Cloud Computing: Trust But Verify
|
|
|
- Paulina Harvey
- 10 years ago
- Views:
Transcription
1 Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP
2 Cloud Computing Provision of services available on the Internet Cloud based services widely used for consumer applications increasingly being adopted for business applications Services typically provided on demand and scalable user can expand use of the services dramatically Services typically provided on a per usage basis (a pooled resource / utility model) although many consumer based services may be provided without charge and on terms where the user agrees to accept ads in exchange for the service
3 TODAY S DISCUSSION Which rules apply? Cloud Computing in the Private Sector Cloud Computing for the Public Sector Questions
4 WHICH RULES APPLY? To assess law that is applicable need to determine: Public or Private? Federally or provincially regulated activity? What information does the organization collect, use and disclose? Is it health information? Is it personal employee information? Is it information collected, used or disclosed on behalf of another party (are they Public or Private?) Is the information collected, used or disclosed by a third party on behalf of the organization? Focus on manageable solutions
5 CLOUD COMPUTING & PRIVATE SECTOR PRIVACY
6 PRIVATE SECTOR OVERLAP Federal: Personal Information Protection and Electronic Documents Act ( PIPEDA ) NWT: PIPEDA BC: Personal Information Protection Act Alberta: Personal Information Protection Act Man: PIPEDA Sask: PIPEDA
7 ACTIVITIES MATTER Legislation is activity based Nature and location of the activity (not the organization) dictates applicable legislation Consider all applicable jurisdictions Consider scope of obligations
8 Which Laws are Applicable? Businesses doing business in multiple jurisdictions need to be aware of the applicable law in each jurisdiction Businesses with operations and customers solely located in a province - likely look to the law of that province Alberta, BC Personal Information Protection Act Quebec - Loi sur la protection des renseignements personnels dans le secteur privé Quebec Other - PIPEDA Need to consider inter-provincial transfers of personal information Contemplation of blended multi-jurisdictional privacy compliance programs
9 PRIVATE SECTOR ENTITIES MAY USE CLOUD COMPUTING
10 PIPEDA Case #145 It is not a disclosure if the personal information is in the control of the customer Railway has agreement providing for provision of personnel files and training records to the managing organization for management purposes PIPEDA organization is responsible for personal information in its possession or custody, including information transferred to a third party for processing Organization to use contractual or other means to provide comparable level of protection Organization only provides information necessary to be processed Service provider limits internal disclosure on a need-to-know basis Agreement includes control by organization, confidentiality and other precautions reinforcing the organization s control of the data / personal information
11 PIPEDA Case #394 operation services provided by US service provider PIPEDA does not prohibit one from obtaining services across international borders Important for the customer to assess risks to security and confidentiality of customer personal information when transferred to a service provider protection measures must be formalized by contract or other means Must be transparent about information handling practices and notify customers that information may be available to governments of the other county under lawful orders The sharing of information with the 3 rd party service provider seen as a 'use' under PIPEDA that requires consent Once consent was obtained - change in service providers would not require a further consent
12 AB/BC PIPA It is not a disclosure if the personal information is in the control of the organization PIPA (BC) Exemption permits collection, use and disclosure of personal information without consent for services provider to assist organization to carry out work Organization must have consent Service providers processing limited to the purposes in consent PIPA (AB) Definition 1(h) organization includes any person acting on behalf of a corporation, unincorporated association, trade union or partnership or an individual acting in a commercial capacity
13 FOCUS ON CLOUD COMPUTING SERVICE PROVIDERS
14 KEY PRINCIPLE - YOU RE RESPONSIBLE An organization is responsible for personal information that is in its custody or under its control. Where an organization engages the services of a person, whether as an agent, by contract or otherwise, the organization is, with respect to those services, responsible for that person s compliance with this Act. An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party.
15 CLEAR ACCOUNTABILITY 5(6) Nothing in subsection (2) is to be construed so as to relieve any person from that person s responsibilities or obligations under this Act 5(2) affirms that a person or agent retained by an organization, whether under contract or otherwise, is not relieved of its own responsibilities or obligations because it has been retained by another organization. The end result is that there can be accountability by on the part of both principal and agent, organization and contractor. Para 40, P2005-IR-005 Builder's case AB PIPA
16 CONSENT & NOTICE Consider consent / notice requirements: Initial transfer of personal information to service provider Distinction between transfer of information for processing and disclosure? "use" per PIPEDA Case #394? Future collection, use and/or disclosure by third-party suppliers Is properly obtained consent / notice to collection, use and/or disclosure by a company sufficient consent / notice for performance of those activities by a company s cloud service providers?
17 CLOUD COMPUTING TERMS Appropriate terms in contract with cloud computing service providers are critical
18 TERMS TO CONSIDER Contracts with cloud computing service providers should ideally include some or all of the following: Covenants restricting collection, use and disclosure of information other than for purposes for which third party is expressly retained Typically addressed in the confidentiality provisions, but must assess that definition of confidential information is broad enough to capture all personal information Covenants requiring the service provider to maintain specific privacy, safety, security and backup standards for the personal information that meet the company s standards A right to audit the privacy & security practices of the cloud service provider
19 FURTHER TERMS If a cloud service provider is collecting information directly for which consent / notice has not already been obtained, detailed requirements regarding the form and content of the consent / notice, and the manner in which it must be recorded Obligations to provide access to personal information to the company and its customers/employees A right to require the cloud service provider to modify its privacy practices at the company s request An indemnity for breach of privacy (may be carved out of limitation of liability) Sensitivity of the personal information will dictate extent of contractual protection required
20 AB OIPC Investigation P2006-IR-004 Complaint re Union International Union maintains personal information about members in system in Las Vegas Assessment of safeguards found: Union implemented reasonable administrative and technical safeguards at both local and international levels Union's policies, procedures, technical security and response to a security breach incident were compliant with PIPA Report assessed preventive measures used to protect personal information including: Training of all users, special training of system operators Servers and data in locked secured data centre 5 levels of security of data firewalls, virus, spyware, denial of service & intrusion protection Data encrypted during transmission System subject to audits
21 AB PIPA Mandatory requirements for organizations using foreign service providers include: Notification of individuals if service provider outside of Canada will collect personal information on behalf of organization Notification if organization will be transferring personal information to service provider outside of Canada Including information on the outsourcing practice in organizations policies and practices
22 PIPEDA Case #313 CIBC, amending cardholder agreement, notifies VISA customers on use of a US service provider and possibility that US law enforcement agencies may be able to obtain access to personal information No opt out possible CPC's findings: PIPEDA does not prohibit use of foreign based 3 rd party service providers Canadian organizations must have provisions in place when using 3 rd party service providers to ensure a comparable level of protection CIBC contract provided security & confidentially guarantees Oversight, monitoring and audit of services CIBC maintains custody and control of information
23 PIPEDA Case #313 personal information in the hands of a foreign 3 rd party service provider, is subject to the laws of that country and no contractual provision can override those laws clear that there is a comparable legal risk that the personal information of Canadians held by any organization and its service provider be it Canadian or US can be obtained by government agencies, whether through the provisions of U.S. law or Canadian law at the very least, a company in Canada that outsources information processing to the US should notify its customers that the information may be available to the US agencies under a lawful order made in that country CIBC did so complaint not well founded
24 CLOUD COMPUTING - THE PUBLIC SECTOR LANDSCAPE
25 THE CHANGING LANDSCAPE 9/11 Terror Attacks Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT Act) BC Govt Serv. Employ Union vs British Columbia (Minster of Health Services) Issue arises in the context of an effort by the Government to outsource certain processing But access for law enforcement is normal in other jurisdictions including Canada Hogan Lovells study of numerous countries [Summary reproduced with consent]
26
27 THE BC Response Bill 73 provides provincial offences, with fines of up to $500,000, for outsourcing service providers who: Store, access or disclose personal information of a British Columbia public sector body outside of Canada, subject to a few narrowly defined exceptions Fail to provide notice to the Minister of Management Services of any foreign demand for disclosure of personal information held by the service provider; or Discipline, suspend, demote, harass or otherwise disadvantage an employee who, acting in good faith and on the basis of reasonable belief, complies with the notice obligations above or acts to insure compliance with the British Columbia legislation
28 BC Govt Serv Empl Union v. BC No Charter or statutory breach by outsourcing to US linked service provider Outsourcing of implementation and development of technology services confirmed Province retained ultimate responsibility for all administration and operation, assessments and final approvals "More than reasonable security" in structure of outsource transaction including: Trust provisions Province to obtain shares of opco if risk of disclosure occurs Restrictions on use and control of electronic equipment by employees $35M penalty for breach of confidentiality Whistle blowing requirements (contractually and legislatively by FOIPPA) Extensive FOIPPA provisions (Bill 73) to ensure records kept in private and in BC All information remains property of Province Prohibition on disclosure of data Subject to laws of BC
29 Features post Bill 73 in BC contracts Requirements for segregated data access Requirements to keep individual user logs More use of non-disclosure agreements (between individual service provider employees and the public body, between employees of a sub-contractor and the service provider, and between employees of the sub-contractor and the public body) Annual oath requirements for service provider and subcontractor employees Restrictions on access of foreign-based employees to personal information, where these employees work on transition and transformation activities Limitations on data access generally, including data remote access
30 Features post Bill 73 in BC contracts Corporate internal limitations on data access, cutting off extra-provincial access Alarm notification facilities to alert the public body to copying or unusual access activity Prohibitions on service provider staff outbound web and access Restrictions on data portability hardware to only designated personnel Dedicated service provider privacy officers to monitor compliance Financial penalties in contract in the event of disclosure or privacy breaches List per OIPC Alberta s report Public-sector Outsourcing and Risks to Privacy" Feb 2006
31 Mission School District No. 75 Use of US based on line assessment tool Unions allege breach of FOIPPA to BC OIPC: Security arrangements reasonable? Adequate consent to storage and access of the personal information? Commissioner finds: S. 30 FOIPPA requirement to make reasonable security arrangements does not foreclose contracting out of services Public body cannot contract out of its privacy obligations Must provide reasonable security having regard to the nature of the personal information involved and seriousness of consequences if unauthorized disclosure Found adequate consent through click to agree mechanism
32 Nova Scotia Response Personal Information International Disclosure Protection Act 2006 SNS 2006, c 3 Requires that information under the custody and control of a public or government body be stored only in Canada and accessed only in Canada Unless individual has consented to its storage or disclosure outside of Canada Unless for permitted disclosure Permits public body or service provider to disclose personal information out of Canada for many lawful purposes including for law enforcement
33 AB Suggestions Alberta's commissioner recommended creation of an Alberta government checklist or model outsourcing contract, which would be applicable to consider in a cloud computing context : A prohibition on the assignment or subcontracting of the outsourcing contract without the written consent of the public body A requirement of notification by the outsourcer in the event of a notice of creditor's remedies or Court applications for bankruptcy or protection from creditors A requirement of notice on any demand for access to or disclosure of personal information received by the outsourcer
34 AB Suggestions A requirement of notice of any loss or unauthorized access to personal information by the outsourcer or its employees A right to audit for both compliance with the contract and with any legislation stipulated to be applicable to it (i.e. Alberta FOIPPA, the Health Information Act, etc.) A requirement for the outsourcer to have in place a system to monitor or audit its own use and disclosure of the personal information, with an access provision for the public body to review those logs on certain conditions Stipulated consequences for breach including mandatory return of all copies of personal information and assistance in recovering lost or otherwise disclosed personal information
35 The Federal Response Federal Treasury Board Secretariat released: A policy guidance document Taking Privacy into Account Before Making Contracting Decisions A strategy paper entitled Privacy Matters: The Federal Strategy to Address Concerns About the USA PATRIOT Act and Transborder Data Flows
36 Review of Licensing Automation System PC Ont. Priv. Comm. Ministry of Natural Resources uses US licensing automation system to manage hunting & fishing licenses Privacy Impact Assessment conducted before proceeding OPC: Ontario has no legislative prohibition on storing personal information outside of Ontario or Canada Prov. Institution obligated to ensure reasonable measures in place to protect privacy and security of records containing personal information Risks of PATRIOT ACT similar to those of law enforcement access in Canada rely on PIPEDA case #
37 Review of Licensing Automation System Safeguards found sufficient and include: All data owned by the Ministry Agent cannot use, collect or disclose personal information for unauthorized purposes All personal information is subject to confidentiality obligations Require notice of compelled disclosure No subcontracting without Ministry consent Agent to ensure security and integrity of all personal information in its possession Agent to return all information at end of term, retaining none Provision for audit of privacy and security compliance Governing law Ontario
38 Existing Practices The segregation of personal information being handled under the contract from other records held by the contractor Audit trails to closely monitor how information is being handled The limiting of right-to-access based upon specific user profiles Approval by the government of any subcontracting The return or approved destruction of all records at the end of a contract The signing of non-disclosure agreements The use of encryption technology allowing only government officials to view the decrypted data
39 New Practices The inclusion of a new step in the solicitation checklist for service contracts that asks for the review of direct and indirect risks involving personal and proprietary information Use of multi-disciplinary teams to review proposed contracting arrangements Monitoring of all contracts where foreign companies have access to personal or other sensitive information Adding contractual requirements that part or all of the work be completed within the institution (especially when health information is involved) or within Canada Ensuring by contract that personal information or other protected or classified information is shared with third parties only where warranted
40 New Practices Consultation with legal services for all future contracts where personal or sensitive information will be exchanged or provided to third parties to consider inclusion of provisions that prevent disclosure under any foreign legislation Modification of contract forms to allow contract authorities to better assess risk Exploration of technological solutions to protect information flows Amendment of training plans to increase department-wide assessment of risks Development of risk management approaches related to business and personal information to mitigate risks associated with foreign legislation, which will in turn be incorporated in the institution's corporate risk management framework
41 FINAL COMMENTS
42 Final Comments Do your Due Diligence know your service provider / customer know your jurisdiction(s) know your transaction Understand the obligations Design the cloud computing service relationship to address privacy and security safeguards Look to public sector guidelines as checklist
43 QUESTIONS? Martin P.J. Kratz, QC
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Privacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
Protecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
Privacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
Index All entries in the index reference page numbers.
Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Accountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1
Personal Information Protection Act ( PIPA ) Tips for Protecting Customers Personal Information 1 More than ever before, retailers have to be prepared to deal with customers who ask questions about the
PIPEDA and Online Backup White Paper
PIPEDA and Online Backup White Paper The cloud computing era has seen a phenomenal growth of the data backup service industry. Backup service providers, by nature of their business, are compelled to collect
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010
pic pic Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 Updated March 2013 Our Vision Better data. Better decisions. Healthier
Personal Information Protection Act. Information Sheet 12: 1. Service Providers Outside Canada: Notification, Policies and Practices
: Notification, Policies and Practices Personal Information Protection Act Information Sheet 12 Introduction Organizations in Alberta operate in an increasingly global business environment. Large and small
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Managing Contracts under the FOIP Act. A Guide for Government of Alberta Contract Managers and FOIP Coordinators
Managing Contracts under the FOIP Act A Guide for Government of Alberta Contract Managers and FOIP Coordinators ISBN 978-0-7785-6102-6 Produced by Access and Privacy Service Alberta 3rd Floor, 10155 102
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
PERSONAL INFORMATION PROTECTION ACT
Province of Alberta Statutes of Alberta, Current as of December 17, 2014 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer 7 th Floor, Park Plaza 10611-98 Avenue Edmonton,
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August
NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT
NOTE: SERVICE AGREEMENTS WILL BE DRAFTED BY RISK SERVICES SERVICE AGREEMENT Between: And: XXXXXX (the Contractor") Langara College 100 West 49 th Avenue Vancouver, BC V5Y 2Z6 (the College") The College
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
The HR Skinny: Effectively managing international employee data flows
The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
BUSINESS ASSOCIATE AGREEMENT
COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into as of ( Effective Date ) by and between The Trustees of Columbia University in the City of
EASTLINK PERSONAL CLOUD TERMS OF SERVICE
EASTLINK PERSONAL CLOUD TERMS OF SERVICE IMPORTANT - READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY BEFORE PROCEEDING WITH DOWNLOADING AND/OR THE INSTALLATION OF THE SOFTWARE OR USING EASTLINK PERSONAL
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
PRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
Information Sheet: Cloud Computing
info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.
The cloud thing: Privacy and cloud computing
The cloud thing: Privacy and cloud computing David T.S. Fraser ([email protected] / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author
Terms of Business for Registered Support Providers
Terms of Business for Registered Support Providers The National Disability Insurance Scheme Act 2013 provides for the making of Rules and requirements for registered providers of support. The Rule National
SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
CATHOLIC SOCIAL SERVICES BUSINESS ASSOCIATE AGREEMENT
CATHOLIC SOCIAL SERVICES BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (Agreement) is made this day of, 20, between the Catholic Social Services ( CSS ), whose business address is 3710
BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT
BENCHMARK MEDICAL LLC, BUSINESS ASSOCIATE AGREEMENT This BUSINESS ASSOCIATE AGREEMENT ( Agreement ) dated as of the signature below, (the Effective Date ), is entered into by and between the signing organization
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,
Practice Resource. Cloud computing checklist. Introduction
Practice Resource Cloud computing checklist Cloud computing offers many benefits to lawyers including the ability to access an exploding array of new software services and applications, the offloading
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Passenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
This form may not be modified without prior approval from the Department of Justice.
This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred
BUSINESS ASSOCIATE ADDENDUM
BUSINESS ASSOCIATE ADDENDUM This BA Agreement, effective as of the effective date of the Terms of Use, adds to and is made part of the Terms of Use by and between Business Associate and Covered Entity.
The Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
Overview of. Health Professions Act Nurses (Registered) and Nurse Practitioners Regulation CRNBC Bylaws
Overview of Health Professions Act Nurses (Registered) and Nurse Practitioners Regulation CRNBC Bylaws College of Registered Nurses of British Columbia 2855 Arbutus Street Vancouver, BC Canada V6J 3Y8
BUSINESS ASSOCIATE AGREEMENT. Emory University and/or Emory Healthcare, Inc. ( Emory ) ( Covered Entity ) and
BUSINESS ASSOCIATE AGREEMENT Emory University and/or Emory Healthcare, Inc. ( Emory ) ( Covered Entity ) and Associate ) ( Business This Business Associate Agreement (this Agreement ) effective as of (the
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
HIPAA Compliance and the Protection of Patient Health Information
HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING
POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING Know your rights A wide range of organizations are requiring employees and volunteers to provide police record checks. Privacy, human rights and employment
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
BOLT Software Technology Terms of Use Last Updated: November 4, 2015
BOLT Software Technology Terms of Use Last Updated: November 4, 2015 1. Introduction; License Thank you for using the Bolt Software Technology ( we, our or Bolt ) Software As A Service ( SaaS ) available
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
PIPA and the Hiring Process
PIPA and the Hiring Process April 10, 2006 INTRODUCTION Any private sector employer who collects, uses or discloses personal information about employees or job applicants has to comply with British Columbia
