Bring Your Own Device (BYOD)

Size: px
Start display at page:

Download "Bring Your Own Device (BYOD)"

Transcription

1 1. Introduction Introduction This document outlines the considerations that the Council needs to consider in relation to its decision whether or not to adopt the current trend (arising from the consumerisation of ICT) to use personal devices for work purposes, known as BYOD (Bring Your Own Device). 2. Background A couple of independently run internal (Horsham D.C. and Mid Sussex D.C) trials are in progress to investigate the business benefit of using IPAD s in the workplace i.e. printing costs savings being one. The Horsham trial is currently on-going and is being project managed through the Horsham Business Transformation Team and the Mid Sussex project managed by the Members Services section. A recommendation report is going forward to the Mid Sussex senior management team week commencing 10th September. With regard to BYOD currently CenSus ICT (at Mid Sussex) are in the process of running a Proof of Concept against a couple of BYOD software tools that would be required to manage a BYOD service. It has not been possible to set dates for completing the Proof of Concept work as the software tools are relatively new and CenSus ICT are dependant on the software suppliers to provide release dates when the software available for testing. The software tested so far with it being relatively new is rather clunky in operation and if adopted now may appear to ICT users as a backward step future releases should over come this problem. The following is some indicative BYOD Management licence pricing costs: 350 user licence (probably shared across partnership) = 80,000 1 user license = circa BYOD Considerations These sections summarise the considerations that need to take in development of a BYOD service taking into account security, legalities and effect on the CenSus ICT service. 3.1 Policies a. The Council s information security policy suite requires certain security controls in order to comply with legislation and codes of connection. Is it possible to match these controls on personal devices? b. How will we enforce appropriate use policies on a personal device? c. Do the current policies protect the Council whilst allowing for the use of BYOD? Page 1 of 5

2 c.1. No, either a new Personal Device Use Policy is needed (as the current Information Security Policy Suite prohibits the connection of personal devices to the Council s network unless permission from CenSus ICT Services management has been received) or the existing Acceptable Use Policy and ICT Security Policy need updating to take account of any changes in the Council s approach to BYOD. 3.2 Legal a. If the individual owns the device then what rights do the council have in respect of a personal device used for council business? b. What are the legal ramifications of the Council losing an individual s personal data? c. What are the legal implications in relation to the Council s monitoring rules to meet its obligations under RIPA and the Computer Misuse Act? Monitoring may not be appropriate on a personal device. d. Individuals should sign a waiver consenting to any activities deemed necessary and holding the Council harmless for any such damage, loss of use or data loss Investigations a. What happens in the event of an investigation? a.1. The captured data is likely to include the employee s / Member s private personal information. However, if the Council is not able to preserve data that may constitute evidence in litigation, it could face court sanctions. b. It may be difficult to actually obtain access to or possession of the device (especially if the individual is the subject of an investigation). c. The individual would be unable to use their personal device while it is being investigated (potentially by a third party on the Council s behalf). 3.3 Data Confidentiality a. What if we didn t store any data on the device in the first place and used virtual desktops to ensure that council data stays on the council network? b. The problem is that people want the integration, e.g. ability to see all their personal and corporate s and appointments in one view. So, if we do allow data to be stored on a device: b.1. How do we effectively wipe Council data from a personal device when lost or stolen? Page 2 of 5

3 b.2. What happens if the individual leaves the Council and takes their BYOD with council data on it to another company? b.3. Does the Council have the ability to selectively wipe data from lost or stolen devices remotely, i.e. wipe Council data but preserver personal? c. How will we segregate personal and corporate data, and apply the necessary controls to protect sensitive Council information? c.1. Do we accept a lesser set of controls and prohibit the storage of sensitive data on personal devices in the policy?. 3.4 Technical Device Management and Support a. Which individuals will be permitted to use personal devices? a.1. Bear in mind that some people handle personal information on behalf of other organisations due to shared services, e.g. CenSus Revenues and Benefits, Building Control and Crawley BC (CBC), Procurement (CBC, HDC and MSDC). Where this is the case is our implementation of BYOD in accordance with any information sharing protocols or data exchange agreements? b. Who manages the device? Individual versus Council c. Who supports the device? Individual versus Council d. Which devices will be permitted as part of the BYOD policy? d.1. All personal devices? d.2. Restricted to approved devices? e. How will we effectively track and manage authorised personal devices and differentiate from rogue devices? f. How will we control what is installed on and update/patch these devices? g. What level of support will CenSus ICT Services offer across the huge number of new devices, across multiple OS platforms and carrier specific implementations of each? h. Where is the corporate information backed up to? h.1. Use of a home backup system would not be permitted. h.2. Council information should only stored on the Council network Mobile Application Management a. How will we securely distribute corporate mobile applications to personal devices? Page 3 of 5

4 b. How will we determine which platforms/devices to support from an application development standpoint? c. Will we even have the right skills to support secure mobile application development? 4. For the Individual This section outlines the implications that need to be fully understood by the individual who wishes to use their own device for council business. 4.1 Personal Data Loss a. Is the data in my device susceptible to automatic or remote deletion? b. What events trigger the automatic deletion? c. Is remote deletion part of the standard employee leaver process? d. Is my approval sought or required for the remote deletion? e. Is my personal data retained in case of automatic or remote wipe? f. Does the Council provide a means to recover the personal data deleted? g. Am I entitled to any reimbursement for the loss of personal content such as songs, videos or applications? 4.2 Personal Privacy a. May I be required to produce my personal devices for forensic analysis? b. Does this apply to devices shared with other family members? c. Who will get access to the personal information stored in my device? d. Is the Council able to track my location? Potentially yes. In exchange for using the corporate network, ICT may have the ability to locate your device at any time. d.1. Under what circumstances can this happen? d.2. Is my approval sought and required to track my location? d.3. Do I get notified? d.4. Are these systems active outside regular work hours? e. Is my personal online activity whilst connected to the Council s Wi-Fi network monitored and logged? f. Is this information retained when I leave the Council? Page 4 of 5

5 4.3 Device seizure and loss of use a. Under what circumstances may I be asked to surrender my personal device? b. Is the Council going to provide a replacement? c. Who is responsible for backing up and restoring personal data and applications if the device is seized? d. Under what circumstances can the Council initiate a remote lock of the device? e. Is my approval sought and required? f. What is the process to regain use of my device? 5. Recommendation If a CenSus Partnership Authority chooses to go down the BYOD route then it makes sense for BYOD to become a partnership project as it is critical that a standardise approach is used as having a disjointed approach to BYOD could seriously effect the CenSus ICT level of support. The relevant parties to be involved in a BYOD project are Business Transformation, CenSus ICT Services, the partnership Information Security Manager, Legal and Personnel services. A key factor being the development of a policy to support BYOD (together with appropriate standards, guidelines and procedures) to ensure that the Council does not increase its risk of an information security breach which could result in financial and reputational penalties. Main sources: 1. Article: The Security, Privacy and Legal Implications of BYOD (Bring Your Own Device) Info Law Group 2. Blog: BringYourOwnIT.com - Consumerization, BYOD and Mobile Security Page 5 of 5

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

NOBLE TRUST COMPANY LTD. GENERAL TERMS OF BUSINESS. The following definitions and rules of interpretation shall apply:

NOBLE TRUST COMPANY LTD. GENERAL TERMS OF BUSINESS. The following definitions and rules of interpretation shall apply: NOBLE TRUST COMPANY LTD. GENERAL TERMS OF BUSINESS 1. Definitions and interpretation The following definitions and rules of interpretation shall apply: 1.1 Agent means any person appointed by a Client

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

Bring your own device - Legal Whitepaper

Bring your own device - Legal Whitepaper A Legal Whitepaper from the Technology Group Bring your own device - Legal Whitepaper The consumerisation of IT is the latest technology trend posing challenges to Australian businesses. As workplaces

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

INTRODUCTION 1. Janet(UK) agrees to provide to the Customer the JVCRS subject to these Terms.

INTRODUCTION 1. Janet(UK) agrees to provide to the Customer the JVCRS subject to these Terms. Terms and Conditions for use of the Janet Videoconferencing Recording Service ( Terms ) Reference: CONREF/LA/xxxx INTRODUCTION 1. Janet(UK) agrees to provide to the Customer the JVCRS subject to these

More information

SWEDBANK AS TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING Valid from 01.12.2014

SWEDBANK AS TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING Valid from 01.12.2014 SWEDBANK AS TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING Valid from 01.12.2014 1. TERMS AND DEFINITIONS 1.1 Account is a current account of the Merchant specified in the Agreement. 1.2 Agreement is

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

SourceIT User Notes. Specific Clauses. Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.

SourceIT User Notes. Specific Clauses. Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2. SourceIT User Notes Specific Clauses Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.3 DECEMBER 2012 AGIMO is part of the Department of Finance and Deregulation SourceIT

More information

(INDIVIDUALS ONLY) IndContPkge Version: 1.7 Updated: 18 Jul. 03

(INDIVIDUALS ONLY) IndContPkge Version: 1.7 Updated: 18 Jul. 03 INDEPENDENT CONTRACTOR PACKAGE (INDIVIDUALS ONLY) IndContPkge Version: 1.7 Updated: 18 Jul. 03 Contents Preface 2 Checklist 3 Helpful Hints 4 Frequently Asked Questions 5 Agreement with an Independent

More information

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION Find A PR agency Terms and Conditions for Clients 1 Introduction 1.1 Find A PR agency is the PRCA s impartial search and referral service for organisations

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Bring Your Own Device Security and Privacy Legal Risks

Bring Your Own Device Security and Privacy Legal Risks Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,

More information

"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.

choose your own device : the employer still provides the hardware and the employee can choose e.g. the model. WHAT IS BYOD? BYOD comes in "different shades of grey". "bring your own device" : employees are allowed to use their privately owned hard- and software. IT-applications and company data of the employer

More information

How To Make Bring Your Own Device A Plus, Not A Risk

How To Make Bring Your Own Device A Plus, Not A Risk FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK

More information

Other Review Dates: 15 July 2010, 20 October 2011

Other Review Dates: 15 July 2010, 20 October 2011 POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October

More information

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,

More information

Social Media in the Workplace

Social Media in the Workplace Social Media in the Workplace A Guide for CWU Members CWU Youth Committee 2013 CONTENTS Introduction... 3 Social Networking in Ireland... 4 Guidelines for using Social Media Responsibly... 5 2 INTRODUCTION

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Bring Your Own Devices (BYOD) Information Governance Guidance

Bring Your Own Devices (BYOD) Information Governance Guidance Bring Your Own Devices (BYOD) Information Governance Guidance 1. Purpose The purpose of this document is to provide guidelines that will support organisations wishing to enable the use of Bring Your Own

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Breed Communications Limited - limited company consultancy agreement 230113

Breed Communications Limited - limited company consultancy agreement 230113 Limited Company Consultancy Master Agreement DATED BETWEEN:- (1) Breed Communications Limited (Company Number 4809384) whose registered office is c/o Hilton Consulting, 119 The Hub, 300 Kensal Rise, London

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

How To Make A Contract Between A Client And A Hoster

How To Make A Contract Between A Client And A Hoster Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Questions to ask about a cloud service. enter

Questions to ask about a cloud service. enter Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

REPAIR SERVICES AND PROCESSING FEES.

REPAIR SERVICES AND PROCESSING FEES. BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY PLAYBOOK REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT ) FORM A LEGAL AGREEMENT BETWEEN YOU INDIVIDUALLY, OR IF YOU ARE AUTHORIZED

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date

More information

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014 Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date

More information

SCHOOL ONLINE SAFETY SELF REVIEW TOOL

SCHOOL ONLINE SAFETY SELF REVIEW TOOL SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: [email protected]

More information

CenSus ICT Strategy (2012 2015)

CenSus ICT Strategy (2012 2015) CenSus ICT Strategy (2012 2015) Date: September 2012 Version: 5.0 Version Control Amendment History including Author: Version Date Author / Amendment History 1.0 Draft 30 th August 2012 Graham Crossingham

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Module 12 Managed Services TABLE OF CONTENTS. Use Guidelines

Module 12 Managed Services TABLE OF CONTENTS. Use Guidelines 1 Module 12 Managed Services Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. TERM OF... 4 3. TRANSITION IN... 4 4. SERVICES... 10 5. SERVICE LEVELS... 12 6. CHANGE CONTROL... 13

More information

Internet Services Terms and Conditions

Internet Services Terms and Conditions Internet Services Terms and Conditions 1. These terms and conditions These General Terms and Conditions apply to you if you are a business or residential telecommunications customer of Telnet Telecommunication

More information

INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK

INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK Registered Company Name Company Trading Name Address Email Address Contact number We have enclosed a standard employee handbook. You should read through the details

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

IT Data Security Policy

IT Data Security Policy IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]

More information

Asset Protection Agreement Templates - Customer Explanatory Notes. Explanatory Notes on Asset Protection Agreement

Asset Protection Agreement Templates - Customer Explanatory Notes. Explanatory Notes on Asset Protection Agreement Asset Protection Agreement Templates - Customer Explanatory Notes Explanatory Notes on Asset Protection Agreement Clause Heading Background The Asset Protection Agreement is intended for use where the

More information

Customer or you or your means the purchaser of KYOsupport.

Customer or you or your means the purchaser of KYOsupport. KYOsupport Fmpd TERMS AND CONDITIONS 1 Definitions Customer or you or your means the purchaser of KYOsupport. Kyocera Mita or we or our or us refers to the Kyocera Mita sales companies in the following

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

Our Customer Relationship Agreement ONLINE VAULT SERVICE DESCRIPTION

Our Customer Relationship Agreement ONLINE VAULT SERVICE DESCRIPTION Our Customer Relationship Agreement ONLINE VAULT SERVICE DESCRIPTION iinet Limited ACN 068 628 937 Phone: 13 22 58 1/502 Hay Street, Subiaco WA 6008 17 September 2013 Rules of interpretation and capitalised

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms

More information

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS

BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS THESE BLACKBERRY AUTHORIZED ONLINE RETAILER BLACKBERRY HANDHELD REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT

More information

COBAR SHIRE COUNCIL FILE:P5-90

COBAR SHIRE COUNCIL FILE:P5-90 COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...

More information

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DIRECT END USER LICENCE

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DIRECT END USER LICENCE ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DIRECT END USER LICENCE Introduction This licence permits the use of PAF Data by an end user. Details of other licences available for the use of PAF Data can

More information

SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE

SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE (Insert Your Organisation Name) uses social media in its work and recognises that those who are involved in its work

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Information Sheet: Cloud Computing

Information Sheet: Cloud Computing info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.

More information

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 12/8/15 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

ANZ Expense Manager TERMS AND CONDITIONS 03.10

ANZ Expense Manager TERMS AND CONDITIONS 03.10 ANZ Expense Manager TERMS AND CONDITIONS 03.10 Contents 1 Introduction 4 2 Defined Terms 4 2.1 Interpretation 7 2.2 Customer More Than One Person 8 3 Provision of ANZ Expense Manager 8 4 ANZ Expense Manager

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley [email protected] (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley [email protected] (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

Terms of Service. Your Information and Privacy

Terms of Service. Your Information and Privacy These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement 111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use

More information

Module 5 Software Support Services TABLE OF CONTENTS. Version 3.1

Module 5 Software Support Services TABLE OF CONTENTS. Version 3.1 1 Module 5 Software Support Services TABLE OF CONTENTS Version 3.1 1. AGREED TERMS AND INTERPRETATION... 2 2. SUPPORT PERIOD... 3 3. SCOPE OF SUPPORT SERVICES... 4 4. RESELLER PROVISION OF... 8 5. ANCILLARY

More information

Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1

Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1 English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Combating Money Laundering and Terrorist

More information

Service Schedule 5 - Internet Connectivity Services Terms & Conditions v1.0

Service Schedule 5 - Internet Connectivity Services Terms & Conditions v1.0 Overriding provisions All quotations are made and all orders are accepted subject to these conditions ( these Schedule Terms ) and our Active Support Contract Framework Terms. In the event of conflict

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered

More information