Overview. What are operational policies? Development, adoption, implementation

Size: px
Start display at page:

Download "Overview. What are operational policies? Development, adoption, implementation"

Transcription

1 Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview and the CGDI Objectives Activities Geospatial Operational Policies What are operational policies? Development, adoption, implementation Recent Outputs Volunteered Geographic Information (VGI) Policy Implications Conclusions 2 1

2 and the CGDI 3 Program The program is a national initiative, led by Natural Resources Canada, designed to facilitate access to and use of authoritative geospatial information in Canada. Program Objectives: Create increased awareness of the benefits of using geospatial data and tools to achieve goals for social, economic and environmental priorities. Facilitate the integration and use of geospatial data to support effective decision making. Coordinate the development of national policies, standards and mechanisms and support their implementation to ensure maintenance and updating of geospatial data and compatibility with global standards. Keep Canada at the leading edge of accessing, sharing and using geospatial information via the Internet. 4 2

3 Program Key Program Activities: Geospatial Strategy and Leadership continued coordination of geomatics activities in Canada, requiring the development and implementation of long-term national geomatics strategies and policies, in partnership with stakeholders. Canadian Geospatial Data Infrastructure (CGDI) work with the geomatics community to advance the operational policies and standards needed to complete the CGDI and support the use of geospatial information. 5 Canadian Geospatial Data Infrastructure (CGDI) What is the CGDI? The CGDI is an online network of resources that improves the sharing, use and integration of information tied to geographic locations in Canada. In essence, the CGDI is the convergence of policies, standards, technologies, and framework data necessary to harmonize all of Canada s location-based information. Through the CGDI, Canadians can discover, access, visualize, integrate, apply and share quality location-based information. The CGDI allows citizens to gain new perspectives into social, economic, and environmental issues and make effective decisions. 6 3

4 and the CGDI What is the connection? is working on integrating the components of the CGDI ensuring that the infrastructure is comprehensive, usable, high-performing, relevant and poised for future growth and development. A complete CGDI includes a comprehensive suite of geospatial operational policies, fully supported and available for adoption and implementation by CGDI s national stakeholders. 7 Geospatial Operational Policies 8 4

5 Geospatial Operational Policies What are Geospatial Operational Policies? Operational Policies address topics related to the lifecycle of geospatial data (i.e. collection, management, dissemination, use). They apply to the day-to-day business of organizations. They include guidelines, directives, procedures and manuals that help facilitate access to and use of geospatial information. They support the development, operation and use of the CGDI. They are distinct from Strategic Policies, which address high level strategic issues and set high level directions for organizations. supports the integration and use of the CGDI and is working to advance the development of geospatial operational policies needed to complete the CGDI, and facilitate their adoption and implementation. 9 CGDI Operational Policy Roadmap Outreach, consultation and awareness Intensify outreach and awareness activities to promote policies, Adoption processes and showcase policy implementations SUPPORT CO-ORDINATE DEVELOP Consensus and common policy for F/P/T Smart, clear guidance and best practices Implementation Support and enable broad implementation and integration of geospatial operational policies Adoption Develop practical adoption processes to ease organizational integration and implementation of common geospatial policy Research and Development Monitor trends, perform research and consultation, develop geospatial operational policies, guidelines, best practices Privacy Licensing Intellectual Property Security Data Quality Data Integration Data Archiving Open Data Confidentiality Digital Rights Management Imagery 5

6 Needs for Operational Policies Key policy topics that impact spatial data infrastructure Legal/Administrative Ethical Legal Practices Confidentiality, Security, and Sensitive Information Privacy Intellectual Property Copyright Licensing Data Sharing Liability Archiving and Preservation Data Quality Technological/Trends Open Data Volunteered Geographic Information (VGI) Open Source Web 2.0 and the GeoWeb Cloud Computing Mobile and Location-based Services High Resolution Imagery Mass Market Geomatics Data Integration 11 Introduction to Geospatial Operational Policies Example Studies and Guides Privacy Public Opinion Research on Geospatial Privacy International Comparative Analysis of Geospatial Privacy Geospatial Privacy Awareness and Risk Management Guide for Federal Agencies Confidential and Sensitive Information and Security Best Practices for Sharing Sensitive Environmental Geospatial Data A Guide to Improved Emergency Management Confidential Business Information (i.e. Critical Infrastructure) 12 6

7 Introduction to Geospatial Operational Policies Example Studies and Guides Geospatial Data Policy Inventory and Classification Intellectual Property and Licensing IP Law Backgrounder Review of IP Law and Instruments (Copyright, Licensing) in the Context of Geospatial data The Dissemination of Government Geographic Data in Canada: Guide to Best Practices, Version 2 Geospatial Data Archiving and Preservation Archiving, Management and Preservation of Geospatial Data report Volunteered Geographic Information Volunteered Geographic Information (VGI) Primer 13 Introduction to Geospatial Operational Policies Example Studies and Guides Data Sharing and Integration Guide to Anonymizing Geospatial Public Health Information A Managers Guide to Public Health Geomatics Good Practices Guide - Success in building and keeping an Aboriginal mapping program Framework Data Guide Good Practices in Regional-Scale Information Integration How to Share Geospatial Data Cloud Computing 14 7

8 Volunteered Geographic Information (VGI) Primer 15 Volunteered Geographic Information (VGI) Primer 16 8

9 Volunteered Geographic Information (VGI) Primer Introduces key issues in geospatial operational policy, imperative to the success of any venture into VGI. Discusses the emerging trend of VGI and areas of related operational policy. Draws on good practices and lessons learned from Internet research and three Case Studies of VGI in use. 17 Volunteered Geographic Information (VGI) Primer Introduction to VGI 18 9

10 Volunteered Geographic Information (VGI) Primer Issues to address in quality benchmarking (Coleman et al, 2009) How to assess the credibility of a contributor How to assess the accuracy of VGI contributions (e.g., in-house quality assurance, a moderated on-line community, or the public) The best and quickest means of delivering credible input The control over content and quality given to contributors Decision-making on acceptability of updates Factors to help determine contributors credibility Location of contributed data versus location of contributor s IP address Timing of data contributions versus independent information (e.g., timing of the contribution of a new road feature compared to independent road construction reports) The degree of conformity between the same data element or attribute that has been submitted by multiple contributors 19 Volunteered Geographic Information (VGI) Primer Lessons learned regarding professional vs. amateur VGI contributors (Case Studies) In densely populated areas, contributions from amateurs produce data of equal quality to professionally produced data Using data custodians to vet VGI-notified changes can greatly enhance data quality Benchmarking VGI performance can improve throughput and help to isolate problem areas Patterns of individual user behaviour can be accessed if necessary for investigating malicious users who are damaging the quality of data Proper data preservation and archival methods (Case Studies) In data model design, use persistent identifiers for all features, so that feature changes over time can be easily tracked Store full details of each addition, deletion or change of features that is derived from VGI, including the identity of the contributor Ensure that data is fully backed up, either in singular offsite facilities or across multiple site locations, and can be accessed in the long term 20 10

11 Volunteered Geographic Information (VGI) Primer Ways to mitigate the risks of legal problems Require VGI contributors to confirm that they have the rights to contributed data and that they will indemnify the organization for any damages arising from law suits relating to the data Recognize contributions by posting names of contributors, while protecting privacy by not linking specific contributions to names Ensure that contributor and user license terms are consistent Rapidly remove any content that may potentially infringe copyright or privacy

12 23 Intended to assist CGDI stakeholders to better understand the emerging trend of cloud computing (CC) and areas of related operational policy. Policy areas include: security, privacy and confidentiality, copyright and licensing, legal/liability, archiving and preservation, and regulation and standards. Involved Internet research and two case studies of current, realworld instances of CC, to identify lessons learned and good practices in geospatial operational policies that help enable CC

13 Cloud Computing Deployment Options The figure below illustrates the types deployments and their associated levels of trust, from a data privacy and security perspective, and the relative cost/complexity levels. Solutions on the left are Internet-based, and those on the right reflect an increasing reliance on private or dedicated Intranet implementations. 25 Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Kinds of Security Risks in the Cloud Account, Service & Traffic Hijacking Complexity Delegation of Authority Encryption Challenges Unknown Risk Profile In a Trend Micro survey of 1,200 decision makers in May 2011, 43% globally (38% in Canada) who were using a cloud computing service reported a data security lapse or issue that year

14 Security Risk Mitigation Good Practices Opt for private clouds behind firewalls, on-premises, to control privacy, security and authentication issues. Insist that data not be stored on servers located in jurisdictions where there are concerns about security breaches. Implement security everywhere (e.g., encrypted transport into the cloud, secure coding and access control inside applications, etc.), rather than the normal perimeter approach to security. Ensure that all APIs and data sources are checked with penetration tests and thoroughly analyzed. Develop a policy statement and training materials covering the types of information allowed on CC services, and establish a process for conducting security reviews according to the policy. Strip off attributes related to sensitive data before sending geospatial data to the cloud. 27 Privacy and Confidentiality Risks in the Cloud Terms of service and privacy policy can vary significantly depending upon the CC provider. Disclosure of information to a cloud provider privacy and confidentiality rights, obligations, and status may change with disclosure. Legal status and protections disclosure and remote storage may have adverse consequences for personal or business information. Location of information in the cloud may have significant effects on information privacy and confidentiality protections and on privacy obligations. Legal obligations cloud providers may be required to examine user records for evidence of criminal activity and other matters. Legal uncertainties assessing the status of information in the cloud, as well as the privacy and confidentiality protections available to users, is difficult. Creation of new data streams CC providers may not use data for purposes beyond those for which consent was originally given. Intrusions into individuals data CC providers or cloud-based applications may be able to access, mine or otherwise commoditize the data they hold

15 Privacy and Confidentiality Risk Mitigation Good Practices Ensure that privacy staff are involved early in the process, to make certain that the privacy rights of individuals are identified and recognized and the potential risks when using cloud computing are addressed. Involve privacy staff in the evaluation of information moving to the cloud, the proposed service delivery model, the CC provider s proposal before a contract award takes place, and other areas of concern with specific legislation. Employ technologies to ensure privacy protection Data encryption prior to uploading to the cloud Hardware-based security initiatives such as the Trusted Platform Module Privacy verification services such as TRUSTe 29 Potential Legal/Liability Issues With Cloud Computing Contracts CC providers are notoriously inflexible on changes to their standard terms and conditions of service. SLAs often use vague language and narrow definitions regarding service guarantees, access to service quality statistics, dispute resolution, etc. Key issues with CC contracts: Cloud Contracting Issues Data ownership and access Loss of data Data integrity Data retention Licenses Privacy Representations, warranties and limitations Audits, certifications and inspections Indemnities Security Jurisdiction Contract changes ediscovery and Computer Forensics Dispute resolution 30 15

16 The choice of cloud model may be influenced by regulatory compliance considerations, such as: Business continuity and disaster recovery Security standards (e.g., ISO 27001) Logs and audit trails Payment Card Industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA) in the US PIPEDA in Canada Compliancy requirements may limit organizations to hybrid or community cloud solutions, losing the full benefits of cloud use. Lack of CC standards presently may result in vendor lock-in. Recognition of the importance of standards has resulted in an array of cloud computing standards setting activities and bodies. 31 Implications of CC for SDI Benefits Emergence of geospatial CC will increase technology adoption and generate increased demand for high quality data. As the market continues to shift from prominence of professional users to non-professional users, web services access to data will replace data download as the primary consumption mode. SDI organizations are well-positioned to address this demand. Risks Operational policy challenges are relevant for SDI use of CC (especially security, and protection of personal, confidential and sensitive data). SDIs weak in providing data access via web services will not be able to meet growing demand in geospatial CC solutions for temporary use of data. Lack of CC standards may pose problems for SDI operations (i.e., vendor lock-in and interoperability issues)

17 Conclusions Canada has an operational SDI which is being used to support organizational operations and decision-making. Emphasis has now shifted to addressing some of the key challenges to the use of the CGDI and geospatial information more generally, and the impacts of emerging technologies, through the development of operational policies. During the next year, efforts will be directed to outreach and engagement with CGDI stakeholders and assistance with operational policy adoption and implementation. This presentation has provided a brief glimpse into operational policy work by highlighting the contents of two guidance documents. 33 For information on evolving Geospatial Operational Policy development, contact: Division Mapping Information Branch Natural Resources Canada 615 Booth Street Ottawa, Ontario K1A 0E9 [email protected] Tel: Fax:

Strategic Activities to Support Sustainability of Canada s Geospatial Data Infrastructure

Strategic Activities to Support Sustainability of Canada s Geospatial Data Infrastructure Strategic Activities to Support Sustainability of Canada s Geospatial Data Infrastructure Paula McLeod Canada Centre for Mapping and Earth Observation United Nations 10 th Regional Cartographic Conference

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Best practices and guidelines for the development of SDI

Best practices and guidelines for the development of SDI Best practices and guidelines for the development of SDI Spatial Data Infrastructure Manual for the Americas Paula McLeod GeoConnections Canada Centre for Mapping and Earth Observation Natural Resources

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

The Challenges of Geospatial Analytics in the Era of Big Data

The Challenges of Geospatial Analytics in the Era of Big Data The Challenges of Geospatial Analytics in the Era of Big Data Dr Noordin Ahmad National Space Agency of Malaysia (ANGKASA) CITA 2015: 4-5 August 2015 Kuching, Sarawak Big datais an all-encompassing term

More information

Assessing Risks in the Cloud

Assessing Risks in the Cloud Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research

More information

Information Technology Internal Audit Report

Information Technology Internal Audit Report Information Technology Internal Audit Report Report #2014-05 July 25, 2014 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope and Testing

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Cloud Computing Questions to Ask

Cloud Computing Questions to Ask Cloud Computing Questions to Ask Pursuant to the Federal Cloud Computing Strategy 1 and the Cloud First policy, agencies are required to evaluate safe, secure cloud computing options before making any

More information

Data Storage Security, Cloud Computing and Virtualization

Data Storage Security, Cloud Computing and Virtualization Data Storage Security, Cloud Computing and Virtualization What You Think You Know Can Hurt You 1 The 8 Fallacies of Distributed Computing 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Best Practices for Choosing a Content Control Solution

Best Practices for Choosing a Content Control Solution Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

SERENA SOFTWARE Serena Service Manager Security

SERENA SOFTWARE Serena Service Manager Security SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Practice Resource. Cloud computing checklist. Introduction

Practice Resource. Cloud computing checklist. Introduction Practice Resource Cloud computing checklist Cloud computing offers many benefits to lawyers including the ability to access an exploding array of new software services and applications, the offloading

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES

DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES From This article focuses on common pitfalls when implementing a DLP solution to secure your organizational information assets. The article also lists

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

ACOT WEBSITE PRIVACY POLICY

ACOT WEBSITE PRIVACY POLICY ACOT WEBSITE PRIVACY POLICY Our commitment to privacy acot.ca (the Website ) is a website owned and operated by The Alberta College of Occupational Therapists ( ACOT ), also referred to as we, us, or our

More information

Cloud Computing: Risks and Auditing

Cloud Computing: Risks and Auditing IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG

More information

Negotiating EHR Acquisition Contracts

Negotiating EHR Acquisition Contracts Negotiating EHR Acquisition Contracts Key Strategies, Terms and Conditions Louisa Barash, Esq. & Jane Eckels, Esq. The Art and Skill of Negotiations Painful Contract Negotiations Take too long Are too

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

LEGAL ISSUES IN CLOUD COMPUTING

LEGAL ISSUES IN CLOUD COMPUTING LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

I. Introduction to Privacy: Common Principles and Approaches

I. Introduction to Privacy: Common Principles and Approaches I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.) Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening

More information

White paper Reaping Business Value from a Hybrid Cloud Strategy

White paper Reaping Business Value from a Hybrid Cloud Strategy White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

STATE OF NEW JERSEY Security Controls Assessment Checklist

STATE OF NEW JERSEY Security Controls Assessment Checklist STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring

More information

TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT. Key Concepts Defined. Key Concepts Defined 4/30/2015

TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT. Key Concepts Defined. Key Concepts Defined 4/30/2015 TRENDS AND DEVELOPMENTS IN INFORMATION GOVERNANCE AND RECORDS MANAGEMENT William Saffady (718) 246-4696 [email protected] Key Concepts Defined Governance the process or system by which an organization s

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Legal Cloud Computing: Concepts and Ramifications

Legal Cloud Computing: Concepts and Ramifications Legal Cloud Computing: Concepts and Ramifications April 27, 2010 Sébastien Lapointe, Holmested & Associés s.e.n.c. Legal Aspects of Cloud Computing Normal businesses using cloud computing ( CC ) face a

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Key Considerations of Regulatory Compliance in the Public Cloud

Key Considerations of Regulatory Compliance in the Public Cloud Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Page 1 of 15. VISC Third Party Guideline

Page 1 of 15. VISC Third Party Guideline Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information