ECSA EuroCloud Star Audit Data Privacy Audit Guide
|
|
|
- Dorthy Simon
- 10 years ago
- Views:
Transcription
1 ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15
2 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs: Cloud Support Page 2 of 15
3 Introduction This Audit Guide is a specific directive to deal with Contractual and formal requirements according to ECSA Area 2 Technical security and data privacy requirements ECSA Area 3 Business operation requirement ECSA Area-4 General remarks: This guide is prepared to reference Cloud Service Providers and Auditors as well as Cloud customer to get familiar with the high level Data Protection requirements on European Level. As main sources the editors used the following public available information by a) European Union: b) SAP as sample DP directive for a Cloud Service Provider which is in line with the general understanding of EU Data Privacy requirements: Please be aware that this topic is currently under discussion by the European Commission to renew the existing Data Protection Directive originated in 1995 with several adjustments. Please refer also to Further on it has to be outlined, that most of the European Countries have the own additional Data Privacy Policies which have to be considered for assessment and under the pre-condition that the country of the cloud service customer who is acting as data controller is ruling the requirements and not the location of the Service provider nor the location of the service or data itself. Page 3 of 15
4 ECSA Data Privacy Rules According to EU - Standard Contractual Clauses for Data Processors established in Third Countries 1 Obligations of the data importer 2 (a) (b) The data importer agrees and warrants: To process the personal data only on behalf of the data exporter and in compliance with its instructions and the EU Standard Contractual Clauses. If it cannot provide such compliance, for whatever reason, it agrees to inform the data exporter promptly, of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract. That it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation, which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will notify the change, to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract Mandatory requirements of the national legislation applicable to the data importer which do not go beyond what is necessary in a democratic society on the basis of one of the interests listed in Article 13(1) of Directive 95/46/EC, that is, if they constitute a necessary measure to safeguard national security, defence, public security, the prevention, investigation, detection and prosecution of criminal offences or of breaches of ethics for the regulated professions, an important economic or financial interest of the State or the protection of the data subject or the rights and freedoms of others, are not in contradiction with the standard contractual clauses. Some examples of such mandatory requirements which do not go beyond what is necessary in a democratic society are, inter alia, internationally recognised sanctions, tax-reporting requirements or anti-money-laundering reporting requirements. Page 4 of 15
5 (c) (d) (e) (f) (g) (h) (i) (j) That it has implemented the technical and organisational security measures specified in Appendix 2 before processing the personal data transferred That it will promptly notify the data exporter about: (i) (ii) (iii) Any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation Any accidental or unauthorised access, and Any request received directly from the data subjects, without responding to that request, unless it has been otherwise authorised to do so To deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data, subject to the transfer, and to abide by the advice of the supervisory authority with regard to the processing of the data transferred At the request of the data exporter, to submit its data processing facilities for audit of the processing activities covered by the Clauses. This shall be carried out by the data exporter or an inspection body composed of independent members, in possession of the required professional qualifications, bound by a duty of confidentiality, selected by the data exporter where applicable and in agreement with the supervisory authority To make available upon the request of the data subject, a copy of the Clauses or any existing contract for sub processing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter That, in the event of sub processing, it has previously informed the data exporter and obtained its prior written consent That the processing services by the sub processor will be carried out To send a copy of any sub processor agreement it concludes under the Clauses to the data exporter promptly. Page 5 of 15
6 Governing Law The Clauses shall be governed by the law of the Member State in which the data exporter is established Sub processing 1. The data importer shall not subcontract any of its processing operations, performed on behalf of the data exporter, under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the sub processor which imposes the same obligations on the sub processor as are imposed on the data importer under the Clauses 3. Where the sub processor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the sub processor's obligations under such agreement. Obligation after the termination of personal data processing services 1. The parties agree that on the termination of the provision of data processing services, the data importer and the sub processor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred any further. 3 This requirement may be satisfied by the sub processor co-signing the contract entered into between the data exporter and the data importer under this Decision. Page 6 of 15
7 2. The data importer and the sub processor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph The security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation. Security Measures A. TOMs: Cloud Service 1. Access Control Aim: Prevent any unauthorised access; the term is interpreted literally as to prevent unauthorised persons from gaining access to data processing systems for processing or using personal data. Measures: Technical and organisational measures for access control, especially to control the legitimacy of authorised entrants to the facilities and systems where data is stored. The CSP takes measures to secure the hosting premises (for example, securing entries and exits) as well as taking measures within the building (for example, alarm systems and restricted access to server rooms) at rented facilities through the use of the following procedures: Established security areas Protection and restriction of access paths Secured decentralized data processing equipment and personal computers Page 7 of 15
8 Established access authorization for employees, including the respective documentation Identification of the persons having access authority Regulations on key-codes Restriction on keys Code card passes Visitors books (including timekeeping) Installation of a security alarm system or other appropriate security measures. 2. System Access Control Aim: Prevent unauthorized intrusion into computer systems. Measures: Technical (password / password protection) and organisational (user master record) measures concerning the user identification and authentication: The CSP employs industry standard encryption. User control shall include the following measures: o - Restricted VPN profile o - Automatic deactivation of the user ID when several erroneous passwords are entered, log file of events (e.g., monitoring of break-inattempts) o - Issuing of one-time use password controls o - Implementation of 2-factor authentication. Access control to Customer Data shall include the following measures: o - Monitoring capability in respect of individuals who delete, add or modify the exported data o - Automatic, system-driven reminders of confidentiality appearing upon each attempt to access systems used in processing data o - Effective and measured disciplinary action against individuals who access, or attempt to access data without authorisation. 3. Data Access Control Aim: Prevent unauthorised activities in computer systems resulting from the exceeding or bypassing of granted permissions. In particular, ensure that persons authorised to use a system have access only to the data they are Page 8 of 15
9 authorised to access and that personal data cannot be read, copied, altered or removed without authorisation during processing, use or after recording. Measures: Demand-driven design approach and the authorisation of access rights, their monitoring and logging through the following: The CSP uses a combination of segregation of duties, local access control lists and central logging to ensure data is accessed as authorised and used in an appropriate manner: o - Intrusion detection systems are installed on both the network and host systems to ensure appropriate access o - Access controls are reviewed on a periodic basis by both internal and external audits. The CSP only uses non-persistent session cookies for authentication and navigation purposes for a user s session, only. The CSP employs industry standard encryption. 4. Data Transmission Control Aim: Define aspects of data transfer, data transport and transmission control. Ensure that data cannot be read, copied, altered or removed without authorisation during electronic transfer or transport or whilst being recorded onto data storage media. Measures: used in transport, transfer and transmission or storage to disk (manual or electronic) as well as during subsequent controls: This shall include measures jointly implemented by both the Customer and the CSP comparable to the following: o - documentation of the retrieval and transmission of programmes o - use of encryption o - monitoring of the completeness and correctness of the transfer of data (success/failure reports will be sent to administrator). 5. Data Input Control Aim: Ensure the traceability and documentation of data management and maintenance. It should be possible after the fact to check and ascertain whether Page 9 of 15
10 personal data have been entered into, altered or removed from data processing systems and, if so, by whom. Measures: Methods used for subsequent review to reflect whether and by whom data were entered, modified or removed (deleted): This shall include measures comparable to the following: o - Proof established within the CSP s organisation of the input authorisation o - Electronic recording of entries (as further specified by the CSP). 6. Job control Aim: Ensure that the instructions of the Customer are fully observed. Measures: (technical / organisational) on the division of responsibilities between the CSP and Customer: Clearly defined responsibilities Criteria for selection of the CSP, as determined and communicated by Customer Monitoring of execution and performance by reviews of the provided selfcertification and audit, as applicable Named contacts for submission of change orders. 7. Availability Control Aim: Protect the data against accidental destruction or loss. Measures: For data storage/backup (physical / logical): Documented daily incremental/weekly full backup procedures Redundant system infrastructure, Highly-Available Oracle clustering Uninterruptible power supply (UPS) Separate storage Antivirus / firewall Emergency plan. Page 10 of 15
11 8. Separation control Aim: Data collected for different purposes can be processed separately. Measures: for separate processing (storage, modification, deletion, transfer) of information with different purposes: Functional separation / production / non- production: The CSP maintains complete physical separation between production, development and testing. The customer is provisioned 2 distinct instances: one for production and at least one for non production. The customer (including its Affiliates) only has access to the Customer s instance(s). TOMs: Cloud Support The following sections define the current security measures.the CSP may improve or increase these at any time. This may mean that individual measures are replaced by new measures that serve the same purpose. 1. Access Control Aim: Prevent any unauthorised access; the term is interpreted literally as to prevent unauthorised persons from gaining access to data processing systems either for processing or using personal data. Measures: The CSP protects its assets and facilities using the appropriate means based on a security classification conducted by an internal security department. In general, buildings are secured through access control systems (smart card access system). As a minimum requirement, the outermost shell of the building must be fitted with a certified master key system including modern, active key management. Page 11 of 15
12 Depending on the security classification, buildings, individual areas and surrounding premises will be further protected by additional measures: These include specific access profiles, closed circuit TV, intruder alarm systems, and even biometric access control systems. A separate access control concept, which includes documentation of names, is used in data centers. Access rights will be granted to authorised persons on an individual basis according to the defined criteria. This also applies to visitor access. Guests and visitors to CSP buildings must register their names at reception, and must be accompanied by company personnel. CSP employees and external personnel must wear their ID cards at all CSP locations. 2. System Access Control Aim: Prevent unauthorised intrusion into computer systems. Measures: Multiple authorisation levels are used to grant access to sensitive systems. Processes are in place to ensure that authorised users have the appropriate authorisation to add, delete, or modify user accounts All users access the CSP s system with a unique identifier (user ID). The CSP has procedures in place to ensure that requested authorisation changes are implemented only in accordance with the guidelines (for example, no rights are granted without authorisation). If a user leaves the company, these access rights are rescinded The CSP has a password policy that prohibits the sharing of passwords, governs what to do if a password is disclosed, and requires passwords to be changed on a regular basis. Personalised user IDs are assigned for authentication. All passwords are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months. This complies with the requirements for complex passwords. The CSP ensures that default passwords are changed on networking devices. Each computer has a password protected screensaver The company network is protected from the public network by a hardware firewall. The CSP uses antivirus software at access points to the company network (for accounts) and on all file servers and all workstations. Security-relevant updates for the existing software are regularly and automatically downloaded and installed. Page 12 of 15
13 3. Data Access Control Aim: Prevent unauthorised activities in computer systems resulting from the exceeding or bypassing of granted permissions. In particular, ensure that persons authorised to use a system have access only to the data they are authorised to access and that personal data cannot be read, copied, altered or removed without authorisation during processing, use or after recording. Measures: Access to personal, confidential or sensitive information is granted on a needto-know basis. In other words, employees or external third parties have access to the information that they require in order to complete their work. The CSP uses authorisation concepts that document how authorisations are assigned and which authorisations are assigned. All personal, confidential, or otherwise sensitive data is protected in accordance with the relevant security standards. Confidential information must be processed confidentially. All production servers are operated in the relevant data centers/server rooms. The security systems that protect applications for processing personal, confidential or other sensitive data are regularly checked. To this end, the CSP conducts internal and external security checks and penetration tests on the IT systems. The CSP does not permit the installation of personal software or other software not approved by CSP. A CSP security standard governs how data and data carriers that are no longer required are deleted or destroyed. 4. Data Transmission Control Aim: Define aspects of data transfer, data transport and transmission control. Ensure that data cannot be read, copied, altered or removed without authorisation during electronic transfer or transport or while being recorded onto data storage media. Measures: Data that is transferred from the CSP network to other external networks is encrypted. Where data carriers are physically transported, adequate measures must be taken to ensure the agreed service levels (for example, encryption, lead-lined containers, and so on). Page 13 of 15
14 5. Data Input Control Aim: Ensure the traceability and documentation of data management and maintenance. It should be possible after the fact to check and ascertain whether personal data have been entered into, altered or removed from data processing systems and, if so, by whom. Measures: The CSP only allows authorised persons to access personal data as required in the course of their work. As part of the support delivery process, the access to customer systems by users and administrators is recorded in a log file. 6. Job Control Aim: Ensure that the instructions of the Customer are fully observed. Measures: The CSP uses controls and processes to ensure compliance with contracts between the CSP and its service providers. As part of the CSP security policy, no customer information is classified lower than confidential. Access to customer data systems is usually granted via remote support. This is governed by the following security requirements: In general, the remote internet connection is established via a Secure Network Communications (SNC) or Virtual Private Networks (VPN) connection. Both options use various security measures to protect customer systems and data from unauthorized access. These include strong encryption, user authentication, and access control technology. The Secure Area is a specially designated support ticket facility in which the CSP provides a special access-protected and monitored security area for transferring the access data and password. At all times, CSP customers have control over their remote support connections. CSP employees cannot access a customer system without the knowledge or full active support of the customer. Page 14 of 15
15 All CSP employees and contractual partners are contractual bound to respect the confidentiality of all sensitive information including information about the trade secrets of CSP customers and partners. During the support process, the personal data of different customers is physically or logically separated. 7. Availability Control Aim: Protect the data against accidental destruction or loss. Measures: The CSP employs backup processes and other measures that ensure rapid restoration of business critical systems as and when necessary. The CSP also uses uninterrupted power supplies (UPS, batteries, generators, and so on) to ensure power is available to the data centers. Emergency processes and systems are regularly tested. Firewalls or other network security technologies are also used. In accordance with the security policy, regularly updated antivirus products are also available on all systems. 8. Separation control Aim: Data collected for different purposes can be processed separately. Measures for separate processing (storage, modification, deletion, transfer) of information with different purposes: Functional separation / production / non-production: SAP maintains completely physical separation between production, development and testing. Customer is provisioned 2 distinct instances: one for production and at least one for non-production. Customer (including its Affiliates) have access only to Customer s instance(s). Page 15 of 15
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Microsoft Online Services - Data Processing Agreement
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID This Amendment consists of
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
on the transfer of personal data from the European Union
on the transfer of personal data from the European Union BCRsseptembre 2008.doc 1 TABLE OF CONTENTS I. PRELIMINARY REMARKS 3 II. DEFINITIONS 3 III. DELEGATED DATA PROTECTION MANAGER 4 IV. MICHELIN GROUP
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Data Protection Consent Clause and Policy Background
Data Protection Consent Clause and Policy Background The Singapore Personal Data Protection Act - 2012 (PDPA) establishes a data protection law that comprises various rules governing the collection, use,
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Belmont 16 Foot Sailing Club. Privacy Policy
Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
The supplier shall have appropriate policies and procedures in place to ensure compliance with
Supplier Instructions for Processing of Personal Data 1 PURPOSE SOS International has legal and contractual obligations on the matters of data protection and IT security. As a part of these obligations
2) applied methods and means of authorisation and procedures connected with their management and use;
Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data *) For the purposes of these Corporate Guidelines, Third Countries are all those countries, which do not
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
E-Gap Terms and Conditions of Use
E-Gap Terms and Conditions of Use User Terms and Conditions The following paragraphs specify the basis on which you may use the e-gap System and provides information on how we will handle your data. This
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
Estée Lauder Companies Global Jobs Website Privacy Policy
Effective Date: August 14, 2014 Estée Lauder Companies Global Jobs Website Privacy Policy The Estée Lauder Companies ( we, us, or our ) respects your concerns about privacy and value the relationship we
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Appendix 11 - Swiss Data Protection Act
GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).
Last updated: 30 May 2016. Credit Suisse Privacy Policy
Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
APPLICANT VERIFICATION SERVICES TERMS AND CONDITIONS OF USE
APPLICANT VERIFICATION SERVICES TERMS AND CONDITIONS OF USE 1 P a g e Contents 1. Interpretation and Definitions 2. Commencement and Term 3. Recitals and Relationship 4. Services 5. Systems and Software
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Information Security Risks when going cloud. How to deal with data security: an EU perspective.
Separating fact from fiction about new software licensing /SaaS/ cloud computing models: advantages, disadvantages and ethical implications. Information Security Risks when going cloud. How to deal with
ESTRO PRIVACY AND DATA SECURITY NOTICE
ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Privacy Policy Draft
Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
esnc ACCESS AGREEMENT
FEDERAL RESERVE BOARD Shared National Credit Function esnc ACCESS AGREEMENT A. Introduction This agreement (Agreement) sets forth the terms for your Institution s use of our Electronic Shared National
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
ANGUS COUNCIL SUPPLEMENTARY CONDITIONS OF CONTRACT. SC 01 - Contract Performance Guarantee Insurance
SC 01 - Contract Performance Guarantee Insurance For contracts equal to or exceeding 750,000 in value the Contractor shall, within 28 days of the date of the award of the Contract, obtain and provide to
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Johnson Controls Privacy Notice
Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal
TERMS OF USE 1 DEFINITIONS
1 DEFINITIONS In these Terms of Use a) CDA shall mean Common Data Access Limited, a company registered in England and Wales whose registered office is at 6th Floor East, Portland House, Bressenden Place,
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
