Selling Information Through Cloud Diagnosis

Size: px
Start display at page:

Download "Selling Information Through Cloud Diagnosis"

Transcription

1 Storm clouds ahead? Part 2: Investigations and litigation using data stored in the cloud April 2014 Publication No

2 1 Introduction 2 In Part 1 of this article, we considered the issues surrounding data privacy in the cloud. In Part 2, we now turn to consider the issues which arise when using data stored in the cloud as evidence in support of investigations or litigation. Most investigations and litigation discovery processes involve the review of electronic information held by organisations, such as s, documents and internet histories. Organisations are often required to provide specific information to third parties, such as law enforcement authorities, within a short timeframe. Whilst cloud infrastructure may improve remote access to an organisation s data, in some cases from anywhere in the world, it also reduces an organisation s direct control over the data. This means that when faced with the need to quickly produce or disclose information, organisations who store data in the cloud face some unique challenges. In this article, Ronald Holtshausen from our Perth office considers the key issues surrounding the use of data in the cloud for litigation and law enforcement, including: acquiring data from the cloud the risk of modification of data data sovereignty data possession and control. 2 Data acquisition from the cloud Imagine that your organisation has just found out that it faces investigation by a regulator - it may need to provide the regulator with a large volume of data within a short time frame. Complying with this deadline will be hard. Even if there is no such specific request, the organisation needs to understand what data it has and perhaps start its own review of that data. But then you remember - your organisation stores some, or all of its financial, operational and data in the cloud. What can be easier, you think. Doesn t storing company information in the cloud make data easy to access? Unfortunately, that is not necessarily the case when it comes to acquiring and preserving a copy of an organisation s data from the cloud for investigation and litigation purposes - this can prove to be slower, and more complex than originally perceived. It can also be costly, particularly if contractual arrangements are not in place for such an event.

3 Conventional computer forensic acquisition procedures look to acquire and preserve data from a storage device which the investigator can physically access. The investigator can then take the appropriate precautions to isolate the data from further access and ensure it is not altered or modified during the preservation, whilst also ensuring adherence to any specifications of the search or disclosure orders. 3 However, in many cases, data contained in the cloud will be stored in remote infrastructure that is shared by multiple organisations. This may limit an investigator s ability to physically access the data storage facilities and isolate it from further potential modifications. The investigator may then need to employ a different approach in order to acquire the data remotely, potentially being hampered by issues such as slow connection speeds to the cloud provider. Risk of modification of data Many investigators rely upon metadata (such as author information, file creation, modification and access times) as part of their work, for example, to piece together a sequence of events by preparing a chronology of a document s creation and modification. Unfortunately, whilst a cloud facility may increase an organisation s ability to access its data, it also increases the risk of potential data modification (accidental or deliberate) by employees and the cloud provider. Simple maintenance activities performed by a cloud provider can modify metadata associated with data. This includes activities such as backups, imaging, data relocation and data replication. This means that data which could prove crucial in investigating a user s activity may be modified or lost. When accessing data in the cloud (known as a remote acquisition ) for litigation purposes, it is crucial that appropriate precautions are taken to preserve data artefacts that may be modified by simply downloading the data from the cloud. We recommend that all remote acquisitions are done by experienced professionals. Example Mr Smith resigns from his software development job at Jones & Co and is immediately walked out of the building by security. Mr Smith sets up his own business with the intent of developing and selling similar software to that designed and owned his former employer. Jones & Co becomes concerned that Mr Smith has stolen its intellectual property. Jones & Co investigates whether Mr Smith accessed and copied its proprietary software designs and source code before his resignation. They therefore want to establish the date at which the software or source code was last accessed, and by whom. Jones & Co stores its software specifications and source code in the cloud, so it asks its cloud provider to check the metadata of the relevant files. Unfortunately, the cloud provider does not make a forensically sound copy of the files, and so accidentally accesses the files during this check. At approximately the same time Jones & Co s data gets replicated from the Singapore data centre to the cloud provider s German data centre. The data s replication to the German data centre has now resulted in further changes to potentially crucial metadata. This means that the previous date of access and modification was updated, and there is no longer any evidence linking Mr Smith to the file. Jones & Co are not able to provide any metadata to establish the theft of their intellectual property, and Mr Smith continued to run his own business as a competitor to Jones & Co.

4 3 Data sovereignty and international concerns 4 Data sovereignty is the concept that information which has been converted and stored in a digital form is subject to the laws of the country in which it is located. Data sovereignty is a key issue for organisations that use the cloud for data storage. Cloud providers often store data in offshore storage facilities to reduce costs. As a result, an organisation s data could physically be held in storage locations anywhere in the world and, potentially, in a number of different jurisdictions. The long arm of overseas legislation Because data may be stored outside Australia, it is important that organisations understand the privacy laws of the country where the data is located, as these may apply in contractual agreements with cloud providers. Organisations may even find their data susceptible to foreign government access in relation to investigations or litigation overseas. For example, through the use of the American Patriot Act, brought in as a response to the events of 11 September 2001, the US Government and its agencies have powers to access Australian data held by US owned cloud providers and their subsidiaries, wherever they may be located. This includes both: Australian data held in Australia by a US owned cloud provider Australian data located in the US by an internationally owned cloud provider. Susceptibility to foreign government access does not stop with the US. A study carried out by Hogan Lovells, an international law firm, found similar data access laws in other countries 1. The governments of the United Kingdom, Germany, France, Japan and Canada have similar laws in place allowing them to obtain personal data stored in the cloud during the course of a government investigation. Data Sovereignty and Australian Privacy Laws When storing data in the cloud, an organisation should be aware that the legal obligations over the protection of the data still reside with them under the Australian Privacy Principles 2 (APP 5 and APP 8). APP 5 requires that upon data collection from a customer, organisations notify individuals of their intention to disclose personal information to recipients overseas 3. They must also specify the location in which these disclosures may take place, if practicable to specify those countries. APP 8 requires that before disclosing personal information to an overseas recipient, the organisation must also take reasonable steps to ensure the recipients will not breach the Australian Privacy Act. An exception to this is if the overseas entity is an agency 4 and the disclosure of the information is required or authorised by or under an international agreement relating to information sharing to which Australia is a party; or the [organisation] reasonably believes that the disclosure of the information is reasonably necessary for one or more enforcement related activities conducted by, or on behalf of, an enforcement body and the recipient is a body that performs functions, or exercises powers, that are similar to those performed or exercised by an enforcement body. This means that if an organisation is required to provide data as part of an investigation, either by an Australian or foreign law enforcement agency, then it is not required to inform the customer of the disclosure of that data. However, organisations should determine whether their cloud provider is required to notify them of such requests as part of their contractual arrangements.

5 4 Issues with possession and control 5 In dealing with data stored in the cloud, it is important to understand not only where the data resides (the entity which has possession of it), but also which entity utilises the data and is able to modify it, i.e. the entity which is in control of the data. As we have discussed, many organisations who place their data into cloud storage may be required to produce this information for legal or investigative purposes; but to whom should investigators address these data requests? Should it be the user organisation, as they are the uploader or generator of the data and already have access to it? Or should it be the cloud entity, as they are the entity who have possession of the data storage? Cloud provider has possession of data data Organisation has control of data Cloud provider hosts the data in one of its offshore storage servers. Organisation uploads data to the cloud and accesses it regularly. A Singapore Case A recent Singapore case 5 has discussed this very notion of possession and control of data from a legal discovery point of view when storing communications and their attached data in the cloud. In particular, there was much discussion around the technical aspects of who has possession and control of cloud based services. This is because, in so far as s accessed using web browsers are concerned (such as Gmail, Yahoo, Hotmail, and web-based/off-site corporate accounts), the user does not technically have possession and custody over the s, as the s are stored on mail servers and data centres sited in remote locations. In this case, the user may still download and save a copy of the s in his computer, hard disk, smart phone, tablet device, or some other compound document. However, unless the user has saved his s in his computer or in similar devices, what the user has in his possession is not the itself, but the username and password to access the s in the possession of the provider. To this end, the provider is in effect a custodian of the electronically stored information in the user s account. 6 With this in mind, a suitable understanding of the cloud infrastructure should be obtained before drafting discovery orders to ensure that they are correctly instructing the entities, and more importantly, identifying the correct entity when making orders for discovery. The judge in the Singapore case allowed the application for discovery, and commented from a practical perspective, saying: The plaintiffs are not seeking discovery of physical printouts of s kept by the defendants, neither are they seeking discovery of soft copies of s saved in the defendants computers, smart phones or other compound documents (storage devices or database). If this was the case, the defendants can be found to be in possession and custody of these physical printouts, or the saved softcopies kept in their computers. Instead, the plaintiffs are seeking discovery of the s in the defendants accounts. 7

6 On this basis, at least from a Singapore perspective, it suggests that for disclosure of web based , suitable care should be taken to determine where the data may reside and which entity the discovery orders should be served on. 6 In our experience the appropriate use of forensic tools, together with the express permission of the web based account user (and assuming there are no issues with the terms and conditions of the web based provider) can allow for the appropriate collection of web based accounts. To date, we are unaware of any Australian cases regarding such a scenario but there could be significant implications for data privacy. In the definitions of the Privacy Act an entity holds personal information if it has possession and control. Could it be that Google or Hotmail might be deemed to be holding personal information through its hosting of accounts? 5 Our recommendations Storing data in the cloud has obvious cost benefits, but organisations who do so must address some unique challenges when faced with an investigation or litigation. In particular, the risks surrounding data privacy in the cloud (as discussed in the last article) mean that it is important to be litigation ready. We suggest that: All remote acquisition is undertaken by an experienced forensic technology professional, to avoid the risks of data modification. Alternatively, organisations may request cloud providers to assist investigators in acquiring data. This scenario should be discussed as part of contractual agreements to avoid additional costs, however, organisations should ensure that the cloud provider has the requisite experience to do this without modification of the data. Organisations should obtain confirmation (and ensure regular updates) from cloud providers of the location in which their data is stored, and whether the local legislation will apply. Whilst requests from regulatory and law enforcement agencies for data stored in the cloud may be unavoidable, ensure that suitable contractual arrangements are in place, including whether your cloud provider is required to notify you of such requests. Legal teams should give due consideration to the wording in their orders for the discovery of cloud based data. Again, expert assistance can assist in ensuring that the appropriate information is collected in a timely manner. So, ask yourself, when your organisation is faced with litigation, or required to provide evidence as part of an investigation, how ready will you be?

7 Endnotes 1. See detail.aspx?news= See privacy-resources/privacy-fact-sheets/privacy-fact-sheet- 17-australian-privacy-principles_2.pdf. 3. See engaging-with-you/current-privacy-consultations/draft-app- Guidelines-2013/Draft_APP_Guidelines_Chapter_8.pdf 4. As defined by the Privacy Act 1988, Section 6, an agency would include most Commonwealth government bodies and representatives, including the AFP and the Federal Court. See pa /s6.html 5. Dirak Asia Pte Ltd and another v Chew Hua Kok and another [2013] SGHCR Dirak Asia Pte Ltd and another v Chew Hua Kok and another [2013] SGHCR 01 [12] 7. Ibid [11] 7 About the author Ronald Holtshausen Manager Perth rholtshausen@kordamentha.com Ronald specialises in the areas of IT security, fraud, data analytics for investigations, computer forensic investigations and e-discovery. He has experience working on engagements in Australia, Asia and South Africa. Prior to joining KordaMentha, Ronald s experience was obtained by working for Big 4 accounting firms in their IT security and forensic practices, providing services to large scale mining organisations, banking institutions and government entities.

8 KordaMentha Forensic Technology 8 KordaMentha identify, preserve, analyse and present potential electronic evidence in a forensically sound manner to effectively support litigation, corporate and regulatory investigations involving: intellectual property (IP) infringement and theft corporate fraud and financial crime contractual disputes defamation and harassment identity theft misuse or unauthorised access to computing or Internet resources. Forensic technology Our experts have the technical qualifications and experience to forensically analyse a variety of electronic devices including personal computers, computer servers, mobile phones, digital media recorders and players from both common and complex technology environments. ediscovery KordaMentha has had significant exposure to some of Australia s largest matters in recent history. We have the technical qualifications and experience to deliver effective ediscovery advice and solutions, including early case assessment, to significantly reduce the time and cost traditionally associated with ediscovery. Key contacts Owain Stone Head of Forensic Melbourne ostone@kordamentha.com Craig Macaulay Melbourne cmacaulay@kordamentha.com Nigel Carson Sydney ncarson@kordamentha.com Grant Whiteley Associate Director Perth gwhiteley@kordamentha.com Brendan Read Associate Director Brisbane bread@kordamentha.com Daniel Tay Associate Director Singapore dtay@kordamentha.com Briston Talbot Manager Adelaide btalbot@kordamentha.com

9 KordaMentha Forensic We provide clarity and objectivity to organisations when the commercial stakes are high, and the evidence is critical to the outcome. Our specialist forensic tools, rigorous analysis and clear presentation of the financial, factual and electronic information provides insights that are otherwise hidden in the detail of a dispute, investigation, or review. Melbourne Owain Stone ostone@kordamentha.com Robert Cockerell rcockerell@kordamentha.com Craig Macaulay cmacaulay@kordamentha.com Brisbane David Van Homrigh dvanhomrigh@kordamentha.com Brian Wood bwood@kordamentha.com Sydney Andrew Ross aross@kordamentha.com John Temple-Cole jtemplecole@kordamentha.com Nigel Carson ncarson@kordamentha.com Alex Bell abell@kordamentha.com Paul Curby pcurby@kordamentha.com Andre Menezes amenezes@kordamentha.com Perth Jarrod Baker Director jbaker@kordamentha.com Singapore Matthew Fleming mfleming@kordamentha.com Adelaide Stephen Duncan sduncan@kordamentha.com Briston Talbot Manager btalbot@kordamentha.com Subscribe to our publications at kordamentha.com/subscribe Learn more about our forensic services at kordamentha.com/forensic This publication, and the information contained therein, is prepared by KordaMentha Forensic s and staff. It is of a general nature and is not intended to address the circumstances of any particular individual or entity. It does not constitute advice, legal or otherwise, and should not be relied on as such. Professional advice should be sought prior to actions being taken on any of the information. The authors note that much of the material presented was originally prepared by others and this publication provides a summary of that material and the personal opinions of the authors. Limited liability under a scheme approved under Professional Standards Legislation.

Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02

Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02 Electronic evidence: More than just a hard drive March 2015 Publication No. 15-02 1 Introduction 2 Over the last decade, the computer hard drive has been the main point of data storage and therefore the

More information

A revised standard for forensic accountants

A revised standard for forensic accountants A revised standard for forensic accountants APES 215 Forensic Accounting Services (Revised December 2013) January 2014 Publication No. 14-01 1 Introduction APES 215 Forensic Accounting Services (Revised

More information

Oppression remedies: who should buy out whom, and at what price?

Oppression remedies: who should buy out whom, and at what price? Oppression remedies: who should buy out whom, and at what price? Case note on Patterson -v- Humfrey [2014] WASC 446 April 2015 Publication No. 15-01 1 Introduction The shares should be valued on a basis

More information

The currency of choice

The currency of choice The currency of choice When the quantum of loss suffered depends on the volatility of foreign exchange rates January 2014 Publication No. 14-01 1 Introduction 2 OneSteel Manufacturing Pty Limited v BlueScope

More information

To gross-up or not to gross-up

To gross-up or not to gross-up To gross-up or not to gross-up Taxation in the assessment of damages June 2013 Publication No. 13-01 1 Introduction When we think about a damages award arising from litigation, we think of barristers,

More information

forensics matters Is Predictive Coding the electronic discovery Magic Bullet? An overview of judicial acceptance of predictive coding

forensics matters Is Predictive Coding the electronic discovery Magic Bullet? An overview of judicial acceptance of predictive coding forensics Is Predictive Coding the electronic discovery Magic Bullet? An overview of judicial acceptance of predictive coding Publication No. 12-03 1Introduction Predictive Coding is the emerging tool

More information

Information Sheet: Cloud Computing

Information Sheet: Cloud Computing info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.

More information

Privacy Policy. 30 January 2015

Privacy Policy. 30 January 2015 Privacy Policy 30 January 2015 Table of Contents 1 Overview 3 Purpose 3 Scope 3 2 Collection 3 What information do we collect? 3 What if you do not give us the information we request? 4 3 Use of information

More information

www.corrs.com.au OFFSHORING Data the new privacy laws

www.corrs.com.au OFFSHORING Data the new privacy laws www.corrs.com.au OFFSHORING Data the new privacy laws OFFSHORING DATA THE NEW PRIVACY LAWS Transfer of data by Australian organisations to other jurisdictions is increasingly common. This is a result of

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY

CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY CORPORATE TRAVEL MANAGEMENT PRIVACY POLICY 1. About this Policy Corporate Travel Management Group Pty Ltd (ABN 52 005 000 895) (CTM) ('we', 'us', 'our') understands the importance of, and is committed

More information

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION Find A PR agency Terms and Conditions for Clients 1 Introduction 1.1 Find A PR agency is the PRCA s impartial search and referral service for organisations

More information

3 What Personal Information do we collect and why do we need it?

3 What Personal Information do we collect and why do we need it? Privacy Policy 1 Protecting your privacy The worldwide rental system operated as Europcar is owned by Europcar International, a French Corporation. A number of independently owned licensees also trade

More information

forensics matters Audit negligence: Who is to blame when it all goes wrong? Publication No. 11-04

forensics matters Audit negligence: Who is to blame when it all goes wrong? Publication No. 11-04 Audit negligence: Who is to blame when it all goes wrong? Publication No. 11-04 Audit negligence following the GFC The recent collapses of Allco, Westpoint, Centro, Storm Financial, Opes Prime, ABC Learning,

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Clevertar Privacy Policy

Clevertar Privacy Policy Clevertar Privacy Policy At Clevertar, we take privacy very seriously. We encourage you to read this Privacy Policy Policy carefully. The defined terms in this Policy have the same meaning as in our Terms

More information

privacy and credit reporting policy.

privacy and credit reporting policy. privacy and credit reporting policy. ME, we, us or our refers to Members Equity Bank Ltd and its subsidiary ME Portfolio Management Ltd. about ME Every Australian deserves to get the most out of their

More information

Credit Reporting Privacy Policy of Baybrick Pty Ltd

Credit Reporting Privacy Policy of Baybrick Pty Ltd Credit Reporting Privacy Policy of Baybrick Pty Ltd Introduction 1. This Credit Reporting Privacy Policy is the official privacy policy of Baybrick Pty Ltd and its subsidiaries which includes JBS Australia

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

forensics matters Advanced interview techniques

forensics matters Advanced interview techniques Advanced interview techniques If it is important to ask the question, then it must be equally as important to listen to the response. Publication No. 11-05 Advanced interview techniques If it is important

More information

Captain Compare Privacy Policy

Captain Compare Privacy Policy Captain Compare Privacy Policy This Privacy Policy contains important information about the type of personal information we collect from you on the Captain Compare website (www.captaincompare.com.au) (Website),

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Privacy Policy Draft

Privacy Policy Draft Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that

More information

2. What personal information do we collect and hold?

2. What personal information do we collect and hold? PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying

More information

Hong Leong Asia Ltd.

Hong Leong Asia Ltd. Hong Leong Asia Ltd. Personal Data Protection Policy The protection of your Personal Data is important to us. This Personal Data Protection Policy ( PDP Policy ) outlines how we manage your personal data,

More information

CUA Group APP Privacy & Credit information Policy

CUA Group APP Privacy & Credit information Policy For more information: Call 133 282 Visit www.cua.com.au Drop into your local branch CUA Group APP Privacy & Credit information Policy 1 August 2015 Credit Union Australia Limited ABN 44 087 650 959 AFSL

More information

The Cloud and Cross-Border Risks - Singapore

The Cloud and Cross-Border Risks - Singapore The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in

More information

FISHER & PAYKEL PRIVACY POLICY

FISHER & PAYKEL PRIVACY POLICY FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed

More information

ShineWing Australia Wealth Privacy Policy

ShineWing Australia Wealth Privacy Policy ShineWing Australia Wealth Privacy Policy When you trust us with your personal information, you expect us to protect it and keep it safe. We take this responsibility seriously and we are bound by the Privacy

More information

Plus500UK Limited. Statement on Privacy and Cookie Policy

Plus500UK Limited. Statement on Privacy and Cookie Policy Plus500UK Limited Statement on Privacy and Cookie Policy Statement on Privacy and Cookie Policy This website is operated by Plus500UK Limited ("we, us or our"). It is our policy to respect the confidentiality

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Credit Reporting and Credit Related Personal Information Policy. Corporate Legal Procedure

Credit Reporting and Credit Related Personal Information Policy. Corporate Legal Procedure Credit Reporting and Credit Related Personal Information Policy Corporate Legal Procedure TABLE OF CONTENTS 1. Purpose... 3 2. Acknowledgment... 3 3. The kind of Credit Information we will collect and

More information

Police Financial Services Limited Copyright exists in this document Privacy Policy 1

Police Financial Services Limited Copyright exists in this document Privacy Policy 1 Privacy January 2015 Policy Police Financial Services Limited ABN 33 087 651 661 ('we', 'us', 'our', BankVic ) is bound by the Australian Privacy Principles under the Privacy Act 1988 (Cth) (Privacy Act).

More information

CREDIT REPORTING AND CREDIT RELATED PERSONAL INFORMATION POLICY

CREDIT REPORTING AND CREDIT RELATED PERSONAL INFORMATION POLICY Purpose CREDIT REPORTING AND CREDIT RELATED PERSONAL INFORMATION POLICY This is the privacy policy of Southern Steel Group Pty Limited ACN 003 067 838, Southern Steel Supplies Pty Limited ACN 000 060 131,

More information

MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM

MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Your Duty of Disclosure Before you enter into

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Revelian Pty Ltd ABN 58 089 022 202 Privacy Policy Effective 1 September 2014

Revelian Pty Ltd ABN 58 089 022 202 Privacy Policy Effective 1 September 2014 Revelian Pty Ltd ABN 58 089 022 202 Privacy Policy Effective 1 September 2014 OUR COMMITMENT Your privacy is important to us. This document explains how Revelian collects, handles, uses and discloses your

More information

Custodian-Node data provision terms and conditions

Custodian-Node data provision terms and conditions Custodian-Node data provision terms and conditions Parties Node Operator Data Custodian Background A B C D E [Insert legal name of node][insert ACN/ABN/ARBN] of [Insert address]\ [Insert legal name of

More information

Bruce Gerald Flint. Liability limited by a Scheme approved under Professional Standards Legislation

Bruce Gerald Flint. Liability limited by a Scheme approved under Professional Standards Legislation ABN 65 103 438 277 It s all about money. PO BOX 249 South Hurstville NSW 2221 DX 11319 Hurstville Tel: 02 9584 1474 Fax: 02 9584 1475 E-mail: action@flintforensics.com.au Website: www.flintforensics.com.au

More information

Information Handling Policy

Information Handling Policy Information Handling Policy 10 December 2015 Information Handling Policy 1. Who We Are 1.1 In this Information Handling Policy, references to we, our, us and ClearView are to ClearView Wealth Limited and

More information

DIRECTORS & OFFICERS LIABILITY INSURANCE PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

DIRECTORS & OFFICERS LIABILITY INSURANCE PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL DIRECTORS & OFFICERS LIABILITY INSURANCE PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Obtaining a Quotation To minimise delays in obtaining

More information

Privacy Statement. What Personal Information We Collect. Australia

Privacy Statement. What Personal Information We Collect. Australia Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect

More information

AASA Online Privacy Policy CRP.020

AASA Online Privacy Policy CRP.020 Introduction Alzheimer s Australia SA Inc values your privacy and takes reasonable steps to protect your personal information (that is, information which identifies or may reasonably be used to identify

More information

DailyMailz may collect and process the following personal information about you:

DailyMailz may collect and process the following personal information about you: Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

Application to access Chesters Trade

Application to access Chesters Trade Application to access Chesters Trade Please fill in all details below: Account Number Company Name Company Phone Number Fax Number Contact Name Mobile Number Email Address Please review the Terms of Use

More information

MEMBI PRIVACY POLICY

MEMBI PRIVACY POLICY MEMBI 1 PURPOSE OF OUR POLICY 1.1 Membi Limited (Company Number 09775238) of 396a Kingston Road, Kingston Road, London SW20 8LL, United Kingdom (Membi, we, us or our) provides the services offered on the

More information

Postcode: Postcode: Australia Business Number (ABN):

Postcode: Postcode: Australia Business Number (ABN): New client form Name of your AJ Park contact: Account name: Trading name: Full name of contact person: Mobile: Street address: Postcode: Postal address (if different from street address): Postcode: Phone:

More information

You are authorised to view and download one copy to a local hard drive or disk, print and make copies of such printouts, provided that:

You are authorised to view and download one copy to a local hard drive or disk, print and make copies of such printouts, provided that: Terms of Use The Standard Bank of South Africa Limited ( Standard Bank ) maintains this demonstration trading platform (the "Demo Trading Platform") and the virtual services/products ("Virtual Services")

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

2.1 Certain words have special meanings when used in this Privacy Policy. These are shown below.

2.1 Certain words have special meanings when used in this Privacy Policy. These are shown below. 1. OUR COMMITTMENT 1.1 In handling your personal information, Maleny Credit Union (ABN 52 087 650 995) and its controlled entities ( MCU / credit union / we / us ) are committed to complying with the Australian

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

How To Understand The Privacy Policy Of Racing Internet Services

How To Understand The Privacy Policy Of Racing Internet Services Racing Internet Services Privacy Policy I. ABOUT THIS POLICY Racing Internet Services and its related bodies corporate ( Company or we ) want you to be familiar with how we collect, use and disclose information

More information

Mercedes-Benz Financial Services. Privacy Statement

Mercedes-Benz Financial Services. Privacy Statement Mercedes-Benz Financial Services Privacy Statement Privacy Statement Mercedes-Benz Financial Services Australia Pty Ltd A Daimler Company We, Mercedes-Benz Financial Services Australia Pty Ltd ( MBFS )

More information

PROFESSIONAL INDEMNITY RENEWAL DECLARATION IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS RENEWAL DECLARATION

PROFESSIONAL INDEMNITY RENEWAL DECLARATION IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS RENEWAL DECLARATION PROFESSIONAL INDEMNITY RENEWAL DECLARATION IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS RENEWAL DECLARATION A. Obtaining a Quotation To minimise delays in obtaining

More information

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation

More information

SOLICITORS EXCESS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

SOLICITORS EXCESS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL SOLICITORS EXCESS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Your Duty of Disclosure Before you enter into a contract

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

UBS Electronic Trading Agreement Global Markets

UBS Electronic Trading Agreement Global Markets UBS Electronic Trading Agreement Global Markets Version: 1.1 November 2014 I. UBS ELECTRONIC TRADING AGREEMENT 1.1 UBS Limited ( UBSL ) provides an electronic trading service, which enables certain clients

More information

REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Your Duty of Disclosure Before you enter into an

More information

Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual

Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual Daltrak Building Services Pty Ltd ABN: 44 069 781 933 Privacy Policy Manual Table Of Contents 1. Introduction Page 2 2. Australian Privacy Principles (APP s) Page 3 3. Kinds Of Personal Information That

More information

PRIVACY AND CREDIT REPORTING POLICY

PRIVACY AND CREDIT REPORTING POLICY PRIVACY AND CREDIT REPORTING POLICY 12 March 2014 CONTENTS What is personal information?...3 Information we may collect, use and disclose about you...4 Collection of sensitive information...6 How personal

More information

Questions to ask about a cloud service. enter

Questions to ask about a cloud service. enter Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.

More information

American Express Bank Account - How to Get the Correct Amount of Payments

American Express Bank Account - How to Get the Correct Amount of Payments Telegraphic Transfers (Personal) Product Disclosure Statement ISSUED: MARCH 2014 Contents Telegraphic Transfers 3 Value Date 3 Cancellation 3 Applying for an International Payments Account 3 Sending International

More information

Last updated: 30 May 2016. Credit Suisse Privacy Policy

Last updated: 30 May 2016. Credit Suisse Privacy Policy Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

School Information Security and Privacy in the Cloud

School Information Security and Privacy in the Cloud School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The

More information

Registrants must agree to their personal information being used by 3P Learning in accordance with this Privacy Policy before they may register.

Registrants must agree to their personal information being used by 3P Learning in accordance with this Privacy Policy before they may register. Rainforest Maths Rainforest Maths is a website (the Site) run by 3P Learning Pty Limited, the company behind LiveMathBowl, Mathletics, Spellodrome and World Maths Day (3P Learning). 3P Learning is committed

More information

Data Protection for the Guidance Counsellor. Issues To Plan For

Data Protection for the Guidance Counsellor. Issues To Plan For Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)

More information

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0 ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright

More information

PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Obtaining a Quotation To minimise delays in obtaining a quotation

More information

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences

More information

Foreign investment managers and other financial

Foreign investment managers and other financial The Investment Lawyer Covering Legal and Regulatory Issues of Asset Management VOL. 22, NO. 8 AUGUST 2015 Investment Management Business in Australia By Jim Bulling, Daniel Knight, and Gabrielle Palmieri

More information

PUBLIC & PRODUCTS LIABILITY RENEWAL DECLARATION

PUBLIC & PRODUCTS LIABILITY RENEWAL DECLARATION PUBLIC & PRODUCTS LIABILITY RENEWAL DECLARATION IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS RENEWAL DECLARATION A. Obtaining a Quotation To minimise delays in obtaining

More information

LAUW Cyber erisks. SME Questionnaire. www.lauw.com.au

LAUW Cyber erisks. SME Questionnaire. www.lauw.com.au LAUW Cyber erisks SME Questionnaire Please only complete this Questionnaire if the Proposers annual gross revenue is less than $25m and they require limits of indemnity up and including $2m. If the Proposer

More information

REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL REAL ESTATE AGENTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Your Duty of Disclosure Before you enter into a contract

More information

PART 1 PERSONAL AND CREDIT INFORMATION PRIVACY POLICY Document Purpose

PART 1 PERSONAL AND CREDIT INFORMATION PRIVACY POLICY Document Purpose Tyro Payments Privacy Policy Version 2.0 PART 1 PERSONAL AND CREDIT INFORMATION PRIVACY POLICY Document Purpose The purpose of this Privacy Policy is to provide a summary of how, why and when personal

More information

Privacy Policy Statement

Privacy Policy Statement Privacy Policy Statement Our Commitment While information is the foundation for providing you with superior service, protecting the privacy of your personal information is of the highest importance to

More information

Belmont 16 Foot Sailing Club. Privacy Policy

Belmont 16 Foot Sailing Club. Privacy Policy Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This

More information

CBHS HEALTH FUND LIMITED PRIVACY POLICY

CBHS HEALTH FUND LIMITED PRIVACY POLICY 1. Policy Statement CBHS Health Fund Limited ABN 87 087 648 717 (CBHS) is committed to maintaining the privacy of individuals whose information we collect in accordance with the Australian Privacy Principles

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL

PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL PUBLIC & PRODUCTS LIABILITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Obtaining a Quotation To minimise delays in obtaining a quotation

More information

DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004

DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004 DISASTER RECOVERY INSTITUTE CANADA (DRIC) UPDATED APRIL 2004 This website privacy policy is intended to provide DRIC website visitors with information about how DRIC treats private and personal information

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Westpac Privacy Policy. Our privacy commitment to you

Westpac Privacy Policy. Our privacy commitment to you Westpac Privacy Policy Our privacy commitment to you 12 March 2014 Contents About this policy... 3 What is personal information?... 3 What kinds of personal information do we collect and hold?... 3 For

More information

EXCESS SOLICITORS PROPOSAL FORM

EXCESS SOLICITORS PROPOSAL FORM EXCESS SOLICITORS PROPOSAL FORM PROFESSIONAL INDEMNITY London Australia Underwriting Pty Ltd Level 35, 100 Miller Street rth Sydney Australia 2060 t 02 8912 6400 f 02 8912 6401 www.lauw.com.au IMPORTANT

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Personal Data Protection Policy

Personal Data Protection Policy Personal Data Protection Policy Please take a moment to read the following Policy. If there is anything you do not understand then please contact us. We are committed to protecting privacy. This Personal

More information

APES GN 30 Outsourced Services

APES GN 30 Outsourced Services APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: [DATE] Copyright 2012 Accounting Professional & Ethical Standards Board Limited (

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

SELECTING AN ENTERPRISE-READY CLOUD SERVICE 21 Point Checklist for SELECTING AN ENTERPRISE-READY CLOUD SERVICE Brought to you by Introduction The journey to the cloud is well underway, and it s easy to see why when 84% of CIOs report cutting application

More information

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us. LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated

More information

PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA

PRIVACY REGULATIONS regarding the Web Health History (W.H.H.) Service called LifepassportPRO provided by Meshpass SA PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes

More information

AMP Bank. Credit Reporting Policy AMP Bank Limited

AMP Bank. Credit Reporting Policy AMP Bank Limited AMP Bank Credit Reporting Policy AMP Bank Limited Effective Date: 12 March 2014 Contents 1. Purpose of this Policy 1 2. Definitions 1 3. Collecting Credit Information 2 4. Disclosing and using Credit-Related

More information