B. Wieland, Principal, Ober Kaler David Holtzman, VP of Compliance, CynergisTek Welcome The slides
Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality
Overview The sparkweave suite of applications is next-generation secure communication and collaboration technology for the changing needs of the enterprise. Sparkweave combines the best attributes of consumer
Privacy Policy and Terms of Use
Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy
