Cloud Software Services for Schools. Supplier self-certification statements with service and support commitments
|
|
|
- Wilfred Atkins
- 10 years ago
- Views:
Transcription
1 Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE Zahid Ghani, Technical Services Manager Contact telephone Authorised by Tony Wild, Director
2 Contents 1. Supplier Commitments Using the Supplier Responses Supplier Response - Overarching Legal Requirements Supplier Response - Data Processing Obligations Supplier Response - Data Confidentiality Supplier Response - Data Integrity Supplier Response - Service Availability Supplier Response - Transfers beyond the EEA Supplier Response - Use of Advertising Page 2 of 32
3 Introduction When entering into an agreement with a cloud service provider, every school/data controller has to be satisfied that the relevant service provider is carrying out its data processing as per their requirements (ensuring compliance with the Data Protection Act (DPA) by the data controller and also the data processor by default). It is the responsibility of every school to ensure compliance with the DPA. This document is meant to act as an aid to that decision-making process by presenting some key questions and answers that should be sought from any potential cloud service provider. The questions answered in sections 3 to 9 below will give a good indication as to the quality of a service provider s data handling processes, although schools will still need to make their own judgement as to whether any provider fully meets DPA requirements. The school/data controller should communicate its particular data handling requirements to the cloud provider (and each school could be different in its interpretation of what measures, procedures or policy best meet their DPA requirements), and confirm these by way of contract. The best way to set that out is to also put in place a data processing agreement with your chosen provider. The principles of the DPA are summarised by the Information Commissioner s Office at: Page 3 of 32
4 1. Supplier commitments In order that schools can be confident regarding the accuracy of the selfcertification statements made in respect of the CPOMS software cloud service, the supplier confirms: that their self-certification responses have been fully and accurately completed by a person or persons who are competent in the relevant fields that their self-certification responses have been independently verified for completeness and accuracy by Tony Wild who is a senior company official that they will update their self-certification responses promptly when changes to the service or its terms and conditions would result in their existing compliance statement no longer being accurate or complete that they will provide any additional information or clarification sought as part of the self-certification process that if at any time, the Department is of the view that any element or elements of a cloud service provider s self-certification responses require independent verification, they will agree to that independent verification, supply all necessary clarification requested, meet the associated verification costs, or withdraw their self-certification submission. 2. Using the Supplier Responses When reviewing supplier responses and statements, schools will also wish to consider aspects of data security beyond the supplier-related issues raised in the questions. These include: how the school chooses to use the provided cloud service the nature, types and sensitivity of data the school chooses to place in the cloud service the extent to which the school adapts its own policies (such as acceptable use, homeworking, Bring Your Own Device (BYOD) and staff training to ensure that the way staff and students use the service is consistent with DPA guidance. Please refer to the Information Commissioner s Office (ICO) BYOD guidance: Page 4 of 32
5 yod the wider policies and practices the school has in place to ensure that the use of cloud services by their staff and students remains DPA compliant, the use of robust, strong, frequently changed authentication passwords and encryption keys, policies on BYOD / homeworking / acceptable use to ensure that school data is accessed securely when either on or off the premises The security of the infrastructure that the school uses to access the supplier s cloud service including network and endpoint security. The purpose of this particular document is to focus upon some key areas that schools should consider when moving services to cloud providers. Although it is designed to cover the most important aspects of data security, the checklist should not be viewed as a comprehensive guide to the DPA. The self-certification checklist consists of a range of questions each of which comprises three elements: o the checklist question o the checklist self-certification response colour o the evidence the supplier will use to indicate the basis for their response For ease of reference, the supplier responses have been categorised as follows: Where a supplier is able to confirm that their service fully meets the issue identified in a specific checklist question (in a manner compliant with the obligations of the Data Protection Act where relevant), the appropriate self-certification colour for that question is GREEN. Where a supplier is not able to confirm that their service fully meets the issue identified in a specific checklist question (in a manner compliant with the obligations of the Data Protection Act where relevant), the appropriate self-certification colour for that question is AMBER. (It should be made clear that a single Amber response is not necessarily a negative, and that any associated clarification Page 5 of 32
6 should also be considered). Where a supplier is able to confirm that a specific checklist question does not apply to their particular service the appropriate selfcertification code for that question is BLACK. There is space provided within the supplier response for links to relevant further information and clarification links. Schools are invited to use the checklist to support their assessment of the extent to which the cloud services from a particular supplier meet their educational, technical and commercial needs in a DPA-compliant manner. Schools should make a decision on the selection of a supplier based on an overall assessment of the extent to which their product meets the needs of the school, the overall level of risk and the nature and extent of support available from the supplier. Page 6 of 32
7 3. Supplier Response - Overarching Legal Requirements Schools are required to ensure that all cloud services used enable them to meet their legal obligations under the DPA. To assist schools in that assessment Meritec Limited confirms the position to be as follows for its safeguarding service, fuller details of which can be found at Question Q 3.1 Does your standard contract for the supply of cloud services to UK schools fully comply with the DPA? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes Our standard contract for the supply of CPOMS as a cloud service allows our schools to fully comply with the DPA. Q 3.2 If your standard contract does not fully comply with the DPA, do you offer additional commitments to UK schools to help ensure such compliance? Q 3.3 Is your contract with UK customers enforceable both in the UK and in the country in which your company is registered? N/A Compliant, as above. Yes Meritec Limited is a UK Company and our contract is enforceable in the UK. Page 7 of 32
8 Q 3.4 Do your services ensure that schools are able to comply with their obligations with regard to the exercise of data subjects rights? Yes User permissions within CPOMS ensure that schools are able to fully comply with their obligations with regard to the exercise of data subjects rights 4. Supplier Response - Data Processing Obligations The Data Protection Act (DPA) relates to personal data that is processed and is likely to be relevant to most of the operations that comprise a cloud computing service. This includes simple storage of data, the obtaining and handling of information, operations such as adaptation, organisation, retrieval and disclosure of data, through to erasure or destruction. Schools, as data controllers, have a responsibility to ensure that the processing of all personal data complies with the DPA and this includes any processing carried out on their behalf by a cloud service provider. To assist schools in understanding whether the cloud service being provided by Meritec Limited is likely to comply with the DPA in relation to data processing, Meritec Limited has responded as follows: Page 8 of 32
9 Question Q 4.1 Taking account of the UK Information Commissioner's Office (ICO) guidance on Data Controllers and Data Processors, when providing the service, do you act at any time as a data controller in respect of the data processed as part of this service? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Meritec Limited does not act as a data controller with regards to the cloud service it provides. In this case the school remains the Data Controller and Meritec Limited (CPOMS) will act as a Data Processor on the schools behalf. Q 4.2 Where you act as a data processor does your contract ensure that you will only act on the instructions of the data controller? Yes - Our contract states that Meritec Limited only acts as a Data Processor and will only process data in accordance with the Data Protection Act. Q. 4.3 Does your contract document the security measures that you implement to enable a school to ensure compliance with the DPA's security obligations? Yes - our contract states the specific security measures in place for each of our services all of which meet or indeed exceed the requirements of the Data Protection Act. Page 9 of 32
10 Q 4.4 Is the processing of personal data or metadata limited to that necessary to deliver [or improve] the service? Yes - the processing of data and metadata is limited solely for the purpose of delivering the service. Q 4.5 Where your contract does not cover every aspect of data processing, are you prepared to enter into a separate dataprocessing agreement with your cloud services customer? Yes - Meritec Limited (CPOMS) contract covers every aspect of data processing. 5. Supplier Response - Data Confidentiality When choosing a cloud service provider, schools must select a data processor providing sufficient guarantees about the technical and organisational security measures governing the processing to be carried out, and must take reasonable steps to ensure compliance with those measures. The cloud customer should therefore review the guarantees of confidentiality that the cloud provider can commit to. To assist in understanding if the service being provided by Meritec Limited is likely to comply with UK law in relation to data confidentiality Meritec Limited has responded as follows: Page 10 of 32
11 Question Q 5.1 Do you prohibit personal data or metadata being shared across other services that you as a supplier do or may offer? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes - No data or metadata is shared across any of our services. Q 5.2 Do you prohibit personal data or metadata being shared with third parties? Q 5.3 Does your service have a robust authentication process in place to protect access to personal data and/or user accounts? Yes - No data or metadata is shared with any third party. Yes - CPOMS has an enterprise level permissions system which allows each school to uniquely control which members of staff can access each type of sensitive information. Access to view incidents logged inside CPOMS is restricted by dual factor authentication which is a technique that many online banks and similar organisations are now using to further protect access to confidential data. CPOMS' dual factor authentication mechanism (MeriLock) requires not only a username and password, but also a MeriLock USB device (which is uniquely associated with each CPOMS account) to access the system. Page 11 of 32
12 Q 5.4 Does your service have in place arrangements to assist schools in protecting access to personal data and/or user accounts? Yes - CPOMS permissions are configurable by an authorised admin user at the school and they can be changed and updated at any time by the school, including completely revoking access for users. We further assist schools in protecting access to the data by having a strong password policy which is automatically enforced. CPOMS has an automatic log out facility and a full audit trail which details user activity within the system. Q 5.5 Are appropriate controls in place to ensure only authorised staff have access to client/customer data? Yes access to customer data is strictly restricted to only those individuals who require such access to perform their job function. All staff who work on CPOMS are employed by Meritec Limited directly and are fully DBS checked. Questions 5.6 to 5.9 address the supplier approach to data encryption. The ICO guidance on encryption is as follows: There have been a number of reports recently of laptop computers, containing personal information which have been stolen from vehicles, dwellings or left in inappropriate places without being protected adequately. The Information Commissioner has formed the view that in future, where such losses occur and where encryption software has not been used to protect the data, regulatory action may be pursued. Page 12 of 32
13 The ICO recommends that portable and mobile devices, including magnetic media, used to store and transmit personal information, the loss of which could cause damage or distress to individuals, should be protected using approved encryption software which is designed to guard against the compromise of information. Personal information which is stored, transmitted or processed in information, communication and technical infrastructures, should also be managed and protected in accordance with the organization s security policy and using best practice methodologies such as using the International Standard Further information can be found at There are a number of different commercial options available to protect stored information on mobile and static devices and in transmission, such as across the internet. Q 5.6 Does your cloud service insist that communications with access devices are encrypted? Yes All connections to a CPOMS installation are encrypted over SSL. The (instead of the normal in your browser's address bar denotes a SSL connection, which means any data transferred is encrypted before being sent. The SSL certificate also allows your computer to verify that the CPOMS server is the server it says it is. Connections are encrypted with 256-bit AES encryption. SSL encryption takes place between your computer and the CPOMS server when you are accessing CPOMS and between your Management Information System (MIS) and the CPOMS server when your data is being transferred through an automatic extract Page 13 of 32
14 Q 5.7 Does your cloud service ensure that data at rest is encrypted? Yes In addition to the SSL encryption, which ensures data transfer between your computer and the CPOMS server, and your MIS and the CPOMS server, is encrypted, we also perform data encryption on any sensitive information stored in the CPOMS databases. The text of incidents, actions, and documents are encrypted when they are stored and unencrypted when an authenticated request is made to view them. This means if unauthorised access was obtained to the database where the information is stored, the data would still be encrypted and be unable to be viewed. This encryption also takes place using 256-bit AES encryption. Q 5.8 Does your cloud service ensure that data in transit between your data centres is encrypted? Q 5.9 Does your cloud service ensure Yes All transfers of data between data centres is encrypted. Data is backed up to multiple locations to enable us to provide maximum resilience. Meritec Limited has taken a conscious decision to exceed the requirements of the Data Protection Act in this regard in that all schools data is held within UK Data Centres it does not move out to the EEA. Yes While our own service allows us to transmit over SSL Meritec Limited naturally cannot speak for the Page 14 of 32
15 that traffic between your cloud service and other cloud service providers can be encrypted? Q 5.10 Does your service provide defined timescales in respect of data destruction and deletion both during the contract and at contract end? Q 5.11 Does your service ensure that you use a secure deletion and erasure process which encompasses all copies of client/customer data? security of schools own systems. As such CPOMS does not send any confidential information via . notifications simply provide information that a concern has been logged and requires action. At such a point a user is required to securely login to CPOMS to be able to view any sensitive data. Yes - At the end of the contract all data will be returned to the customer via password protected encrypted media. Password details will be forwarded by separate secure communication. Once the customer has provided us with written confirmation that they have successfully accessed that data we will arrange for our copies of their data to be securely deleted from the CPOMS database within 30 days. Yes Where such data resides on an active SQL database server we are able to assure customers that their data has been deleted following the process at Where our Cloud Services partner Memset have taken SQL database servers out of service (end of life) we receive a specific assurance from Memset that data on all such servers has been deleted and the media destroyed in line with UK regulations. Q 5.12 Does your service provide a mechanism free of charge whereby users can access a complete and secure copy of Yes - Clients have access to their data 24/7/365 completely free of charge. Customers can run a full report which will extract for them all of their data. Page 15 of 32
16 their data? 6. Supplier Response - Data Integrity Data integrity has been defined as the property that data is authentic and has not been maliciously or accidentally altered during processing, storage or transmission. To assist schools in understanding if the cloud service being provided by Meritec Limited is likely to comply with the DPA in relation to data integrity Meritec Limited has confirmed the position to be as follows: Question Q 6.1 Do you allow a trusted independent third party to conduct regular detailed security audits of the physical, technical and organisational aspects of your service? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes Meritec Limited (CPOMS) is an accredited ISO27001 and GCloud supplier. As part of that accreditation, we have annual penetration/ vulnerability test performed by a trusted 3 rd party partner. In addition to these tests Meritec Limited (CPOMS) uses a UK based Data Centre supplier who is also also accredited to ISO27001 and thus subject to the same security audits. Meritec is accredited to the latest version of the ISO27001 standard (2013) Accreditation requires annual external audits by the accreditation providers and regular internal audits by the senior management including persons at Director level. Page 16 of 32
17 Q 6.2 Where the above audits are conducted, do you make the findings available to current and/or prospective cloud customers? Yes - A summary of the audits will be provided to customers on request. Q 6.3 Does your service ensure that where such audits are carried out, they are conducted to best industry standards? Yes - All audits are carried out to Industry Standards in accordance with ISO Q 6.4 Are audit trails in place enabling users to monitor who is accessing their data? Q 6.5 Does your service ensure you could restore all customer data (without alteration) from a back-up if you suffered any data loss? Q 6.6 Does your service have a disaster recovery plan, and is information on this plan made available to current/prospective Yes - This is a unique standard feature within CPOMS and provides a full audit trail by child detailing which user has accessed data and what actions they have taken. Yes - Data is stored in 2 primary UK Government accredited Tier 3 secure Data Centres, with backups as standard in 2 separate secure data centres. All CPOMS data is stored and processed not only within the EEA, but entirely within the UK. Yes As part of our ISO27001 accreditation Meritec Limited (CPOMS) has full Disaster Recovery and Business Continuity plans in place. Memset Tier 3 data centres backup to other sites. Details can be provided Page 17 of 32
18 cloud service customers? to customers upon request. 7. Supplier Response - Service Availability Service availability means ensuring timely and reliable access to personal data. One threat to availability in the cloud which is often outside the responsibility of the cloud service provider is the accidental loss of network connectivity between the client and the provider of service. Data controllers should therefore check whether the cloud provider has adopted reasonable measures to cope with the risk of disruptions, such as backup internet network links, redundant storage and effective data backup mechanisms. To assist schools in understanding if the service being provided by a particular company is likely to comply with the DPA in relation to service availability Meritec Limited has confirmed as follows: Page 18 of 32
19 Question Q 7.1 Can you confirm that you have sufficient capacity to ensure you can provide a resilient, reliable and accessible service at all times? Q 7.2 Does your service offer guaranteed service levels? Q 7.3 Does your service provide remedies to customers in the event that service levels are not met? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes - Meritec Limited has sufficient capacity and via our platform monitoring we are able to view and predict potential and physical server storage. Meritec Limited (CPOMS) maintains a substantial operational buffer zone to allow for data fluctuations and capacity can be increased with minimal notice. In addition our Data Centre architecture includes in built load balancing, automated backups and redundancy in terms of server and network capacity. Yes - guaranteed with our data centres and details in our SLA. Yes We have SLA arrangements in place with Memset and also separate Insurance in place should remedies to customers be required. To date we have never had a claim Page 19 of 32
20 8. Supplier Response - Transfers beyond the European Economic Area (EEA) The eighth principal of the DPA permits the transfer of personal data beyond the EEA when adequate arrangements are in place to ensure rights and freedoms of data subjects in relation to the processing of personal data. The eighth principal of the DPA states: Personal data shall not be transferred to any country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data Guidance on data transfers published by the ICO states: Cloud customers should ask a potential cloud provider for a list of countries where data is likely to be processed and for information relating to the safeguards in place there. The cloud provider should be able to explain when data will be transferred to these locations. The European Commission has approved four sets of standard contractual clauses (known as model clauses) as providing an adequate level of protection where data is transferred outside the EEA. If your service provider uses these model clauses in their entirety in their contract, you will not have to make your own assessment of adequacy. To assist schools in understanding where its data is likely to be held and if the cloud service being provided is likely to comply with the DPA in relation to permitted transfers of personal data beyond the EEA, Meritec Limited has responded as follows: Page 20 of 32
21 Question Q 8.1 In providing the service do you limit the transfer of personal data to countries within the EEA? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes Given the sensitivity of the information stored on CPOMS databases, we prefer a much higher level of assurance than is required by EU law and as such all of our data is actually stored in data centres within the UK. Q 8.2 If you transfer data outside the EEA do you explain to schools when (and under what circumstances) data will be transferred to these locations? N/A - We do not transmit data outside of the UK. Q 8.3 If you transfer data outside the EEA does your standard contract include the unmodified EU approved model clauses in respect of such transfers? N/A Q 8.4 If you transfer data outside the EEA, (and do not offer the unmodified EU approved "model clauses", can you confirm N/A Page 21 of 32
22 that the requirements of the DPA are met in respect of the need for adequate protection for the rights and freedoms of data subjects in connection with the cross-border transfer and processing of their personal data? 9. Supplier Response - Use of Advertising Recognising the particularly sensitive nature of the data likely to be processed in a cloud service aimed at schools, there is particular concern in relation to the use of advertising and the extent of data mining which providers of cloudbased services may adopt in relation to user data. To assist schools in understanding if the cloud service provided by a particular company will involve serving advertisements or engaging in advertisement-related data mining or advertisement-related profiling activities, suppliers will be asked to indicate in respect of services to pupil and staff users as follows: ICO cloud computing guidance states that In order to target advertisements the cloud provider will need access to the personal data of cloud users. A cloud provider may not process the personal data it processes for its own advertising purposes unless this has been authorised by the cloud customer and the cloud customer has explained this processing to cloud users. Individuals have a right to prevent their personal data being used for the purpose of direct marketing. So a school would have to agree to the advertising and then would have a duty to explain to staff and pupils what Page 22 of 32
23 personal data would be collected, how it will be used and by whom, and what control they have over the use of their data in this way. As there are obvious difficulties with schools deciding if children are competent enough to understand any explanation of their data being used for advertising, and to understand and exercise their right to object, without parental involvement it would seem sensible to avoid this in solutions for schools, especially where children are concerned. Question Q 9.1 In providing the cloud service, is the default position that you enter into a legally binding obligation not to serve advertisements to any pupil or staff users via your school cloud service? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes - No advertising is ever delivered to customers via CPOMS. Q 9.2 In providing the cloud service, is the default position that you enter into a legally binding obligation not to conduct any advertisement-related data mining in respect of pupil or staff data or metadata? Yes - We do not conduct any advertising using any data belonging to schools. Page 23 of 32
24 Q 9.3 In providing the cloud service, is the default position that you enter into a legally binding obligation never to use for any commercial purpose (or pass on to others) personal data or metadata in respect of pupil or staff users of your service? Yes - It is our default position to enter in to a legally binding obligation never to use for any commercial purpose (or pass on to others) personal data or meta data in respect of pupil or staff data. Page 24 of 32
25 Appendix 1: Availability and extent of support available to schools when using cloud software services. Table of Contents Section 1.0 Section Section 3.0 Section 3.1 Section 3.2 Section 3.3 Section 3.4 Section 3.5 Section 3.6 Section 3.7 Introduction Managing Worst Case Scenarios Key Support Areas Addressing Serious Incidents Supplier Responsibilities Solution Configuration Restoring Data Managing Media Attention Engaging with Child Support Agencies Engaging with the Wider School Community Page 25 of 32
26 Section 1.0 Introduction The Department for Education intends that schools who are considering the use of cloud based services should have easy access to information in relation to: Responsibilities in respect of Data Protection Act compliance. General guidance for schools can be found at The general levels of security inherent in the solutions offered by many of cloud service providers as compared to what might apply to their current arrangements this information is provided in the general guidance statements to be found at (hyperlink tba.gov) The data protection implications of using a particular supplier s cloud services addressed through the self-certification process detailed in the associated checklist document found above The normal support mechanisms available in respect of routine administrative or technical support issues this is addressed by inviting cloud service providers who are participating in the self-certification process to complete the statements summarising their routine support arrangements as above. The additional support that would be available in the unlikely event of some serious data-related incident related to the use by schools of cloud services this is addressed by inviting cloud service suppliers to indicate how they would respond to a number of specific challenges which a school might face in the event of such a serious breach or failure. Section 2.0 of this document sets out the rationale underpinning the need for greater clarity in the event of some serious data-related event. Section 3.0 sets out those areas where specific supplier commitments on additional support are invited. Page 26 of 32
27 Section 2.0 Managing Worst Case Scenarios Whilst there is much to be gained from adopting a cloud service platform, it is only prudent that schools should, as part of their overall risk assessment, and prior to deploying a cloud service, understand (in the event of a data-protection related worst case scenario ) the nature and extent of the support that would be forthcoming from a potential cloud service provider. It is also clearly in the interests of cloud service providers themselves to work with schools to address the technical, business, reputational and legal issues which would flow from some such incident, and which resulted in for example: A significant data loss flowing from a breach of security associated with the provision of cloud service A breach of privacy whereby confidential data was released to a person or persons not authorised to receive it A serious disruption to the school s business, educational or administrative processes The key headings that cloud service providers are invited to respond against are set out in Section 3. When responding to the various issues set out in Section 3, cloud service providers should draft their response assuming that the intended audience is non-technical senior staff in schools. Suppliers may, of course, make reference to supporting management or technical documents but the response provided here should go beyond referring to terms of service and should set out clearly and simply what additional support could be expected in the event of a data protection-related worst case scenario. Page 27 of 32
28 Section 3.0 Key Support Areas The key areas that cloud service providers are invited to respond against in respect of a serious incident are: Solution configuration Communicating serious breaches Supplier responsibilities Restoring data Managing media attention Engaging with the child protection agencies Engaging with the wider school community These are minimum suggested areas and suppliers are free to set out additional support capabilities which could be used in the event of a serious incident and which they feel will engender confidence in schools and differentiate the supplier in this competitive and growing marketplace. 3.1 ADDRESSING SERIOUS INCIDENTS Cloud service providers should as a minimum clarify in this area of their response: How schools should log any serious issues regarding the use of the service, providing as a minimum a UK phone number and support address. It is better to provide an indication of the individuals or roles that should be the first point of contact for example you should also contact our Head of Security [email protected] phone number +44 (0) who will also make sure our education /public sector team at [xxx] is contacted. It would also be useful to cover all time scenarios out of hours, weekends etc. The nature of the support that might be available for example, is it limited to phone and/or or are there circumstances when on-site support might be required. How the cloud service provider might work with schools to address the consequences of the serious incident Whether in addition to contacting the incident support centre there are other resources that could be made available for example via online tools and resources, a partner ecosystem, a local public sector or education support team or identified escalation routes within the company that should be utilised. Supplier response: Incidents should be reported to the CPOMS Help Desk using the Contact Support button at the top left hand side of the CPOMS screen. If for any reason the CPOMS system is unavailable Incidents can be reported by (preferred) to [email protected] or by telephone to Page 28 of 32
29 The person reporting the Incident should be an authorised user who is able to accurately describe the nature of the Incident/problem and to be able to provide as much detail as possible. If the Incident is serious the Helpdesk will prioritise the Incident by escalating the call to the Technical Services Manager who has full responsibility for the resolution of all Incident Calls. If the Customer, for any reason, believe that their call is not receiving the appropriate priority they are asked to further escalate the Incident Call to the responsible Director being Tony Wild on or by ing at 3.2 SUPPLIER RESPONSIBILITIES In this section cloud service providers should, as a minimum, set out (in language aimed at school managers), their responsibilities when working with schools to address the implications of a serious incident. In addition, cloud service providers should describe what practical assistance they would be able to offer which goes beyond the contractual minimum as set out in their terms and conditions. Supplier response: Meritec is dedicated to providing a high level of service to our customers. Our Technical Services Manager is a school Governor and takes pride in monitoring the quality and responsiveness of our service to schools. As such he will not hesitate to involve the company s Directors if necessary to prioritise resources to respond to Incidents. Customers have access directly to the board of Directors via the Director details given at section 3.1 above. Also every school using CPOMS is provided with a comprehensive Service Level Agreement (SLA) and all CPOMS system support and maintenance is included within the annual CPOMS service charge. Via the Designated Safeguarding lead, schools are able to ask for assistance and advice on the use of CPOMS, including training and best practice. 3.3 SOLUTION CONFIGURATION. Whilst virtually all cloud service providers have detailed technical advice on how their systems should be configured, this section of the supplier response should set out the general principles which school management should expect to see implemented to ensure maximum security of their cloud implementation. This might cover for example: Page 29 of 32
30 The need for correct configuration of access devices appropriate web browsers The use of additional backup / data synchronisation arrangements for sensitive or business critical data Configuration options or additional services that provide greater level of security than is available in your free offering Sample password policies in relation to the age and ability of the users of their service Policies in respect of helpdesk and security staff access to client data Supplier response: Schools should put in place appropriate security measures to protect their own school networks. Information on appropriate web browsers is contained in the CPOMS SLA, access to CPOMS is strictly controlled through SSL Key access to the system and role based access to the data. All staff who work on CPOMS are employed by Meritec Limited directly and are thus fully accountable to them. CPOMS is developed completely in house and we do not outsource work to third parties. All staff who work on CPOMS are also fully DBS checked. CPOMS staff do not have access to schools data which is encrypted and not accessible by any of our staff including the database administrators. 3.4 RESTORING DATA Where a serious event had occurred which resulted in the loss of data by a school, cloud service, providers should set out what steps they would take to work with the school to recover and restore to the maximum extent possible the data which has been lost (or corrupted). This section should also include indicative timescales. Supplier response: It is not possible for a school to delete any data within CPOMS. The integrity of the system relies upon the fact that once an incident has been logged it is not possible for the school to delete that incident. With regards to CPOMS data integrity, all data is backed up to multiple UK based data centres enabling us to quickly restore service should an issue be encountered at any one of them. 3.5 MANAGING MEDIA ATTENTION Where a serious event had occurred which resulted in significant media attention falling on the school, suppliers should indicate the steps they would take as a responsible service provider to work with the school in managing the media attention. Page 30 of 32
31 Supplier response: Under the data protection act Meritec Limited simply acts as the Data Processor and would never engage with the media to comment on events relating to a school without the schools express permission. Our Technical Services Manager is a former Chari of Governors and well understands the environment in which schools operate. We would therefore be well placed to provide assistance and would be happy to do so over and above our contractual requirements. Meritec s Board of Directors have held senior positions in organisations which have supported both local and national government for many years. In the event of serious event occurring which resulted in significant media attention, we would of course be happy to offer the school advice on how to deal with that attention but would not speak directly to the media unless we were asked to do so. 3.6 ENGAGING WITH CHILD SUPPORT AGENCIES Where a serious event had resulted in issues being raised that related to child protection for example the loss of sensitive pupil data, the cloud service provider should indicate what it would do to assist the school in engaging with the relevant child protection agencies, over and above the contractual minimum. Supplier response: CPOMS is specifically designed to protect against data loss and multiple copies of the data contained within the system are stored within UK based data centres. This ensures both the resilience of our service and also the integrity of the data which we process on your behalf. The CPOMS system will not allow data to be deleted by the user and as such it cannot be lost from the system. The school would be able to produce timely reports for the relevant child protection agencies. 3.7 ENGAGING WITH THE WIDER SCHOOL COMMUNITY Where a serious incident had resulted in issues being raised that related to the wider school community for example parents, the local authority, the curriculum or examination bodies or the Information Commissioners Office, the cloud service provider should indicate what it would do to assist the school in engaging with the relevant organisation to address the implications of the serious incident. Again, this should describe available support over and above the contractual minimum. Page 31 of 32
32 Supplier response: The Directors of Meritec Limited have significant experience of the public sector and engaging with all relevant stakeholders. Our technical services manager is a former Chair of Governors and has a significant understanding of the context in which our school customers operate. We are therefore well placed to assist the school in addressing the implications of any serious incident which may occur. CPOMS has a dedicated in-house support team employed directly by Meritec for the sole purpose of assisting our CPOMS schools. We can therefore respond quickly to any events which occur and can direct resources over and above our contractual minimums to provide assistance to our schools. Page 32 of 32
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Google Ireland Limited Address Google Ireland Ltd Gasworks Building Barrow
Cloud (educational apps) software services and the Data Protection Act
Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
www.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union
Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
White Paper Security. Data Protection and Security in School Management Systems
White Paper Security Data Protection and Security in School Management Systems This paper clarifies the roles and responsibilities of those dealing with the data that is central to school management systems.
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
PAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 [email protected] www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure
Auditing data protection a guide to ICO data protection audits
Auditing data protection a guide to ICO data protection audits Contents Executive summary 3 1. Audit programme development 5 Audit planning and risk assessment 2. Audit approach 6 Gathering evidence Audit
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD Data Breach Management Policy Adopted by Cavan and Monaghan Education Training Board on 11 September 2013 Policy Safeguarding personally identifiable information
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Audit Management. service definition document
Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service
