XIT CLOUD SOLUTIONS LIMITED
|
|
|
- Suzanna Hicks
- 10 years ago
- Views:
Transcription
1 DISCLOSURE STATEMENT PREPARED BY XIT CLOUD SOLUTIONS LIMITED AS AT 06 December 2013
2 1 Introduction For an organisation to be a CloudCode Signatory they must wholly disclose the following information to all clients, both prospective and current, before, during and after the sales process. They must update their Disclosure Document and inform the Register of CloudCode Signatories of these changed disclosures as soon as possible and not later than 28 days after the change is made. Where the change has a material effect on the Cloud product or service being provided, they must notify all clients of these changes. The CloudCode website provides more information of what constitutes a material change. The standard areas of disclosure required by the CloudCode are: 1. Corporate Identity Company name:... XIT CLOUD SOLUTIONS LIMITED Company Registration Number: Trading name:... XIT CLOUD SOLUTIONS LIMITED Physical address: LONG STREET, WOOLSTON, CHRISTCHURCH Postal address:... PO BOX , PHILLIPSTOWN, CHRISTHURCH Company website:... Contact phone number: Contact address:... [email protected] Complaints about our service can be made in the first instance to: [email protected] Contact person responsible for these disclosure statements can be contacted via the following address: [email protected] The disclosures herein apply to the following products or services supplied by us: Domain Hosting as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud-domainservices.html VOIP Services as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud-voip-services.html Server Hosting as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud-serverhosting.html Application Hosting as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud-applicationhosting.html Hosting as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud- -hosting.html Online Backups as described at: xitcloud.com/cloud-solutions-christchurch-xit-cloud-onlinebackup.html For the purpose of Legal Jurisdiction, the contracted supplier who provides the service to you is a Company registered in New Zealand The governing law of our contract with you is New Zealand Law The disclosure statements that follow have been Self-Assessed CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 2
3 2. Ownership of Information We do not claim ownership of any data or information uploaded to our service. Your data and information may traverse or be stored on our upstream provider s networks or systems. In these instances that provider considers the data and information that you use or transmit via our service as owned by the client Metadata and other statistical information, such as anonymised data generated as a result of the use of our service, is owned by the service provider and is used for the purposes of improving our service to you. 1. Security As at the date of application: We are not listed on the CSA STAR Registry. We do not formally meet any security related standards We have the following physical security in place at the data center s hosting your data: 24 hour / 7 day monitored alarm After hours security monitoring Onsite staff 24 hours CCTV Recordings We have the following digital security in place on the systems hosting your data: Centrally managed antivirus. Centrally managed Microsoft software updates. SSL/TLS encrypted communications, Access event logging. and internet anti-spam and anti-virus protection. Complex password policies 2. Data Location Our primary systems that host your data are located in Christchurch Our Backup/Disaster recovery systems that hold your data are located Christchurch Additional information about data location: Additional offsite backup is also located in Christchurch 3. Data Access and Use Data access by you: Your data may be accessed during the contract period as described in our contract with you. Your data can be downloaded from our service during the service provision period via the following formats native format or other format requested by you At the cessation of our service to you, your data will be available to access o o Access to this data will be granted via your username and password There may be additional charges for access to your data after the service has been ceased CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 3
4 Data access by us: Deletion of all customer data at the cessation of our service to you takes place after the agreed period of time. We use customer data for the following business functions: We do not use data for any business function We do not access customer data for any other purpose We do not use customer data in order to generate revenue other than through provision of the service. Data access by others: If we are approached by law enforcement agencies it is our policy to. assist with New Zealand Law as directed We do not provide access to customer data to third parties other than law enforcement agencies as set out above. 4. Backup and Maintenance Understanding the backup procedures of your service provider and their maintenance policies allows the customer to make decisions on what further steps they may need to ensure their data is backed up sufficiently. Backups are performed every day. Backups include (tick those that apply) system data client data statistical data operating system data other Full system image, exchange backup and key Data (eg Word / Excel Document s / etc Backup data is stored offsite Where backup data is stored offsite, the offsite location is 12. km from the location of the data being backed up CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 4
5 We test the restoration of backup data every 3 months and the test is conducted: We perform a full restore. Access to backup data or archive data is available via a service request Adhoc requests for restoration of customer data will be commenced within 4 hours We do allow client audits of backup data, costs of which will be carried by the client directly Backup data is retained for 4 weeks We do undertake a regular maintenance programme to ensure the reliability and stability of our cloud resources We do a regular maintenance programed to ensure the reliability and stability of our service offerings. 5. Geographic Diversity Our service is not provided via multiple locations Our services are provided from the following locations: New Zealand We operate offices in the following countries: New Zealand 6. SLA and Support This section sets out the standard support mechanisms and service level agreements that apply to services. Our standard support hours are. 8:00am to 5:30pm Monday to Friday (local time unless stated otherwise). In the event of an unscheduled outage or incident, we will communicate the details of the issues and expected resolution times via phone or via text message CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 10
6 When communicating an issue to us we prefer you to do so via phone. Our standard response time to any support issue raised is 60 Minutes In the event of a major incident, we will update our notifications every hour. When communicating with you we will use either phone or We do make incident reports available to our clients after a major incident. We may shut down or isolate any service offering that is impacting, or will impact, service level agreements. We may require service offering specific tools to enable safe service offering shutdown or isolation if needed. We operate an active/activebased service. Additional information about SLA s and support: Support outside of our normal hours is possible by leaving a message on our answering service. All messages are sent electronically to the support team 7. Data Transportability An API is not relevant to the service we offer. Data will be available to download after we cease supplying service to you (if data is available post service cessation, then the following statement will apply) Data can be obtained via appointment There may be additional charges associated with accessing data after your service has ceased. 8. Business Continuity Multiple UPS s / Battery Back up units with approx. 45 minutes uptime before a generator is required. Generator in case of power failure for long periods of time 9. Data Formats All client data can be exported at any stage of the service delivery in the following formats: Native file format 10. Ownership of Application The source code for the application that you use on our service is not available to license on your systems outside of our service provision. It will be possible to use your data downloaded from our systems in its native form outside of our service (i.e. your local network) by acquiring the appropriate Microsoft operating system and application software licenses or any relevant Microsoft services. 11. Customer Engagement We do allow the auditing of our services by customers We do not have an acceptable use policy that is applicable to the services stated in section 5.2. CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 6
7 We do not operate a Privacy Policy. 12. Data Breaches If we discover that your data has been lost or compromised, we will always notify you as soon as practicable by phone and , unless that notification would compromise a criminal investigation into the breach. please state conditions When we are in possession of evidence of criminal activity associated with the breach (such as evidence of hacker activity) we will always notify appropriate law enforcement agencies. (If sometimes, please state conditions 13. Law Enforcement When requested by appropriate law enforcement agencies to supply customer related information without a warrant or legal mechanism to compel disclosure: (please delete the appropriate statement) It is our usual policy not to comply with such requests. 14. Region specific Disclosures Please list the countries to which you are becoming a signatory to the CloudCode. (Currently just New Zealand). New Zealand CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 7
8 Schedule 1: New Zealand specific Content S1.1 Data Breach Notification The Office of the Privacy Commissioner has published voluntary breach notification guidelines, which can be found at The Data Breach Notification we will make in Section 5.15 will be made consistent with the Voluntary Breach Notification Guidelines issued by the Office of the Privacy Commissioner in New Zealand. Where we are able to determine that there has been significant loss or compromise of information and a risk of harm to individuals we will also notify the Office of the Privacy Commissioner directly. S1.2 New Zealand Legislation We affirm that we always comply with the Privacy Act, Fair Trading Act, Commerce Act, Copyright (Infringing File Sharing) Amendment Act 2011 and other relevant legislation. We do not have a current Fair Trading Act Compliance policy, S1.3 Fair Trading Compliance Policy (Sample) A sample Fair Trading Act Compliance Policy can be downloaded from CloudCode: Cloud Computing Code of Practice - v2.0 Disclosure Statement Template 8
Contact person responsible for these disclosure statements can be contacted via the following email address: Uli Knapp, [email protected].
DISCLOSURESTATEMENTPREPAREDBY UliKnapp8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888 Base10 Limited 8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888
TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Questions to ask about a cloud service. enter
Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
Licence Fee means the fees calculated as set out on the Website or such other fee as is agreed between You and the Supplier from time to time.
BY CLICKING ON I AGREE BELOW, OR BY DOWNLOADING, INSTALLING OR MAKING ANY USE OF THE SYSTEM DESCRIBED BELOW, YOU AGREE TO THE FOLLOWING TERMS OF THIS AGREEMENT BETWEEN YOU AND {Reseller Business Name}
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT
IP AUSTRALIA B2B ONLINE TRANSACTION SYSTEM AGREEMENT Name of Customer: (The Customer) A.C.N. A.B.N. IPA Customer Number Telephone Fax Email Physical Address Postcode Mail Address Postcode Name of the Customer
Guideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
Cloud Computing Consumer Protocol. ACS Cloud Discussion Paper July 2013
Cloud Computing Consumer Protocol ACS Cloud Discussion Paper July 2013 ACS Cloud Protocol Discussion Paper July 2013 2 CONTENTS SECTION PAGE 1. Introduction and Purpose 3 2. Structure and Timelines 3 3.
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
3 What Personal Information do we collect and why do we need it?
Privacy Policy 1 Protecting your privacy The worldwide rental system operated as Europcar is owned by Europcar International, a French Corporation. A number of independently owned licensees also trade
HIPAA Breach Notification Policy
HIPAA Breach Notification Policy Purpose: To ensure compliance with applicable laws and regulations governing the privacy and security of protected health information, and to ensure that appropriate notice
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Terms and Conditions Website Development
Terms and Conditions Website Development 1. DEFINITIONS The following terms and conditions document is a legal agreement between Embertech Ltd hereafter the Company and Client for the purposes of web site
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
Team Anywhere EMAIL ORDER FORM
1. Applicant Details Team Anywhere EMAIL ORDER FORM Please complete and return this form to: Quincerto Group (NZ) Ltd, PO Box 31-248, Christchurch, New Zealand Telephone: 0508 332 537 Fax: 03 342 6109
S E R V E R C E N T R E H O S T I N G
S E R V E R C E N T R E H O S T I N G Managed Hosting Multi Tenant Platform Microsoft Dynamics CRM 2013 Service Level Agreement Server Centre Hosting Limited Master Version - 2.1 Server Centre Hosting
Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.
Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
Egress Switch Email & File Encryption Service Description
Egress Switch Email & File Encryption Service Description Egress Software Technologies Ltd Web: www.egress.com // Email: [email protected] // Twitter: @EgressSwitch Telephone: +44 (0)207 624 8500 // Fax:
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Terms and Conditions.
Terms and Conditions. We ask that you read them through and keep a copy for your own records, just in case you need to refer back to them at any time. By ordering or using a Systems Integration (UK) Ltd.service
Terms of Service. Your Information and Privacy
These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
BUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
DATA PROTECTION LAWS OF THE WORLD. Panama
DATA PROTECTION LAWS OF THE WORLD Panama Date of Download: 19 November 2015 PANAMA Last modified 26 January 2015 LAW IN PANAMA In recent years, Panama has taken significant legislative steps to regulate
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
Select Internet. Standard Terms and Conditions relating to the supply of online backup services by Select Internet
Select Internet Standard Terms and Conditions relating to the supply of online backup services by Select Internet Select Internet, PO Box 317 Kidlington, Oxford. OX5 3WZ www.selectinternet.co.uk Page 1
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
SOFTWARE HOSTING AND SERVICES AGREEMENT
SOFTWARE HOSTING AND SERVICES AGREEMENT IMPORTANT! PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The X2Engine.Com website (hereinafter Website ) is owned by, and the hosting
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015
WEBSITE HOSTING SERVICES AGREEMENT Effective Date: 1/1/2015 1) Scope of Services. Company will provide Client a shared or dedicated virtual machine, an Internet address for storage and access to Content,
SOFTWARE HOSTING AND SERVICES AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The SuiteCRM website (hereinafter
SOFTWARE HOSTING AND SERVICES AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE SERVICES OR WEBSITE. The SuiteCRM website (hereinafter Website ) is owned by, and the hosting and support services
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Service Level Agreement (SLA) for Customer by. Cybersmart ISP. (Cloud Hosting Agreement)
Service Level Agreement (SLA) for Customer by (Cloud Hosting Agreement) Effective Date: Document Owner: Version Version Date Description Author 1.0.2 07-05-2013 Service Level Agreement 1.0.3 22-10-2013
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Website Hosting General Terms and Service Levels for Web Hosting and E- Mail
Website Hosting General Terms and Service Levels for Web Hosting and E- Mail Between Web Results Direct Ltd ( we/us/our ); and The Customer ( you/your ) A Bandwidth If your bandwidth either exceeds the
1.1 These Terms and Conditions set out the agreement between MRS Web Solutions Ltd, 1 Blue Prior Business Park, Redfields Ln, Church Crookham,
Terms and Conditions of Sale and Services Please read these Terms and Conditions for the Supply of Services ( Terms and Conditions ) carefully, as they form part of the Agreement for the supply of our
Online (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement
* 1) The RAA should not explicitly condone or encourage the use of 1. Use of Proxy or Privacy Registrations Proxy Registrations or Privacy Services, as it appears in paragraphs a. In the event ICANN establishes
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
SaaS Hosting Agreement
SaaS Hosting Agreement V1.2, August 18th, 2014 Between: Project Open Business Solutions, S.L. VAT ID: ESB65837809 Calle Aprestadora 19, 12 o -2 a E-08907 Hospitalet de Llobregat (Barcelona) (]project-open[,
EASTLINK PERSONAL CLOUD TERMS OF SERVICE
EASTLINK PERSONAL CLOUD TERMS OF SERVICE IMPORTANT - READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY BEFORE PROCEEDING WITH DOWNLOADING AND/OR THE INSTALLATION OF THE SOFTWARE OR USING EASTLINK PERSONAL
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
