THE CLOUD COMPUTING APPROACH IN PUBLIC SECTOR
|
|
|
- Theodore Davidson
- 10 years ago
- Views:
Transcription
1 THE CLOUD COMPUTING APPROACH IN PUBLIC SECTOR Anna KACZOROWSKA Summary: In the society using more and more mobile technologies, the management of the key documentary processes (including also their use for interaction with clients, human resources management, as well as the management of finances, reporting and accountancy) in and between the public sector organizations is very difficult. The article shows that the cloud computing approach may significantly improve the management of information, especially the main documentary processes in offices, but requires special attention paid to legal issues, as well as the personal data security and protection. Besides, the type of a cloud best for the public sector was proposed, along with the components of a safe agreement with the cloud service provider. Key words: public cloud computing, private cloud computing, hybrid cloud computing, PaaS, IaaS. 1. The cloud computing conditions in public administration The public sector considers now a possibility of adapting the cloud computing from the private sector (as it once did with project management). The studies carried out by Microsoft on implementation of the cloud computing in private enterprises indicates that the savings of the site, time and especially the costs associated with the purchase of teleinformation infrastructure may reach as much as 80%. The forecast value of the IT sector incomes generated from the cloud services provision is to be almost doubled. In 2010 this value reached approx. 1.2 billion PLN, whereas in 2013 it was to grow to about 8.3 billion PLN [1]. The public administration entities are expected first of all to provide actually needed e- services to the more and more mobile society. As many as 83% of organizations from the public sector confirm [2] that they have access to such devices as smartfon or tablet, but their use is inhibited by obsolete information systems. In addition, the existing division between the technologies supplied to the front office and back office results in delays in access to necessary public information and threats to its security. Report [2] shows also that the big data phenomenon (91% of the respondents) and cooperation with many suppliers largely affect the organization s processes management. Only 33% of the investigated organizations established the objectives for their documentary processes in a way which allows to overcome the problem of too many data. In the light of such results of the report the key processes in the organization may be encumbered with documents and may directly affect offices interactions with clients and employees. The cloud service providers will not perform any public administration tasks but will only supply space on virtual disks and computing power of the processor (Infrastructure as a Service) or an operating platform (Platform as a Service), possibly with the implemented appropriate software (Software as a Service). So what will happen will exclusively be supplying the IT resources enabling accomplishment of public tasks. 802
2 In public sector the solutions based on cloud computing are used by the Central Registration and Information on Business (CEIDG), Public Information Bulletin (BIP) of the Prison Service and internal systems of making information available and documents circulation, e.g. in the General Directorate for National Roads and Highways (GDDKiA). The benefits of the use of cloud computing in all sectors are: decreased investments in equipment and software; decreased personal costs of ICT departments; easier access to information; increased sharing of knowledge; assured permanent access to e-services for many recipients; scale economy. On the other hand, the most important limitations which have to be considered in detail before using the cloud computing are: [3]: lack of impact on software (also its updatings) used by the provider of services; seizure of hardware or loss of financial liquidity of the provider of services; loss of control of access to employees data and data flow, e.g. cloud federations; loss of control of the compliance with data protection requirements; increased risk of a change, loss, destruction or damage of data; non-liability to notification duty; higher vulnerability to hacking and hackers attacks; poorer anti-virus protection; increased failures (frequent lack of access to resources); lack of economic profitability Specificity of cloud computing and its classifications The concept of the cloud computing solution dates back to the year 1960 when the American computer scientist John McCarthy wrote that calculations might one day be organized as a public utility service. The name itself most probably comes from graphic presentations of clouds used for symbolic presentations of Internet in various studies. In its contemporary meaning this term was for the first time used in 1997 during a lecture delivered by Ramnath Chellapp who defined the cloud computing as a paradigm in which the calculation services limit will be established by economic reasons and not by technological limitations. The cloud computing is defined as a model of data processing in which many recipients provide IT solutions of high scalability in a mass way, in form of a service, by electronic medium which is Internet (such definition is presented by the Gartner Inc research centre [4]). Conceived like this, the cloud should not be understood as a new technology but rather as a new approach to IT solutions construction. Customers may obtain an access to a given network space, the computing power resources in almost real time, and release them when they are no longer needed. In other words, it is a service of using the co-shared IT resources. The cloud phenomenon results from the present world economy situation and redefinition of the role of IT departments in organizations. The cloud allows for flexible adjustment to changes. The cloud computing helps to react on an on-going basis, without incurring unnecessary costs on the demand for an additional space on servers, additional 803
3 hardware, licenses etc., and consequently allows to have one s finger on the pulse, which is an important element of the competitive advantage. Depending on the extent of the user s control of IT infrastructure and resources, three basic levels of cloud computing are singled out, as characterized in Table 1: Tab. 1. Characteristics of the levels of cloud computing No Acronym of the Full name of the level Characteristics of the level name 1 IaaS Infrastructure as a Service The service as infrastructure in which the user uses hardware (virtual Internet disks, CPU power) through the Internet 2 PaaS Platform as a Service The service is a platform owing to which the user apart from infrastructure obtains access to the operating environment allowing for independent installation and launching of application 3 SaaS Software as a Service The service in this case consists in providing a functional software through the Internet browser. Apart from the hardware infrastructure, with the operating system environment the service client obtains also access to specific applications (spreadsheets, accounting software) the functioning of which rests with the service provider At the IaaS level the user controls his data and software, whereas the basic part of the infrastructure, which consists of servering and data warehouses, is leased from the cloud provider [5]. The PaaS service (see tab. 1) provides the user with an access to virtual computer. The role of the cloud s provider is increased here, because he accounts for providing the working environment (comprising also an appropriate infrastructure and instruments for designing the software) for the client who will continue to control the data and software. Examples of such services are: Google App Engine or Microsoft Windows Azure. The SaaS software (tab. 1), such as for example Microsoft Business Productivity Suite, Google Mail or Salesforce.com, does not use local computing resources and does not have to be installed at the end user. Another classification distinguishes the following types of clouds: public, private, dedicated and hybrid. The concept of the public cloud stipulates that the user wholly uses the service of an external provider of the cloud and other third entities (e.g. suppliers of external applications launched in the cloud) [6, p. 24]. Such a cloud computing arouses fears of the users, i.e. public administration and its clients, for safety of their data. Such fears are not legitimate in the case of the so called private cloud, where the whole infrastructure is physically located in the area controlled by the user which may be the public administration. 804
4 Another type of cloud computing, the dedicated cloud, enables giving to a given user s exclusive disposal a separate part of the cloud, e.g. in the form of physically allocated servers. On the other hand, hybrid clouds combine the use and location of data of the key importance and confidential information in private cloud and location and processing of public information or the information which does not require any special protection in the public cloud. The use of the public or dedicated cloud computing is not connected with taking over, by the cloud provider, any public tasks encumbering the state or self-governmental administration, but exclusively with delivery of IT resources for their implementation. All existing applications of the cloud computing in public administration use first of all the private cloud, where all infrastructure is owned by administration entities, whereas in the case of CEIDG by the Minister of Economy. An example of the use of the public cloud is the pilot implementation of Office 365, available from Microsoft, by the Association of Polish Towns and Association of Polish Counties Legal limitations on the use of cloud computing in public administration The act of 17 February 2005 on informatization of the activity of the entities which perform public tasks (UINF; [7]) and order [8] based on it do not exclude the possibility to use the public cloud, but the functioning of the cloud computing is not regulated clearly in the public law. However, this does not mean that once the storage and processing of data are transferred to the cloud, the regulations which determine the activities of respective public administration organs, establishing for them the information security requirements, will become invalid. Acts [7] and [8] assume that teleinformation systems used in the cloud should at least meet the technological requirements and those related to security and protection procedures stipulated in Polish standards (especially PN 2700) or those used by the European Union (EU), whereas where these are missing the internationally acknowledged standards published by the Internet Engineering Task Force or World Wide Web Consortium (W3C). UINF assumes that when providing the cloud computing it is sufficient that the service provider indicates the assumed standards and formats used in computer science without the obligation to reveal detailed technological data of applied teleinformation solutions. However, the use of the cloud computing is tantamount to assignment of the control of IT resources to another entity or usually several entities with which the cloud provider cooperates. An important issue is then to establish the legal nature of the relationship connecting the cloud provider with the entity which is the IT resources disposer. Usually it will be a civil law relationship, but it is possible that the cloud provider for public organization will be another budgetary unit. In most cases, the relationship between the parties will be regulated by the agreement for providing services, to which regulations about the order apply. Assignment of the control of IT resources is usually connected with revealing the personal data included in these resources, therefore the entities planning to use the cloud computing, especially the public cloud, should find out the type of that disclosure in the light of the Act on personal data protection ([9]; UODO). On the ground of this act, the following two ways of showing the personal data are singled out: 805
5 1. Entrusting the processing (art. 31 UODO, sec. 1 and 2) the entity (processor) to which personal data processing was entrusted may process them to the extent and purpose stipulated in the agreement; 2. Availability when information about natural persons is revealed, the administrator gives another entity access to personal data; assumingly, the public administration entity shows then the data needed by the entity to which they were made available. In Poland for most of the services of data processing in the cloud the civil law agreement of entrusting the personal data processing applies. The cloud provider s task is usually mediation in giving access to technological infrastructure belonging to other entities with which (according to UODO) agreements of entrusting personal data processing should be concluded. What happens then is sub-entrusting, i.e. further entrusting of personal data processing. So legal relationships between the parties may be multi-level, where on the lowest level of that system there is more than one entity [18]. We deal with personal data availability when cloud providers, apart from payment for providing the service, want to obtain an additional benefit in form of a possibility to process personal data contained in the service client s resources, for instance if they want to carry out marketing research on them. The legal nature of the relationship between the service client and the service provider changes then, because the service provider is both the processor and administrator of personal data. In the agreement concluded for using the cloud computing, we should take into account the (organizational and technological) security of personal data and a special emphasis should be put on the rights and obligations connected with notifying of the public administration entity about breaking the security rules of the entrusted personal data, e.g. in connection with the control carried out by the General Inspector of Personal Data (GIODO) at the service provider. Pursuant to art. 36 sec. 2 of UODO the data administrator is to conduct the documentation describing the data processing method as well as the technical and organizational measures assuring the processed data protection [10]. The executory act specifying the requirements to conduct such documentation is [10]. The Polish legislator requires also, from those processing personal data by virtue of the entrusting agreement, that they conduct the documentation on processing of such data. On the other hand, section 3 art. 36 of UODO [9] imposes on the data administrator or the information security administrator designated by him, the general obligation to supervise the compliance with the personal data protection rules, whereas sec. 1 enacts the general obligation to secure such data. The mentioned regulations of UODO may be comprehensively interpreted by GIODO Office employees who during a possible control may e.g. consider whether or not the agreement for entrusting the personal data processing authorises the administrator to access to the documents related to security rules and technical measures applied in respective processing centres. A huge provided of the cloud from the USA or SAR (South African Republic) will probably refuse also incorporating into the agreements a clause enabling a securities audit at the processor s site. Regulations of the Act on protection of secret information [11] confine the use of the cloud computing in a different form than the private cloud. Its entries exclude the use of the technical measures of the third entities whom the provider entrusts with data processing. What happens then is further entrusting of data, i.e. sub-entrusting. Furthermore, these 806
6 measures must be at a site which is strictly controlled by the entity which processes or stores secret information. The provider of the cloud may also be an entity based in the third country (from art. 7, sec. 7 UODO in a country which does not belong to the European Economic Area (EOG), such as e.g. the USA and South African Republic). In case of huge cloud providers from outside the EOG it may be difficult to comply with the obligation to stick to the written form of the agreement of entrusting the personal data processing, as well as the obligation to specify in it the scope and purpose of entrusting. According to the Polish law, the requirement of conducting the personal data processing should be met both by the cloud provider based in the Republic of Poland and the one whose registered seat is outside the EOG territory. However, this requirement does not have to be met by service providers from other EOG countries, but regulations of these countries may impose on cloud providers the requirements identical with those which were used by the Polish legislator. Implementation of the cloud computing generates one more problem connected with the use of regulations of the Public procurement law [12] which impose on the client the need to precisely estimate the demand for the computing power, disk space sizes or bandwidth. Because of the cyclical nature and type of activities performed by public administration entities, associated with their duty to submit reports, returns and declarations at a specified time, it is allowed to determine the quantity of expected operations in the system and subsequently adjust the ordered resources to such fluctuations. In the case of underestimation or overestimation of IT resources the encumbered party will be first of all the service client who covers the costs of unused resources in case of overestimation or increases the order in case of underestimation of the demand. The errors made while constructing the Terms of Reference may even undermine the whole procurement procedure and cause the need to carry it out again if appeals lodged by other participants of the proceedings are accepted. Applied to legal problems associated with the use of cloud computing is opinion 5/12 adopted by the Working Group Art. 29 for Data Protection on 1 July 2012 relating to data processing in cloud computing (WP 196; [13]). Aiming at a further legal regulation of the use of cloud computing, on 27 September 2012 the European Commission (EC) announced a strategy on cloud computing [14], where the tasks presented in table 2 are indicated. Tab. 2. Tasks in the EC strategy relating to cloud computing No Task 1. Solving the problem of a set of standards used by the cloud computing clients 2. Establishing the standards of data transfer 3. Promotion of certification mechanisms mutual for the EU for reliable providers of cloud services 4. Development of a pattern of secure and honest conditions for cloud computing agreements, including agreements with a guaranteed level of services. 5. Establishment of European partnership for cloud computing with participating member states and branch entities for the development of the European market of cloud computing 6. Increase in the competitiveness of European providers of cloud services to provide cheaper and better solutions within e-government 807
7 The public sector organization which wants to use the hosting service or backup in cloud should know that such a service as Dropbox or Google Apps has its own rules of use. And so, from available, under itwa.pl/2a, conditions of Dropbox service use (under itwa.pl/2b there are analogical entries for Google Apps for companies) it results that the provider may terminate or suspend the service providing agreement at any time. Such an entry may be a severe obstacle, when the client decides to enforce his rights at court. Dropbox rules indicate that the service provider is the supplier of the Safe Harbor (itwa.pl/2c) agreement concluded between the EU and the USA, guaranteeing that providers from the USA will use appropriate levels of data securing as required by the European Union s directive 95/46/EC. If Dropbox service is a party to Safe Harbor, it could seem that it is free from the problem of transferring the personal data outside the European Economic Area (EOG). However, according to Working Group Art. 29, the data transferring entities should not rely only on declarations of the organization to which they transmit the data, but should independently receive confirmation that the service provider has certificate Safe Harbor and observes its rules. For this purpose, page may be used and it should be checked when the confidence in a given service provider becomes invalid. According to art. 48 of act [9], GIODO s consent may be a premise authorising the transfer of personal data beyond the EOG. Another important issue is the obligation to assure an appropriate security within the protection of privacy as well as the rights and freedom of the person to which the data refer. In practice, administrators fulfill this obligation while concluding agreements including standard contractual clauses, with data recipients. Standard contractual clauses are ready patterns of agreements established by the Commission s Decision of 27 December 2004 (itwa.pl/2d), the use of which is considered by the personal data protection organs as the guarantee of the use of the protection rules for such data, mandatory in the EOG Cloud computing optimal for public administration In view of the type of the data whose administrators are public sector organizations, the proposed optimum solution is the use of hybrid cloud computing where the information under special protection would be processed in private cloud computing, whereas the open information, such as e.g. the data from BIP, in public cloud computing. Because of complicated relationships which arise between the service client, service provider and its co-operators, the use of cloud computing faces many legal obstacles. If, for example, the cloud provider is an entity based abroad, the relationship between the parties may be regulated by legal provisions of another country. Directive [10] determines, among other, the indispensable minimum of information which should be contained in the policy of the personal data processing security, a part of which is a list of buildings, premises or their parts, which form an area where personal data are processed. Drawing up such a list would require from the service provider the information about precise localization of servers on which the entrusted personal data are processed. Some large cloud providers which do not belong to the EOG enable the service clients only to choose the world s region where the data will be processed, which in Polish legislation is too general information and does not allow to perform the obligation resulting from [10, 4 item 1]. Agreement with the cloud computing provider is constructed so that in case of a dispute the contractual provisions may be enforced effectively. Elements which should be 808
8 contained in a secure agreement on cloud computing are presented in table 3. The agreement about entrusting of personal data should be concluded in writing, but very often such agreements are concluded on-line. Therefore, a problem may arise of a failure to stick to the form of the concluded agreement as required for evidence and not under invalidity rigour. However, a failure to stick to the form of the agreement may be controlled by GIODO. A potential post-giodo-control obligation to remedy such infringement may be difficult or even impossible to complete, if the on-line agreement with the cloud provider was concluded so that he adopted standard conditions, i.e. the agreement was concluded by access. If the cloud provider is based in a country within EOG, regulations allow for a possibility to draw up an agreement concluded in a form which is equal with the agreement concluded in writing, which facilitates the conclusion of an on-line agreement that is legally valid. Tab. 3. Elements of a correctly constructed agreement with the cloud service provider No Element of the agreement Description of element 1. Detailed information for the provider on the client s demands The information should refer mostly to applied agreements with a guaranteed level of services and to sanctions involving a possibility to summon the provider if the requirements are not met. 2. The security measures with which the cloud service provider must assure the compliance with the client s demands, depending on the risks connected with processing and type of the data under protection. First of all, concrete organizational and technical measures have to be specified 3. The object and time framework of the cloud computing service as well as the scope, method and purpose of personal data processing. 4. Conditions of the return and destruction of data after the service is provided 5. The confidence clause binding the cloud service provider and his employees having access to the data The aims of entrusting the personal data are specific storage activities, including storage as such. In this case, the processing entity is not an administrator of entrusted data but only a contractor of certain activities carried out on the data for a purpose specified by their administrator. For personal data transferred to the cloud computing provider the types of processed personal data should be specified. The scope means the personal data categories which are subject to entrusting, e.g. electronic mail addresses. Secure deleting of personal data has to be ensured at the public administration entity s request Only authorized people may have access to entrusted data 809
9 6. Entry about the provider s obligation to support the client in exercising the rights of the person to which the processed data refer 7. Entry about the provider s non-transfer of the data to any third parties, unless the agreement stipulates involvement of other entities to which the service provision will be entrusted 8. Entry explaining the cloud service provider s obligations 9. Remembering about the service provider s obligation to draw up a list of locations where the data may be processed 10. Remembering about the administrator s right to monitor the course of the service completion by its provider 11. Entry about the provider s obligation to inform about significant changes related to a specific cloud service 12. Entry about registration and control of important operations of personal data processing 13. Entry about notifying the service client about each legally binding application for personal data availability 14. Entry about the provider s assurance that his internal decisions within data organization and processing will comply with applicable national and international standards and legal requirements This entry should refer to the scope of a given person s access to her/his data, their amendment or deleting The agreement should specify that the processing entity s subcontractors may be engaged only with a consent from the data administrator, i.e. the public administration entity. The processing entity has to regulate the cross-border data transmission, e.g. by signing agreements with engaged subcontractors, by virtue of standard contractual clauses 2010/87/EU What is meant here are obligations related to the service client notification about any data protection infringements which affect the client s data The cloud service provider is obliged to cooperate to this end with the data administrator E.g. notifying about implementation of additional functionality This entry refers to the cloud service provider or entities which were subentrusted with its accomplishment Notifying rests with the law enforcement organ, it this is not forbidden This entry refers also to internal decisions made by sub-processing entities, if there are any. Also the ENISA study may be helpful in constructing a correct agreement with the cloud computing provider [15]. Making the personal data available to the cloud processing entity is, according to the Polish law, very difficult, because it should have a consent of those to whom the data refer. Therefore, the cloud service provider may find it difficult to use the personal data which are subject to entrusting for his own purpose, because of the difficulty with getting the declarations. 810
10 Under the present legal situation it seems most advantageous to conclude civil law agreements with cloud computing providers based in the countries belonging to the EOG. It may be even more troublesome to conclude agreements with entities based in the territory of the Republic of Poland. On the other hand, the choice of the cloud provider from outside the EOG, as the one that is associated with the need to negotiate the compliance with all conditions specified in the Polish law, is now most difficult Continued public sector informatization through cloud computing Implementation of private sector projects management enhanced the public sector informatization. There is these days little information about the projects implemented using the public cloud computing, or dedicated or hybrid cloud computing, owing to which the public administration informatization would be continued dynamically. Expenditures on new information technologies within the public administration informatization are growing continuously. Paradoxically, the maintenance of teleinformation infrastructure costs more and more, as it becomes obsolete very fast. With the rapid development of technology, continuous investments in the development of employees are unavoidable. This is particularly difficult for small territorial selfgovernment entities (JST) which more and more lag behind big offices as regards advancement of provided services. It is particularly visible in the EC s annual rankings [16] and despite a progress reached in recent years the level of provided e-government services in Poland continues to be below the average among the countries subjected to the study. In the conclusions from the study [16] of 2012 the EC discerned considerable differences in offices informatization level and emphasized this as one of the main reasons for insufficient development of e-government in Poland. The conclusions from the study carried out within [16] inclined the Information Projects Centre (IPC) at the Ministry of Administration and Digitization (MAC) to initiate the project Informatization of JST using the cloud computing processing technology. This project enables a considerable reduction of the JST expenditures owing to replacement of some investment expenditures for current costs, as confirmed by the results of the ventures implemented among other in Finland, Slovenia, or Great Britain. The conclusions from implementations in other countries confirm that the foundation of a mutual teleinformation infrastructure allows to obtain in the entire administration the added value impossible to work out in single JST s information systems. Without knowing whether or not JST would be interested in such a project, the CPI carried out, tentatively, a questionnaire poll. The poll, addressed to the JST, was available on the CPI s website during the period from 27 September to 12 October Passing over incomplete or erroneously completed questionnaires, 654 questionnaires were collected from the communes (over 60% of the questionnaires were filled in by the offices operating in the communes having up to 10,000 inhabitants), 6 from county starosty offices, and 3 filled in by marshals offices. The main question in the questionnaire was whether or not the JST would like to participate in the initiative and be a user of the project s products. Over 38% gave affirmative answers, almost 80% of affirmative answers coming from small JST. Approximately 40% of the communes were unable to answer the key question asked in the initial questionnaire, mentioning as the main reason for the I don t know answer the lack of the JST s detailed knowledge about the innovative nature of the venture. This points to 811
11 the need to start the project with a comprehensive and well prepared promotional and informative campaign. The Minister of Administration and Digitization entrusted the CPI with implementation of this project, and by virtue of an agreement between the Implementing Authority for European Programmes and Minister of Administration and Digitization, of 5 April 2013, the project with estimated budget of 120 million PLN obtained 85% subsidizing from the European Regional Development Fund within the Innovative Economy Operational Programme. The project s initial schedule assumes that the project will be completed in mid The aim of the project is to launch integrated e-government services provided by JST for their clients, based on a consolidated teleinformation infrastructure of the type of a private cloud computing. The project assumes that this infrastructure will enable the JST the development of new and integration of already operating teleinformation systems, using the possibilities offered by the electronic Platform of Public Administration Services (epuap). Furthermore, the project stipulates a cohesion of the policy of implementing the documents management systems and their standardization. Infrastructure and services it provides are to be wholly completed by the CPI. The services made available by self-governments will be based on a consolidated, centrally managed teleinformation infrastructure of the type of a private cloud computing. Besides, training courses for the JST employees will be conducted within the project. Those implementing the project want to construct the primary computing centre, auxiliary centre and the system management centre, virtualized infrastructure for providing services in IaaS model, central, regional and local platforms available in PaaS model and ensuring the connection with epuap as well as web applications, often simple, of the type of text editor or electronic mail, as well as advanced CRM solutions, workflow, accountancy, group work etc. (available in SaaS model). A formal basis which arranges the cooperation of CPI (MAC) and JST would be the entries of the so called Cooperation Line, i.e. simply agreements between MAC and JST. Within the project, the Steering Committee was appointed and the following work groups were launched: organizational-legal group to work out the entries of agreements with the JST addressing the issues of cooperation in project implementation as well as the principles of the maintenance and further development of the system; for electronic services to draw up a document tentatively entitled as the Plan of Development and Integration of Services, presenting the plan of reaching the target state within administration electronic services provided through the cloud computing infrastructure; infrastructural, aimed at drawing up a document tentatively entitled as the Plan of the Construction of Mutual Infrastructure, presenting a plan of constructing a private cloud computing for Polish public administration. When appointing the project s Steering Committee it was assumed that it would consist of: Minister of Administration and Digitization as a sponsor of the Programme of Integrated Informatization of the State, the Ministry Cabinet Committee for Digitization which supervises the programme, and the Project s Users Council. Infrastructure and services resulting from the project will be developed owing to the resources owned by the CPI at the Ministry of Administration and Digitization, resources at the disposal of the data processing centres formed both by the central and selfgovernmental administration entities, and resources acquired through public procurement. 812
12 The first of the public procurement procedures will be the Technical dialogue related to electronic services and teleinformation infrastruture of the private cloud computing in public administration. 2. Conclusions The mandatory legal regulations do not exclude the use of the public cloud computing in public administration. Yet, the public sector in Poland does not maximise the benefits resulting from the use of cloud computing, which may result from non-cohesive documentary processes in which the technology does not support sufficiently the information flow and the clerks, because of obsolete practices, do not work as effectively as they could. Optimization of using this approach is necessary especially to maintain the balance between the office clerks and clients access to information and the confidential data protection. According to study [2] only 47% of offices use cloud computing to share documents, 71% use them to enable a remote access to documents, and as many as 69% of investments in new technologies are carried out before the functionality of existing information systems is fully known. Only 44% of public entities may prove that their documentary processes are safe. Regular surveys of documentary processes may help identify the risks and enable a better sharing of public information in a safe way. By using this modern and innovative approach, the public administration entities may significantly raise the level of provided services and ensure an appropriate level of data security and protection. Cloud computing (if the agreement is constructed properly) according to the provisions of the Act on public finances [17] imposing the obligation of apt and economical spending of public funds, seems to be a good solution enabling reduction of costs with simultaneous performance of public tasks at an appropriate level. The need to reduce the public administration costs will perhaps incline the Minister of Economy to take a favourable stand on implementing, in public sector, of information solutions based on storage and processing of data in the cloud provided by partners from the IT branch. Literature 1. Raport Cloud Computing elastyczność, efektywność, bezpieczeństwo. Microsoft Polska, THINKTANK, Instytut Badań nad Gospodarką Rynkową, Warszawa Coleman Parkes Research: Badanie Ricoh Document Governance Index Ricoh Europe Kluska M.: Hosting i backup danych urzędu w chmurze. IT w Administracji, nr 5, 2013, The What, Why, and When of Cloud Computing. Gartner Inc. 5. Pawłowicz W.: IaaS zalety i wady wieku dojrzewania. Networld, 184, nr 11, 2011, Byrski J.: Cloud computing z perspektywy administracji publicznej. IT w Administracji, nr 1, 2013, Ustawa o informatyzacji działalności podmiotów realizujących zadania publiczne z dnia 17 lutego 2005 r.. Dz. U. 2005, nr 64, poz. 565 z późn. zm., 813
13 8. Rozporządzenie Rady Ministrów z dnia 12 kwietnia 2012 r. w sprawie Krajowych Ram Interoperacyjności, minimalnych wymagań dla rejestrów publicznych i wymiany informacji w postaci elektronicznej oraz minimalnych wymagań dla systemów teleinformatycznych. Dz. U. 2012, poz. 526, 9. Ustawa z dnia 29 sierpnia 1997 r. o ochronie danych osobowych. Dz. U. 2002, nr 101, poz. 926 z późn. zm, Minister Spraw Wewnętrznych i Administracji: Rozporządzenie z dnia 29 kwietnia 2004 r. w sprawie dokumentacji przetwarzania danych osobowych oraz warunków technicznych i organizacyjnych, jakim powinny odpowiadać urządzenia i systemy informatyczne służące do przetwarzania danych osobowych. Dz. U. nr 100, poz Ustawa z dnia 5 sierpnia 2010 r. o ochronie informacji niejawnych. Dz. U. 2010, nr 182, poz. 1228, Marszałek Sejmu: Prawo zamówień publicznych. Dz. U. 2010, nr 113, poz. 759, Grupa Robocza Art. 29 ds. Ochrony Danych: Opinia 5/2012 w sprawie przetwarzania danych w chmurze obliczeniowej The European Commission: Cloud Computing Strategy. Brussels 2012, Procedure secure: ENISA s new guide for monitoring cloud computing contracts. ENISA The European Commission: Digital Agenda Scoreboard, Ustawa z dnia 27 sierpnia 2009 r. o finansach publicznych. Dz. U. 2009, nr 157, poz z późn. zm., Kamiński M.: Przetwarzanie w chmurze a ochrona danych osobowych. IT w Administracji, nr 6, 2013, Dr Anna KACZOROWSKA Katedra Informatyki na Wydziale Zarządzania Uniwersytet Łódzki Łódź, ul. Matejki 22/26 tel./fax.: (0-42) / [email protected] 814
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
ACT on Payment Services 1 ) 2 ) of 19 August 2011. Part 1 General Provisions
ACT on Payment Services 1 ) 2 ) of 19 August 2011 Part 1 General Provisions Article 1. This Act sets out rules for the provision of payment services, including: 1) the conditions for provision of payment
Table of contents: ***
Table of contents: *** In Europe the issue of personal data protection is settled by European Parliament s and European Council s Directive 95/46/WE of October 24, 1995 (which is basis of Polish regulations)
Application of Data Protection Concepts to Cloud Computing
Application of Data Protection Concepts to Cloud Computing By Denitza Toptchiyska Abstract: The fast technological development and growing use of cloud computing services require implementation of effective
LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT
LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text
OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
How To Write A Report On A Recipe Card
Opinion on a notification for Prior Checking received from the Data Protection Officer of the European Investment Bank (EIB) concerning procedures related to "360 Leadership feedback report" Brussels,
PAYMENT SERVICES AND SYSTEMS ACT (ZPlaSS) CHAPTER 1 GENERAL PROVISIONS SUBCHAPTER 1 CONTENT OF THE ACT. Article 1. (scope)
Legal notice All effort has been made to ensure the accuracy of this translation, which is based on the original Slovenian text. All translations of this kind may, nevertheless, be subject to a certain
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
235.1. Federal Act on Data Protection (FADP) Aim, Scope and Definitions
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Data Protection (FADP) 235.1 of 19 June
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Rules of Alternative Trading System organised by the BondSpot S.A.
Rules of Alternative Trading System organised by the BondSpot S.A. The Rules adopted by the Management Board by Resolution No. 103/2009 dated 4 November 2009, as amended by the Management Board: by Resolution
on Electronic Signature and change to some other laws (Electronic Signature Act) The Parliament has hereby agreed on this Act of the Czech Republic:
227/2000 Coll. ACT of 29 th June 2000 on Electronic Signature and change to some other laws (Electronic Signature Act) Amendment: 226/2002 Coll. Amendment: 517/2002 Coll. Amendment :440/2004 Coll. Amendment:
Terms of Use 1. [Preliminary provision] 1. All capitalized expressions and other terms contained and used in the Terms are primarily meanings assigned to them below: 1) Application - Software made available
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
AIRBUS GROUP BINDING CORPORATE RULES
1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Rules of Alternative Trading System organised by the BondSpot S.A.
Rules of Alternative Trading System organised by the BondSpot S.A. text according to legal condition at 1 January 2013 Only the Polish version of these documents is legally binding. This translation is
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
ARTICLE 29 DATA PROTECTION WORKING PARTY
ARTICLE 29 DATA PROTECTION WORKING PARTY 00658/13/EN WP 204 Explanatory Document on the Processor Binding Corporate Rules Adopted on 19 April 2013 This Working Party was set up under Article 29 of Directive
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
Electronic Documents Law
Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
Cloud computing and the legal framework
Cloud computing and the legal framework - Guidance on legislative requirement and the contractual environment related to cloud computing Content 1. Introduction 3 2. The Danish Act on Processing of Personal
ACT of 29 January 2004 PUBLIC PROCUREMENT LAW
ACT of 29 January 2004 PUBLIC PROCUREMENT LAW Warsaw 2008 Warsaw 2008 ISBN: 978-83-88686-06-1 Public Procurement Office Note: The English translation of the Act of 29 January 2004 Public Procurement Law
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY. Introduction
PRINCIPLES OF THE TRANSFER OF PERSONAL DATA TO A THIRD COUNTRY Introduction The continuous globalization of the world economy influences the international transfer of personal data. The transfer of personal
Journal of Laws No. 19-2117 - Item 101. The Act on Concession for Works or Services 1 2 of 9 January 2009. Chapter 1 General Provisions
Journal of Laws No. 19-2117 - Item 101 101 The Act on Concession for Works or Services 1 2 of 9 January 2009 Chapter 1 General Provisions Art. 1.1. This Act specifies the rules and procedures for concluding
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Regulations of using the ALLVOD.PL service
REGULATIONS OF USING THE ALLVOD.PL SERVICE Regulations of using the ALLVOD.PL service List of content 1. Basic definitions.. p. 2 2. General provisions of the Regulations. p. 3 3. Technical conditions.
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
ACT. on Statutory Auditors, Their Self-Governing Organisation, Entities Authorised to Audit Financial Statements and on Public Oversight 1)
Dz.U.09.77.649 ACT on Statutory Auditors, Their Self-Governing Organisation, Entities Authorised to Audit Financial Statements and on Public Oversight 1) of May 7, 2009 (Dz.U. of May 22, 2009) Chapter
Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?
EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud
GENERAL SOFTWARE LICENCE TERMS AND CONDITIONS of Fritz & Macziol GmbH Current as of March 2014
GENERAL SOFTWARE LICENCE TERMS AND CONDITIONS of Fritz & Macziol GmbH Current as of March 2014 Section 1 Preamble The following software licence terms and conditions stipulate the extent of the rights
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text)
ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) On basis of article 153 of the National Assembly of Slovenia Rules of Procedure the National Assembly of the Republic
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
THE TRANSFER OF PERSONAL DATA ABROAD
THE TRANSFER OF PERSONAL DATA ABROAD MARCH 2014 THIS NOTE CONSIDERS THE SITUATION OF AN IRISH ORGANISATION OR BUSINESS SEEKING TO TRANSFER PERSONAL DATA ABROAD FOR STORAGE OR PROCESSING, IN LIGHT OF THE
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
DECISION PROMULGATING THE PAYMENT SYSTEM ACT
THE CROATIAN PARLIAMENT 3247 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby issue the DECISION PROMULGATING THE PAYMENT SYSTEM ACT I hereby promulgate the Payment System
Law on Fire Safety of the Republic of Azerbaijan
Chapter I. General provisions Law on Fire Safety of the Republic of Azerbaijan Article 1. Key definitions used in this Law Following definitions are applied for the purposes of this Law: 1) Fire- uncontrolled
Act on the Contractor s Obligations and Liability when Work is Contracted Out (1233/2006) (as amended by several Acts, including 678/2015)
Unofficial Translation Ministry of Employment and the Economy, Finland September 2015 Section 1. Objectives of the Act Act on the Contractor s Obligations and Liability when Work is Contracted Out (1233/2006)
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Binding Corporate Rules ( BCR ) Summary of Third Party Rights
Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting
Standard conditions of the Electricity Distribution Licence
Gas and Electricity Markets Authority ELECTRICITY ACT 1989 Standard conditions of the Electricity Distribution Licence Statutory Consultation: 29 April 2008 SECTION A: STANDARD CONDITIONS FOR ALL ELECTRICITY
Contractor s Obligations and Liability when Work is Contracted Out
Contractor s Obligations and Liability when Work is Contracted Out Introduction There are many ways of combating the negative effects caused to enterprises by the grey or undeclared economy and unhealthy
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
CONTENT OF THE AUDIT LAW
CONTENT OF THE AUDIT LAW I. GENERAL PROVISIONS Article 1 This Law shall regulate the conditions for conducting an audit of legal entities which perform activities, seated in the Republic of Macedonia.
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1.
27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA (as amended by Federal Law of 25.11.2009 No.266-FZ) Article 1. Scope of This Federal Law Chapter 1. GENERAL Adopted by The State Duma
CHAPTER 1 General Provisions. Article 1
Amendments 2004-01-01 Journal of Laws of 2002 No. 153, item 1271 Art. 52 2004-05-01 Journal of Laws of 2004 No. 33, item 285 Art. 1 2004-03-01 Journal of Laws of 2004 No. 25, item 219 Art. 181 2006-09-06
Liechtenstein. Heinz Frommelt. Sele Frommelt & Partners Attorneys at Law Ltd
Sele Frommelt & Partners Attorneys at Law Ltd Heinz Frommelt Sele Frommelt & Partners Attorneys at Law Ltd Legislation and jurisdiction 1 What is the relevant legislation and who enforces it? is a member
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
General Terms of Public Procurement in Service Contracts JYSE 2014 SERVICES
General Terms of Public Procurement in Service Contracts January 2015 Contents Introduction...3 Issues to be observed in applying...5 General Terms of Public Procurement in Service Contracts ()...9 1 Definitions...9
Official Journal of RS, No. 86/2006 of 11. 08. 2006 REGULATION
Official Journal of RS, No. 86/2006 of 11. 08. 2006 Pursuant to Articles 10, 23, 36, 40, 43, 47, 53, 54, 63, 71, 72, 73, 74, 88 and 91 of the Protection of Documents and Archives and Archival Institutions
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.
A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries
A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Questions marked with an asterisk * require an answer to be given.
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
CZECH REPUBLIC ACT ON BONDS
CZECH REPUBLIC ACT ON BONDS Important Disclaimer This translation has been generously provided by the Czech National Bank. This does not constitute an official translation and the translator and the EBRD
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS Content of principles I. ORGANISATION AND ORGANISATIONAL STRUCTURE 1. 1 The organisation of a supervised institution should enable meeting
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
RULES. MultiCash Electronic Customer Service System
RULES MultiCash Electronic Customer Service System Warsaw May 2015 Table of Contents CHAPTER 1 GENERAL PROVISIONS... 3 CHAPTER 2 CONDITIONS FOR MAKING THE MULTICASH SYSTEM AVAILABLE... 4 CHAPTER 3 MAKING
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Cloud/structural funds workshop on 6 February 2014, DG Connect
Cloud/structural funds workshop on 6 February 2014, DG Connect Anna Katarzyna Nietyksza President of EuroCloud Polska President of EFICOM S.A. Member of the European Economic and Social Committee (EESC),
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
ELECTRONIC SIGNATURE LAW
ELECTRONIC SIGNATURE LAW (Published in the Official Gazette ref 25355, 2004-01-23) SECTION ONE Purpose, Scope and Definitions Purpose Article 1 The purpose of this Law is to define the principles for the
Terms & Conditions of HYPE Softwaretechnik GmbH ( HYPE ) for HYPE Enterprise Express (Version October 2015) 1 Scope
1 Scope 1 (1) These terms and conditions (the T&C HYPE Enterprise Express ) together with the description of the Software Services provided by HYPE accepted by Customer by completing the HYPE Enterprise
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES
Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.
Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.
PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically
The basic regulations concerning insurance contract are formulated in the following acts:
Warsaw, 15 th May 2016 INFORMATION ON THE RULES OF THE GENERAL GOOD Introduction: This information intended for insurance companies from the EU Member States, as well as from the EFTA Member States the
ACT. of 15 March 2002
215 ACT of 15 March 2002 on electronic signature and on the amendment and supplementing of certain acts as amended by Act No. 679/2004 Coll., Act No. 25/2006 Coll., Act No. 275/2006 Coll., Act No. 214/2008
CROATIAN PARLIAMENT 1364
CROATIAN PARLIAMENT 1364 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON PERSONAL DATA PROTECTION I hereby promulgate the Act on
INFORMATION FLOWS BETWEEN BANKING SUPERVISORY AUTHORITIES
INFORMATION FLOWS BETWEEN BANKING SUPERVISORY AUTHORITIES (April 1990) Introduction In May 1983 the Basle Committee of Banking Supervisors issued a paper entitled "Principles for the Supervision of Banks
Personal Data Act (1998:204);
Personal Data Act (1998:204); issued 29 April 1998. Be it enacted as follows. General provisions Purpose of this Act Section 1 The purpose of this Act is to protect people against the violation of their
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
