Resolution on Consumer Protection in Cloud Computing
|
|
|
- Thomas Sherman Chapman
- 10 years ago
- Views:
Transcription
1 DOC NO: INFOSOC DATE ISSUED: JUNE 2011 Resolution on Consumer Protection in Cloud Computing Consumers, businesses and governments are increasingly using cloud computing services to store and share data. These services can offer users many benefits such as a large storage capacity, convenient access from any computer, and a high level of security. Use of cloud computing services by governments and businesses can reduce their expenditures for hardware and software, and the resulting savings may be passed along to taxpayers and consumers. However, the use of cloud computing services for data pertaining to consumers also raises many concerns. These concerns center mainly on control of the data: Who has access to it? How can it be used? How easy is it to move one s data from one cloud service to another? How secure is the data? Who is responsible if the data is lost or abused? Unresolved, these concerns are likely to prevent the widespread adoption of these valuable and efficient services. Therefore, governments and businesses must adopt policies that protect consumers with regard to law enforcement access to their data in the cloud, secondary uses of their data, portability and interoperability, data security, data deletion, transparency, and terms of use. Recommendations The Trans Atlantic Consumer Dialogue resolves that the governments in the United States and Europe should require these protections for business-to-consumer cloud computing services: 1. Data that consumers store in the clouds should have the same legal protections with regard to access by governments and others as it would if it was stored on their own computers. To the extent appropriate, consumers should receive notice of criminal and civil requests for data that is stored with cloud computing services before such requests are fulfilled. 2. Cloud computing services should not use or allow others to use consumers data for secondary purposes without first clearly explaining to consumers how it will be used and by whom and obtaining their express affirmative consent. Secondary use should be limited to those purposes for which consumers have provided such consent. 3. Cloud computing services should not be allowed to exploit the physical locations of their servers in order to limit consumers rights concerning the privacy and security of their data. 4. Cloud computing services should not interfere with consumers ability to move their data to another service or to use their data in an interoperable manner with other services.
2 5. Cloud computing services should be required to meet and demonstrate that they maintain adequate security standards to protect consumers data. Compliance with security measures should be monitored through independent auditing. Consumers should be provided with information about the security of their data and given the means to safeguard their data through tools such as encryption for which only the consumers themselves have the keys. 6. Consumers should have the right to delete the data that they had provided to cloud computing services for storage. 7. Cloud computing services should be required to be transparent about how they operate, what legal protections apply to consumers data, and whom to contact to ask questions or make complaints. 8. Cloud computing services should be prohibited from using unfair contract terms such as requiring consumers who use free services to agree to a lower level of protection than those who pay or requiring that consumers give up the right to take legal action to resolve disputes. 9. Cloud computing services should be required to provide consumers with clear information on redress and compensation in the event that their data is lost, shared or stolen and with easy- to- use methods for making such claims. The Trans Atlantic Consumer Dialogue also urges businesses and governments that outsource individuals data to the cloud to consider these issues and ensure that their contracts for cloud computing services provide for adequate protection. In these instances, businesses and governments should be fully accountable to those individuals for the privacy and security of their data. Background Cloud computing has been defined as the sharing and storage by users of their own information on remote servers owned and operated by others and accessed through the Internet or other connections. 1 There are many popular cloud-based consumer services available in the U.S. and the EU, including webmail (such as Gmail and Hotmail), photo sharing websites (such as Flickr), and social networking sites (such as Facebook, MySpace and Badoo). Convenience is a major reason why consumers use cloud computing; it enables them to access their data from any computer and share it with others easily. 2 Cloud computing services can also protect consumers from loss of data if their computers fail and may offer better data security than they have on their own computers. While the use of cloud computing services can benefit consumers, it also raises many concerns. These concerns focus mainly on control of the data. Once consumers data is entrusted to a cloud computing service, it may be accessed and used by the cloud service provider or third parties for a variety of purposes unrelated to fulfilling the services that the consumers have requested. Consumers may have no idea, however, that their data may be accessible to parties 1 See World Privacy Forum, Cloud Computing and Privacy, 2 John Horrigan, Use of Cloud Computing Applications and Services, Pew Research Center s Internet & American Life Project,
3 to whom they have not specifically provided it, for uses beyond the purposes for which it was originally given. For instance, the data may be sought by the government or others for criminal or civil litigation, or cloud service providers may want to access consumers data for their own commercial use or to sell it to others. 3 In the U.S., federal law does not provide adequate protection for the privacy of data in the cloud. While data stored in a consumer s own hard drive is protected from government access by Fourth Amendment rights, requiring a judge s permission in most cases, the same data may lose that protection when transferred to a third party such as a cloud computing service. In a report for the World Privacy Forum, Bob Gellman describes the confusing legal landscape under the Electronic Communications Privacy Act of 1986 as it applies to current Internet activities. 4 He also points out that since the U.S. lacks an overarching legal privacy framework and relies on a narrow sectoral approach, consumers may have no rights concerning the secondary use and sharing of the data that they place in the cloud. While in Europe the EU Data Protection Directive 5 and the Directive on privacy and electronic communications 6 provide a comprehensive privacy framework, the European Network and Information Security Agency (ENISA) recommended in its recent cloud computing risk assessment that European officials should determine how the data protection laws apply to cloud computing services. 7 Consumers are clearly concerned about the privacy of their data in the cloud. According to one survey, 8 90 percent of respondents said that they would be very concerned if cloud providers sold their files to others, and 80 percent said they would be very concerned if the service used their photos and other information for marketing. Sixty-eight percent said they would be very concerned if the data was used to tailor advertisements to them. Data that consumers store in the clouds should have the same legal protections with regard to access by government and others as it would if it was stored on consumers own computers. To the extent appropriate, consumers should receive notice of criminal and civil requests for data that they have stored with cloud computing services before such requests are fulfilled. Furthermore, consumers data should not be used by cloud computing services or others for secondary purposes without first explaining those uses and obtaining consumers express affirmative consent. Portability is also an important consumer concern. While there may be no contractual barrier to switching from one cloud computing service to another, providers could use proprietary formats or employ technical obstacles to make it difficult to do so. For instance, a consumer might be required to select each file individually to download. For consumers who have spent years uploading data, this could effectively make the service non-portable, locking them in and 3 See Alan Weissberger, ACLU Northern CA: Cloud Computing Storm Warnings for Privacy? Viodi View, 4 Bob Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, 2009, See 8 See fn 2 supra.
4 threatening competition. Interoperability is a related issue; unless standardized data formats are used, it might be hard for consumers to use data that they have customized on one service with another service. Cloud computing services should not interfere with consumers ability to move their data to another service or to use their data in an interoperable manner with other services. Once consumers entrust their data to the cloud, they must rely on the cloud service provider to keep it secure. One potential benefit to consumers is that the security that the cloud service provider employs may be even stronger than they have on their own computers. Consumers can have no confidence about the security of cloud services, however, unless those services are required to meet adequate security standards and to be independently audited on a regular basis to ensure compliance. Cloud computing services should provide consumers with information about their security. In addition, cloud computing services should provide consumers with the means to safeguard their data through tools such as encryption for which only the consumers themselves have the keys. While the location of the servers that cloud computing services use can actually enhance the protection of consumers data, cloud computing services should not be allowed to exploit the physical locations of their servers in order to limit consumers rights concerning the privacy and security of their data. Consumers should have the right to delete data that they upload to the cloud. To address the fact that sometimes consumers regret deleting data, the Norwegian Consumer Council s best practices standard for cloud storage of photographs may serve as a good model: it recommends that customer files and metadata be quarantined for a period before actually being deleted. 9 Transparency is a guiding principle for all consumer transactions: consumers cannot make informed choices without understanding exactly what is being offered and on what terms. Many cloud services terms of service, however, are unclear and missing important information. 10 Information about cloud services business models is also important; if services are based primarily on monetizing the secondary use of consumers data that should be made clear. Other key information that should be provided includes what countries laws apply, who the primary regulatory agencies are, what the termination policy is, and whom to contact if consumers have questions or complaints. 11 This information should be prominently disclosed in clear, easy to understand language. Another concern is the fairness of terms of service. Many consumer contracts, including those for cloud computing, are one-sided agreements in which the providers disclaim any liability if things go wrong, reserve the right to change terms unilaterally, and require that disputes be resolved through privately-operated arbitration that is binding on consumers. 12 Unfair contract terms for cloud computing services should be prohibited. For instance, cloud service providers 9 See 10 Simon Bradshaw, Christopher Millard, and Ian Walden, Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services, Queen Mary School of Law Studies Research Paper No. 63/2010, 11 See model disclosure form in Appendix B, Consumer Protection in Cloud Computing Services: Recommendations for Best Practices from a Consumer Federation of America Retreat on Cloud Computing, November 2010, 12 See fn 7 supra.
5 should not be allowed to disclaim responsibility if they lose consumers data, or to suddenly terminate services without notice and giving consumers sufficient time to retrieve their data. Furthermore, terms of service should not require consumers who use free services to agree to a lower level of protection than those who pay or require that consumers give up the right to take legal action to resolve disputes. Cloud computing services should provide consumers with clear information on redress and compensation in the event that their data is lost, shared or stolen and with easy- to- use methods for making such claims.
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act
International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
BEUC s contribution on Cloud Computing for the Public Hearing in the ITRE Committee, European Parliament, 29 May 2013
BEUC s contribution on Cloud Computing for the Public Hearing in the ITRE Committee, European Parliament, 29 May 2013 Contact: Digital and Consumer Contracts Teams [email protected] - [email protected]
Ford & Thomas Insurance Agency
Ford & Thomas Insurance Agency PRIVACY POLICY NOTICE (As of February 14, 2012) PURPOSE OF THIS NOTICE As provided by law, we are generally prohibited from sharing nonpublic personal information about you
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
SAMPLE RETURN POLICY
DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Consumer Confidence Trustmarks
Consumer Confidence Trustmarks September 14, 2001 Issue Chair Contact Point (Europe/Africa) Contact Point (Asia/Oceania) Carleton S. Fiorina Chairman & CEO Hewlett-Packard Dr. Klaus Mangold CEO DaimlerChrysler
PRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Privacy Policy documents for
Privacy Policy documents for Praendex Incorporated doing business as PI Worldwide Product User Privacy Policy - For Customers, as well as those invited to our websites to complete a PI Survey or SSAT General
Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)
Role of contracts in Cloud Computing an Overview Kevin McGillivray Doctoral Candidate (NRCCL) Barriers/Challenges to Cloud Transparency Compliance Legal Shared infrastructure Subcontractors (and their
PRIVACY POLICY. Last updated February 2, 2009 INTRODUCTION
PRIVACY POLICY Last updated February 2, 2009 INTRODUCTION This Privacy Policy explains how personal information about you may be collected, used, or disclosed by the Canadian Education and Research Institute
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
FISHER & PAYKEL PRIVACY POLICY
FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament
September 5, 2012 Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament Lara Comi Rapporteur, Committee on Internal market and Consumer Protection
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
What Personally Identifiable Information does EducationDynamics collect?
EducationDynamics, LLC GradSchools.com Privacy Policy Thank you for visiting GradSchools.com (hereinafter referred to as the Site ), which is owned and/or operated, in whole or in part, by EducationDynamics,
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH
A. Overview PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH GENERAL COUNCIL ON FINANCE AND ADMINISTRATION OF THE UNITED METHODIST CHURCH, INC., an Illinois corporation 1 Music
Insights into Cloud Computing
This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid
Privacy Policy Last Modified: April 3, 2015 1
Privacy Policy Last Modified: April 3, 2015 1 Introduction Jamberry Nails, LLC, a Utah limited liability company, U.S.A., (referred to herein as Jamberry, we, us and our ) understands the importance of
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
RezScore SM Privacy Policy
RezScore SM Privacy Policy Last updated: August 19, 2011 Thank you for using RezScore.com. We are committed to protecting your privacy and, for that reason, we have adopted this Privacy Policy to memorialize
Joint Innovate UK and CW Legal SIG Event - Internet of Things Workshop - 17th March 2015. Contracting for IoT
Joint Innovate UK and CW Legal SIG Event - Internet of Things Workshop - 17th March 2015 Contracting for IoT Professor Ian Walden Institute of Computer and Communications Law Centre for Commercial Law
EXHIBIT C BUSINESS ASSOCIATE AGREEMENT
EXHIBIT C BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT is made and entered into by and between ( Covered Entity ) and KHIN ( Business Associate ). This Agreement is effective as of, 20 ( Effective Date
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
CPA Global North America LLC SAFE HARBOR PRIVACY POLICY. Introduction
CPA Global North America LLC SAFE HARBOR PRIVACY POLICY Introduction CPA Global North America LLC ( CPA Global ) is the US affiliate of the world's leading intellectual property (IP) management and IP
DISCLAIMER HEALTH INFORMATION PRIVACY POLICIES & PROCEDURES
DISCLAIMER This web site is provided for information and education purposes only. No doctor/patient relationship is established by your use of this site. No diagnosis or treatment is being provided. The
ONLINE PRIVACY POLICY
ONLINE PRIVACY POLICY The City of New Westminster is committed to protecting your privacy. Any personal information collected, used or disclosed by the City is in accordance with the Freedom of Information
Type of Personal Data We Collect and How We Use It
Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
PRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview
PRIVACY POLICY The effective date of this Privacy Policy is December 15, 2010 Last Updated September 29, 2014 Overview The Bay Area Toll Authority (BATA) is committed to ensuring customer privacy and security.
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security
Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,
Jerry M. Ruhl Ph.D. Clinical Psychologist (Texas #34359) 5200 Montrose Blvd. Houston, TX 77006
Jerry M. Ruhl Ph.D. Clinical Psychologist (Texas #34359) 5200 Montrose Blvd. Houston, TX 77006 CELL (937) 684-7746 PLEASE USE THIS NUMBER TO SCHEDULE OR CHANGE APPOINTMENTS INFORMED CONSENT FOR TREATMENT
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
BUSINESS TERMS AND CONDITIONS FOR USE OF MONKEYDATA SERVICE
BUSINESS TERMS AND CONDITIONS FOR USE OF MONKEYDATA SERVICE 1. CONTRACTING PARTIES 1.1. Provider: (hereinafter "BTC ) MonkeyData s.r.o. Business ID: 02731452, Tax Identification Number: CZ2731452 Registered
Resolution on E-commerce
DOC NO: INFOSOC 40-09 DATE ISSUED: DECEMBER 2009 Resolution on E-commerce The growth of e-commerce and the emergence of new forms of virtual commercial transactions such as mobile commerce, online auctions
PointCentral Subscription Agreement v.9.2
PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development
Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development RECOMMENDATION OF THE OECD COUNCIL CONCERNING GUIDELINES FOR CONSUMER PROTECTION IN THE
Contracting for Cloud Computing
Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 [email protected] April 5th 2011 Mayer Brown is a global legal services organization comprising legal
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
APPMACHINE MOBILE PRIVACY STATEMENT. Version, May 29, 2015
APPMACHINE MOBILE PRIVACY STATEMENT Version, May 29, 2015 The privacy of all of our Users is very important to AppMachine and the AppMachine App-builders (hereto referred to as App-owner). When you, as
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information
Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January
Appendix A: Rules of Behavior for VA Employees
Appendix A: Rules of Behavior for VA Employees Department of Veterans Affairs (VA) National Rules of Behavior 1 Background a) Section 5723(b)(12) of title 38, United States Code, requires the Assistant
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information.
PRIVACY POLICY Our privacy policy discloses how we gather and use your data. In short we do not collect sensitive personal information. A) Market Simplified' commitment to privacy This website is administered
Terms and Conditions
Terms and Conditions The use of angieavardturnerlaw.com, including all materials online and all services provided by Angie Avard Turner Law, LLC (hereafter Angie Avard Turner Law), is subject to the following
PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]
[Insert Date of Policy] PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS of [ABC SCHOOL] Address Independent schools in British Columbia are invited to adopt or adapt some or all of this
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT
SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT This SOFTWARE LICENSE AND NON-DISCLOSURE AGREEMENT ( Agreement ) is between Drake Software, LLC ( Drake ) and Licensee (as defined below). PLEASE READ THIS
Privacy Policy. Effective Date: November 20, 2014
Privacy Policy Effective Date: November 20, 2014 Welcome to the American Born Moonshine website (this Site ). This policy describes the Privacy Policy (this Policy ) for this Site and describes how Windy
Agreement for 2015 S Corporation Income Tax Preparation
Agreement for 2015 S Corporation Income Tax Preparation Dear Client: We will prepare the federal, resident state and city S-corporation income tax returns for for the year ended December 31, 2015 and we
HCAOG Records Retention Policies & Procedures
HCAOG Records Retention Policies & Procedures Draft September 2015 HUMBOLDT COUNTY ASSOCIATION OF GOVERNMENTS 611 I Street, Suite B Eureka, CA 95501 www.hcaog.net RECORDS MANAGEMENT These procedures are
