PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS
|
|
|
- Sharyl Letitia Dixon
- 10 years ago
- Views:
Transcription
1 PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS CIRRUS WORSHOP 28 February 2013, The Interna<onal Auditorium, Brussels, Belgium Dr. Paolo Balboni, Partner at ICT Legal Consul7ng & Scien7fic Director of the European Privacy Associa7on
2 Introduc7on 2012 and 2103(already) have been very interesting years from the cloud computing data protection & data security point of view! 2
3 Official documents published o Art.29WP Opinion 05/2012 on Cloud Computing o European Cloud Strategy o European Cybersecurity Strategy o CNIL's recommendations for companies using cloud computing services o Italian DPA Cloud Computing: il Vademecum del Garante o Irish DPC Data Protection in the Cloud o ICO Guidance on the use of cloud computing 3
4 So what?... o All the documents need to be read in close connection with the EU Commission Proposal for a General Data Protection Regulation o From the official documents and the actual and forthcoming applicable data protection legislation we can draw a checklist of information that, on the one side, the CSP has to disclose and, on the other side, the client must carefully analyse and assess 4
5 Privacy checklist (i) A CSP will have to share: 1. Information about its identity (and the representative in EU, if applicable), its data protection role, and the contact details of the Data Protection Officer or of a "privacy contact person 2. CSP will have to describe in which ways the data will be processed and provide information on data location and subcontractors 3. How data transfer may take place and on which legal ground (mainly model contracts, binding corporate rules SH principles have not been recognised as adequate) 5
6 Privacy checklist (ii) 4. Data security measure in place, with special reference to: - availability of data - integrity - confidentiality - transparency - isolation (purpose limitation) - intervenability 5. Way to monitoring CSP data security 6. Possibility to run audits for clients or trusted third-parties 6
7 Privacy checklist (iii) 7. Personal data breach notification policy 8. Data portability, migration, and transfer back assistance 9. Data retention, restitution and deletion policies 10. Accountability, meaning the policies and procedures CSP has in place to ensure and demonstrate compliance, throughout CSP value chain (e.g., sub-contractors) 7
8 Privacy checklist (iv) 11. Cooperation with clients to respect data protection law, e.g., to assure the exercise of data protection rights 12. Management of law enforcement request of access to personal data 13. Remedies available for the customer in case of CSP breach of contract. 8
9 Some final remarks o o o A couple of issues Conclusions Recommendations: - Transparency, accountability PLA! 9
10 Thanks for your anen7on! Q&A CIRRUS WORSHOP 28 February 2013, The Interna<onal Auditorium, Brussels, Belgium Dr. Paolo Balboni, Partner at ICT Legal Consul7ng & Scien7fic Director of the European Privacy Associa7on
11 Paolo Balboni, Ph.D., is a top Aer European ICT, Privacy & Data ProtecAon lawyer and serves as Data ProtecAon Officer (DPO) for mulanaaonal companies. As a frequently invited speaker, Balboni has spoken at more than 50 interna7onal conferences around the world in the last 2 years on ICT, Privacy & Data Protec7on legal maners. He is a regular invited expert on the revision of the EU General Data Protec7on Regula7on to the European Parliament. Balboni is the author of the book Trustmarks in E- Commerce: The Value of Web Seals and the Liability of their Providers (Cambridge University Press) and of numerous papers on European ICT, Privacy & Data protec7on law. Balboni is the Scien7fic Director of European Privacy Associa7on, Cloud Compu7ng Sector Director and responsible for Foreign Affairs of Italian Ins7tute for Privacy. He is admined to the Bar in Milan and the Founding Partner at ICT Legal Consul7ng. Together with his team, he provides legal advice across Europe to mul7na7onal companies, especially concerning personal data protec7on, IT- contracts, cloud compu7ng, e- commerce, e- marke7ng, adver7sing, Web 2.0 service providers liability, Law Enforcement Agency (LEA) access to informa7on and databases, digital contract and document management, and intellectual property rights. He also advises celebri7es on privacy and copyright maners. He has considerable experience in the following areas: IT - including Cloud Compu7ng, Big Data & Analy7cs, Media & Entertainment, e- Health, Fashion, Banking, An7- Money Laundering (AML) and Counter- Terrorist Financing (CFT). He co- chairs the Privacy Level Agreement (PLA) Working Group of Cloud Security Alliance and was the legal counsel chosen for the projects of European Network and Informa7on Security Agency (ENISA) on Cloud Compu7ng Risk Assessment, Security and Resilience in Governmental Clouds, Procure Secure: A guide to monitoring of security service levels in cloud contracts and Common Assurance Maturity Model Beyond the Cloud (CAMM). Paolo Balboni is ac7vely involved in European Commission studies on new technologies and data protec7on. Balboni is Lecturer at the Master Digital Media Management at the European Ins7tute of Design and Research Associate at Tilburg University. He obtained his Law Degree with dis7nc7on from the University of Bologna in 2002, a Ph.D. from Tilburg University on Compara7ve ICT Law. He speaks fluent Italian, English and Dutch and has a good knowledge of French, German and Spanish. 11
CLOUD COMPUTING Contractual and data protection aspects
CLOUD COMPUTING Contractual and data protection aspects Cloudscape VI 25 February 2014, Bruxelles Paolo Balboni Ph.D., Founding Partner, ICT Legal Consulting Domenico Converso LL.M., Senior Associate,
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union
Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working
Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012
Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
The Cloud Security Alliance
The Cloud Security Alliance Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
Acquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
Data Protection Compliance for the Public and Private Sector in the EU
Seminar Data Protection Compliance for the Public and Private Sector in the EU Maastricht (NL), 8-9 December 2014 European Institute of Public Administration Institut européen d administration publique
EuroCloud Star Audit. A strong partnership that provides you with a competitive advantage
EuroCloud Star Audit A strong partnership that provides you with a competitive advantage Strong and advantageous? 5 topics to consider 99% of all organisations are SME, with little internal Know- how.
Cloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
Information Management Compliance and Data protection.
Information Management Compliance and Data protection. Technology, Media & Telecommunications Information is the life blood of every business. Yet how you use that information is increasingly regulated.
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Privacy Compliance and Security SLA: CSA addressing the challenges
Privacy Compliance and Security SLA: CSA addressing the challenges Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director - Cloud Security Alliance Arthur van der Wees, Managing Director
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
ENISA and Cloud Security
ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?
EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda? Dr. Jörg Hladjk Counsel European Data Protection & Privacy Practice Hunton & Williams, Brussels Cyber Security
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
E- COMMERCE IN EUROPE & PORTUGAL
E- COMMERCE IN EUROPE & PORTUGAL ALEXANDRE NILO FONSECA President, ACEPI Portuguese E- Commerce Associa?on Board Member, EMOTA European Mul?- Channel and Online Trade Associa?on [email protected]
ENISA and Cloud Security
ENISA and Cloud Security Dimitra Liveri NIS Expert EuroCloud Forum 2015 Barcelona 07-10-2015 European Union Agency for Network and Information Security Securing Europe s Information Society Operational
Data protection issues on an EU outsourcing
Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
August 2011. Report on Cloud Computing and the Law for UK FE and HE (An Overview)
August 2011 Report on Cloud Computing and the Law for UK FE and HE (An Overview) Please Note: This guidance is for information only and is not intended to replace legal advice when faced with a risk decision.
Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
Cloud Computing Security Audit
Cloud Computing Security Audit Teddy Sukardi [email protected] Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Supplier Integrity Guide
Supplier Integrity Guide Wayne Fueling Systems and its Wayne Fueling Systems business are committed to unyielding Integrity and high standards of business conduct in everything we do, especially in our
The Cadence Partnership Service Definition
The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
TOOLS and BEST PRACTICES
TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
How To Get A Degree From The Brussels School Of International Relations
The UK s European university BRUSSELS SCHOOL OF INTERNATIONAL STUDIES Graduate study BRUSSELS: THE CAPITAL OF EUROPE Home to the main institutions of the European Union and numerous European and international
COCIR contribution to the public consultation on Personal Data Protection in the EU 1
COCIR contribution to the public consultation on Personal Data Protection in the EU 1 European Coordination Committee of the Radiological, Electromedical and Healthcare IT Industry Bd. A. Reyers 80, 1030
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
PRIVACY MANAGEMENT ACTIVITIES
PRIVACY MANAGEMENT ACTIVITIES Designed for the privacy office to take privacy management to the next level, Nymity Templates offers a wide range of downloadable resources. Publication Date: June 2014 1.
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Pursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;
Decision No. 2011-316 dated 6 October 2011 adopting a standard for delivering privacy seals in audit procedures covering the protection of persons with regard to the processing of personal data The French
SINGLE RESOLUTION BOARD VACANCY NOTICE ICT PROJECT MANAGER AND BUSINESS ANALYST (SRB/AD/2015/017)
SINGLE RESOLUTION BOARD VACANCY NOTICE ICT PROJECT MANAGER AND BUSINESS ANALYST (SRB/AD/2015/017) Type of contract Temporary agent Function group and grade AD6 Duration of contract 3 years (renewable)
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
Data and Cyber Laws Up-date 9 July 2015
Data and Cyber Laws Up-date 9 July 2015 Janine Regan Alexia Zuber Viktoria Protokova Simon Holdsworth charlesrussellspeechlys.com Topics Updates on the key aspects of, and commentary on, the proposed GDPR
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
SINGLE RESOLUTION BOARD VACANCY NOTICE DOCUMENT MANAGEMENT OFFICER (SRB/AST/2016/003) Corporate Services IT
SINGLE RESOLUTION BOARD VACANCY NOTICE DOCUMENT MANAGEMENT OFFICER (SRB/AST/2016/003) Type of contract Temporary agent Function group and grade AST 4 Duration of contract 3 years (renewable) Area Corporate
Regulatory Issues - Review of the Cullen International Economic System
MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective
Policy Implications: Privacy, Security and Liability Big Data in Telecom. June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX
Policy Implications: Privacy, Security and Liability Big Data in Telecom June 7 2012 TIA 2012: INSIDE THE NETWORK Dallas TX Who We Are Leading trade association in support of information and communications
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users?
10 Juni 2013 Taylor Wessing - Essay Competition 2013 Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? by Katarina Kesselová, LLM. Introduction
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
LIABILITY FOR NON-COMPLIANCE WITH DATA PROTECTION OBLIGATIONS
LIABILITY FOR NON-COMPLIANCE WITH DATA PROTECTION OBLIGATIONS This document is a rough draft aiming at presenting key provisions, current clauses used in Cloud computing contracts and first drafts on possible
European Payment Institutions Federation
European Payment Institutions Federation SECRETARIAT SECRETARIAT GENERAL GENERAL RUE DE RUE LA DE SCIENCE LA SCIENCE 14B 1040 BRUSSELS TEL + +32 2 588 13 130304 [email protected] WWW.PAYMENTINSTITUTIONS.EU
Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World
Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. [email protected]
Essential terms and conditions for a secure use of Cloud services Checklist
Essential terms and conditions for a secure use of Cloud services Checklist Publication of the CIO Interest Group Cloud CIO Platform Nederland, March 2015 www.cio-platform.nl/publicaties From the authors
Checklist: Cloud Computing Agreement
Checklist: Cloud Computing Agreement crosslaw s checklists Date : 21 November 2015 Version 1.4 Tags : ICT Law Johan Vandendriessche Johan is partner and heads the ICT/IP/Data Protection practice. He combines
Privacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
Overview. Data protection in a swirl of change 28.03.2014. Cloud computing. Software as a service. Infrastructure as a service. Platform as a service
Data protection in a swirl of change Overview 1 Data protection issues in cloud computing 2 Consent for mobile applications Security Seminar 2014: Privacy Radboud University Nijmegen 3 The WhatsApp case
FUNERAL SERVICES MBA (FuseMBA) 3rd edi8on, March 2015. Corporate Solu8ons for companies and ins8tu8ons
FUNERAL SERVICES MBA (FuseMBA) 3rd edi8on, March 2015 Corporate Solu8ons for companies and ins8tu8ons The funeral industry in Europe Funeral companies across Europe, in par2cular Small and Mid- Sized companies
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
EMEA Account opening guide
GLOBAL TRANSACTION SERVICES EMEA Account opening guide The power of global connections Introduction This guide gives you all the information you need when opening accounts and completing documentation
August 2011. User Guide: Cloud Computing Contracts, SLAs and Terms & Conditions of Use. Key Points. What s in this Guide?
August 2011 User Guide: Cloud Computing Contracts, SLAs and Terms & Conditions of Use Please Note: This guidance is for information only and is not intended to replace legal advice when faced with a risk
AGENDA Morning Session
AGENDA Morning Session 8:00 8:30 Breakfast and Social Networking 8:30 8:45 Welcome & Introduc@ons, Bill Sieglein, Founder CSO Breakfast Club 8:45 9:30 Keynote: Benita Kahn Partner, Vorys Sater Seymour
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
SINGLE RESOLUTION BOARD VACANCY NOTICE ICT OPERATIONS MANAGER (SRB/AD/2015/016)
SINGLE RESOLUTION BOARD VACANCY NOTICE ICT OPERATIONS MANAGER (SRB/AD/2015/016) Type of contract Temporary agent Function group and grade AD8 Duration of contract 3 years (renewable) Duration of probationary
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
