The Virtual Privacy Office

Size: px
Start display at page:

Download "The Virtual Privacy Office"

Transcription

1 - A New Approach To Privacy Protection - Bruno Baeriswyl John Borking Helmut Bäumler Marit Köhntopp Privacy Commissioner Zurich, CH Registratiekamer, NL Independent Centre for Privacy Protection Schleswig-Holstein, D Overview Trust and Privacy Protection Authorities The Idea behind the Project Aims of the Virtual Privacy Office Ways and Means to the Aims Modules Technological Aspects Co-operation within the Project Possible Problems Conclusion and Outlook 1

2 Trust as an Essential Element of the Information Society Today s IT Systems: highly complex, intransparent & lacking control lacking fundamental security demands correctness cannot practically be proven by formal means The Element of Trust: users feel uneasy about their privacy trust is important for IT systems, especially for safety/security matters trust is valuable for vendors Trust plays an essential role in the information society. Privacy Protection Authorities: Trusted Parties Tasks: guarantee privacy & data security (as laid down in Privacy Acts) being an advocate for citizen s privacy rights Requirements: independence trustworthiness & discretion acceptance interference when necessary Methods: monitoring use of personal data (control visits) in case of infringements of Privacy Acts: complaint recommending improvements publications & (bi)annual activity reports 2

3 The Net is bringing social changes so profound their only parallel is probably the discovery of fire. Louis Rosetto The Idea behind the Virtual Privacy Office Users are concerned about privacy: increasing data trails and motion profiles almost no limits to analysability of data neither limitation of use to specific purpose nor protection against their misuse can be guaranteed Transformation of society revaluing privacy concepts: need for action in order to prevent the loss of privacy new tasks for Privacy Commissioners: more than web presence basis: absorbing Internet technology and culture New ways needed to act adequately to challenges posed by the Internet 3

4 The question before you is not preservation of the status quo - all hope of that is now lost.... Demand privacy, while the question is still relevant. Dan Geer Aims of the Virtual Privacy Office E-Privacy: privacy protection contact for users absorbing Internet culture: open discussions & open source Privacy Protection Network: information exchange & division of labour assembly point for privacy experts & platform for projects Gaining Working Knowledge: learning by doing: practical experience Updating the State of the Art for Technical Measures: support of Privacy Enhancing Technologies Main aim: new quality of privacy protection 4

5 There is power in this Internet to create conversations and open source is the heart of it. Tim O'Reilly More Detailed: Ways and Means to the Aims Transparency: open discussions with experts and the public open source for software Participation: everybody is invited to take part project pool to bring people together High Standards of Privacy Protection and Data Security: put existing law into practice give new impulses by developing concepts testbed for Privacy Enhancing Technologies Feedback: transfer to manufacturers, providers, users, legislators, standardisation bodies 5

6 Modules of the Virtual Privacy Office Forums for Project Partners: mailing lists, Virtual Private Networks (VPN) Privacy Internet Portal: FAQ, search engines, on-line privacy magazine Public Privacy Office: individual questions, call centre management system Forums for Experts: mailing lists, web forums, project pool Basis: Privacy Information Database (being developed) Project Events: Regular Meetings of Project Associates Public Project Events Note: The layers displaying the four main modules are each built from the basics. The tasks can in order of their realization be found beneath. marks tasks currently in progress (as of 09/2000) Concepts: - Webdesign - Structure and Presentation of Content Individual Service via Webserver with Dynamic Page Generation and Authoring System Room for any Experts: - Invitation for Participation - Privacy Events Public Privacy Office Privacy Internet Portal Forums for Project Associates Forums for Experts Thematic Mailing Lists and Other Forums Project Pool Workflow & Call Center Functionality: - Classification of s - Personal Assistants with - Forwarding to Responsible Departments Editing Support - Ticket System: Trace Job Status Contents: - Frequently Asked Questions - Detailed Expert Information - Tools for Self-Protection Basic Features: - Catalogues - Search Engine - Multilingual Support Advanced Features: - On-line Magazine - Hyperlink Management - Interactivity Mailing Lists via an own Server Integration of Encryption Technologies Virtual Private Network: Privacy VPN Virtual Meetings: - Chatrooms - Videoconferences via the Internet Groupware System with Document Management Basics Basic Concepts: - Functionality of the Separate Modules - Requirements and Interfaces - Technology and Organization Internet Access: - of the Privacy Protection Authorities - at the Workplace - Providing of Servers Knowledge Management Systems: - Structured Knowledge - Technical Representation (XML) - Information Database with Adequate Search Patterns Evaluation: Practicable Concepts for Privacy Protection and Data Security 6

7 Participation of Trusted Parties in Technology Design Building Trust into (Technological) Systems: General advice Participation in standardisation Individual consultation Active prototyping Participation in development Technology: Design, Implementation, and Operating Functionality different optimization methods sometimes putting effort in one field leads to restrictions in the other(s) sometimes increase in all fields is possible Security Privacy 7

8 Technology in the Virtual Privacy Office Developing Innovative & Privacy Enhancing Concepts (basis: security, data minimization): for Internet Connectivity for Virtual Private Networks for Ticket Systems & Workflow Knowledge Management System: structured privacy information representation in XML Tools for Internet Users and Privacy Protection Authorities: recommendations & links download area for privacy tools Principle: Open Source where possible 8

9 Platform for Projects Project Pool: people looking for ideas (e.g. students, researchers) ideas looking for realisation Supporting Projects: fund raising among several interested parties reuse existing modules because of open source PET in Action: prove of practicability bringing PET on the market PET becoming state of the art Results useful for e-government and e-commerce Co-operation within the Virtual Privacy Office Project Partners (September 2000): D: Federal Commissioner for Data Protection and a number of regional Offices for Privacy Protection NL: Registratiekamer CH: Privacy Commissioners CA: IPC Ontario Possible Co-operation Partners from Internet community, science, organisations, economy etc. Prototype sponsored and supported by: Schleswig-Holstein Information Society Initiative Independent Centre for Privacy Protection Schleswig-Holstein Technology Foundation Schleswig-Holstein 9

10 Present Status and Schedule September 2000: mailing lists and web server on-line for project partners End of November, 2000: authoring and moderating systems for project partners going public (German & English version) 2001: Virtual Private Network for project partners integration of external experts 2002: support by privacy information database and workflow system enlargement by Privacy Mall Scalability of the project: size and pace depend on invested resources 10

11 Possible Problems Garbage Collection? Connectivity Problems? Only Little Impact? Not Operating On Internet Time? Conclusions and Outlook Virtual Privacy Office - a new approach to privacy protection new role for Privacy Protection Authorities by absorbing Internet culture by making use of technology remodelling privacy protection with available resources E-Privacy privacy information and privacy tools for Internet users networks for Privacy Protection Authorities Everybody is invited to participate: as project partners: Privacy Protection Authorities as co-operation partners: other experts 11

12 Contact: Virtual Privacy Office Project 12

elearning Content Management Middleware

elearning Content Management Middleware elearning Content Management Middleware Chen Zhao Helsinki 18.2.2004 University of Helsinki Department of Computer Science Authors Chen Zhao Title elearning Content Management Middleware Date 18.2.2004

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1 ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original

More information

NSW Government Open Data Policy. September 2013 V1.0. Contact

NSW Government Open Data Policy. September 2013 V1.0. Contact NSW Government Open Data Policy September 2013 V1.0 Contact [email protected] Department of Finance & Services Level 15, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 DOCUMENT CONTROL Document

More information

YORK REGION DISTRICT SCHOOL BOARD. Policy and Procedure #160.0 Records and Information Management

YORK REGION DISTRICT SCHOOL BOARD. Policy and Procedure #160.0 Records and Information Management YORK REGION DISTRICT SCHOOL BOARD Policy and Procedure #160.0 Records and Information Management Policy and Procedure #160.0 Records and Information Management outline the process for ensuring information

More information

Digital Continuity Plan

Digital Continuity Plan Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach

More information

Welcome to EPO Online Services

Welcome to EPO Online Services Welcome to EPO Online Services Welcome to EPO Online Services! With EPO Online Services you can interact with the European Patent Office electronically in a tailor-made, state-of-the-art secure environment,

More information

DFS C2013-6 Open Data Policy

DFS C2013-6 Open Data Policy DFS C2013-6 Open Data Policy Status Current KEY POINTS The NSW Government Open Data Policy establishes a set of principles to simplify and facilitate the release of appropriate data by NSW Government agencies.

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

User Guide of edox Archiver, the Electronic Document Handling Gateway of

User Guide of edox Archiver, the Electronic Document Handling Gateway of User Guide of edox Archiver, the Electronic Document Handling Gateway of project v0.7 SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI-283481 Table of Contents 1 INTRODUCTION...

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document

More information

Aecus European Innovation Awards 2015

Aecus European Innovation Awards 2015 Aecus European Innovation Awards 2015 Name of the Innovation Project: Enabling UK s National Employment Savings Trust (NEST) scheme to deliver a national pensions scheme Name of Supplier Organisation(s):

More information

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.

D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID. Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,

More information

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE TURNKEY AND CUSTOM MADE DSwiss AG Badenerstr. 281 CH 8003 Zürich Switzerland +41 (0)44 515 11 11 [email protected] www.dswiss.com Management Summary Internet data safes are web based solutions that enable

More information

TITAN LOAN MASTER CENTRAL SOFTWARE

TITAN LOAN MASTER CENTRAL SOFTWARE TITAN LOAN MASTER CENTRAL SOFTWARE NOTES: 1 Why Central Software Central Software was formed in 1984 by its founder and chairman John Ormond. John was an Investment and Unit Trust Manager who was looking

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

Development of a generic IT service catalog as pre-arrangement for Service Level Agreements

Development of a generic IT service catalog as pre-arrangement for Service Level Agreements Development of a generic IT service catalog as pre-arrangement for Service Level Agreements Thorsten Anders Universität Hamburg, Regionales Rechenzentrum, Schlüterstraße 70, 20146 Hamburg, Germany [email protected]

More information

Adlib Internet Server

Adlib Internet Server Adlib Internet Server Software for professional collections management in archives, libraries and museums Comprehensive, Flexible, User-friendly Adlib Internet Server Put your data online, the easy way

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Best Practices for Choosing a Content Control Solution

Best Practices for Choosing a Content Control Solution Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other

More information

Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management - The Difference Between DPM and CM WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA [email protected] http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr

More information

4.10 Information Management Policy

4.10 Information Management Policy Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

ARC-Desk CHANGE MANAGEMENT, REVIEW AND APPROVAL OF DOCUMENTS EASY TRACEABLE EFFICIENT

ARC-Desk CHANGE MANAGEMENT, REVIEW AND APPROVAL OF DOCUMENTS EASY TRACEABLE EFFICIENT ARC-Desk CHANGE MANAGEMENT, REVIEW AND APPROVAL OF DOCUMENTS EASY TRACEABLE EFFICIENT ABOUT OVIDIUS OVIDIUS XML solutions that work Ovidius GmbH, headquartered in Berlin, develops XML-based solutions and

More information

Dynamic Services from T-Systems: Enterprise Cloud Computing in practice

Dynamic Services from T-Systems: Enterprise Cloud Computing in practice Dynamic Services from T-Systems: ntral & Eastern European Software Engineering Conference, Moscow, November 1, 2011 him Stohr, Head of SAP Global Services Architecture, T-Systems 1 Best of clouds which

More information

A. Document repository services for EU policy support

A. Document repository services for EU policy support A. Document repository services for EU policy support 1. CONTEXT Type of Action Type of Activity Service in charge Associated Services Project Reusable generic tools DG DIGIT Policy DGs (e.g. FP7 DGs,

More information

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide 1 P a g e Contents Module Objectives... 3 Training Materials / Resources... 3 2 P a g e Module Outcomes After completing these

More information

Electronic Document Workflow Platform for KBA Customers

Electronic Document Workflow Platform for KBA Customers Electronic Document Workflow Platform for KBA Customers Contents...1 I. Introduction...2 II. What is the point? How does it work?...3 A. Document Workflow System...3 B. Document Circulation Rules...4 C.

More information

How To Protect Your Privacy On The Net

How To Protect Your Privacy On The Net International Working Group on Data Protection in Telecommunications Report and Guidance on Data Protection and Privacy on the Internet "Budapest - Berlin Memorandum" adopted at the 20th Meeting in Berlin,

More information

FISHER & PAYKEL PRIVACY POLICY

FISHER & PAYKEL PRIVACY POLICY FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed

More information

COCIR contribution to the public consultation on Personal Data Protection in the EU 1

COCIR contribution to the public consultation on Personal Data Protection in the EU 1 COCIR contribution to the public consultation on Personal Data Protection in the EU 1 European Coordination Committee of the Radiological, Electromedical and Healthcare IT Industry Bd. A. Reyers 80, 1030

More information

Response of the German Medical Association

Response of the German Medical Association Response of the German Medical Association To the Green Paper on mobile Health ( mhealth ) of the European Commission Berlin, 3 July 2014 Bundesärztekammer Herbert-Lewin-Platz 1 10623 Berlin We are grateful

More information

SCDHSC0437 Promote your organisation and its services to stakeholders

SCDHSC0437 Promote your organisation and its services to stakeholders Promote your organisation and its services to stakeholders Overview This standard identifies the requirements when promoting your organisation and the services it provides to a range of stakeholders. The

More information

Fujitsu Dynamic Cloud Bridging today and tomorrow

Fujitsu Dynamic Cloud Bridging today and tomorrow Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards

More information

Adworks Local Area Marketing. The way it works

Adworks Local Area Marketing. The way it works Adworks Local Area Marketing The way it works Adworks is an on line local store and dealership marketing system. Retailers, and especially franchises, are facing dramatic changes, in the coming years,

More information

CWA Flow. CWA Flow 8D Report. The flexibly configurable software. Claim and Complaint Management. User-defined forms and processes

CWA Flow. CWA Flow 8D Report. The flexibly configurable software. Claim and Complaint Management. User-defined forms and processes CWA Flow 8D Report Web- and workflow-based software for claims, problems and 8D reports CWA Flow Claim and Complaint Management The flexibly configurable software User-defined forms and processes Workflow

More information

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution Enterprise Cloud Solution is an end-to-end solution for the planning, execution and reporting of corporate external and internal audit and inspections across enterprise risk, safety, security and sustainability.

More information

Email Protective Marking Standard Implementation Guide for the Australian Government

Email Protective Marking Standard Implementation Guide for the Australian Government Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

Guidelines on Facsimile Transmission Security

Guidelines on Facsimile Transmission Security Information and Privacy Commissioner/ Ontario Guidelines on Facsimile Transmission Security Ann Cavoukian, Ph.D. Commissioner Revised January 2003 Information and Privacy Commissioner/Ontario 2 Bloor Street

More information

Visendo Fax Server Integration With SharePoint Server

Visendo Fax Server Integration With SharePoint Server Energy reduction Visendo Fax Server Integration With SharePoint Server 5 reasons why to integrate Fax Servers in Content Management Servers Whitepaper Achieve more with less Increase Productivity Shortening

More information

Information Management: A common approach

Information Management: A common approach Information Management: A common approach July 2013 Document Control Document history Date Version No. Description Author July 2013 1.0 Final Department of Finance and Services October 2013 1.1 Updated

More information

vtiger Customer Portal 4.2 User Manual

vtiger Customer Portal 4.2 User Manual - 1 - vtiger Customer Portal 4.2 User Manual (Version 2.0) - 2 - Table of Contents 1. Introduction... 3 2. Installing vtiger Customer Portal... 4 2.1. System Requirements... 4 2.2. Installation Prerequisites...

More information

Table of content. Electronic Performance Support System

Table of content. Electronic Performance Support System Table of content From knowledge management to EPSS... 3 1. Knowledge management as management function... 3 1.1 Kinds of knowledge... 4 1.2 Solutions for knowledge management... 5 2. Trends How should

More information

Three tools to facilitate online job matching throughout Europe. ESCO, EURES, Match & Map

Three tools to facilitate online job matching throughout Europe. ESCO, EURES, Match & Map Three tools to facilitate online job matching throughout Europe ESCO, EURES, Match & Map Neither the European Union nor any person acting on behalf of the Commission may be held responsible for the use

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview

AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview AppConnect FAQ for MobileIron Technology Partners! AppConnect Overview What is AppConnect? AppConnect is a MobileIron product that secures and protects enterprise mobile apps. It manages the complete lifecycle

More information

CUSTOMER MANAGEMENT IN THE CLOUD

CUSTOMER MANAGEMENT IN THE CLOUD CUSTOMER MANAGEMENT IN THE CLOUD SPEED UP YOUR BUSINESS WITH CRM2HOST. COST-EFFICIENT, FLEXIBLE, INTUITIVE AND SECURE. Business requirements steadily grow. You need efficient processes and central information

More information

Office of the Chief Information Officer. Annual Report 2012 13

Office of the Chief Information Officer. Annual Report 2012 13 [Type text] Office of the Chief Information Officer Annual Report 2012 13 This page is intentionally blank Message from the Minister As the Minister Responsible for the Office of the Chief Information

More information

UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE

UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE 1. DISCLAIMER NOTICE UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE The information provided by UGANDA REVENUE AUTHORITY (URA) on the web portal relating to products and services (or

More information

Enterprise Content Management (ECM) Strategies

Enterprise Content Management (ECM) Strategies Enterprise Content (ECM) Strategies Randy Hans Senior Solutions Consultant Open Text Corporation February 19, 2009 SAP 2009 / Page 1 [email protected] Agenda Open Text & SAP Business Challenges Open Text

More information

Designed for Local Government Powered by Microsoft Dynamics

Designed for Local Government Powered by Microsoft Dynamics Designed for Local Government Powered by Microsoft Dynamics CouncilFirst is a Division of Open Systems Technology Pty Ltd (OST ) A Powerful, Flexible Business Solution CouncilFirst delivers a fully integrated

More information

Action/Task Management

Action/Task Management Rivo can be used independently of any other Solution Layer, or indeed fully integrated into other solution layers such as Audit & Inspection Management, Risk & Hazard Management, Environmental Monitoring

More information

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment ("Cookie Order") 2nd version, April 2013 Preface...3 1. Introduction...5

More information

Virtual Team Collaboration Glossary

Virtual Team Collaboration Glossary Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects

More information

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service. i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement Get Better Protected...

More information

Information governance strategy 2014-16

Information governance strategy 2014-16 Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope

More information

Get more value from virtualisation

Get more value from virtualisation Get more value from virtualisation Computacenter enables organisations to realise the full benefits of a virtual enterprise with integrated management tools and automated processes GET MORE VALUE FROM

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking

The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking The Information Commissioner has responsibility for promoting and enforcing the

More information

Risk & Hazard Management

Risk & Hazard Management Rivo Software Solution Layer provides a rapidly deployable complete set of hazard and risk management functionality from any device, accessible from anywhere through our highly secure cloud platform. Identify,

More information

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems eenviper White Paper #4 Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems 1 Executive Summary Cloud computing could revolutionise public services

More information

Health Portal Suggestions for Continued Work

Health Portal Suggestions for Continued Work Health Portal Suggestions for Continued Work CSD Fall 2010 Version: 1.0 Identifier: HP-003 Project owners Björn Pehrson Sven Jonsson Amos Nungu Project coach Hans Eriksson Team members Contact ECTS credits

More information

SuperOffice Expander. Introduction & Background

SuperOffice Expander. Introduction & Background Expander Introduction & Background Introduction & Background Software from is well known (and awarded!) for its unique usability. We have provided more than 200.000 company employees throughout the world

More information

Trust and Dependability in Cloud Computing

Trust and Dependability in Cloud Computing Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance

More information

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities

More information

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning

A Best Practices Point of View from. Data Backup and Disaster Recovery Planning A Best Practices Point of View from Data Backup and Disaster Recovery Planning Security Protect Your Data Expertise Support Patient Privacy Business Continuity Plan and Restore Peace of Mind Backup and

More information

Strategic Briefing Data Center Management & Automation

Strategic Briefing Data Center Management & Automation Strategic Briefing Data Center & Automation Contents Why is Data Center & Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges

More information

H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders

H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders H5RE 04 (SCDHSC0437) Promote Your Organisation and Its Services to Stakeholders Overview This standard identifies the requirements when promoting your organisation and the services it provides to a range

More information

Rebuilding Trust Through Privacy by Design. by Alexander Hanff [email protected]

Rebuilding Trust Through Privacy by Design. by Alexander Hanff alexander.hanff@startmail.com Rebuilding Trust Through Privacy by Design by Alexander Hanff [email protected] The Principles of Privacy by Design (You all know this stuff right?) o Proactive not Reactive; Preventative not

More information

QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: [email protected] WWW: http://www.qualityssl.com/

QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: support@qualityssl.com WWW: http://www.qualityssl.com/ QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark Email: [email protected] WWW: http://www.qualityssl.com/ 2002 BitEngines. All Rights Reserved. Introduction Today, online commerce

More information

SharePoint 2013 Social Intranet Case Study

SharePoint 2013 Social Intranet Case Study Social Business Interactive SharePoint 2013 Social Intranet Case Study Middleburg Bank Anna Kaur Manager, Business Solutions and Quality Assurance Social Business Interactive BACKGROUND Middleburg Financial

More information

White Paper. Simplify SSL Certificate Management Across the Enterprise

White Paper. Simplify SSL Certificate Management Across the Enterprise WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents

More information

Papermule Workflow. Workflow and Asset Management Software. Papermule Ltd

Papermule Workflow. Workflow and Asset Management Software. Papermule Ltd Papermule Workflow Papermule Workflow - the power to specify adaptive and responsive workflows that let the business manage production problems in a resilient way. Workflow and Asset Management Software

More information

Big Data and New Paradigms in Information Management. Vladimir Videnovic Institute for Information Management

Big Data and New Paradigms in Information Management. Vladimir Videnovic Institute for Information Management Big Data and New Paradigms in Information Management Vladimir Videnovic Institute for Information Management 2 "I am certainly not an advocate for frequent and untried changes laws and institutions must

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :[email protected], Website :

More information