UK School Opinions of Cloud Services and Student Privacy. A survey conducted by the Ponemon Institute for SafeGov.org May 2013

Size: px
Start display at page:

Download "UK School Opinions of Cloud Services and Student Privacy. A survey conducted by the Ponemon Institute for SafeGov.org May 2013"

Transcription

1 UK School Opinions of Cloud Services and Student Privacy A survey conducted by the Ponemon Institute for SafeGov.org May 2013

2 EXECUTIVE SUMMARY UK schools believe cloud services will bring significant benefits for students, such as better acquisition of skills for employment, better social integration, better exam results, and more chance of pursuing university degrees. Cloud services are also seen as easier to manage and cheaper than traditional solutions. With the recognition of these benefits, a strong majority of UK schools expect to deploy cloud and document collaboration services in the foreseeable future. However, schools also recognise that data mining for profit by cloud providers is a threat to student privacy and strongly object to the practice. The vast majority of schools say that student profiling and ad serving should never be allowed in school-provided cloud services. But some schools admit they are tempted to trade student privacy for lower cost services. Many schools also say that parents should have the right to opt-out of data mining of their children s information. May 2013 SafeGov.org & Ponemon Institute 2

3 UK SCHOOLS SEE CLOUD SERVICES IN THEIR FUTURE A decisive majority of UK schools expect to use cloud services such as and document collaboration in the near future. They believe such tools offer many educational and social benefits, and will be cheaper and easier to manage than traditional software. May 2013 SafeGov.org & Ponemon Institute 3

4 Most schools already provide to staff (85%) and students (59%) 25% already offer students cloud for Staff Own servers 9% 22% for Students Other outsourced 10% 21% Local Council or LEA 16% 23% Cloud (Google or Microsoft) 20% 25% Don't provide service 15% 41% 0% 10% 20% 30% 40% 50% May 2013 SafeGov.org & Ponemon Institute 4

5 61% of schools that don t yet provide expect to offer cloud in the foreseeable future 40% 35% 35% 30% 26% 25% 20% 21% 18% 15% 10% 5% 0% Yes, within the next 12 months Yes, more than 12 months from now No Not sure May 2013 SafeGov.org & Ponemon Institute 5

6 Schools believe cloud tools will help students improve skills, thrive in modern society, obtain better exam results Scale: 1 = very likely, 2 = likely, 3 = not likely and 4 = unsure Improve acquisition of skills needed to gain employment after leaving school 36% 42% Become better integrated in modern society outside of school 29% 34% Obtain better results on national exams 23% 38% Be more likely to go on to university or other post-secondary education 21% 29% Be less likely to engage in disruptive behaviour while in school Be less likely to engage in disruptive behaviour outside of school 15% 13% 28% 29% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Very likely Likely May 2013 SafeGov.org & Ponemon Institute 6

7 BUT SCHOOLS ALSO SEE A DARK SIDE IN CLOUD: DATA MINING Schools overwhelmingly recognise that data mining for profit by cloud providers is a threat to student privacy and strongly object to the practice. But some schools admit they are tempted to trade student privacy for lower costs. A solution to this conflict of interest is to let parents opt-out of cloud data mining for their children. May 2013 SafeGov.org & Ponemon Institute 7

8 Schools believe cloud will be easier to manage and cheaper, but not necessarily safer or more secure Scale: 1 = significant benefit, 2 = some benefit, 3 = nominal benefit and 4 = no benefit Easier for staff to administer and maintain 50% 29% Less expensive than the previous solution 36% 40% Better integration with other software or online services, such as document creation and sharing 39% 25% Easier for students to use 23% 24% Less vulnerable to hacking or viruses 13% 19% Better protection of student privacy 5% 6% Significant benefit 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Some benefit May 2013 SafeGov.org & Ponemon Institute 8

9 Schools see threats to student privacy as top risk of cloud (74%), followed by security breaches (70%) Scale: 1 = significant benefit, 2 = some benefit, 3 = nominal benefit and 4 = no benefit Might fail to protect student privacy 46% 28% Might be vulnerable to hacking or viruses 39% 31% Could turn out to be more expensive than expected 21% 33% Might not integrate well with other software or online services Could be difficult for staff to administer and maintain 18% 15% 20% 22% Could prove difficult for students to use 11% 20% Significant risk 0% 10% 20% 30% 40% 50% 60% 70% 80% Some risk May 2013 SafeGov.org & Ponemon Institute 9

10 Vast majority of schools (81%) object to cloud providers that data mine student online behavior (i.e. analyse s or track web browsing) for profit 60% 56% 50% 40% 30% 25% 20% 10% 11% 8% 0% Highly objectionable Somewhat objectionable Only slightly objectionable Not at all objectionable May 2013 SafeGov.org & Ponemon Institute 10

11 84% of schools say cloud providers should never profile students for profit, 70% say ads should not be an option Providers of online services should consent never to profile student online behaviour or web browsing for commercial purposes 53% 31% Providers of online services should consent never to analyse the content of student s for commercial purposes 51% 30% Providers of online services should consent to remove the option to turn on ad serving 34% 36% Strongly agree 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Agree 5/22/2013 SafeGov.org & Ponemon Institute 11

12 Conflict of interest? 47% of schools admit they might trade student privacy for lower costs, but 44% also say parents should have right to opt-out for children Full disclosure that the service provider is analysing s and/or profiling online behaviour for commercial purposes, with no right to opt-out, but the service is provided at a lower cost or no cost 1 = eliminates all objections, 2 = eliminates some objections and 3 = does not eliminate objections 19% 28% Offering students parents the right to opt-out completely from having their children s analysed or their online behaviour profiled 25% 19% Full disclosure by the service provider but no right to opt-out 11% 25% Offering students (but not their parents) the right to optout completely from having their analysed or their online behaviour profiled 8% 26% Offering students the right to see what information has been gathered about them, but no right to opt-out 8% 23% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Eliminates all objections Eliminates some objections May 2013 SafeGov.org & Ponemon Institute 12

13 DEMOGRAPHICS AND METHODOLOGY May 2013 SafeGov.org & Ponemon Institute 13

14 Respondents type of school or related educational institution 10% 3% 2% State-funded school Local education authority 13% Independent school (non-religious) Independent school (religious) 72% Other public or private body responsible for school administration May 2013 SafeGov.org & Ponemon Institute 14

15 Student level at respondents schools 50% 45% 46% 40% 35% 30% 25% 24% 20% 17% 15% 10% 12% 5% 0% Primary school Secondary school 6th form Combination of the above May 2013 SafeGov.org & Ponemon Institute 15

16 Survey methodology Online survey of administrators, teachers and IT staff in UK primary and secondary schools (including 6 th form) Data collected in May 2013 Sample of 218 survey respondents (3.6 percent response rate) May 2013 SafeGov.org & Ponemon Institute 16

17 Questions? For more information, please contact: Jeff Gould Kate Tellier

PRIVACY RISKS OF AD SUBSIDIZED COMPUTING DEVICES IN SCHOOLS: A SAFEGOV ADVISORY BRIEFING FOR GLOBAL EDUCATION POLICY MAKERS

PRIVACY RISKS OF AD SUBSIDIZED COMPUTING DEVICES IN SCHOOLS: A SAFEGOV ADVISORY BRIEFING FOR GLOBAL EDUCATION POLICY MAKERS PRIVACY RISKS OF AD SUBSIDIZED COMPUTING DEVICES IN SCHOOLS: A SAFEGOV ADVISORY BRIEFING FOR GLOBAL EDUCATION POLICY MAKERS SUMMARY SafeGov is a global non profit organization devoted to promoting safe

More information

The 2010 Symantec Break in the Clouds Report. 2010 Symantec Break in the Clouds Report

The 2010 Symantec Break in the Clouds Report. 2010 Symantec Break in the Clouds Report The 2010 Symantec Break in the Clouds Report 1 Introduction The White House is urging Federal agencies to adopt cloud computing, with a clear focus on streamlining infrastructure management, improving

More information

Mobile Security Landscape in 2014 - A Report

Mobile Security Landscape in 2014 - A Report The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace A report by: Copyright 2014. All rights Reserved. The Role for Mobile Operators in Enterprise Mobility Security Working

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Securing Your Data In The Cloud: an insiders perspective

Securing Your Data In The Cloud: an insiders perspective Securing Your Data In The Cloud: an insiders perspective INTRODUCTION As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private

More information

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

ailexpert MailExpert Security form

ailexpert MailExpert Security form ailexpert MailExpert Security form Data security and confidentiality are two of our top priorities at MailExpert. The MailExpert platform was designed in such a way that ensures our customer s security

More information

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully

More information

About the Survey Respondents

About the Survey Respondents SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security

More information

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH

More information

School Information Security and Privacy in the Cloud

School Information Security and Privacy in the Cloud School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The

More information

Ed Adams, CEO Security Innovation. Dr. Larry Ponemon Ponemon Institute. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.

Ed Adams, CEO Security Innovation. Dr. Larry Ponemon Ponemon Institute. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. 2012 Study on Application Security: AS Survey of fits Security and dd Developers Ed Adams, CEO Security Innovation Dr. Larry Ponemon Ponemon Institute 2012 ISACA Webinar Program. 2012 ISACA. All rights

More information

Profound Outdoors Privacy Policy

Profound Outdoors Privacy Policy Profound Outdoors Privacy Policy Our Commitment to Privacy Our Privacy Policy has been developed as an extension of our commitment to combine quality products and services with integrity in dealing with

More information

Data Security in Development & Testing

Data Security in Development & Testing Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development

More information

Unisys Security Insights: Germany A Consumer Viewpoint - 2015

Unisys Security Insights: Germany A Consumer Viewpoint - 2015 Unisys Security Insights: Germany A Consumer Viewpoint - 2015 How consumers in Germany feel about: Personal data security, ranked by industry Experiences concerning security of personal data Research by

More information

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

Service Availability Metrics

Service Availability Metrics 2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

ONLINE PAYMENT PRIVACY POLICY

ONLINE PAYMENT PRIVACY POLICY ONLINE PAYMENT PRIVACY POLICY Updated: June, 2013 In order to operate the College online-payments system, Sanjari International College (SIC) may collect and store personal information student/customer

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

Chicagoland Burger Build Off Privacy Policy

Chicagoland Burger Build Off Privacy Policy Chicagoland Burger Build Off Privacy Policy Purpose of Privacy Policy McDonald s Owners of Chicagoland and Northwest Indiana [MOCNI] ( Company, we or us ) is a franchisee Co-Op of McDonald s Corporation.

More information

plications of their online actions for the lives of others. They are less likely to understand the risks of cyber-stalkers, or the risks of

plications of their online actions for the lives of others. They are less likely to understand the risks of cyber-stalkers, or the risks of Students and Parents Attitudes towards Online Privacy: The Start of an International Study Eric K. Clemons, Josh Wilson The Wharton School 15 September 2013 Extended Abstract 1. Introduction A new threat

More information

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Question: 1 Which of the following should be the FIRST step in developing an information security plan? 1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

Local Government Information Security Risk in the Age of E-Government. Eunjung Shin Lauren N. Bowman PhD Students. Eric Welch Associate Professor

Local Government Information Security Risk in the Age of E-Government. Eunjung Shin Lauren N. Bowman PhD Students. Eric Welch Associate Professor Introduction Local Government Information Security Risk in the Age of E-Government Eunjung Shin Lauren N. Bowman PhD Students Eric Welch Associate Professor Department of Public Administration Science,

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report

More information

SharePoint and Security: A Survey of SharePoint Stakeholders

SharePoint and Security: A Survey of SharePoint Stakeholders SharePoint and Security: A Survey of SharePoint Stakeholders December 2013 1 Key Findings Non-employee access to on-premise SharePoint desirable 76% have had requests to grant non-employee access 72% say

More information

1. The information we collect and how we collect it.

1. The information we collect and how we collect it. PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

White Paper - Crypto Virus. A guide to protecting your IT

White Paper - Crypto Virus. A guide to protecting your IT White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Global Study on the State of Payment Data Security

Global Study on the State of Payment Data Security Global Study on the State of Payment Data Security 3 Introduction We are pleased to present the findings of The Global Study on the State of Payment Data Security Study conducted on behalf of Gemalto by

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Application Instructions

Application Instructions Application Instructions It is recommended that applicants draft and save a copy of their response to the three Key Selection Criteria using Microsoft Word. Applicants can then Copy (Ctrl C) and Paste

More information

Cloud Computing: The Gathering Storm

Cloud Computing: The Gathering Storm Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and

More information

Social Marketing Survey

Social Marketing Survey Social Marketing Survey 1. How important is social media to your marketing efforts? not at all 9.4% 15 somewhat important 41.5% 66 very important 45.3% 72 our primary marketing effort 3.8% 6 answered question

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM

More information

Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting your privacy.

Public Health England, an executive agency of the Department of Health (We) are committed to protecting and respecting your privacy. PRIVACY POLICY 2015 PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE Public Health England, an executive agency of the Department of Health ("We") are committed to protecting and respecting

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information.

PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information. PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information. A) Market Simplified' commitment to privacy This website is administered

More information

CTN281 - Security+ Certification Prep

CTN281 - Security+ Certification Prep CTN281 - Security+ Certification Prep Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline New Course Carol Koepke South 08/21/2012-9:04 AM BASIC INFORMATION

More information

The Credit Research Foundation. Disaster Recovery and Business Continuity. Of Your E-mail, Credit & A/R System. An Occasional Paper February 2003

The Credit Research Foundation. Disaster Recovery and Business Continuity. Of Your E-mail, Credit & A/R System. An Occasional Paper February 2003 Disaster Recovery and Business Continuity Of Your E-mail, Credit & A/R System Executive Summary The Credit Research Foundation An Occasional Paper February 2003 Since September 11, 2001, 67% of the 229

More information

MIS Privacy Statement. Our Privacy Commitments

MIS Privacy Statement. Our Privacy Commitments MIS Privacy Statement Our Privacy Commitments MIS Training Institute Holdings, Inc. (together "we") respect the privacy of every person who visits or registers with our websites ("you"), and are committed

More information

New Channels Create New Growth Opportunities for Insurers. North American Insurance Distribution Survey Findings

New Channels Create New Growth Opportunities for Insurers. North American Insurance Distribution Survey Findings New Channels Create New Growth Opportunities for Insurers North American Insurance Distribution Survey Findings Introduction After a period marked by disruption of the financial systems and heightened

More information

How to Survive and Thrive in the Application Economy. ca.com

How to Survive and Thrive in the Application Economy. ca.com How to Survive and Thrive in the Application Economy 2 RESEARCH PAPER: HOW TO SURVIVE AND THRIVE IN THE APPLICATION ECONOMY SEPTEMBER 2014 How to Survive and Thrive in the Application Economy Executive

More information

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage Dean Bank Primary and Nursery School Secure Storage of Data and Cloud Storage January 2015 All school e-mail is disclosable under Freedom of Information and Data Protection legislation. Be aware that anything

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

We may collect the following types of information during your visit on our Site:

We may collect the following types of information during your visit on our Site: Privacy Policy This Privacy Policy (the Policy ) governs the use and collection of information that Horizon Broadcasting Group, LLC (collectively, "we," "our" or the "website") obtains from you while you

More information

This Privacy Policy has been prepared by DEBTSUPPORTCENTRE (the Company, we or us)

This Privacy Policy has been prepared by DEBTSUPPORTCENTRE (the Company, we or us) This Privacy Policy has been prepared by DEBTSUPPORTCENTRE (the Company, we or us) and (together with our terms of use www.debtsupportcentre.co.uk and any other documents referred to on it) sets out the

More information

PROTOCOL. Managed Moves Issued Feb 2012

PROTOCOL. Managed Moves Issued Feb 2012 PROTOCOL Managed Moves Issued Feb 2012 In the overseas context SCE does not maintain Pupil Referral Units nor does it have the continuum or provision normally available within an English Local Authority

More information

AdvancedMD Online Privacy Statement

AdvancedMD Online Privacy Statement AdvancedMD Online Privacy Statement Effective date: September 1, 2015 This Privacy Statement explains how AdvancedMD uses and discloses personal information that we collect from people who visit our websites

More information

Is your business still wasting time and money on PCs and Servers?

Is your business still wasting time and money on PCs and Servers? Hosted Managed Desktop Cloud Computing Is your business still wasting time and money on PCs and Servers? Our service is a cheaper and simpler alternative to owning and managing your own business IT network.

More information

White Paper: Cloud Solutions for Continuity

White Paper: Cloud Solutions for Continuity White Paper: Cloud Solutions for Continuity 2014, igroup ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties

More information

How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey

How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey How Boards of Directors Really Feel About Cyber Security Reports Based on an Osterman Research survey Executive Summary 89% of board members said they are very involved in making cyber risk decisions Bay

More information

GlobePartners Limited. Privacy Policy

GlobePartners Limited. Privacy Policy GlobePartners Limited Privacy Policy PRIVACY STATEMENT Protecting the privacy and safeguarding the personal and financial information of our clients and Web site visitors is one of our highest priorities.

More information

Collection and Use of Information

Collection and Use of Information AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we

More information

MOVING TO THE CLOUD: Understanding the Total Cost of Ownership

MOVING TO THE CLOUD: Understanding the Total Cost of Ownership MOVING TO THE CLOUD: Understanding the Total Cost of Ownership The most significant cost of owning and managing software applications is tied up in operating and maintaining the software, along with the

More information

Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau

Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau Office of Fair Trading (OFT) Online Targeting of Advertising and Prices Market Study Response by the Internet Advertising Bureau 1. Introduction The Internet Advertising Bureau (IAB) is the UK industry

More information

Efficacy of Emerging Network Security Technologies

Efficacy of Emerging Network Security Technologies Efficacy of Emerging Network Security Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Part

More information

The problem with privileged users: What you don t know can hurt you

The problem with privileged users: What you don t know can hurt you The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so

More information

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP Table of Contents Section Page Definitions 2 Terms of Service and Network Management Practices 2 Devices & Software that may be

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

How. Cloud. Disaster Recovery. Can help your business. www.iconz-webvisions.com

How. Cloud. Disaster Recovery. Can help your business. www.iconz-webvisions.com How Cloud Disaster Recovery Can help your 1 Cloud-based disaster recovery has the potential to provide es with lower costs yet offers faster recovery and more flexible contracts. This article looks at

More information

Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector.

Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector. Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector. Keeping a watchful eye over your schools network infrastructure. Our ICT introduces

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

How To Choose Data Center Colocation Over Cloud Computing

How To Choose Data Center Colocation Over Cloud Computing White Paper Cloud vs. Colo: Colo Wins on 4 out of 5 Key Criteria of new security threats, hacking attacks and data breaches every week. Couple that with major service interruptions and outages experienced

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Healthcare in the Crosshairs for Data Breaches. April 22, 2015. Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com

Healthcare in the Crosshairs for Data Breaches. April 22, 2015. Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com Healthcare in the Crosshairs for Data Breaches April 22, 2015 1 Presenters Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com Ana Cowan (512) 703-5791 ana.cowan@huschblackwell.com Debbie Juhnke,

More information

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world

More information

Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following:

Privacy policy. 1. Collecting Information We may collect Personal Data about you from a number of sources, including the following: Privacy policy Protecting your personal details on our website. Last updated: 13 June 2013 Hartleys Skip Hire (registered number 01033645), whose registered office is at Draycott Cross Road Brookhouse

More information

Cookies which our online service providers use Updated 12 th May 2015

Cookies which our online service providers use Updated 12 th May 2015 Cookies which our online service providers use Updated 12 th May 2015 / persistent cookies Online service Objective Name Type of cookie More information from service provider consultation (persistent)

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

Risk Assessment and Cloud Strategy Development: Getting it Right this Time!

Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Barbara Endicott-Popovsky, PhD University of Washington Center of Information Assurance and Cybersecurity Kirsten Ferguson-Boucher

More information

3Degrees Group, Inc. Privacy Policy

3Degrees Group, Inc. Privacy Policy 3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to

More information

SAP Splash Privacy Statement

SAP Splash Privacy Statement SAP Splash Privacy Statement The SAP Splash Privacy Statement (this Privacy Statement ) applies to the use of this website, http://www.experiencesplash.com (the Website ) and any other subdomains or webpages

More information

Defining the Gap: The Cybersecurity Governance Study

Defining the Gap: The Cybersecurity Governance Study Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

IDEA, IEP'S, and Section 504 Plans: Differences between K12 and College

IDEA, IEP'S, and Section 504 Plans: Differences between K12 and College IDEA, IEP'S, and Section 504 Plans: Differences between K12 and College Many students and families find it difficult to understand how different disability laws affect the provision of services at college.

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

INDEX PRIVACY POLICY...2

INDEX PRIVACY POLICY...2 INDEX PRIVACY POLICY...2 WHAT PERSONAL INFORMATION DOES RENTINGCARZ GATHER FROM ME AND HOW IS THIS INFORMATION USED?...2 MAKING A PURCHASE...2 NEWSLETTERS...2 ONLINE SURVEYS...2 PROMOTIONS & SWEEPSTAKES...3

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking

More information

U.S. Department of Health and Human Services. U.S. Department of Education

U.S. Department of Health and Human Services. U.S. Department of Education U.S. Department of Health and Human Services U.S. Department of Education Joint Guidance on the Application of the Family Educational Rights and Privacy Act (FERPA) And the Health Insurance Portability

More information

28400 POLICY IT SECURITY MANAGEMENT

28400 POLICY IT SECURITY MANAGEMENT Version: 2.2 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. The objective of this policy is to provide direction and support for IT

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

Talen Energy Corporation Website Privacy Notice

Talen Energy Corporation Website Privacy Notice Talen Energy Corporation Website Privacy Notice Talen Energy Corporation and its affiliates (collectively referred to in this notice as Talen Energy, we, us, our and other similar pronouns), have developed

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

Unisys Security Insights: U.S. A Consumer Viewpoint - 2015

Unisys Security Insights: U.S. A Consumer Viewpoint - 2015 Unisys Security Insights: U.S. A Consumer Viewpoint - 2015 How US consumers feel about Personal data security, ranked by industry Biometrics as a security measure Research by Table of Contents Executive

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

Information Management Advice 39 Developing an Information Asset Register

Information Management Advice 39 Developing an Information Asset Register Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if

More information