Data Privacy in the Cloud: A Dozen Myths & Facts
|
|
|
- Marlene Howard
- 10 years ago
- Views:
Transcription
1 Data Privacy in the Cloud: A Dozen Myths & Facts March 7-9 Washington DC Presented by: Barbara Cosgrove, Chief Security Officer, Workday, Inc. Lothar Determann, Partner, Baker & McKenzie LLP
2 We re taking on the most common concerns raised against cloud computing solutions as two leading privacy experts provide practical guidance and dispel myths about privacy in the cloud. Hear seasoned experts test the notion that cloud computing presents fundamentally unique data privacy challenges, argue that increased data sharing in the cloud can actually be good for privacy and assert that legal compliance does not fall under service provider purview. These and other major questions are tackled in this session, where you ll get the information you need to confidently maneuver your organization through the cloud.
3 What you ll take away: A solid understanding of pros and cons of cloud computing for privacy compliance An increased ability to discuss challenges with customers and providers Practical guidance for contracts between vendors and customers
4 A DOZEN MYTHS Myth 1: Cloud Computing Presents Fundamentally New and Unique Challenges for Data Privacy and Security Compliance Myth 2: Cloud Computing Involves More Data Sharing, Which Is Inherently Bad for Privacy Myth 3: Cloud Computing Is Bad for Data Security Myth 4: Cloud Computing Causes Additional Issues Under Privacy Law Because Data Is Transmitted Internationally Myth 5: Data in the United States Is Endangered by the USA Patriot Act Myth 6: Record Keeping Laws Require Data to Stay Local Myth 7: US-EU Safe Harbor Does Not Apply to Service Provider Arrangements Myth 8: Contractual Clauses Are Unnecessary If the Service Provider Is Safe Harbor-Certified Myth 9: Data Privacy & Security Law Compliance Is the Provider s Responsibility Myth 10: Cloud Service Providers Cannot Cede Control to Their Customers Myth 11: Vendor Has and Should Accept Unlimited Liability for Data Security Breaches Myth 12: Customer Must Have the Right to Access the Provider s Data Centers and Systems for Audit Purposes
5 Myth 1: Cloud Computing Presents Fundamentally New and Unique Challenges for Data Privacy and Security Compliance
6 Myth 1: Cloud Computing Presents Fundamentally New and Unique Challenges for Data Privacy and Security Compliance Fact is that consumers and companies have been entrusting specialized service providers with personal data for a long time: - including telecommunications companies, payment processors, accountants, and various outsourcing service providers ( e.g., payroll, call centers, and IT support) - Internet is founded on the principle of decentralized transfer of data across geographies, devices, and connections. Remember application service providers?
7 Myth 2: Cloud Computing Involves More Data Sharing, Which Is Inherently Bad for Privacy
8 Myth 2: Cloud Computing Involves More Data Sharing, Which Is Inherently Bad for Privacy Fact is sharing with processors transfers to controllers. companies never act without people, and people can be statutory employees, individual independent contractors or employees or contractors of corporate suppliers neither option is per se harmful to data privacy. data sharing with data processing agents is not inherently bad or good for privacy; it is neutral most multiational companies transfer data across geographies anyhow.
9 Myth 3: Cloud Computing Is Bad for Data Security
10 Myth 3: Cloud Computing Is Bad for Data Security Fact is whether personal data is safer on a system secured by you or your vendor depends on who you and your vendor are, depends on the security measures deployed by each particular organization.
11 Myth 3: Cloud Computing Is Bad for Data Security Contd. For example regarding a global HRIS, each multinational employer needs to ask itself whether its own IT capabilities and security policies are superior to the measures deployed by a specialized vendor that can leverage economies of scale and is motivated by the risk of reputational harm to keep data of its customers secure.
12 Myth 4: Cloud Computing Causes Additional Issues Under Privacy Law Because Data Is Transmitted Internationally
13 Myth 4: Cloud Computing Causes Additional Issues Under Privacy Law Because Data Is Transmitted Internationally Fact is that most companies are already transmitting data internationally because they use the Internet (for example, to spreadsheets to various office locations) or because they have subsidiaries, customers, suppliers, or channel partners in other jurisdictions.
14 Myth 5: Data in the United States Is Endangered by the USA Patriot Act
15 Myth 5: Data in the United States Is Endangered by the USA Patriot Act The United States enacted the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA Patriot Act) in October 2001 following the September 11 terrorist attacks to help fight terrorism and money laundering activities and to provide certain additional investigative powers to US law enforcement officials.
16 Myth 5: Data in the United States Is Endangered by the USA Patriot Act Contd. But: these powers are not relevant for most types of data in cloud computing arrangements; the government is much more likely to obtain the data directly from the data controllers ( i.e., users of cloud computing services); if the data controller is not based in the United States and lacks a strong nexus to the United States, chances are the US government is not interested in the data regardless of whether the data is hosted in the United States; if the US government is interested, it can usually obtain access to the data through foreign governments through judicial assistance and cooperation treaties, regardless of where the data is hosted; similar powers exist in most other countries and data is typically much more at risk of being accessed by governments at the place where the data controller is based; and the USA Patriot Act issue is cited to support unrelated agendas, such as protecting local companies or unionized jobs from global competition.
17 Myth 5: Data in the United States Is Endangered by the USA Patriot Act Contd. The information that the US government seeks to fight terrorism and money-laundering is not what most companies store or process in the cloud In some cases, the additional hurdles established by jurisdictional complications will make a difference, but this difference works both ways. For example, a US bankruptcy court recently refused to hand over s to and from a German resident to the German government
18 Myth 5: Data in the United States Is Endangered by the USA Patriot Act Contd. In this case, the German resident s privacy was better protected due to the fact that his s were stored in the United States: The German government would have easily gotten access to his if he had used a German Internet service provider. Most countries around the world allow law enforcement access to private information to a similar extent as in the United States, and many countries have updated their privacy laws to provide for minimum data retention requirements (European telecommunications laws go beyond US requirements) and otherwise lowered privacy protection standards
19 Myth 6: Record Keeping Laws Require Data to Stay Local
20 Myth 6: Record Keeping Laws Require Data to Stay Local Fact is that some tax, bookkeeping, and corporate laws in some jurisdictions historically required certain records to stay in country. But such requirements apply only to certain kinds of records and they do not prohibit the transfer of data into the cloud so long as originals or back-up copies are also kept local.
21 Myth 7: US-EU Safe Harbor Does Not Apply to Service Provider Arrangements
22 Myth 7: US-EU Safe Harbor Does Not Apply to Service Provider Arrangements Fact is that the safe harbor principles expressly state that data processors may participate and achieve adequacy through certification and that the EU Commission ordered EEA member states to consider companies adequate if they certify under the US-EU safe harbor program, whether they act as data controllers or processors. Consider is data really safer in every EEA Member State than anywhere in the USA?
23 Myth 8: Contractual Clauses Are Unnecessary If the Service Provider Is Safe Harbor- Certified
24 Myth 8: Contractual Clauses Are Unnecessary If the Service Provider Is Safe Harbor-Certified Fact is that the safe harbor certification qualifies a service provider outside the EEA as adequate as a service provider within the EEA is presumed to be. But, European laws require particular contractual clauses for data transfers to any service provider, whether the provider is in the EEA or outside You have to clear three hurdles
25 Myth 9: Data Privacy & Security Law Compliance Is the Provider s Responsibility
26 Myth 9: Data Privacy & Security Law Compliance Is the Provider s Responsibility Fact is that data privacy and security laws primarily hold the data controller responsible for compliance, that is, the customer in a service provider relationship. The service provider has typically only two duties under data privacy laws: The processor has to follow its customer s instructions and keep the data secure against unauthorized access. It is important for customer and vendor to reach a reasonable agreement about what level of security is appropriate for particular types of data and who should be doing what
27 Myth 10: Cloud Service Providers Cannot Cede Control to Their Customers
28 Myth 10: Cloud Service Providers Cannot Cede Control to Their Customers Fact is that many organizations find it difficult to stay in control over modern IT systems, whether they hire service providers to provide IT infrastructure or whether they host, operate, and maintain systems themselves.
29 Myth 11: Vendor Has and Should Accept Unlimited Liability for Data Security Breaches
30 Myth 11: Vendor Has and Should Accept Unlimited Liability for Data Security Breaches Fact is that service providers may not always be able to limit their liability vis-à-vis the data subjects. But, data protection laws do not prescribe the allocation of commercial liabilities between the parties. Sophisticated companies usually slice and dice exposure in various ways in indemnification, limitation of liability, and warranty clauses. It is quite common to differentiate in risk allocation clauses based on whether customer and/or service provider contributed primarily to a breach or resulting harm, whether the service provider was in compliance with its contractual obligations, its information security policies, and applicable law, and whether a risk materialized that could have affected any other company, including the customer.
31 Myth 12: Customer Must Have the Right to Access the Provider s Data Centers and Systems for Audit Purposes
32 Myth 12: Customer Must Have the Right to Access the Provider s Data Centers and Systems for Audit Purposes Fact is that customers need to reserve a right to audit the cloud service provider s compliance measures... the service provider may not let customers into its data centers or systems because that would impair the security of other customers data individual audits can be unnecessarily disruptive and costly
33 Myth 12: Customer Must Have the Right to Access the Provider s Data Centers and Systems for Audit Purposes Contd. Possible compromise: Cloud service providers can arrange for routine, comprehensive audits of their systems by a generally accepted audit firm and make the results available to all customers. If customers demand additional topics on the audit list, providers can expand the scope of the next scheduled audit, provided that the customers are willing to pay for the additional effort and the controls are within the scope of the service.
34 Questions
The HR Skinny: Effectively managing international employee data flows
The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study
PIPEDA and Online Backup White Paper
PIPEDA and Online Backup White Paper The cloud computing era has seen a phenomenal growth of the data backup service industry. Backup service providers, by nature of their business, are compelled to collect
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
AUDITING AND ENFORCEMENT AT THE SPANISH DPA. EXPERIENCE WITH OUTSOURCING TO COUNTRIES WITH A NON ADEQUATE LEVEL OF PROTECTION
AUDITING AND ENFORCEMENT AT THE SPANISH DPA. EXPERIENCE WITH OUTSOURCING TO COUNTRIES WITH A NON ADEQUATE LEVEL OF PROTECTION CONFERENCE ON CROSS-BORDER DATA FLOW & PRIVACY October 15 16, 2007 Washington,
Credit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Privacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
The Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
THE TRANSFER OF PERSONAL DATA ABROAD
THE TRANSFER OF PERSONAL DATA ABROAD MARCH 2014 THIS NOTE CONSIDERS THE SITUATION OF AN IRISH ORGANISATION OR BUSINESS SEEKING TO TRANSFER PERSONAL DATA ABROAD FOR STORAGE OR PROCESSING, IN LIGHT OF THE
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
Data Protection, Software Licenses and other Legal Issues in the Cloud
Data Protection, Software Licenses and other Legal Issues in the Cloud Dr. Hendrik Schöttle Rechtsanwalt, Fachanwalt für IT-Recht OSDC 2012, Nuremberg 26. April 2012 Overview Introduction Data Protection
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Help for ADP s Mobile App
Help for ADP s Mobile App Contents Main Screen... 2 Settings... 3 Preferences... 4 Change PIN... 5 International... 6 Privacy... 7 Terms of Use... 10 Requirements... 13 Help (Main Screen)... 14 Springboard...
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions
PAYMENT SERVICES AND SYSTEMS ACT (ZPlaSS) CHAPTER 1 GENERAL PROVISIONS SUBCHAPTER 1 CONTENT OF THE ACT. Article 1. (scope)
Legal notice All effort has been made to ensure the accuracy of this translation, which is based on the original Slovenian text. All translations of this kind may, nevertheless, be subject to a certain
12 Considerations for Managing Foreign Supplier Risk
12 Considerations for Managing Foreign Supplier Risk November 2014 Lockton Companies A growing number of manufacturers over the past VINCE GAFFIGAN, CPA EVP, Director, Risk Consulting Risk Management Services
ISO/IEC 27018 Safeguarding Personal Information in the Cloud. Whitepaper
ISO/IEC 27018 Safeguarding Personal Information in the Cloud Whitepaper Summary The protection of private information has never been a higher priority. Many national and international bodies, including
Statement of Guidance
Statement of Guidance Internal Audit Unrestricted Trust Companies 1. Statement of Objectives 1.1. To provide specific guidance on Internal Audit Functions as called for in section 3.6 of the Statement
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Capital Policy and Safeguards Statement for Merchant Acquirer Limited Purpose Banks
Capital Policy and Safeguards Statement for Merchant Acquirer Limited Purpose Banks Capital Each of the minimum capital requirements is designed to stand alone, and each of the capital requirements must,
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Isaac Willett April 5, 2011
Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act
The Hidden Risks: Managing Risks in Outsourcing Relationships. Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak Company
The Hidden Risks: Managing Risks in Outsourcing Relationships Brian O Connor Chief Security & Privacy Officer Eastman Kodak Company Bruce Jones Global IT Security, Compliance & Risk Manager Eastman Kodak
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk
March 24, 2014 If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or your regular Skadden contact. Stuart D. Levi New York / 212.735.2750
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
EUROPEAN CENTRAL BANK
17.2.2005 C 40/9 EUROPEAN CTRAL BANK OPINION OF THE EUROPEAN CTRAL BANK of 4 February 2005 at the request of the Council of the European Union on a proposal for a directive of the European Parliament and
Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.
Privacy in the cloud computing, and the company concerned is required to submit a risk analysis to DNB. 3 Cloud computing entails the saving, processing and using of company data on the servers of a cloud
WHITE PAPER Meeting European Data Protection and Security Requirements with CipherCloud Solutions
WHITE PAPER Meeting European Data Protection and Security Requirements with CipherCloud Solutions Meeting European Data Protection and Security Requirements with CipherCloud Solutions 2015 1 TABLE OF CONTENTS
How To Protect Your Data In The Cloud
Cloud Computing Hot topics in relation to security, liability and privacy Steven De Schrijver Cloud Computing : who and what is involved? Data Cloud Service Provider (e.g. SaaS, PaaS, IaaS) Sub-contractor
Cloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
Paychex Accounting Online Terms of Use
Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
Risk Management of Remote Deposit Capture
Federal Financial Institutions Examination Council 3501 FAIRFAX DRIVE ROOM 3086 ARLINGTON, VA 22226-3550 (703) 516-5487 http://www.ffiec.gov Background and Purpose Risk Management of Remote Deposit Capture
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Worldwide Anti-Corruption Policy
Worldwide Anti-Corruption Policy I. PURPOSE The laws of most countries make the payment or offer of payment or even receipt of a bribe, kickback or other corrupt payment a crime, subjecting both Eaton
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
Insights into Cloud Computing
This article was originally published in the November 2010 issue of the Intellectual Property & Technology Law Journal. ARTICLE Insights into Cloud Computing The basic point of cloud computing is to avoid
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective
Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Professor Michael Geist Canada Research Chair in Internet and E-commerce Law University of Ottawa, Faculty of Law Cloud Computing - Canada
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
Privacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
Directors and officers liability best practices guidelines
Directors and officers liability best practices guidelines DIRECTORS AND OFFICERS LIABILITY BEST PRACTICES GUIDELINES INTRODUCTION A continuing challenge to all business is the efficient functioning of
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
GENERAL TERMS AND CONDITIONS FOR SAP CLOUD SERVICES ( GTC )
GENERAL TERMS AND CONDITIONS FOR SAP CLOUD SERVICES ( GTC ) 1. DEFINITIONS Commonly used capitalized terms are defined in the Glossary at the end of the document. 2. USAGE RIGHTS AND RESTRICTIONS 2.1 Grant
WASHINGTON STATE EMPLOYEES CREDIT UNION ONLINE BANKING AGREEMENT
WASHINGTON STATE EMPLOYEES CREDIT UNION ONLINE BANKING AGREEMENT This Agreement is the contract which covers your and our rights and responsibilities concerning Online Banking services ("Online Banking")
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
