Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools
|
|
|
- Brooke Sherman
- 10 years ago
- Views:
Transcription
1 Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools Nick Papanikolaou, Cloud and Security Lab, HP Labs Europe With special thanks to Nick Wainwright and Siani Pearson, HP Labs
2 Introduction In the context of cloud computing, accountability is all about developing a holistic approach to achieving trust and security in the cloud, encompassing Legal, Regulatory, and Technical mechanisms In this talk we will give an overview of the subject, emphasising the importance of international cooperation and consensus on these aspects
3 International Frameworks mentioning Accountability The notion of accountability appears in several international frameworks: OECD Privacy Guidelines (1980) Canada s Personal Information Protection and Electronic Documents Act (2000) Asia Pacific Economic Cooperation (APEC) Privacy Framework (2005) European Data Protection Directive 95/46/EC Also - Outputs of EU Article 29 Working Party Binding Corporate Rules
4 What is Accountability? In the business context, accountability is about complying with measures that give effect to practices articulated in given guidelines
5 Definitions of Accountability In the context of corporate data governance: Accountability is the obligation to act as a responsible steward of the personal information of others, to take responsibility for the protection and appropriate use of that information beyond mere legal requirements, and to be accountable for any misuse of that information. (Galway Project)
6 Accountability in the Cloud In the context of cloud, accountability is a set of approaches to addresses two key problems: Lack of consumer trust in cloud service providers Difficulty faced by cloud service providers with compliance across geographic boundaries Emphasis is on data protection, but the notion of accountability encompasses more than just privacy
7 Barriers to Cloud Adoption Lack of consumer trust in CSPs End users have increased expectations that companies with which they share their data will handle it responsibly End users perceive a lack of transparency and less control over their data as it shifts to the cloud Fear that governments might get access to data in their countries How to obtain redress in case of a problem? Difficulty of Compliance for CSPs Data flows are global and dynamic Transborder data flows international agreements Which courts should preside in case of a problem?
8 Accountable organisations ensure that obligations to protect data are observed by all who process the data, irrespective of where that processing occurs. User Data Printing Service Office Apps responsibility remediation CRM Service On Demand CPUs Data Storage Service transparency Cloud Provider #1 validation Enterprise Data Employee Service Service Cloud Provider #2 Data ILM Service Backup Service Service 3 Business Apps/Service Service Private Cloud The Internet
9 Key Differentiators for Accountable Cloud Service Providers Business reputation - trustworthiness enhanced Enterprises that are accountable will be perceived as more responsible and Business advantage in going beyond mere legal expectations and providing good data stewardship
10 Cloud service users Chain of Accountability Cloud service supply chain/network Regulators, auditors, business governance Cloud service service service service Preventive Detective Corrective Trusted services supporting accountability Cloud service users: Service providers: Regulators/auditors: control and transparency over how their data is used, and support in obtaining redress techniques to make services more trustworthy, satisfy business policies and allow differentiation assurance about compliance with policies and regulations
11 Solutions: Achieving Organisational Accountability Organisational accountability comprises: A company-wide commitment to conformance with external standards of responsibility and data stewardship Use of mechanisms to put privacy policies in effect Having systems in place for internal and external oversight Allowing for transparency and individual participation Having means of remediation and external enforcement
12 A Vision of Governance Continuity BCR Proc Proc. Proc. BCR Proc BCR Proc Proc. Proc. BCR Proc BCR Cont Data Controller Proc. BCR Proc Proc. BCR Proc Data Subject 1 2
13 Who are the Stakeholders? Technology-providers Partners Standards groups (CSA, ENISA,...) Infrastructure providers Shared infrastructure CSP Service providers SMEs: CSPs (data processor), primary service provider using CSPs (data controller) Large companies: data processor, managed services Trusted third parties TTP providing certification services Insurance providers Service users Auditor End users Data subjects Employees Regulators etc DPAs EU Commission Other intermediaries Consumer groups Brokers
14 Solutions: Mechanisms for Achieving Accountability in the Cloud Shared SOFTWARE services Shared PLATFORM services Shared INFRASTRUCTURE services SLA Management Incident Mgmt. Trust Management Policy Enforcement Impact Assessment Monitoring status and violations Audit and Certification
15 Classes of Technical Mechanisms for Accountability Preventive controls Risk analysis and decision support tools Policy enforcement mechanisms (access control, obligations,...) Data Obfuscation Identity management Detective controls Intrusion detection systems Transaction logs Language frameworks for expressing security properties Verification tools Corrective controls Incident management plans Dispute resolution methods Other forms or remediation
16 Related Work at HP Labs: HP Privacy Advisor Questionnaire Project/activity profile Detailed compliance questions Transborder flows Indicators of potential harms Rules Engine Knowledgebase Rules HP Policies Rules HP Privacy standards & Specifications Rules Country requirements Rules Guidance Feedback Assessment against; HP Policies, Standards, Specifications, country requirements, etc. Checklists Means to seek help
17 Related Work at HP Labs EnCoRe project ( Focused on policy enforcement for privacy and consent Cloud Stewardship Economics Project ( TrustDomains Project ( Other Projects
18 Papers on Accountability in the Cloud Siani Pearson, Toward Accountability in the Cloud, View from the Cloud, IEEE Internet Computing, IEEE Computer Society, July/August issue, vol. 15, no. 4, pp , Siani Pearson and Nick Wainwright, Towards Achieving Accountability in Future Internet Service Provision, to appear. For more information please us at
19 Opportunities for Collaboration Achieving accountability involves stakeholders at many different levels International cooperation is essential in order to remove barriers to cloud adoption We are interested in collaborations, case studies, further analysis of the issues
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
I. Introduction to Privacy: Common Principles and Approaches
I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
Accountability Model for Cloud Governance
Accountability Model for Cloud Governance Massimo Felici, Hewlett-Packard Laboratories CSP Forum 2014, Athens, 21-22 May 2014 Overview Problem of Data Governance Data Governance in the Cloud Accountability
Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)
OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
Privacy and Data Protection
Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 hp.com HP Policy Position Privacy and Data Protection Current Global State of Privacy and Data Protection The rapid expansion and pervasiveness
IAPP Privacy Certification
IAPP Privacy Certification Program Introduction to the Certification Foundation copyright 2011, IAPP Overview Each candidate who seeks an IAPP privacy certification for the very first time must complete
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union
Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Response of the German Medical Association
Response of the German Medical Association To the Green Paper on mobile Health ( mhealth ) of the European Commission Berlin, 3 July 2014 Bundesärztekammer Herbert-Lewin-Platz 1 10623 Berlin We are grateful
Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners
Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners The Accountability Project ( the Project ) is pleased to release Self-Assessment of a Comprehensive Privacy Programme: A Tool
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Data Protection and Cloud Computing: an Overview of the Legal Issues
Data Protection and Cloud Computing: an Overview of the Legal Issues Christopher Kuner Partner, Hunton & Williams, Brussels Research Assistant, University of Copenhagen Nordic IT Law Conference Copenhagen,
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
POLICIES, RULES AND GUIDELINES
APEC CROSS-BORDER PRIVACY RULES SYSTEM POLICIES, RULES AND GUIDELINES The purpose of this document is to describe the APEC Cross Border Privacy Rules (CBPR) System, its core elements, governance structure
White Paper: Data Protection In The Cloud. Data Protection In The Cloud
White Paper: Data Protection In The Cloud Data Protection In The Cloud Introduction The rapid emergence of cloud computing has placed it at the forefront of IT decision making and business strategies.
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Privacy, Security and Trust in Cloud Computing
Privacy, Security and Trust in Cloud Computing Siani Pearson HP Laboratories HPL-2012-80R1 Keyword(s): cloud computing; privacy; security; trust Abstract: Cloud computing refers to the underlying infrastructure
Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Human Services Quality Framework. User Guide
Human Services Quality Framework User Guide Purpose The purpose of the user guide is to assist in interpreting and applying the Human Services Quality Standards and associated indicators across all service
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or
FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION
FIRST DATA CORPORATION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION SUMMARY: BINDING CORPORATE RULES FOR DATA PRIVACY AND PROTECTION v 1.3 Supersedes: v 1.2 Summary Owner: Corporate
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Summary of feedback on Big data and data protection and ICO response
Summary of feedback on Big data and data protection and ICO response Contents Introduction... 2 Question 1... 3 Impacts and benefits; privacy impact assessments (PIAs)... 3 New approaches to data protection...
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2
COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode.
Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version)
Aalborg Universitet Cloud Governance Berthing, Hans Henrik Aabenhus Publication date: 2013 Document Version Preprint (usually an early version) Link to publication from Aalborg University Citation for
Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago
Global Efforts to Secure Cloud Computing Jason Witty President, Cloud Security Alliance Chicago Cloud: Ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart
EuroCloud Star Audit. A strong partnership that provides you with a competitive advantage
EuroCloud Star Audit A strong partnership that provides you with a competitive advantage Strong and advantageous? 5 topics to consider 99% of all organisations are SME, with little internal Know- how.
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Jerry Wertelecky, CPA, Fellow HKIoD & Managing Director INTRODUCTION Jerry Wertelecky Country of Birth: United States Current
CyberEdge Insurance Proposal Form
Note to the Proposer Signing or completing this proposal does not bind the Proposer, or any individual or entity he or she is representing to complete this insurance. Please provide by addendum any supplementary
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
CFPB Readiness Series: Compliant Vendor Management Overview
CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
TOOLS and BEST PRACTICES
TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE
Best Practices at Research Level
PReparing Industry to Privacy-by-design by supporting its Application in REsearch Best Practices at Research Level Hisain Elshaafi Telecommunications Software and Systems Group (TSSG) Waterford Institute
Cloud Computing Consumer Protocol
Cloud Computing Consumer Protocol Submission by the Australian Communications Consumer Action Network to the Australian Computer Society 16 August 2013 Australian Communications Consumer Action Network
COMPLIANCE MANAGEMENT SYSTEM
COMPLIANCE MANAGEMENT SYSTEM Ensuring Your Bank Meets Regulatory Standards Overview of Compliance Exams Examination Purpose: Assess the quality of an institution s compliance management system (CMS) for
The Cloud Balancing Act for IT: Between Promise and Peril
The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
ISO 9001 : 2000 Quality Management Systems Requirements
A guide to the contents of ISO 9001 : 2000 Quality Management Systems Requirements BSIA Form No. 137 February 2001 This document is the copyright of the BSIA and is not to be reproduced without the written
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security [email protected]
Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security [email protected] Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big
Registration must be carried out by a top executive or a number of executives having the power to commit the whole company in the EU.
Questions and answers 1- What is the purpose of The Initiative? Why are we doing this? The purpose of the Supply Chain Initiative is to promote fair business practices in the food supply chain as a basis
Draft Code of Conduct on privacy for mobile health applications
Draft Code of Conduct on privacy for mobile health applications I. About this Code 1) Introduction To be drafted as a last step, when the rest of the Code is more or less stable Ed. 2) Purpose The purpose
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
AUDIT COMMITTEE BEST PRACTICES CHECKLIST
AUDIT COMMITTEE BEST PRACTICES CHECKLIST General 1. Members have the appropriate predefined qualifications to meet the objectives of the audit committee s charter, including appropriate financial literacy.
A Comprehensive Study on Cloud Computing Standardization
A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act On 1 January 2016, the Dutch Data Breach Notification Act will enter into force. The Dutch DPA issued Guidelines
Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization
Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization Intros - Name - Interest / Challenge - Role Data Governance is a Business Function Data governance should
Health Care Insurance Ltd Complaints Handling Policy
Health Care Insurance Ltd Complaints Handling Policy Purpose The purpose of this document is to outline the procedure that Health Care Insurance Ltd (HCI) will adopt in the process of resolving complaints
cloud computing IEEE What's Special? 3 Fraudulent Resource Consumption 14 Prototype
cloud IEEE Prototype A digital magazine in support of the IEEE Cloud Computing Initiative computing What's Special? 3 Fraudulent Resource Consumption 14 Securing the Cloud May/June 2013 cloud computing
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
