Geolocation: Sustainability
|
|
|
- Lesley Rodgers
- 10 years ago
- Views:
Transcription
1 An ISACA White Paper Geolocation: Risk, Issues and Sustainability Strategies Abstract Geolocation data, revealing an individual s physical location, are obtained using tracking technologies such as global positioning system (GPS) devices, Internet Protocol (IP) geolocation using databases that map IP addresses to geographic locations, and financial transaction information. Uses of the information are myriad, including direct marketing and context-sensitive content delivery, monitoring of criminals, enforcing location-based access restrictions on services, cloud balancing, and fraud detection and prevention. Geolocation technologies and their application, while offering social and economic benefit to a mobile society, raise significant privacy and risk concerns for individuals, businesses and governments.
2 ISACA With 95,000 constituents in 160 countries, ISACA ( is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA ), Certified Information Security Manager (CISM ), Certified in the Governance of Enterprise IT (CGEIT ) and Certified in Risk and Information Systems Control TM (CRISC TM ) designations. ISACA continually updates COBIT, which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. Disclaimer ISACA has designed and created Geolocation: Risk, Issues and Strategies (the Work ) primarily as an educational resource for security, governance and assurance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, security, governance and assurance professionals should apply their own professional judgment to the specific control circumstances presented by the particular systems or information technology environment. Reservation of Rights 2011 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written authorization of ISACA. Reproduction and use of all or portions of this publication are permitted solely for academic, internal and noncommercial use and for consulting/advisory engagements, and must include full attribution of the material s source. No other right or permission is granted with respect to this work. ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: [email protected] Web site: Geolocation: Risk, Issues and Strategies CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world. 2
3 Acknowledgments ISACA wishes to recognize: Project Development Team Ramses Gallego, CISM, CGEIT, CCSK, CISSP, SCPM, 6 Sigma, Quest Software, Spain Avani Mehta-Desai, CISA, CRISC, KPMG LLP, USA Rodolfo Tesone, ICT Law Section, Bar Association of Barcelona, Spain Jonathan Wilson, CISA, CIA, CEH, Advantage Health Solutions, USA Expert Reviewers Sourabh Awasthi, TCS, USA Nadeem Bukhari, CISM, CISSP, Kinamik Data Integrity, USA Roger Gallego, Entelgy, Spain Albert llado, CISA, CISM, CGEIT, CRISC, Auren International, Spain Pablo Ruiz Muzquiz, Kaleidos, Spain Gorka Sadowski, CISSP, LogLogic, Spain Michael Yung, CISA, CISM, Next Media, China ISACA Board of Directors Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, International President Christos K. Dimitriadis, Ph.D., CISA, CISM, INTRALOT S.A., Greece, Vice President Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, Vice President Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Vice President Niraj Kapasi, CISA, Kapasi Bangad Tech Consulting Pvt. Ltd., India, Vice President Jeff Spivey, CRISC, CPP, PSP, Security Risk Management, Inc., USA, Vice President Jo Stewart-Rattray, CISA, CISM, CGEIT, CSEPS, RSM Bird Cameron, Australia, Vice President Emil D Angelo, CISA, CISM, Bank of Tokyo-Mitsubishi UFJ Ltd., USA, Past International President Lynn C. Lawton, CISA, FBCS CITP, FCA, FIIA, KPMG Ltd., Russian Federation, Past International President Allan Neville Boardman, CISA, CISM, CGEIT, CRISC, CA, CISSP, Morgan Stanley, UK, Director Marc Vael, Ph.D., CISA, CISM, CGEIT, CISSP, Valuendo, Belgium, Director Knowledge Board Marc Vael, Ph.D., CISA, CISM, CGEIT, CISSP, Valuendo, Belgium, Chairman Michael A. Berardi Jr., CISA, CGEIT, Nestle USA, USA John Ho Chi, CISA, CISM, CFE, CBCP, Ernst & Young LLP, Singapore Phil Lageschulte, CGEIT, CPA, KPMG LLP, USA Jon Singleton, CISA, FCA, Canada Patrick Stachtchenko, CISA, CGEIT, Stachtchenko & Associates SAS, France Guidance and Practices Committee Phil Lageschulte, CGEIT, CPA, KPMG LLP, USA, Chairman Ramses Gallego, CISM, CGEIT, CCSK, CISSP, SCPM, 6 Sigma, Quest Software, Spain Meenu Gupta, CISA, CISM, CBP, CIPP, CISSP, Mittal Technologies, USA Yongdeok Kim, CISA, IBM Korea Inc., Korea Gary Langham, CISA, CISM, CGEIT, CISSP, CPFA, Australia Perry Menezes, CISM, CRISC, Deutsche Bank, USA Mario Micallef, CGEIT, CPAA, FIA, Advisory in GRC, Malta Salomon Rico, CISA, CISM, CGEIT, Deloitte Mexico, Mexico Nikolaos Zacharopoulos, Geniki Bank, Greece 3
4 Acknowledgments (cont.) ISACA and IT Governance Institute (ITGI ) Affiliates and Sponsors American Institute of Certified Public Accountants ASIS International The Center for Internet Security Commonwealth Association for Corporate Governance Inc. FIDA Inform Information Security Forum Institute of Management Accountants Inc. ISACA chapters ITGI Japan Norwich University Solvay Brussels School of Economics and Management Strategic Technology Management Institute (STMI) of the National University of Singapore University of Antwerp Management School ASI System Integration Hewlett-Packard IBM SOAProjects Inc. Symantec Corp. TruArx Inc. 4
5 Introduction: What Is Geolocation and How Does It Work? Stated simply, geolocation is a technology that uses data acquired from an individual s computer or mobile device (any type of radio or network-connection-enabled device) to identify or describe his/her actual physical location. It is one of the most popular manifestations of the current development of information technologies and is recently experiencing a significant rise in popularity. A more systems-oriented definition might be as follows: A geolocation system is an information technology solution that ascertains the location of an object in the physical (geo-spatial) or virtual (Internet) environment. Most often, the object is a person who wants to utilize a service based on location, while maintaining his/her privacy. Geolocation software services are used to support the business objectives of private and public enterprises. Geolocation data generally are used for three purposes: 1 Geo-referencing or positioning Ascertaining the physical location of an object or person relative to a coordinate system (map) to access specific information later. Examples of this are car navigation via a global positioning system (GPS) device such as TomTom TM and prisoner monitoring via GPS-enabled ankle bracelets. Geo-coding Searching for information regarding objects or services on a map, such as locating a restaurant offering a particular type of cuisine Geo-tagging Adding geographic information to an object, such as a photograph, by incorporating the geolocation data in the photograph s metadata Geolocation makes it possible, from a device connected to the Internet, to obtain various types of information in real time and locate it on the map with high accuracy at a given point in time. Geolocation data can be collected in a multitude of ways: web browsing via IP addresses, mobile phones, GPS devices, radio frequency identification (RFID), credit/debit card transactions, tags in photographs, and postings (such as geo-tags or check-ins using applications such as Foursquare) on social network sites such as Facebook and Twitter. Geolocation technology has become a foundation for locationpositioning services and location-aware applications running on smartphones such as iphone and Android TM devices. Geolocation data have a variety of uses, each of which can be tailored to particular applications, environments or enterprises. These uses presently include localization and/or customization of delivered content, enforcement of access and delivery restrictions based on geographic location, fraud prevention, and network traffic analysis. 2 Extending these technologies and their demand entails the problem of the nature of the information often private and/or sensitive associated with them. It is, therefore, important to be especially aware of issues relating to security and privacy to be able to use geolocation tools responsibly. Geolocation data is generated and collected in one of two ways in an active mode referred to as user-device-based geolocation or in a passive mode referred to as table look-up or data correlation server-based geolocation. Figure 1 summarizes these modes and the technologies each employs. 1 See, for example, San-Jose, Pablo; Cristina Gutierrez Borge; Eduardo Alvarez Alonso; Susana de la Fuente Rodriguez; Laura Garcia Perez; Guide to Security and Privacy of Geolocation Tools, Information Security Observatory, INTECO, Spain, King, Kevin, Personal Jurisdiction, Internet Commerce, and Privacy: The Pervasive Legal Consequences of Geolocation Technologies, Albany Law Journal of Science and Technology, January
6 Active: User Device-based Passive: Data-lookup Sever-based Impacts of Geolocation Figure 1 Modes of Geolocation Data Generation and Collection Mode Collection Method Technologies Involved Uses firmware and software on user s computer or wireless device Location determined via GPS chip and/or triangulation using cellular tower information Request-response model Involves use of third-party geolocation service providers, e.g., Quova, NetGeo, Bering Media Based on nonlocation-specific IP address acquired from user device or service set identifiers (SSIDs) for wireless networks Correlation with stored IP or SSID databases obtained from purchase records, user-provided information, network analysis of trace routes and domain name system (DNS) host names GPS Assisted GPS (A-GPS) Wi-Fi Wireless positioning 3G/4G Mobile applications iphone, Android devices, BlackBerry IP location Whois lookup, DNS LOC, geographic names in domain name user or application information, timing data using ping inference based on routing data, e.g., traceroute monitoring of Internet service provider (ISP) networks 3G/4G Wi-Fi Wireless positioning The capability to provide accurate and timely geo-reference data, tag items of interest with location metadata, and use location coordinates as a key to search databases has become the foundation for an expanding software market for applications that run on mobile platforms. The advent of GPS, Wi-Fi, wireless mobile networks and IP location identification techniques has spawned a wide range of derivative technology applications. These include the ability to tailor content and services to users in particular locations; conduct financial transactions from mobile devices with greater assurance of detecting fraud; and apply new uses for cloud computing paradigms, such as using cloud storage to synchronize heterogeneous devices in support of context-aware computing across a multitude of mobile platforms and varying user locations. The capability to provide accurate and timely geo-reference data, tag items of interest with location metadata, and use location coordinates as a key to search databases has become the foundation for an expanding software market for applications that run on mobile platforms. Consequently, it has become possible to enhance and control Internet commerce by using geolocation information to provide virtual boundaries and de facto controls for activities such as Internet gambling, video distribution, and procurement of products and services that may be restricted in one jurisdiction but permitted in another. However, such boundaries and controls can be intentionally evaded by using web proxies, anonymizer software, e.g., Tor, or Internet services such as My Expat Network. Of course, concomitant with these benefits is a range of social and privacy considerations on how geolocation data, when correlated with other personally identifiable information (PII) can be used or abused. These privacy and related security matters are discussed in a later section of this publication. As with any technology, geolocation has a double-edged nature. The capabilities that empower social networking, aid in law enforcement, and transform how the world is experienced and navigated and also provide the basis for serious misuse in the wrong hands. Such misuse includes unwarranted surveillance of individual or enterprise activities and use in criminal activities. In addition there are tools, such as the anonymizer Tor, that enable intentional evasion of geolocation, an ability that may facilitate criminal acts. 6
7 Business Benefits of Geolocation The business benefits of geolocation are far-reaching and are being leveraged by all types of enterprises manufacturing, retail sales, financial services, The business benefits of geolocation are insurance, transportation, utilities and governments. As business and far-reaching and are being leveraged by government services are enhanced, the user or consumer of those services benefits as well. Some business benefits include: all types of enterprises manufacturing, In advertising, use of designated market areas (DMA) and demographic data, retail sales, financial services, insurance, e.g., from metropolitan statistical areas (MSA) transportation, utilities and governments. Know your customer (KYC), e.g., better understanding of customer requirements and expectations for products and services and benefits accruing from targeted sales Delivery and asset management, e.g., truck location and manifest status Content customization and delivery, such as movies on demand Augmented reality, i.e., the use of geo-reference data and other detection methods, such as motion sensors and compass, combined with virtual information from the Internet, to enrich the user s world view Fine-grained management of Internet commerce activities and interests E-discovery in support of litigation and regulatory enforcement Highway toll devices, e.g., I-Pass, EZ-Pass in the US Vehicle Ad Hoc Networks (VANS), as used in the EU Optimal request routing Cloud balancing Fraud detection and prevention using IP location technology in conjunction with fraud profile data Real-time incident management through geolocation enrichment of logs and other IT data Companies recognize the benefits of geo-marketing and the applications (apps) that can bring discounts and promotions directly to the user at the point of purchase and provide valuable, real-time data about customer preferences. These data can be used, in aggregate, to provide data on key market trends, or integrated into a customer profile to provide a more personalized experience. It would be difficult to compile this type of information through a more efficient process using any other currently known technology. Consumers benefit, too from access to information that can be instantly relevant to a purchasing decision, to location-specific discounts and services. For businesses, being on the vanguard of the use of geolocation and mobile technologies will be critical to future success. Geolocation in conjunction with cross-platform mobile applications will provide the basis for enhanced customer experiences and present opportunities for enterprises to merge location with social-media-based and other information into context enriched services. Risk, Security and Privacy Concerns of Geolocation Mobile geolocation services have become pervasive in the always connected world. They have introduced innovative, profitable and functional services and applications. With location technology, a user s experience can be uniquely personalized, which appeals to marketers, retailers, government entities, law enforcement, lawyers and, unfortunately, criminals. Despite their many benefits, these services do increase risk to the user, the service providers and those who utilize the data collected by the service providers. The potential benefits have led many individuals and enterprises to adopt this technology, resulting in more data and personal privacy risk in the virtual network and an exponential increase in the inherent vulnerability for geolocation data across the information life cycle. When a user utilizes an application and its services, there may be multiple data controllers: the service provider, wireless access points and/or developers. Multiple data controllers force users to accede 7
8 control of the systems that determine and store their location and other personal information. Consequently, users usually cannot identify the source and ownership of data collection. This raises several questions of concern for the user, such as how their location data are being used, with whom the data will be shared, whether there will be onward transfer of the data, and the timeline for data retention and destruction. As the rise in the use of location-aware apps and geo-marketing continue, concerns keep on growing around online privacy specifically, business practices around the collection and use of the PII data. As the user group grows, continually utilizing new features and creative applications on their smartphones and other mobile devices, the prospect of criminal attacks becomes even more worrisome. The amount and the nature of individual and corporate information available to potential hackers would allow targeted attacks that are difficult to prevent, detect and manage. In addition, each user s personal information, including race, gender, occupation and financial history, has significant financial value. Therefore, location information is particularly of high value. Information from a GPS and geolocation tags, in combination with other personal information, can be utilized by criminals to identify an individual s present or future location, thus facilitating the ability to cause harm to an individual and/or his/her property, ranging from burglary and theft, to stalking, kidnapping and domestic violence. And the Companies should think carefully about their geo-marketing practices and examine whether their current privacy policies accurately reflect the collection and use of geolocation data. risk of identity theft increases with each collection of PII, especially when the information is not maintained for the purpose of specifically identifying an individual. Technology that can match PII with a user s location presents an additional layer of privacy concern. Regulators are aware of such concerns and are moving quickly to enact rules regarding how companies can use geolocation data. In this climate, companies should think carefully about their geo-marketing practices and examine whether their current privacy policies accurately reflect the collection and use of geolocation data. Criminal activity can take various forms. Physical crime, while more visceral, is likely less prevalent than cybercrime. Major corporations usually store positional data on remote servers. Through IP geolocation data, a user s physical location and computer can be identified. Using GPS on a computer or mobile device and geolocation tags on pictures and video also reveals personal information such as home, work and school addresses, and a daily itinerary. A cybercriminal then can mine personal information (e.g., credit card numbers and Social Security or other government identification numbers) by utilizing social engineering, malware, key loggers and persistent threat mechanisms to steal a user s identity. From social engineering arises the risk of a user being subjected to location-based spamming. IP geolocation attacks in two ways: It identifies the physical location of an organization s hosted . The spammer uses this information to plan a targeted attack that will overload the enterprise s servers, causing usage issues. Spamming attacks to an individual s or mobile device are targeted and are, therefore, highly effective at soliciting a response acknowledgment from the victim. Geolocation risk extends farther than to a sole individual. The location data risk also pertains to enterprises, employees and families. The areas of concern regarding privacy and safety on geolocation are: What data are collected? Who is collecting location data? How are the data used? With whom can the data be shared? How long can the data be stored? Spamming by advertisements or offers based on physical location Accidental or unintentional sharing of location data resulting in annoyance, embarrassment or danger to an individual 8
9 Consequently, there is a growing consensus that geolocation data should be classified as sensitive due to a number of concerns such as transparency about data collection practices, solicitations made based on geolocation data obtained without the user s consent and physical safety stemming from the misuse of information that can identify a user s current (or future) physical location. Geolocation data can give a competitive advantage to business rivals. For example, the knowledge that a group of executives is at a specific location could constitute unauthorized disclosure of confidential or proprietary business information, such as a merger, an acquisition, or a research and development breakthrough. This type of breach can affect reputation, brand strength and financial statements. Employees face the risk of their employers utilizing geolocation data to monitor them both during and outside of work hours. There may be a justifiable business reason, e.g., to identify and locate delinquent employees, but it could also extend into a gray area, such as tracking an employee s recreational activities because the company believes they may negatively affect its reputation. Enterprises collecting and/or using geolocation data face a difficult task in balancing the privacy and ethical use concerns of customers, employees and other individuals with challenges and opportunities posed by geolocation There is a growing consensus that geolocation data should be classified as sensitive due to a number of concerns such as transparency about data collection practices, solicitations made based on geolocation data obtained without the user s consent and physical safety stemming from the misuse of information that can identify a user s current (or future) physical location. information. As an enterprise considers how to integrate geolocation into its services and offerings, an ISACA developed model, the Business Model for Information Security (BMIS) can be applied to assist in developing an optimal balance among the competing concerns regarding geolocation. BMIS provides a means to examine the interrelationships of the traditional triad of people, process and technology together with the cultural and organizational aspects of the enterprise as it develops a strategy for services and activities involving geolocation data use and protection. Strategies for Addressing Risk Associated With Use of Geolocation Current law does not articulate a stance on the privacy and security aspect of geolocation. Therefore, it is uncertain whether enterprises have a legal obligation to the users and developers of the geolocation data. Yet, despite legal guidelines or absence thereof, there are two paths that can mitigate the risk of geolocation: through technology safeguards and through the user. There is an implied urgency in addressing such risk as the geolocation genie is out of the bottle, so to speak. The geolocation provider and other third parties must implement the appropriate safeguards and a privacy and security governance program. Enterprises should not view privacy as a regulatory hurdle to jump. The program implemented should be proactive. Therefore, the enterprise needs to educate itself on what is needed in the absence of a legal mandate, audit guidelines or standards, or the presence of confidentiality risk. Each department within an enterprise should proactively manage the inputs and outputs of the technology and provide input on the strategy. The appropriate general controls should be implemented within the geolocation technology. For instance, the operating system and software should be updated periodically with antivirus software, patches should be implemented and backups should be performed regularly. In addition, there should be logical and physical access controls that restrict access to a need to know basis and are monitored for unauthorized access. In addition, subscribing to the principle of keep the least for the shortest period as well as using anonymization techniques is recommended. These pervasive controls may not directly impact safeguarding of personal information, but they are extremely important and provide the foundation for a strong defense-in-depth technology infrastructure. 9
10 Through data classification the enterprise should identify the data that are considered personal information and confirm that there are appropriate mechanisms such as encryption to mitigate the risk of disclosure. Another extremely important task is data classification. Without knowing where the data are, who owns the data and the source of the data, the data cannot be appropriately safeguarded. Through data classification the enterprise should identify the data that are considered personal information and confirm that there are appropriate mechanisms such as encryption to mitigate the risk of disclosure. In addition, data that are considered personal information should be either redacted or anonymized. Appropriate integrity controls should be used in the event that location data and associated PII may be required for discovery or forensics purposes. An enterprise should verify that it is adhering to its privacy policy for location-based services. The enterprise may be liable for deceptive or unfair business practices if it utilizes the collected data for a purpose not included within the notice. Therefore, the enterprise should confirm its documented guidelines regarding notice, choice and onward transfer to validate that its practices are in sync with its notice. The enterprise then needs to design a governance framework to address privacy and security implications. The framework should use a top-down approach and be pervasive for the entire enterprise. First, the enterprise needs to identify the strategy it is going to implement for geolocation. The strategy should be linked to other technologies and follow the same privacy and security standards for safeguarding personal information. Second, depending on the strategy, policies, procedures and consistent nomenclature should be implemented and followed. Third, communication, training and awareness programs should be established to educate the user, developer and other parties who will collect or use the data. Last, a monitoring and reporting structure should be put in place to proactively manage issues, breaches and exceptions. As noted earlier, ISACA s BMIS can be of use to enterprises wrestling with the question of how to address the context and protection of geolocation information within the enterprise. In addition, ISACA s Risk IT (and Val IT) and COBIT frameworks can be applied to develop a risk mitigation (and value-chain) strategy and privacy compliance and protection processes pertaining to the collection, use and governance of geolocation information. There are important questions that a company should ask and that should be part of a company s factual due-diligence process when dealing with data from users: knowing what the location-aware application does, what type of data it collects and whether those data are shared with affiliates, partners or third parties. An organization should pose the right questions regarding which data are aggregated, whether the data can identify an individual, what are the data flows from its location-aware offering, and whether the organization will share data with other parties. In addition to safeguards implemented at the geolocation organization, the user must also play a key role in safeguarding his/her personal information. As a first step, the user should identify within the application or service how to disable, opt out and understand the capabilities of the technology. Users also should also educate themselves and increase awareness among others on evolving technologies. As users become aware and begin to understand the corresponding risk, it is hoped that they will think carefully before posting or tagging personal information. It will require collaborative effort between the enterprise and the user, and a shift in user behavior, to maintain privacy in a digital world. Users should also educate families, friends and coworkers as their actions may disclose location-based information that a user wishes to be kept private. For example, Facebook s facial recognition technology and/or tagging capabilities may inadvertently identify an individual and disclose associated geolocation data. This type of collaboration and shift in behavior will necessitate that the user reexamine how to maintain one s privacy in a digital world. 10
11 Governance and Change Consideration for Use of Geolocation Geolocation technology, in and of itself, is neutral. Of greater importance is how geolocation data are acquired, used and archived. In this sense, governance pertains more particularly to how capabilities implicit in a specific geolocation technology are used, how geolocation services manage geolocation data to comply with relevant laws and regulations, and how the interests of the objects of geolocation (such as individuals) are served and protected. At the heart of an enterprise s governance activity is the mechanism by which geolocation information is ethically used and protected. Privacy and the protection of PII are key considerations, together with how such information is collected and used. In legal or regulatory parlance, governance of geolocation is a matter of how to address opt-in or opt-out privacy rules, depending on jurisdictional rules and boundaries. Opt-in and opt-out are the two options the user or subscriber can have to manage the degree of privacy with mobile devices. The opt-in system requires a previous action by the user, i.e., informed consent At the heart of an enterprise s governance activity is the mechanism by which geolocation information is ethically used and protected. and authorization, to begin the collection of location and/or provision of location services by a third party. The opt-out system considers location service active by default and, as such, requires the user to execute an action later to deactivate it. The former is the approach taken by the EU, whereas the latter is the prevailing situation in the US. It is also important to note the close relationship developed between geolocation technologies and social networks, collaborative communities, and other services related to the so-called Web 2.0. Users have the opportunity to integrate virtually any kind of geo-referenced information on popular social networks as well as using new specially designed social networks that are developed on geolocation technology. The use of appropriate countermeasures and security mindset applies here as indicated in ISACA s recent white paper entitled Social Media. Assurance Considerations Pertaining to Geolocation There are four assurance aspects relative to geolocation technology and its use: ISACA s Risk IT and COBIT frameworks can be used by service providers and requestors to provide the basis for risk management, compliance and proper use of geolocation information. Auditing, vetting and certifying geolocation service providers and third-party users. Such audits and certification can take the form of, for example, ISAE3402 (or SSAE16) reports and trusted third-party branding such as VeriSign, TRUSTe and Common Criteria (CC) Target of Evaluation (TOE) evaluations. Providing security and safety assessment of mobile applications employing geolocation capabilities, e.g., iphone applications, Android applications, and proper use of HTML5 and other geolocation-related application programming interfaces (APIs). The ISACA white paper Securing Mobile Devices provides useful information in this regard. Ensuring compliance with privacy and usage laws and regulations by service providers and technology developers across diverse international jurisdictional boundaries. Compliance in this context would also include consideration of the full spectrum of ethics of use issues. Some specific things relating to geolocation that an assurance strategy should address include: Proper policies, processes and procedures governing an enterprise s use of third-party geolocation services and data and related ethics of use guidelines and requirements Integrity of underlying technologies as manufactured and the associated integrity of geolocation service infrastructures utilizing or depending on those technologies. This includes the integrity of the geolocation data records and the audit trail records of the underlying infrastructure. Security of client-side devices including susceptibility to man-in-the-middle (MIM) attacks, packet sniffing and signal-/ frequency-based attacks User behavioral analysis and profiling to ascertain the degree of compliance and effectiveness of user data protection safeguards in a variety of scenarios 11
12 Privacy protection assurances, such as use of privacy by design methods and secure database technologies to protect against unauthorized collection of, access to or improper use of sensitive personal information associated with geolocation data Awareness training for all C-level and executive management regarding the implications, benefits and associated responsibilities involved in the collection and use of geolocation information Vetting of third-party software application developers and software to: Ensure software security and integrity through secure application design and test methodologies to address data-caching concerns, covert use of location data in metadata, and protection against the range of web-based attacks. Require the use of trusted platforms and tool sets for application development to reduce risk from viruses, malware, unauthorized operating system (OS) modifications and misuse of open APIs. Adhere to secure systems development life cycle (SDLC) processes and procedures such as configuration management by in-house or third-party application developers. Conclusion The increasingly global nature of content and the migration of multimedia content distribution from typical broadcast channels to the Internet make geolocation a requirement for enforcing access restrictions, supporting fraud prevention, and providing the basis for traditional performance-enhancing and disaster recovery solutions. Accurate geolocation data are often viewed as useful only in certain scenarios involving content delivery networks and advertising efforts. As recently noted by a network supplier, 3 the increasingly global nature of content and the migration of multimedia content distribution from typical broadcast channels to the Internet make geolocation a requirement for enforcing access restrictions, supporting fraud prevention, and providing the basis for traditional performance-enhancing and disaster recovery solutions. As the sophistication of the geolocation technologies themselves increases, along with the diversity of services built on them, there will be recurring topics and themes that society will continue to consider and debate, such as those put forth at a recent symposium on mobile devices, geolocation and shifting values, sponsored by Fordham University: 4 How do mobile devices and location technologies impact the distribution of content? How does mobile computing impact intellectual property rights? What challenges do content providers face in bringing their products to mobile devices? How do these challenges vary across national borders? How does mobility impact distribution rights? How do location technologies impact territorial licensing and royalty calculations? How have mobile devices, networks and location-based services changed our values regarding privacy, data collection and data use? What rights do people and organizations have regarding the data collected? What rights do people and organizations expect and are these expectations changing as services become more popular? What rights are granted and recognized internationally, and how can compliance with local and international standards be assured? What rights should corporations ethically grant their users? What standards should apply to government access to, and collection of, location data? What limits should there be on law enforcement access to these data? What are the most significant international differences in the standards for government access to location data? Finding answers to these and other questions in the future should prove challenging, yet enlightening. 3 MacVittie, Lori; Geolocation and Application Delivery, F5 White Paper, USA, Fifth Annual Law and Information Society Symposium: Mobile Devices, Technologies and Shifting Values, Fordham University, USA, 25 March
13 Additional Resources and Feedback Visit for additional resources and use the feedback function to provide your comments and suggestions on this document. Your feedback is a very important element in the development of ISACA guidance for its constituents and is greatly appreciated. 13
CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask AN ISACA CLOUD VISION SERIES WHITE PAPER
AN ISACA CLOUD VISION SERIES WHITE PAPER CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask Cloud computing is gaining momentum. As cloud offerings gain maturity, cloud service providers are becoming
CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world.
ISACA Model Curriculum for IS Audit and Control, 3 rd Edition ISACA With 95,000 constituents in 10 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community,
Social Media: Business Benefits and Security, Governance and Assurance Perspectives
An ISACA Emerging Technology White Paper Social Media: Business Benefits and Security, Governance and Assurance Perspectives Abstract Initiated as a consumer-oriented technology, social media is increasingly
G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING
IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
IS Standards, Guidelines and Procedures for Auditing and Control Professionals
IS Standards, Guidelines and Procedures for Auditing and Control Professionals Code of Professional Ethics IS Auditing Standards, Guidelines and Procedures IS Control Professionals Standards Current as
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
www.pwc.com/mt Internal Audit Takes On Emerging Technologies
www.pwc.com/mt In Internal Audit Takes On Emerging Technologies Contents Introduction 2 Cloud Computing & Internal Audit 3 Smart Devices/ Technology & Internal Audit 6 Social Media & Internal Audit 8 Cyber
Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives
An ISACA Emerging Technology White Paper Security Information and Event Management: Business Benefits and Security, Governance and Assurance Perspectives Abstract In today s information-driven business
ITAF. 3 rd Edition. A Professional Practices Framework for IS Audit/Assurance
ITAF 3 rd Edition A Professional Practices Framework for IS Audit/Assurance About ISACA With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust
Zubi Advertising Privacy Policy
Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
How To Manage Virtualization
An ISACA Emerging Technology White Paper Virtualization: Benefits and Challenges Abstract Virtualization is a high-tech buzzword in broad use today, but its increasing importance is based on more than
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
Advanced Persistent Threat Awareness
Advanced Persistent Threat Awareness Study Results Advanced persistent threat (APT) has been a term used frequently during security threat discussion; however, confusion exists as to what an APT is and
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Security, Audit and Control Features Oracle PeopleSoft
Technical and Risk Management Reference Series Security, Audit and Control Features Oracle PeopleSoft 3 rd Edition Security, Audit and Control Features Oracle PeopleSoft, 3 rd Edition ISACA With 95,000
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
Privacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
G11 EFFECT OF PERVASIVE IS CONTROLS
IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically
Business Continuity Management: Emerging Trends
An ISACA Emerging Technology White Paper December 2012 Business Continuity Management: Emerging Trends Abstract As the pace of change in information technology (IT) accelerates, business continuity management
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Microsoft SQL Server Database Audit/Assurance Program
Microsoft SQL Server Database Audit/Assurance Program ISACA With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
BUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
Mobile Device Security and Audit
Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP [email protected] Session Objectives Define mobile devices
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
Online Lead Generation: Data Security Best Practices
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
HOW SECURE IS YOUR PAYMENT CARD DATA?
HOW SECURE IS YOUR PAYMENT CARD DATA? October 27, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director PCI Practice Leader Kevin Villanueva,, CISSP,
CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout the world.
COBIT 5 Design Paper Exposure Draft ISACA With more than 86,000 constituents in more than 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy
Thank you for visiting this website, which is owned by Essendant Co.
Essendant Online Privacy Policy Thank you for visiting this website, which is owned by Essendant Co. Please take a few minutes to review this Policy. It describes how we will collect, use, and share information
1. The information we collect and how we collect it.
PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
for Information Security
for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals
GUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015
Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.
PRIVACY POLICY This Privacy Policy ( Policy ) applies to the website Creditseva.com which is an online internet portal ( Creditseva ), offering credit repair, credit monitoring and credit consulting services
PRIVACY POLICY. What Information Is Collected
PRIVACY POLICY This Privacy Policy applies to Web.com Group, Inc. (along with all subsidiaries, affiliates, successors and assigns thereof, referred to hereinafter collectively as Web.com, "we", "our"
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
1.1 Personal Information is information about an identifiable individual such as your name, address, telephone number and email address.
Privacy Policy Last updated on December 14, 2015. This Privacy Policy (this Policy ) describes how Kik Interactive, Inc. and its subsidiaries with authorized links to this Policy, (collectively, Kik Group,
Mobilebits Inc. Privacy Policy
Mobilebits Inc. Privacy Policy Notice: We have updated our Privacy Policy as of February 1, 2016 Protection of your privacy is of the utmost importance to the Mobilebits Inc. ( MI, us, or we ). Please
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Privacy Statement. What Personal Information We Collect. Australia
Privacy Statement Kelly Services, Inc. and its subsidiaries ("Kelly Services" or Kelly ) respect your privacy and we acknowledge that you have certain rights related to any personal information we collect
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Android Developer Applications
Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )
ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
SKoolAide Privacy Policy
SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
1. TYPES OF INFORMATION WE COLLECT.
PRIVACY POLICY GLOBAL ASSESSOR POOL, LLC, DBA PINSIGHT ( Company or we or us ) is committed to protecting your privacy. We prepared this Privacy Policy to describe our practices regarding the information
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Beasley Broadcast Group, Inc. Privacy Policy
Beasley Broadcast Group, Inc. Privacy Policy Last Updated and Effective December 31, 2015 This Privacy Policy has been updated to include a section regarding your California privacy rights if you are a
2 Security Considerations for Cloud Computing
1 2 Security Considerations for Cloud Computing About ISACA With more than 100,000 constituents in 180 countries, ISACA (www.isaca.org) is a leading global provider of knowledge, certifications, community,
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
Data Leak Prevention. An ISACA White Paper
An ISACA White Paper Data Leak Prevention Abstract Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe.
IT Governance and Outsourcing
Copyright 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT Governance and Outsourcing By Hugh Parkes, CISA, FCA is a subset of corporate governance. It refers
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
Cloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security
Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
