SUBMISSION TO THE SPECIAL COMMITTEE TO REVIEW TRANSBORDER DATA FLOWS AND THEIR REGULATION THE FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY ACT

Size: px
Start display at page:

Download "SUBMISSION TO THE SPECIAL COMMITTEE TO REVIEW TRANSBORDER DATA FLOWS AND THEIR REGULATION THE FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY ACT"

Transcription

1 SUBMISSION TO THE SPECIAL COMMITTEE TO REVIEW THE FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY ACT TRANSBORDER DATA FLOWS AND THEIR REGULATION Authored by Kris Klein from the Law Office of Kris Klein, a professional corporation

2 - 2 - A critical question for regulators, lawmakers, policymakers, and scholars is how to maintain information privacy law at a high level that responds in a meaningful fashion to the challenges and opportunities of global networked data flows. 1 British Columbia s Freedom to Information and Protection of Privacy Act (BC FIPPA) is one of only two laws in Canada that prohibit the flow of personal information across Canadian borders. Every other law (excluding the public sector law in Nova Scotia) permits transborder flows of personal information outside Canada for processing purposes if certain conditions are met. This is true of both the public sector and private sector legislation governing the management of personal information. 2 While BC FIPPA s law has the well-intentioned goal of protecting the personal information of citizens held by public bodies, the law s prohibition on transborder flows has been described as being seriously flawed and has having contributed to misfocusing the growing debate over privacy issues in multinational information flows. 3 The prohibition was created based on a perception of risk that the personal information of British Columbians would be accessed by foreign officials if the information was allowed to be stored or accessed from outside the country. As elaborated below, that risk has proven to be misguided. Moreover that particular risk analysis inappropriately ignored the risks of NOT permitting transborder data flows. Risks such as those created by higher costs, loss of innovation, lower productivity, lack of adoption, and limited scalability are much more detrimental than the risk of foreign authorities accessing personal information. We submit that the prohibition should be amended for the following reasons. First Reason: British Columbia public sector agencies are missing out on innovation and efficiencies afforded by modern outsourcing arrangements because the prohibition is not consistent with the modern economy. It is beyond doubt that we are in the information age. Data, including personal information, is not a static item that is stored on a piece of paper. Rather, the value derived from data depends on its fluid nature. It must be accessed and used readily by those authorized to do so. To build dams and artificial constraints that limit data s fluidity necessarily reduces the value of that data. The value of data for public bodies is as important as in the private sector. So, the prohibition and restriction on data flow currently used in British Columbia devalues the personal information under the control of public bodies. Thus, decision making is more difficult and less effective. Moreover, the services being delivered by those public bodies are delivered less efficiently and at a greater cost. 1 Paul M. Schwartz, Managing Global Data Privacy, Privacy-Projects-Paul-Schwartz-Global-Data-Flows pdf. 2 See, Kris Klein, Applying Canadian Privacy Law to Transborder Flows of Personal Information from Canada to the United States: A Clarification, posted by Industry Canada at August Fred Cate, Legal Restrictions on Transborder Data Flows to Prevent Government Access to Personal Data: Lessons from British Columbia, published by The Center for Information Policy and Leadership, August 2005

3 - 3 - Today s modern economy including the provision of services by public bodies places a high premium on the efficient management of information. Cloud computing helps organizations of all sizes and in all sectors achieve that goal. Enterprise cloud computing allows organizations to develop and run software applications over the Internet. Customers pay a monthly subscription fee and access their applications with a Web browser. Because customers do not have to invest in information technology, infrastructure or buy software licenses, they benefit from low up-front costs and a rapid return on investment. Because enterprise cloud computing is based on a multi-tenant architecture, customers benefit from rapid deployment, easy customization, flexible use, and Internet scale solutions. And because enterprise cloud computing offers a multi-layered approach to the protection of customer data that includes compliance with international security standards like ISO 27001, customers also benefit from robust security. This reality is reflected in almost all privacy legislation and privacy frameworks around the world. While some jurisdictions, such as Europe, have used more restrictions then others when it comes to allowing the flow of information, few laws have been as restrictive as the prohibition imposed by the law in British Columbia. Second Reason: British Columbia public sector organizations unnecessarily spend significant sums of money to keep data inside of Canada. There are enormous opportunity costs for requiring public bodies to build and maintain data centers within Canada. Moreover, when entering into outsourcing arrangements, the prohibition raises difficulties and complexities that add unnecessary costs to the deals themselves. If an outsourcing arrangement is ultimately reached, it will have required additional time, money and resources. Or, in some instances, the prohibition leads to the outright inability to enter into a legitimate outsourcing arrangement thus rendering the time and investment in exploring the arrangement meaningless. In such negotiations, the British Columbia public sector agency bears much of these costs. For example, in one instance, the parties had to incur several thousands of dollars in obtaining legal opinions for fear that the prohibition was in effect for the particular transaction at issue. We are aware of many public bodies that are interested in using outsourcing solutions that involve transborder data flow. Their interest is predominantly driven by the costs to be saved and efficiencies to be gained. Because such arrangements involve transferring personal information outside of Canada, however, these public bodies are forced to forego the best solutions available. One of several examples is a contract with the Ministry of Children and Family Development for an Integrated Case Management Project. In that instance, the Ministry issued a Notice of Intent to renew a contract at a cost of nearly $24 million. Had the prohibition on transborder data flows not been in place, a solution could have been procured for less than half the cost. That s approximately $12 million dollars from British Columbia s taxpayers that was wasted. Lastly, it is noteworthy that this prohibition has a trickle-down effect on the private sector that is caused by the confusion and fear created by the prohibition for public bodies. Because many private sector organizations serve the public sector, they are concerned that the prohibition may apply to them as well. While impossible to quantify exactly, it is safe to say that this prohibition is causing the British Columbia taxpayers to waste significant financial resources.

4 - 4 - Third Reason: The protection the prohibition affords is illusory. First, the fear of having the personal information of Canadians accessed by foreign officials is unfounded because foreign officials have always been able to gain access to the personal information of Canadians. Considering that the impetus for the prohibition was fear the American authorities would abuse the powers granted to them in the Patriot Act, it is worth noting that this power has been used a total of 87 times through to the end of That s an average of only 12 instances per year. It is unknown whether any of those instances involved accessing the information of Canadians, let along anyone from the province of British Columbia. Relevant to this consideration is the fact that the United States has a Mutual Legal Assistance Treaty ( MLAT ) with Canada. The powers granted to American authorities under the Patriot Act are much more likely to be used to access personal information of individuals from countries for which there is no such treaty. This is because the Americans have negotiated a treaty with Canada and they have not rescinded their obligations under that treaty with the passing of the Patriot Act. The second component is that many data centers outside of Canada offer better security than those that have to be built simply to house public sector data within British Columbia. Building data centers that offer the equivalent amount of protection from hackers and other types of data breaches as those located outside of Canada involve tremendous costs. Even then, the security level may not be same. Fourth Reason Although BC FIPPA applies only to data held by public bodies in British Columbia, the confusion created by the prohibition has caused a negative impact across the Canadian economy. Many organizations and public bodies in Canada are under the mistaken impression that the prohibition is widely applicable across the country. In other words, there is a mistaken belief that no one is permitted to move data outside of Canada. As a result, many large and small enterprises and public bodies in Canada are reluctant to take advantage of the innovation, cost-efficiency, security and productivity that enterprise cloud computing enables. This mistaken interpretation of the BC FIPPA has already had a negative impact on the competitiveness of numerous Canadian organizations that are not located in British Columbia. If allowed to persist, it could further undermine the competitiveness of Canadian industry as we move into the 21 st century. What does Salesforce.com do and what is Cloud computing Salesforce.com provides an Internet-based business application (also known as software-as-a-service or enterprise cloud computing ) that allows public bodies to input, store, and access data about the people they serve. Salesforce.com s services provide comprehensive customer relationship management ( CRM ) functionality that include sales force automation, customer support and help desk, and marketing automation features in addition to an on-demand technology platform that enables the public bodies to build and use entirely new on-demand applications without having to invest in new software, hardware, or related infrastructure.

5 - 5 - Salesforce.com delivers its services over the Internet through commercially-available Web connections and browser software. Customers log into salesforce.com s services from salesforce.com s Web site using a unique username and password. Salesforce.com s services allow for additional authentication methods that may be activated by public bodies. Salesforce.com serves public bodies through secure hardware and software, using what is known in the industry as multi-tenant application architecture. A multitenant application is one that can be accessed and used by many authorized users simultaneously, with logical separation of data in hardware and software. The logical separation of data allows each salesforce.com customer to view only its instance of salesforce.com s services and associated data. Salesforce.com s multi-tenant architecture is similar to that used to provide online banking and brokerage services to consumers (which can also be accessed and used securely by thousands of users simultaneously through the logical not physical separation of data). Over 70,000 enterprises globally including public bodies in Canada, and customers in highly regulated industries such as financial services, healthcare, insurance, media, and communications trust salesforce.com to host the personal information under their control in its secure data centers. Conclusion It is time for British Columbia to adopt a more flexible model for the protection of personal information held by public bodies -- a model that takes into account a more accurate analysis of the risk associated with permitting transborder data flow AND the risk associated with NOT permitting it. Such an analysis will take into account the effect on cost, innovation, productivity, adaptability, and scalability. Once realized, this model will allow the personal information under its care and control to be more secure and more valuable thus resulting in more efficient service delivery and better (and more timely) decision making. Other jurisdictions are adopting the model used in the rest of Canada. That model rests on the principle of accountability and transparency. It requires public bodies and organizations to be clear about where information is stored and it demands that public bodies and organizations remain accountable for the information regardless of what jurisdiction it finds itself in. This is done by using appropriate contractual clauses with outsourcers and by being reasonable in terms of ensuring the necessary control can be exerted over the personal information under its care. Salesforce.com will make representatives available to the Committee should there be any desire to meet with us while the legislative review process unfolds.

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

Protecting Saskatchewan data the USA Patriot Act

Protecting Saskatchewan data the USA Patriot Act Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

COMESA Guidelines on Free and Open Source Software (FOSS)

COMESA Guidelines on Free and Open Source Software (FOSS) COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective

More information

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

The Software-as-a Service (SaaS) Delivery Stack

The Software-as-a Service (SaaS) Delivery Stack The Software-as-a Service (SaaS) Delivery Stack A Framework for Delivering Successful SaaS Applications October 2010 2010 Online Tech, Inc. Page 1 of 12 www.onlinetech.com Audience Executives, founders,

More information

Insights and Commentary from Dentons

Insights and Commentary from Dentons dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:

More information

The cloud thing: Privacy and cloud computing

The cloud thing: Privacy and cloud computing The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author

More information

Cloud Infrastructure Security

Cloud Infrastructure Security Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria dvelev@unwe.acad.bg 2 Institute of Control and

More information

Cloud Computing: Trust But Verify

Cloud Computing: Trust But Verify Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet

More information

Residential Tenancy Office Compliance and Consumer Services Branch Ministry of Public Safety and Solicitor General Residential Tenancy Office (RTO)

Residential Tenancy Office Compliance and Consumer Services Branch Ministry of Public Safety and Solicitor General Residential Tenancy Office (RTO) Residential Tenancy Office Compliance and Consumer Services Branch Ministry of Public Safety and Solicitor General Residential Tenancy Office (RTO) Project Summary Report May, 2005 TABLE OF CONTENTS 1

More information

SaaS-Based Budget Planning

SaaS-Based Budget Planning SaaS-Based Budget Planning Advantages over Traditional Models Author: Tom Olson Tom Olson is President and CEO of MyBudgetFile Inc. and former Associate Superintendent of Business and Finance for the Parkland

More information

Common Student Information System for Schools and School Boards. Project Summary

Common Student Information System for Schools and School Boards. Project Summary for Schools and School Boards May 2007 Table of Contents 1. Executive Summary...... 3 2. Project Background, Rationale, Benefits and Scope... 4 3. Procurement Process... 8 4. The Final Agreement. 10 5.

More information

Best Practices in Contract Migration

Best Practices in Contract Migration ebook Best Practices in Contract Migration Why You Should & How to Do It Introducing Contract Migration Organizations have as many as 10,000-200,000 contracts, perhaps more, yet very few organizations

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

RE: ITI s Comments on Korea s Revised Proposed Bill for the Development of Cloud Computing and Protection of Users

RE: ITI s Comments on Korea s Revised Proposed Bill for the Development of Cloud Computing and Protection of Users July 3, 2013 Jung-tae Kim Director Smart Network & Communications Policy Division Ministry of Science, ICT, and Future Planning (MSIP) Via e-mail to: kchu@msip.go.kr RE: ITI s Comments on Korea s Revised

More information

Privacy Matters. The Federal Strategy to Address Concerns About the USA PATRIOT Act and Transborder Data Flows

Privacy Matters. The Federal Strategy to Address Concerns About the USA PATRIOT Act and Transborder Data Flows Privacy Matters The Federal Strategy to Address Concerns About the USA PATRIOT Act and Transborder Data Flows Her Majesty the Queen in Right of Canada, represented by the President of the Treasury Board,

More information

Welcome & Introductions

Welcome & Introductions Addressing Data Privacy and Security Compliance in Cloud Computing Benjamin Hayes, Director of Legal Services, Data Privacy Compliance North America Accenture Copyright 2011 Accenture All Rights Reserved.

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

The PerspecSys PRS Solution and Cloud Computing

The PerspecSys PRS Solution and Cloud Computing THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from

More information

How to do Business with the Province of British Columbia

How to do Business with the Province of British Columbia How to do Business with the Province of British Columbia Every year, the B.C. Government buys a wide range of goods and services from businesses of all sizes and types. Your business could be one of them.

More information

SaaS A Product Perspective

SaaS A Product Perspective SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also

More information

MOVING TO THE CLOUD: Understanding the Total Cost of Ownership

MOVING TO THE CLOUD: Understanding the Total Cost of Ownership MOVING TO THE CLOUD: Understanding the Total Cost of Ownership The most significant cost of owning and managing software applications is tied up in operating and maintaining the software, along with the

More information

Auditing Software as a Service (SaaS): Balancing Security with Performance

Auditing Software as a Service (SaaS): Balancing Security with Performance Auditing Software as a Service (SaaS): Balancing Security with Performance Goals for Today Defining SaaS (Software as a Service) and its importance Identify your company's process for managing SaaS solutions

More information

Rethinking Cybersecurity. Rethinking Cybersecurity. Page 1

Rethinking Cybersecurity. Rethinking Cybersecurity. Page 1 Rethinking Cybersecurity Page 1 Engineering Control, Freedom & Privacy: TABLE OF CONTENTS It s not about the networks, it s about the data. It s the data that s valuable, and it s the data that s risky.

More information

Student Email Service Improvements Executive Background Brief

Student Email Service Improvements Executive Background Brief Student Email Service Improvements Executive Background Brief Executive Summary Despite the ubiquity of consumer email services and the fact that virtually all students coming to York have been using electronic

More information

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

IT Security and Employee Privacy: Tips and Guidance

IT Security and Employee Privacy: Tips and Guidance IT Security and Employee Privacy: Tips and Guidance June 2015 This guidance document gives an overview of the issues employers should consider before implementing IT security tools that collect employee

More information

April 12, 2013. Attention:

April 12, 2013. Attention: Michelle Alexander Director of Policy April 12, 2013 British Columbia Securities Commission Alberta Securities Commission Saskatchewan Financial Services Commission Manitoba Securities Commission Ontario

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

Business Analytics in the Cloud Rapid, Low-cost Deployment for the Enterprise

Business Analytics in the Cloud Rapid, Low-cost Deployment for the Enterprise Business Analytics in the Cloud Rapid, Low-cost Deployment for the Enterprise Mike Biere Rocket Software March 11, 2014 4:30pm 5:30pm Session Number (15315) Grand Ballroom Salon H www.share.org In summary

More information

Four Pillars of Urban Sustainability Submission

Four Pillars of Urban Sustainability Submission Four Pillars of Urban Sustainability Submission Introduction The sustainability of a city can, in part, be measured by the quality of its infrastructure. Physical assets such as roads, sewer lines, transit,

More information

Increasing Sales Through Adoption of the Applied Educational Systems Software as a Service (SaaS) Model

Increasing Sales Through Adoption of the Applied Educational Systems Software as a Service (SaaS) Model Applied Educational Systems SaaS Advantage Increasing Sales Through Adoption of the Applied Educational Systems Software as a Service (SaaS) Model Version 1.0 Engage. Learn. Succeed. www.aeseducation.com

More information

EXECUTIVE SUMMARY OF U.S. APPELLANT SUBMISSION

EXECUTIVE SUMMARY OF U.S. APPELLANT SUBMISSION EXECUTIVE SUMMARY OF U.S. APPELLANT SUBMISSION 1. Introduction. The ETI Panel Report is analytically flawed and expands the meaning of provisions of the SCM Agreement. In addition, the Panel s analysis

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users

RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users August 19, 2012 Korean Communications Commission Via e-mail to: ycs@kcc.go.kr RE: ITI Comments on Korea s Proposed Bill for the Development of Cloud Computing and Protection of Users Dear Director Yang:

More information

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making

More information

How To Manage Revenue Management In The Province Of Britain Colony

How To Manage Revenue Management In The Province Of Britain Colony MINISTRY OF FINANCE REVENUE SERVICES OF BRITISH COLUMBIA REPORT January - December 2008 Table of Contents Overview... 3 Background... 3 Status Update... 4 Contract Objectives... 5 Implementing a Revenue

More information

Drawing Lines in the Cloud: Jurisdictional Access to Data. Nancy Libin Mary Ellen Callahan

Drawing Lines in the Cloud: Jurisdictional Access to Data. Nancy Libin Mary Ellen Callahan Drawing Lines in the Cloud: Jurisdictional Access to Data Nancy Libin Mary Ellen Callahan OVERVIEW Introduction to Cloud Computing Definition Benefits and Risks How does the physical location of data or

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

CIO s Guide to Software-as-a-Service:

CIO s Guide to Software-as-a-Service: THINKstrategies White Paper CIO s Guide to Software-as-a-Service: A Primer for Understanding and Maximizing the Value of SaaS Solutions What is Software-as-a-Service (SaaS)? SaaS is a software deployment

More information

Solutions for Deploying Multi-Architecture EHRs on a Single EHR Educational Portal

Solutions for Deploying Multi-Architecture EHRs on a Single EHR Educational Portal Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.) IOS Press, 2009 2009 European Federation for Medical Informatics. All rights reserved. doi:10.3233/978-1-60750-044-5-167

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

BRIEF TO THE STANDING COMMITTEE ON FINANCE

BRIEF TO THE STANDING COMMITTEE ON FINANCE BRIEF TO THE STANDING COMMITTEE ON FINANCE By Terrance S. Carter (co-authored with Nancy Claridge and Sean Carter) Carters Professional Corporation April 20, 2015 It is a pleasure to receive the invitation

More information

Proudly Presents. Navigating the Cloud Across the US & Canada Border

Proudly Presents. Navigating the Cloud Across the US & Canada Border Proudly Presents Navigating the Cloud Across the US & Canada Border Presenters Rob Groves, B.A., M.B.A., Director, Finance and Business Services, Calgary Catholic School District Rob Groves is the Director,

More information

ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001

ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001 ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001 I. Introduction A longstanding objective of U.S. trade policy has been to open opportunities for U.S. suppliers to compete

More information

Information Sheet: Cloud Computing

Information Sheet: Cloud Computing info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.

More information

A Year in Review: CIHI s 2013 2014 Annual Privacy Report

A Year in Review: CIHI s 2013 2014 Annual Privacy Report A Year in Review: CIHI s 2013 2014 Annual Privacy Report Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated

More information

How Informatica Built and Launched a Successful SaaS Business

How Informatica Built and Launched a Successful SaaS Business How Informatica Built and Launched a Successful SaaS Business A Neovise Case Study, Prepared for Zuora 2011 Neovise, LLC. All Rights Reserved. Being successful with SaaS isn t just about web -based software

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer Problems Faced by Cloud Computing tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

Privacy Law in Canada

Privacy Law in Canada by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually

More information

How To Make A Software Revolution For Business

How To Make A Software Revolution For Business The Software Revolution Salesforce.com Feb, 2000 There is a software revolution going on. This software revolution will fundamentally change the way organizations view enterprise software. This software

More information

LEGAL ISSUES IN CLOUD COMPUTING

LEGAL ISSUES IN CLOUD COMPUTING LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

LEGAL RESTRICTIONS ON TRANSBORDER DATA FLOWS TO PREVENT GOVERNMENT ACCESS TO PERSONAL DATA: LESSONS FROM BRITISH COLUMBIA

LEGAL RESTRICTIONS ON TRANSBORDER DATA FLOWS TO PREVENT GOVERNMENT ACCESS TO PERSONAL DATA: LESSONS FROM BRITISH COLUMBIA LEGAL RESTRICTIONS ON TRANSBORDER DATA FLOWS TO PREVENT GOVERNMENT ACCESS TO PERSONAL DATA: LESSONS FROM BRITISH COLUMBIA Fred H. Cate 1 August 2005 1 Fred H. Cate is a Distinguished Professor of Law,

More information

Making HR Simpler. A Guide to HR Software in the Cloud

Making HR Simpler. A Guide to HR Software in the Cloud Making HR Simpler A Guide to HR Software in the Cloud Index Introduction 3 Everyone Wins 4 What is the Cloud and where does SaaS fit in? 4 What are the benefits? 5 Food For Thought 7 Questions to Ask 8

More information

Labour Mobility Act QUESTIONS AND ANSWERS

Labour Mobility Act QUESTIONS AND ANSWERS Labour Mobility Act QUESTIONS AND ANSWERS Background: Agreement on Internal Trade... 1 Background: Labour Mobility Act... 3 Economic Impacts... 5 Role of Professional and Occupational Associations... 5

More information

Making HR Simpler. A Guide to Software as a Service. Cezanne Software White Paper

Making HR Simpler. A Guide to Software as a Service. Cezanne Software White Paper Making HR Simpler A Guide to Software as a Service Cezanne Software White Paper Contents Introduction... 1 What is SaaS?... 2 What are the Benefits?... 3 Food for Thought... 4 Finding the Right Supplier...

More information

EHR Buyer Beware: Issues to Consider When Contracting with EHR Vendors

EHR Buyer Beware: Issues to Consider When Contracting with EHR Vendors Health Information Technology Practice Management Services EHR Buyer Beware: Issues to Consider When Contracting with EHR Vendors INTRODUCTION Electronic health record (EHR) contracts typically are vendor-favorable.

More information

Accountable Privacy Management in BC s Public Sector

Accountable Privacy Management in BC s Public Sector Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY

More information

UNCLOUDING CLOUD COMPUTING CONCEPTS

UNCLOUDING CLOUD COMPUTING CONCEPTS UNCLOUDING CLOUD COMPUTING CONCEPTS Confounded by cloud computing terminology and related concepts? Let Mikael Ekström be your guide to understanding the terminology, concepts, and the acronyms that permeate

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing

More information

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops July 2009 Table of Contents Introduction... 3 What are Outsourced Hosted Virtual Desktops?... 3 How Outsourced Hosted Virtual

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup WHITEPAPER 7 Reasons Why Businesses are Shifting to Cloud Backup Table of Contents Introduction..1 Internal Resource Efficiency..2 Enhance Security.2 Leverage Deduplication Technology..2 Process Validation

More information

SaaS, PaaS & TaaS. By: Raza Usmani

SaaS, PaaS & TaaS. By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the

More information

Six Common Factors to Consider When selecting a CMS

Six Common Factors to Consider When selecting a CMS By Akshaya Ray, Technical Support Leader, Revize Software Systems When you create a search on the Internet you will find many web content management solutions (also referred to as a CMS content management

More information

White Paper. Are SaaS and Cloud Computing Your Best Bets?

White Paper. Are SaaS and Cloud Computing Your Best Bets? White Paper Are SaaS and Cloud Computing Your Best Bets? Understanding SaaS and Cloud Computing and Service Delivery Options for Real Estate Technology Solutions Joseph Valeri, MBA, MS President, Lucernex

More information

Information Sharing Agreements for Disclosure of EHR Data within Canada

Information Sharing Agreements for Disclosure of EHR Data within Canada Information Sharing Agreements for Disclosure of EHR Data within Canada Prepared for the Pan Canadian Health Information Privacy (HIP) Group Authored by: Elaine Sawatsky, January 2010 Table of Contents

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

Table of Contents. About the book. Copyright. Preface. About the author. Cloud Computing. Amazing Types of Cloud Computing

Table of Contents. About the book. Copyright. Preface. About the author. Cloud Computing. Amazing Types of Cloud Computing Table of Contents About the book Copyright Preface About the author Cloud Computing Amazing Types of Cloud Computing Top Reasons Why Should We Adopt Cloud Pros and Cons of Business Cloud Computing 5 Tips

More information

How To Understand The Benefits Of Cloud Computing

How To Understand The Benefits Of Cloud Computing Issue in Focus: Assessing the Cloud PLM Opportunity Evaluating Benefits, Requirements, and Considerations Tech-Clarity, Inc. 2012 Table of Contents Introducing the Issue... 3 The Cloud Meets PLM... 3 Evaluating

More information

ECPA Reform and the Revolution in Cloud Computing. Testimony of David Schellhase. Executive Vice President and General Counsel. Salesforce.com.

ECPA Reform and the Revolution in Cloud Computing. Testimony of David Schellhase. Executive Vice President and General Counsel. Salesforce.com. ECPA Reform and the Revolution in Cloud Computing Testimony of David Schellhase Executive Vice President and General Counsel Salesforce.com Before The U.S. House of Representatives Committee on the Judiciary

More information

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33 CLOUD COMPUTING NEW TECHNOLOGIES 1 Gokul krishnan. 2 M, Pravin raj.k, 3 Ms. K.M. Poornima 1, 2 III MSC (software system), 3 Assistant professor M.C.A.,M.Phil. 1, 2, 3 Department of BCA&SS, 1, 2, 3 Sri

More information

ISI INTERNATIONAL STRATEGY & INVESTMENT

ISI INTERNATIONAL STRATEGY & INVESTMENT ISI INTERNATIONAL STRATEGY & INVESTMENT Cloud Computing Information Security and Privacy Advisory Board Bill Whyman December 5, 2008 bwhyman@isigrp.com Cloud Computing Is the BIG Change In I.T. Cloud applications

More information

Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance

Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance December 2004 Open Source Software: Recent Developments and Public Policy Implications Open source software has become a topic of great interest in the press and among policymakers. Open source software

More information

How To Address Data Sovereignty In The Cloud

How To Address Data Sovereignty In The Cloud DATA SOVEREIGNTY & THE CLOUD Whitepaper Data Sovereignty & The Cloud Organizations looking to benefit from the scalability, agility, and capital cost savings of cloud computing inevitably encounter the

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Buyers Guide to ERP Business Management Software

Buyers Guide to ERP Business Management Software Buyers Guide to ERP Business Management Software one 1. Introduction When you search for ERP or Enterprise Resource Planning on the web, the sheer amount of information that appears can be overwhelming

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

Cloud Enterprise Content Management

Cloud Enterprise Content Management Table of contents Overview...1 Content-Centric Applications: The Potential and the Challenge...2 Business Process Improvement...2 Cloud: A New Way Forward for ECM...4 The Inevitable Evolution to Cloud

More information

View Point. Oracle Applications and the economics of Cloud Computing. Abstract

View Point. Oracle Applications and the economics of Cloud Computing. Abstract View Point Oracle Applications and the economics of Cloud Computing Mandar Bhale Abstract Cloud computing is making waves in the Enterprise package space as the latest trend in Information Technology.

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Using Managed Services As A Software Delivery Model In Canadian Health Care

Using Managed Services As A Software Delivery Model In Canadian Health Care Using Managed Services As A Software Delivery Model In Canadian Health Care September 9, 2005 Authors: Darren Jones Darcy Matras INTRODUCTION... 3 MANAGED SERVICES DEFINED... 4 MANAGED SERVICES OVERVIEW...

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Cloud Services. More agility. More freedom. More choice.

Cloud Services. More agility. More freedom. More choice. Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud

More information