Cloud Software Services for Schools
|
|
|
- Fay Bond
- 10 years ago
- Views:
Transcription
1 Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Google Ireland Limited Address Google Ireland Ltd Gasworks Building Barrow Street Dublin 4 Ireland Contact name For queries relating to an existing Google Apps for Education account please use Google s standard support service, at For queries related to this checklist, please contact: Adam Stewart, Regional Manager - UK, Google Education Contact [email protected] Contact telephone +44 (0) Page 1 of 33
2 Contents Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier commitments 3 2. Using the Supplier Responses 4 3. Supplier Response - Overarching Legal Requirements 6 4. Supplier Response - Data Processing Obligations 7 5. Supplier Response - Data Confidentiality 9 6. Supplier Response - Data Integrity Supplier Response - Service Availability Supplier Response - Transfers beyond the European Economic Area (EEA) Supplier Response - Use of Advertising 22 Page 2 of 33
3 Introduction When entering into an agreement with a cloud service provider, every school/data controller has to be satisfied that the relevant service provider is carrying out its data processing as per their requirements (ensuring compliance with the Data Protection Act (DPA) by the data controller and also the data processor by default). It is the responsibility of every school to ensure compliance with the DPA. This document is meant to act as an aid to that decision-making process by presenting some key questions and answers that should be sought from any potential cloud service provider. The questions answered in sections 3 to 9 below will give a good indication as to the quality of a service provider s data handling processes, although schools will still need to make their own judgement as to whether any provider fully meets DPA requirements. The school/data controller should communicate its particular data handling requirements to the cloud provider (and each school could be different in its interpretation of what measures, procedures or policy best meet their DPA requirements), and confirm these by way of contract. The best way to set that out is to also put in place a data processing agreement with your chosen provider. The principles of the DPA are summarised by the Information Commissioner s Office at: 1. Supplier commitments In order that schools can be confident regarding the accuracy of the selfcertification statements made in respect of the Google cloud service, the supplier confirms: that their self-certification responses have been fully and accurately completed by a person or persons who are competent in the relevant fields Page 3 of 33
4 that their self-certification responses have been independently verified for completeness and accuracy by Liz Sproat who is a senior company official that they will update their self-certification responses promptly when changes to the service or its terms and conditions would result in their existing compliance statement no longer being accurate or complete that they will provide any additional information or clarification sought as part of the self-certification process that if at any time, the Department is of the view that any element or elements of a cloud service provider s self-certification responses require independent verification, they will agree to that independent verification, supply all necessary clarification requested, meet the associated verification costs, or withdraw their self-certification submission. 2. Using the Supplier Responses When reviewing supplier responses and statements, schools will also wish to consider aspects of data security beyond the supplier-related issues raised in the questions. These include: how the school chooses to use the provided cloud service the nature, types and sensitivity of data the school chooses to place in the cloud service the extent to which the school adapts its own policies (such as acceptable use, homeworking, Bring Your Own Device (BYOD) and staff training to ensure that the way staff and students use the service is consistent with DPA guidance. Please refer to the Information Commissioner s Office (ICO) BYOD guidance: yod the wider policies and practices the school has in place to ensure that the use of cloud services by their staff and students remains DPA compliant, Please refer to the ICO guidance on cloud computing: /library/data_protection/practical_application/cloud_computing_guidan ce_for_organisations.ashx the use of robust, strong, frequently changed authentication passwords and encryption keys, policies on BYOD / homeworking / acceptable use Page 4 of 33
5 to ensure that school data is accessed securely when either on or off the premises The security of the infrastructure that the school uses to access the supplier s cloud service including network and endpoint security. The purpose of this particular document is to focus upon some key areas that schools should consider when moving services to cloud providers. Although it is designed to cover the most important aspects of data security, the checklist should not be viewed as a comprehensive guide to the DPA. The self-certification checklist consists of a range of questions each of which comprises three elements: o the checklist question o the checklist self-certification response colour o the evidence the supplier will use to indicate the basis for their response For ease of reference, the supplier responses have been categorised as follows: Where a supplier is able to confirm that their service fully meets the issue identified in a specific checklist question (in a manner compliant with the obligations of the Data Protection Act where relevant), the appropriate self-certification colour for that question is GREEN. Where a supplier is not able to confirm that their service fully meets the issue identified in a specific checklist question (in a manner compliant with the obligations of the Data Protection Act where relevant), the appropriate self-certification colour for that question is AMBER. (It should be made clear that a single Amber response is not necessarily a negative, and that any associated clarification should also be considered). Where a supplier is able to confirm that a specific checklist question does not apply to their particular service the appropriate self-certification code for that question is BLACK. There is space provided within the supplier response for links to relevant further information and clarification links. Page 5 of 33
6 Schools are invited to use the checklist to support their assessment of the extent to which the cloud services from a particular supplier meet their educational, technical and commercial needs in a DPA-compliant manner. Schools should make a decision on the selection of a supplier based on an overall assessment of the extent to which their product meets the needs of the school, the overall level of risk and the nature and extent of support available from the supplier. 3. Supplier Response - Overarching Legal Requirements Schools are required to ensure that all cloud services used enable them to meet their legal obligations under the DPA. To assist schools in that assessment, Google confirms the position to be as follows: Question Q 3.1 Does your standard contract for the supply of cloud services to UK schools fully comply with the DPA? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes, we believe that our standard contract allows a UK school to meet the requirements applicable to it as a data controller under the UK Data Protection Act. In addition to our standard contract, we also offer all schools the option to amend the standard contract with our Data Processing Amendment. This Data Processing Amendment gives schools an additional means of meeting the requirements of the European Commission's Data Protection Directive for transfers of data to third countries. Google Apps administrators may opt in to the Data Processing Amendment by visiting the Google Apps Admin Console. From there, click Company Profile and then choose the Profile tab to navigate to the amendments listed under Security and Privacy Additional Terms. Q 3.2 If your standard n/a Page 6 of 33
7 contract does not fully comply with the DPA, do you offer additional commitments to UK schools to help ensure such compliance? Q 3.3 Is your contract with UK customers enforceable both in the UK and in the country in which your company is registered? Yes, we offer customers a contract that is governed by English law and subject to the jurisdiction of the English courts. Our contract is viewable at this link: goo.gl/qpizgy Q 3.4 Do your services ensure that schools are able to comply with their obligations with regard to the exercise of data subjects rights? Users have access to their own information from within the services. In addition, Google provides the administrators of Google Apps accounts with tools which may assist customers with accessing data. These tools enable schools to exercise data subjects rights within their Google Apps account. 4. Supplier Response - Data Processing Obligations The Data Protection Act (DPA) relates to personal data that is processed and is likely to be relevant to most of the operations that comprise a cloud computing service. This includes simple storage of data, the obtaining and handling of information, operations such as adaptation, organisation, retrieval and disclosure of data, through to erasure or destruction. Schools, as data controllers, have a responsibility to ensure that the processing of all personal data complies with the DPA and this includes any processing carried out on their behalf by a cloud service provider. To assist schools in understanding whether the cloud service being provided by [Supplier Name] is likely to comply with the DPA in relation to data processing, Google has responded as follows: Page 7 of 33
8 Question Q 4.1 Taking account of the UK Information Commissioner's Office (ICO) guidance on Data Controllers and Data Processors, when providing the service, do you act at any time as a data controller in respect of the data processed as part of this service? Q 4.2 Where you act as a data processor does your contract ensure that you will only act on the instructions of the data controller? Supplier Response Code Response Statement with Supporting Evidence (where applicable) No, Google does not act as the data controller. Customer shall be the data controller and Google shall be a data processor. Yes, Google only acts according to the instructions of the data controller as provided in the contract. Q 4.3 Does your contract document the security measures that you implement to enable a school to ensure compliance with the DPA's security obligations? Q 4.4 Is the processing of personal data or metadata limited to that necessary to deliver [or improve] the service? Q 4.5 Where your contract does not cover every aspect of data processing, are you prepared to enter into a Yes, through its Data Processing Amendment to Google Apps Enterprise Agreement. Google will only process customer data in accordance with the customer agreement and will not process Customer Data for any other purpose. For clarity, and notwithstanding any other term in the Agreement, Google will not serve Advertising in the Services or use Customer Data for Advertising purposes. Google provides customers with a 'Data Processing Amendment to Google Apps Enterprise Agreement' to cover aspects of data processing not otherwise addressed directly in the Page 8 of 33
9 separate data-processing agreement with your cloud services customer? Customer Agreement. 5. Supplier Response - Data Confidentiality When choosing a cloud service provider, schools must select a data processor providing sufficient guarantees about the technical and organisational security measures governing the processing to be carried out, and must take reasonable steps to ensure compliance with those measures. The cloud customer should therefore review the guarantees of confidentiality that the cloud provider can commit to. To assist in understanding if the service being provided by Google is likely to comply with UK law in relation to data confidentiality Google has responded as follows: Question Q 5.1 Do you prohibit personal data or metadata being shared across other services that you as a supplier do or may offer? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Google will process Customer Data in accordance with Customer s Instructions and will not process Customer Data for any other purpose. Customer instructs Google to process Customer Data to: (i) provide the Services (which may include the detection, prevention and resolution of security and technical issues) and (ii) respond to customer support requests. Q 5.2 Do you prohibit personal data or metadata being shared with third parties? Google's view is that requests for enterprise user data should be handled by the enterprise customers directly, and not Google. The customer is in the best position to make decisions about disclosure and evaluate options. Accordingly, when possible and legal to do so, we notify affected customers about requests for user data that may affect them and direct requesting parties to the customers. Page 9 of 33
10 Q 5.3 Does your service have a robust authentication process in place to protect access to personal data and/or user accounts? Q 5.4 Does your service have in place arrangements to assist schools in protecting access to personal data and/or user accounts? Q 5.5 Are appropriate controls in place to ensure only authorised staff have access to client/customer data? Yes, login is encrypted via HTTPS (SSL) and you have the ability to enable 2-step authentication ( at no additional cost. More information can also be found in our Security White Paper ( Administrators can manage users' security settings to enforce 2-step authentication ( and password strength, and to revoke any application-specific passwords ( that have been granted access to the user's account. These steps can greatly reduce the risk of unauthorized access if a user's password is compromised. Yes, Google s internal data access processes and policies are designed to prevent unauthorised persons and/or systems from gaining access to systems used to process personal data. Google employs a centralised access management system to control personnel access to production servers, and only provides access to a limited number of authorized personnel. The granting or modification of access rights is based on: the authorized personnel s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Google s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Page 10 of 33
11 Questions 6.6 to 6.9 address the supplier approach to data encryption. The ICO guidance on encryption is as follows: There have been a number of reports recently of laptop computers, containing personal information which have been stolen from vehicles, dwellings or left in inappropriate places without being protected adequately. The Information Commissioner has formed the view that in future, where such losses occur and where encryption software has not been used to protect the data, regulatory action may be pursued. The ICO recommends that portable and mobile devices, including magnetic media, used to store and transmit personal information, the loss of which could cause damage or distress to individuals, should be protected using approved encryption software which is designed to guard against the compromise of information. Personal information which is stored, transmitted or processed in information, communication and technical infrastructures, should also be managed and protected in accordance with the organization s security policy and using best practice methodologies such as using the International Standard Further information can be found at There are a number of different commercial options available to protect stored information on mobile and static devices and in transmission, such as across the internet. Q 5.6 Does your cloud service insist that communications with access devices are encrypted? Yes it is possible to force users to access Google Apps core services via SSL, when you enable SSL (goo.gl/sifcuh). In order to enable SSL, log into your Google Apps Admin Console (admin.google.com). Click on Security > Basic Settings. Under the General tab and in the SSL section, check the box next to Enable SSL. Click save changes. Page 11 of 33
12 Q 5.7 Does your cloud service ensure that data at rest is encrypted? All data in transit is encrypted. As of June 25th, all files uploaded to Google Drive will be encrypted not only from your device to Google and in transit between Google data centers, but also at rest on Google servers. Google is constantly working to extend and strengthen encryption across more services and links. Q 5.8 Does your cloud service ensure that data in transit between your data centres is encrypted? Q 5.9 Does your cloud service ensure that traffic between your cloud service and other cloud service providers can be encrypted? Google apps for education uses an encrypted HTTPS connection when you check or send or Google applications. This means that no one can listen in on your messages as they go back and forth between you and Google s servers regardless of whether you're using public WiFi or logging in from your computer, phone or tablet. In addition, every single message you send or receive is encrypted while moving internally. This ensures that your messages are safe not only when they move between you and Gmail's servers, but also as they move between Google's data centres. We provide this, but we cannot guarantee the practices of other companies providing cloud services. Q 5.10 Does your service provide defined timescales in respect of data destruction and deletion both during the contract and at contract end? Yes. Once Customer or End User deletes Customer Data (and such Customer Data cannot be recovered by the Customer or End User, such as from the trash ) Google will delete such Customer Data from its systems as soon as reasonably practicable and within a maximum period of 180 days. Page 12 of 33
13 Q 5.11 Does your service ensure that you use a secure deletion and erasure process which encompasses all copies of client/customer data? Yes Q 5.12 Does your service provide a mechanism free of charge whereby users can access a complete and secure copy of their data? Yes. Google aims to make it easy for our users to transfer their personal data in and out of Google's services, by building simple import and export functions. For more information, please see Google's Data Liberation Front ( From your account settings you can quickly and easily download data that you created in (or imported into) a number of Google products. Data is provided in a variety of open, portable formats. 6. Supplier Response - Data Integrity Data integrity has been defined as the property that data is authentic and has not been maliciously or accidentally altered during processing, storage or transmission. To assist schools in understanding if the cloud service being provided by Google is likely to comply with the DPA in relation to data integrity Google has confirmed the position to be as follows: Question Q 6.1 Do you allow a trusted independent third party to conduct regular detailed security audits of the physical, technical and organisational aspects of your service? Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes. Google has been awarded an unqualified SSAE 16 and ISAE 3402 Type II audit opinion, and has earned ISO certification ( The independent third party auditor verified that Google Apps has the following controls and protocols in place: Page 13 of 33
14 Logical security: Controls provide reasonable assurance that logical access to Google Apps production systems and data is restricted to authorized individuals Data centre physical security: Controls provide reasonable assurance that data centres that house Google Apps data and corporate offices are protected Incident management and availability: Controls provide reasonable assurance that Google Apps systems are redundant and incidents are properly reported, responded to, and recorded Change management: Controls provide reasonable assurance that development of and changes to Google Apps undergo testing and independent code review prior to release into production Organization and administration: Controls provide reasonable assurance that management provides the infrastructure and mechanisms to track and communicate initiatives within the company that impact Google Apps Q 6.2 Where the above audits are conducted, do you make the findings available to current and/or prospective cloud customers? Administrators of Google Apps for Education accounts may request the Statement on Standards for Attestation Engagements (SSAE) No. 16 Type II / International Standards for Assurance Engagements (ISAE) No reports via the Google Apps support team. Customers may contact the support team via the Support link within their Admin Console. Prospective customers may request a copy of the audits via the contact address. Page 14 of 33
15 Q 6.3 Does your service ensure that where such audits are carried out, they are conducted to best industry standards? Our Google security audits are conducted following industry standards, such as ISO certification ( and SSAE 16/ ISAE Q 6.4 Are audit trails are in place enabling users to monitor who is accessing their data? Q 6.5 Does your service ensure you could restore all customer data (without alteration) from a backup if you suffered any data loss? Access to systems is logged to create an audit trail for accountability. The Reports API lets Google Apps administrators customize usage reports across your whole account, for example, the number of logins in the past 30 days. And the API's activity reports let you understand user activities in specific Google Apps services such as the Admin console and Google Docs and Drive.- Yes, Google s systems are designed to restore customer data (without alteration) from a back-up in the event of a data loss. Q 6.6 Does your service have a disaster recovery plan, and is information on this plan made available to current/prospective cloud service customers? Yes Google has a disaster recovery plan. In addition Google tests its Disaster Recovery (DR) on a regular basis, and publishes some of its thought leadership in the space for others to learn from e.g. goo.gl/aakjz5 While some of the details of the DR plan are reported and audited in Google's SOC 2 and ISO report each year which is available to customers, the actual plan is confidential. However Google does commit to a 99.9% SLA with no scheduled downtime, and our track record has shown that we exceed this SLA. Page 15 of 33
16 To minimize service interruption due to hardware failure, natural disaster, or other catastrophes, Google frequently and thoroughly tests its DR plan. Testing includes multiple components to minimize the risk of any single point of failure, including the following: Data replication and backup: To help ensure availability in the event of a disaster, Google Apps data is replicated to multiple systems within a data centre, and also replicated to a secondary data centre. Google operates a geographically distributed set of data centres that is designed to maintain service continuity in the event of a disaster or other incident in a single region. High-speed connections between the data centres help ensure swift failover. Management of the data centres is also distributed to provide location-independent around-theclock coverage, and system administration. In addition to the redundancy of data and regionally disparate data centres, Google also has a business continuity plan for its headquarters in Mountain View, CA. This plan accounts for major disasters, such as a seismic event or a public health crisis, and it assumes people and services may be unavailable for up to 30 days. This plan is designed to enable continued operations of our services for our customers. Further information is available from the Google Enterprise Blog : Page 16 of 33
17 7. Supplier Response - Service Availability Service availability means ensuring timely and reliable access to personal data. One threat to availability in the cloud which is often outside the responsibility of the cloud service provider is the accidental loss of network connectivity between the client and the provider of service. Data controllers should therefore check whether the cloud provider has adopted reasonable measures to cope with the risk of disruptions, such as backup internet network links, redundant storage and effective data backup mechanisms. To assist schools in understanding if the service being provided by a particular company is likely to comply with the DPA in relation to service availability Google has confirmed as follows: Question Supplier Response Code Response Statement with Supporting Evidence (where applicable) Q 7.1 Can you confirm that you have sufficient capacity to ensure you can provide a resilient, reliable and accessible service at all times? The application and network architecture run by Google is designed for maximum reliability and uptime. Google's computing platform assumes ongoing hardware failure, and robust software fail-over withstands this disruption. All Google systems are inherently redundant by design, and each subsystem is not dependent on any particular physical or logical server for ongoing operation. Data is replicated multiple times across Google's clustered active servers, so, in the case of a machine failure, data will still be accessible through another system. Google offers a 99.9% uptime guarantee ( to its customers. With Google Apps, there is no planned downtime. Rather than storing each user's data on a single machine or set of machines, we Page 17 of 33
18 distribute all data including our own across many computers in different locations. We then chunk and replicate the data over multiple systems to avoid a single point of failure. We randomly name these data chunks as an extra measure of security, making them unreadable to the human eye. While you work, our servers automatically back up your critical data. So when accidents happen if your computer crashes or gets stolen you can be up and running again in seconds. Q 7.2 Does your service offer guaranteed service levels? Q 7.3 Does your service provide remedies to customers in the event that service levels are not met? Yes, Google Apps for Education customers are guaranteed 99.9% uptime in their contract. In 2013, Gmail was available % of the time, which averages to less than two hours of disruption for a user for the entire year. Our engineering experts work 24 hours a day, 7 days a week and are available immediately should an issue arise. We keep customers informed by posting updates on the Apps Status Dashboard ( until the issue is fixed, and we always conduct a full analysis on the problem to prevent it from happening again. Yes, During the Term of the applicable Google Apps Agreement, the Google Apps Covered Services web interface will be operational and available to Customer at least 99.9% of the time in any calendar month. If Google does not meet the Google Apps SLA, and if Customer meets its obligations under this Google Apps SLA, Customer will be eligible to receive Service Credits. See credits on the SLA site ( Page 18 of 33
19 8. Supplier Response - Transfers beyond the European Economic Area (EEA) The eighth principal of the DPA permits the transfer of personal data beyond the EEA when adequate arrangements are in place to ensure rights and freedoms of data subjects in relation to the processing of personal data. The eighth principal of the DPA states: Personal data shall not be transferred to any country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data Guidance on data transfers published by the ICO states: If you decide you need to transfer personal data outside the EEA, and the recipient is not in a country subject to a positive finding of adequacy by the Commission, nor signed up to the Safe Harbor Scheme, you will need to: - conduct a risk assessment into whether the proposed transfer will provide an adequate level of protection for the rights of the data subjects; or - if you do not find there is an adequate level of protection, put in place adequate safeguards to protect the rights of the data subjects, possibly using Model Contract Clauses or Binding Corporate Rules; or - consider using one of the other statutory exceptions to the Eighth Principle restriction on international transfers of personal data. The European Commission has approved four sets of standard contractual clauses (known as model clauses) as providing an adequate level of protection where data is transferred outside the EEA. If your service provider offers these model clauses in their entirety in their contract, you will not have to make your own assessment of adequacy. To assist schools in understanding if the cloud service being provided is likely to comply with the DPA in relation to permitted transfers of personal data beyond the EEA, Google has responded as follows: Page 19 of 33
20 Question Q 8.1 In providing the service do you limit the transfer of personal data to countries within the EEA? Supplier Response Code Response Statement with Supporting Evidence (where applicable) In accordance with ICO guidance (goo.gl/ppoe4h) regarding the transfer of personal data outside of the EEA, Google offers both 1) participation in the US-EU (and Switzerland) Safe Harbor framework and 2) model contract clauses as means of meeting the adequacy and security requirements of the European Commission s Data Protection Directive, thus negating the need to limit the transfer of personal data outside the EEA. As such, Google does not limit the transfer of personal data outside the EEA. Q 8.2 If you transfer data outside the EEA do you explain to schools when (and under what circumstances) data will be transferred to these locations? Yes, this is explained in the Google Apps for Education Agreement: As part of providing the Services, Google may transfer, store and process Customer Data in the United States or any other country in which Google or its Group Companies maintain facilities. Q 8.3 If you transfer data outside the EEA does your standard contract include the unmodified EU approved model clauses in respect of such transfers? Page 20 of 33 Google offers a data processing amendment and the full text of EUapproved model clauses to customers as amendments to the standard contract. In conformity with clause 10 of the model clauses, Google adds a clause - provided strictly for businessrelated issues - involving each party s aggregate liability to the other. This provision does not modify or contradict the model clauses. Further, in conformity with guidance provided by the Article 29 Working Party Opinion 05/2012 on Cloud Computing, in its data processing amendment Google provides for independent third party audits of Google systems in lieu of direct customer audits.
21 Q 8.4 If you transfer data outside the EEA, (and do not offer the unmodified EU approved "model clauses", can you confirm that the requirements of the DPA are met in respect of the need for adequate protection for the rights and freedoms of data subjects in connection with the crossborder transfer and processing of their personal data? Google participates in the US-EU Safe Harbor Framework, as well as offering a data processing amendment and model contract clauses as an additional means of meeting the adequacy and security requirements of the European Commission's Data Protection Directive. Page 21 of 33
22 9. Supplier Response - Use of Advertising Recognising the particularly sensitive nature of the data likely to be processed in a cloud service aimed at schools, there is particular concern in relation to the use of advertising and the extent of data mining which providers of cloud-based services may adopt in relation to user data. To assist schools in understanding if the cloud service provided by a particular company will involve serving advertisements or engaging in advertisement-related data mining or advertisement-related profiling activities, suppliers will be asked to indicate in respect of services to pupil and staff users as follows: ICO cloud computing guidance states that In order to target advertisements the cloud provider will need access to the personal data of cloud users. A cloud provider may not process the personal data it processes for its own advertising purposes unless this has been authorised by the cloud customer and the cloud customer has explained this processing to cloud users. Individuals have a right to prevent their personal data being used for the purpose of direct marketing. So a school would have to agree to the advertising and then would have a duty to explain to staff and pupils what personal data would be collected, how it will be used and by whom, and what control they have over the use of their data in this way. As there are obvious difficulties with schools deciding if children are competent enough to understand any explanation of their data being used for advertising, and to understand and exercise their right to object, without parental involvement it would seem sensible to avoid this in solutions for schools, especially where children are concerned. Question Q 9.1 In providing the cloud service, is the default position that you enter into a legally binding obligation not to serve advertisements to any Supplier Response Code Response Statement with Supporting Evidence (where applicable) Yes. Page 22 of 33
23 pupil or staff users via your school cloud service? Q 9.2 In providing the cloud service, is the default position that you enter into a legally binding obligation not to conduct any advertisement-related data mining in respect of pupil or staff data or metadata? Yes. Q 9.3 In providing the cloud service, is the default position that you enter into a legally binding obligation never to use for any commercial purpose (or pass on to others) personal data or metadata in respect of pupil or staff users of your service? Under our Data Processing Amendment, Google will only process Customer Data in accordance with the customer agreement and will not process Customer Data for any other purpose. For clarity, and notwithstanding any other term in the Agreement, Google will not serve Advertising in the Services or use Customer Data for Advertising purposes. Page 23 of 33
24 Appendix 1: Availability and extent of support available to schools when using cloud software services. Table of Contents Section 1.0 Section Section 3.0 Section 3.1 Section 3.2 Section 3.3 Section 3.4 Section 3.5 Section 3.6 Section 3.7 Introduction Managing Worst Case Scenarios Key Support Areas Addressing Serious Incidents Supplier Responsibilities Solution Configuration Restoring Data Managing Media Attention Engaging with Child Support Agencies Engaging with the Wider School Community Page 24 of 33
25 Section 1.0 Introduction The Department for Education intends that schools who are considering the use of cloud based services should have easy access to information in relation to: Responsibilities in respect of Data Protection Act compliance. General guidance for schools can be found at The general levels of security inherent in the solutions offered by many of cloud service providers as compared to what might apply to their current arrangements this information is provided in the general guidance statements to be found at (hyperlink tba.gov) The data protection implications of using a particular supplier s cloud services addressed through the self-certification process detailed in the associated checklist document found above The normal support mechanisms available in respect of routine administrative or technical support issues this is addressed by inviting cloud service providers who are participating in the self-certification process to complete the statements summarising their routine support arrangements as above. The additional support that would be available in the unlikely event of some serious data-related incident related to the use by schools of cloud services this is addressed by inviting cloud service suppliers to indicate how they would respond to a number of specific challenges that a school might face in the event of such a serious breach or failure. Section 2.0 of this document sets out the rationale underpinning the need for greater clarity in the event of some serious data-related event. Section 3.0 sets out those areas where specific supplier commitments on additional support are invited. Page 25 of 33
26 Section 2.0 Managing Worst Case Scenarios Whilst there is much to be gained from adopting a cloud service platform, it is only prudent that schools should, as part of their overall risk assessment, and prior to deploying a cloud service, understand (in the event of a data-protection related worst case scenario ) the nature and extent of the support that would be forthcoming from a potential cloud service provider. It is also clearly in the interests of cloud service providers themselves to work with schools to address the technical, business, reputational and legal issues which would flow from some such incident, and which resulted in for example: A significant data loss flowing from a breach of security associated with the provision of cloud service A breach of privacy whereby confidential data was released to a person or persons not authorised to receive it A serious disruption to the school s business, educational or administrative processes The key headings that cloud service providers are invited to respond against are set out in Section 3. When responding to the various issues set out in Section 3, cloud service providers should draft their response assuming that the intended audience is non-technical senior staff in schools. Suppliers may, of course, make reference to supporting management or technical documents but the response provided here should go beyond referring to terms of service and should set out clearly and simply what additional support could be expected in the event of a data protection-related worst case scenario. Page 26 of 33
27 Section 3.0 Key Support Areas The key areas that cloud service providers are invited to respond against in respect of a serious incident are: Solution configuration Communicating serious breaches Supplier responsibilities Restoring data Managing media attention Engaging with the child protection agencies Engaging with the wider school community These are minimum suggested areas and suppliers are free to set out additional support capabilities which could be used in the event of a serious incident and which they feel will engender confidence in schools and differentiate the supplier in this competitive and growing marketplace. 3.1 ADDRESSING SERIOUS INCIDENTS Cloud service providers should as a minimum clarify in this area of their response: How schools should log any serious issues regarding the use of the service, providing as a minimum a UK phone number and support address. It is better to provide an indication of the individuals or roles that should be the first point of contact for example you should also contact our Head of Security [email protected] phone number +44 (0) who will also make sure our education /public sector team at [xxx] is contacted. It would also be useful to cover all time scenarios out of hours, weekends etc. The nature of the support that might be available for example, is it limited to phone and/or or are there circumstances when on-site support might be required. How the cloud service provider might work with schools to address the consequences of the serious incident Whether in addition to contacting the incident support centre there are other resources that could be made available for example via online tools and resources, a partner ecosystem, a local public sector or education support team or identified escalation routes within the company that should be utilised. Google provides 24/7 support to our Education customers. If you experience a serious issue, the first step is to call or the support team. Domain administrators can generate a PIN number via their Control Panel. On calling the support centre on , customers will be asked to enter their PIN number. Administrators may also file a ticket via our online portal: Page 27 of 33
28 Often, users may find an answer more quickly via online resources which are also available to all our users: Apps service status: Apps Status Dashboard ( and Known Issues ( Deployment: Planning and training resources ( Documentation: Admin Help Centre ( Forums: Administrators ( and Developers ( Feature & product launches: What's new with Google Apps ( Technical support: Contact Google Technical support ( Troubleshooting: Troubleshooting resources ( User Help Centres: Gmail ( Calendar ( Drive ( Sites ( Mobile ( More ( Support from Google is via phone, and online help centre support. For catastrophic events, the first point of call will always be the support team who will be best placed to assist. The Google UK press office is also manned 24 hours a day, 7 days a week and can easily be reached by ing [email protected]. The Google press office will be able to help any school with advice on handling media inquiries resulting from a serious event. 3.2 SUPPLIER RESPONSIBILITIES In this section cloud service providers should, as a minimum, set out (in language aimed at school managers), their responsibilities when working with schools to address the implications of a serious incident. In addition, cloud service providers should describe what practical assistance they would be able to offer which goes beyond the contractual minimum as set out in their terms and conditions. Google has implemented a robust disaster recovery programme at each data centre. It is important to first note the processes Google has put in place to avoid a disaster scenario impacting our customers: Page 28 of 33
29 The Google disaster recovery programme includes multiple components to minimize the risk of any single point of failure, including the following: Data replication and backup: To help ensure availability in the event of a disaster, Google Apps data is replicated to multiple systems within a data centre, and also replicated to a secondary data centre Google operates a geographically distributed set of data centres that is designed to maintain service continuity in the event of a disaster or other incident in a single region. High-speed connections between the data centres help ensure swift failover. Management of the data centres is also distributed to provide location-independent, around-the-clock coverage, and system administration. In addition to the redundancy of data and regionally disparate data centres, Google also has a business continuity plan for its headquarters in Mountain View, CA. This plan accounts for major disasters, such as a seismic event or a public health crisis, and it assumes people and services may be unavailable for up to 30 days. This plan is designed to enable continued operations of our services for our customers. We conduct regular testing of our Disaster Recovery Plan. Further information is available from the Google Enterprise blog ( Google s systems are designed to restore customer data (without alteration) from a back-up in the event of a data loss. 3.3 SOLUTION CONFIGURATION. Whilst virtually all cloud service providers have detailed technical advice on how their systems should be configured, this section of the supplier response should set out the general principles which school management should expect to see implemented to ensure maximum security of their cloud implementation. This might cover for example: The need for correct configuration of access devices The use of additional backup / data synchronisation arrangements for sensitive or business critical data Configuration options or additional services that provide greater level of security than is available in your free offering Sample password policies in relation to the age and ability of the users of their service Policies in respect of helpdesk and security staff access to client data Page 29 of 33
30 Deployment Domain Best Practice ( on how to setup your Google Apps domain Google Apps for Education Deployment Guide ( to ensure a smooth transition for your technology team, your teachers, and your students Google Apps Technical Transition Guide Technical Transition Guide ( - a full in-depth guide for all your technical questions. Training Education Training Website ( that includes information on administering ( Google apps and basic product training In depth product training ( for all core products Education Change Management Guide ( which includes strategy and information on everything to do with change management. Support Google provides 24/7 support to our Education customers. If you experience a serious issue, the first step is to call or the support team. Domain administrators can generate a PIN number via their Control Panel. On calling the support centre on , customers will be asked to enter their PIN number. Administrators may also file a ticket via our online portal: All other users will have access to the Google Apps Help Centre ( Your school assumes the responsibility for complying with child privacy protection policies. Per the Google Apps Education Edition Agreement, any school administering Google Apps Education Edition acknowledges and agrees that it is solely responsible for compliance including, but not limited to, obtaining parental consent concerning collection of students' personal information used in connection with the provisioning and use of the Services by the Customer and End Users. Parental consent and notification could take place in form of a permission slip granting use of Google Apps and/or other technology services at the school. Most schools already have an internet policy in place that requires parental permission for internet access at school etc. If a school moves to Google Apps, these permission forms should specifically reference the school's use of Apps for Education. We would also recommend the school's IT team to investigate the security policies, for example, walled garden ( turning on/off services by Org Unit ( 2-step verification ( and objectionable content filters ( and make sure that they are Page 30 of 33
31 familiar with the general security features ( of Apps. Once the school has investigated all the child protection possibilities then they should be able to answer any parent's questions and/or create their own information sites like two schools have done here, ( and here, ( which gives information to address the concerns of parents and the steps that they are taking to protect the children using Google Apps within the school. See some of Google's suggested template letters for parents, ( Examples of Google promoting online safety: Good to Know programme ( 3.4 RESTORING DATA Where a serious event had occurred which resulted in the loss of data by a school, cloud service, providers should set out what steps they would take to work with the school to recover and restore to the maximum extent possible the data which has been lost (or corrupted). This section should also include indicative timescales. Customers should first contact the support team for initial support and to log their issue. The support team can be reached on and is available to all Google Apps administrators. Administrators may also file a ticket via our online portal: Google s systems are designed to restore customer data (without alteration) from a back-up in the event of a data loss. 3.5 MANAGING MEDIA ATTENTION Where a serious event had occurred which resulted in significant media attention falling on the school, suppliers should indicate the steps they would take as a responsible service provider to work with the school in managing the media attention. The Google UK press office is manned 24 hours a day, 7 days a week and can easily be reached by e mailing [email protected]. The Google press office will be able to help any school with advice on handling media inquiries resulting from a serious event. Page 31 of 33
32 3.6 ENGAGING WITH CHILD SUPPORT AGENCIES Where a serious event had resulted in issues being raised that related to child protection for example the loss of sensitive pupil data, the cloud service provider should indicate what it would do to assist the school in engaging with the relevant child protection agencies, over and above the contractual minimum. 1. Customers should first contact the Google Apps support team for initial support and to log their issue. 2. Google believes that it is the responsibility of the Data Controller (the school) to inform the relevant authorities should their systems be hacked and pupil data is leaked. However, our Google Apps support team will be on standby to provide as much technical support as possible. Administrators can also manage users' security settings to enforce 2-step authentication ( and password strength, and to revoke any application-specific passwords ( that have been granted access to the user's account. These steps can greatly reduce the risk of unauthorized access if a user's password is compromised. 3. The UK Google press office can be contacted for advice on handling any media fall-out from any data controller leak. 4. In the unlikely event that Google s wider systems are hacked and personal data is leaked or lost then Google will be responsible for a) contacting the Data Protection Agency to inform them of the leak and b) contacting all affected schools and providing them with guidance on defeating the hack and making their systems secure once again. 3.7 ENGAGING WITH THE WIDER SCHOOL COMMUNITY Where a serious incident had resulted in issues being raised that related to the wider school community for example parents, the local authority, the curriculum or examination bodies or the Information Commissioners Office, the cloud service provider should indicate what it would do to assist the school in engaging with the relevant organisation to address the implications of the serious incident. Again, this should describe available support over and above the contractual minimum. 1. Customers should first contact the Google Apps support team for initial support and to log their issue 2. In the unlikely event that Google s wider systems are hacked and personal data is leaked or lost then Google s first priority will be to recover the leaked or lost data. 3. In the even more unlikely event that Google is not able to recover any of the leaked or lost data then Google will take responsibility for alerting any relevant Page 32 of 33
33 authority (such as an examination board) and provide the necessary evidence that something untoward has occurred and the fault was not that of the pupil or school. Page 33 of 33
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
Cloud Software Services for Schools. Supplier self-certification statements with service and support commitments
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Meritec Limited Meritec House, Acorn Business
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
Cloud (educational apps) software services and the Data Protection Act
Cloud (educational apps) software services and the Data Protection Act Departmental advice for local authorities, school leaders, school staff and governing bodies October 2014 Contents 1. Summary 3 About
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
White Paper Security. Data Protection and Security in School Management Systems
White Paper Security Data Protection and Security in School Management Systems This paper clarifies the roles and responsibilities of those dealing with the data that is central to school management systems.
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Microsoft Online Services - Data Processing Agreement
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID This Amendment consists of
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Technical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union
Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
Use of The Information Services Active Directory Service (AD) Code of Practice
Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be
CLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
www.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA
PRIVACY REGULATIONS regarding the Web Health History ("W.H.H.") Service called LifepassportPRO provided by Meshpass SA Updated: 20 Jun 2015 (substitutes previous versions) This Privacy Policy describes
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
THE TRANSFER OF PERSONAL DATA ABROAD
THE TRANSFER OF PERSONAL DATA ABROAD MARCH 2014 THIS NOTE CONSIDERS THE SITUATION OF AN IRISH ORGANISATION OR BUSINESS SEEKING TO TRANSFER PERSONAL DATA ABROAD FOR STORAGE OR PROCESSING, IN LIGHT OF THE
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.
c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
