Guidelines for Outsourcing, Offshoring, and Cloud Services
|
|
|
- Alvin Russell
- 10 years ago
- Views:
Transcription
1 Preview Guidelines fr Outsurcing, Offshring, and Clud Services Frewrd Data security and data prtectin challenges arise in mst utsurcing and ffshring transactins, particularly where services are clud based. Unfrtunately, these challenges are ften reslved at the last minute, resulting in higher csts, unwieldy slutins and the increased prspect f regulatry interventin. In many cases, data gvernance issues are nt addressed early enugh because the parties d nt knw where t begin the dialgue r hw t identify relevant cncerns. There is little practical guidance in the market which addresses bth data security and data prtectin issues in the cntext f internatinal utsurcing and ffshring transactins. The advent f the prvisin f cludbased services is bringing these issues int sharp fcus. The dcument is a result f the cperatin between ICT Nrway and Intellect (a UK technlgy industry trade assciatin), with the cntributin frm several representatives frm bth private and public sectr. Deserving special mentin in this respect are the fllwing players: Accenture AS, Evry AS, the Financial Supervisry Authrity f Nrway, Itera ASA, Lgica Nrge AS, Micrsft Nrge AS, the Natinal Archives f Nrway, NrSIS and Sparebank1. Our main intentin with this dcument is merely t prvide parties with relevant and practical guidelines describing the steps that culd r need t be taken in rder t increase the level f cmpliance and t reduce the level f unwanted expsure. It is imprtant t nte that infrmatin prvided in these guidelines is nt intended nr recmmended as a substitute fr prfessinal, legal r ther advice. We have deliberately fcused n data privacy matters in the cntext f utsurcing and ffshring transactins, as this is highly relevant fr many parties invlved. Hwever, it is imprtant t nte that different kinds f transactins in mst cases will als give rise t ther legal matters in additin t data privacy matters in crssbrder situatins. Therefre we prvide a sectin with a legal verview f the sectr specific regulatins that may be f relevance depending n the characteristics f the transactin (cf. Sectin 4 Legislatin verview (Nrway)). The verview may be expanded with a mre indepth analysis upn request and/r in a later editin f these guidelines. If s happens, the analysis and specific guidelines regarding sectr specific regulatins may be added as schedules t this main dcument. Accrdingly, an example f the structure f the dcument wuld be as shwn in the figure belw: MAIN DOCUMENT SCHEDULE 1: BANKING AND FINANCIAL DATA SCHEDULE 2: INFORMATION SECURITY SCHEDULE 3: ARCHIVING SCHEDULE 4: (TBD) We feel that wider debate f these matters, frm bth a security and a data prtectin perspective and fr all the phases in the utsurcing lifecycle, will ensure that these issues are dealt with pragmatically and cnstructively in the future; particularly as clud cmputing achieves wider prminence. Hpefully, these guidelines will encurage parties t discuss these cmplex challenges as early as pssible in the utsurcing lifecycle.
2 Cntents 1. Intrductin t the guidelines Key data issues The utsurcing and ffshring lifecycle data prtectin and security bligatins Legislatin verview (Nrway) Checklist 10 Phase 1. Analyse 10 Phase 2. Scpe and select 17 Phase 3. Cntract 22 Phase 4. Implement 23 Phase 5. Manage steady state 25 Phase 6. Terminatin, transfer r stepin 27 Phase 7. Exit 29 Appendix A: List f useful standards 30 Appendix B: Data prtectin laws in key jurisdictins 31 Appendix C: EU Security Breach Ntificatin Requirements 35 Appendix D: Glssary 37 Appendix E: List f useful guidance dcuments 39 Appendix F: Examples f cmmnly used ICTcntract mdels fr in NORWAY 41
3 1. Intrductin t the guidelines What are the guidelines? Data security and data prtectin requirements frequently trigger frictin and frustratin in internatinal utsurcing and ffshring transactins. T ften, this is because the parties d nt understand their respective bligatins r are unable t identify and fcus n the key issues. This set f guidelines will encurage vendrs and custmers t wrk tgether t anticipate and address the data security and data prtectin issues which may affect the success f their utsurcing prjects. The guidelines als seek t eliminate last minute frustratins by prviding bth custmer and vendr with a clear verview f the types f issues which arise, the stage f the prject at which they can mst easily be addressed, and indicating which party is best placed (r legally bliged) t deal with the issues. Key definitins and explanatins Fr ease f reference we include belw sme definitins and explanatins f a limited selectin f the mst imprtant terms that are being used in these guidelines. Fr further clarificatin f terms and phrases being used thrughut this dcument, please see the Glssary in Appendix D and als Appendix B fr explanatins f the mst cmmn terms related t data privacy. Outsurcing: Mst cmmnly the term utsurcing refers t the transmissin f services, prductin, prcesses r activities t an external prvider. The term is ften used tgether with a descriptin f what services, prcesses etc. that are being utsurced. Fr example, scalled business prcess utsurcing typically includes transmissin f HR functins and assciated peratinal activities t a third party. Amng many ther examples are IT infrastructure utsurcing and IT applicatin management utsurcing. Offshring: Offshring as referred t in this dcument means the relcatin f services, prductin, prcesses r activities frm ne cuntry t anther. As fr the relatinship t the term utsurcing as explained abve; when the ffshred services, prcesses etc. are being transferred t an external prvider in that ther cuntry, the situatin may be described as ffshre utsurcing (as ppsed t nshre utsurcing where the utsurcing is perfrmed within ne cuntry). It may be the case that the ther cuntry is nt ffshre in the strictest sense f the wrd, fr example the ther cuntry may be a nearby cuntry, ften sharing a brder, where bth parties expect t benefit frm ne r mre f the fllwing dimensins f prximity: gegraphic, tempral (time zne), cultural, linguistic, ecnmic, plitical, r histrical linkages. In these cases the term nearshring may be used. Clud: Accrding t the fficial Natinal Institute f Standards and Technlgy's (NIST) definitin, "clud cmputing is a mdel fr enabling ubiquitus, cnvenient, ndemand netwrk access t a shared pl f cnfigurable cmputing resurces (e.g., netwrks, servers, strage, applicatins and services) that can be rapidly prvisined and released with minimal management effrt r service prvider interactin." The NIST definitin lists five essential characteristics f clud cmputing: ndemand selfservice, brad netwrk access, resurce pling, rapid elasticity r expansin, and measured service. The terms Clud, Clud cmputing and Clud services are in this dcument interchangeable terms unless therwise specified r bvius cnsidering the cntext.examples f service mdels fr Clud cmputing : Sftware as a Service ( SaaS ), which is a mdel f sftware deplyment ver a netwrk where the custmer uses the prvider s applicatin(s) n a clud infrastructure; Platfrm as a Service where the custmer deplys custmercreated/acquired applicatins nt the prvider s clud infrastructure using prgramming languages and tls supprted by the prvider; and Infrastructure as a Service ( IaaS ) which refers t the delivery f cmputer infrastructure as a service ver a netwrk. Clud is related t ffshring in the sense that the external prvider and its servers may be situated in anther cuntry than the user. Als, Clud is related t utsurcing in the sense that the delivery f clud services may be a way f the Custmer t utsurce sme f its services, prductin, prcesses r activities t an external prvider.
4 Persnal data: Data that relates t a living individual wh can be identified frm thse data, r frm thse data and ther data in the pssessin f the data cntrller (cfr. belw). Data cntrller: Persn/cmpany wh determines hw and fr which purpses persnal data is t be prcessed. Often the Custmer is the riginal data cntrller wh wishes t utsurce the prcessing (and ccasinally) cntrl functins t a third party vendr. The prcessr may be situated in anther cuntry ( ffshre ). Please nte that the categrizatin f data cntrller and data prcessr (cfr. belw) may be difficult, and that there are substantially different legal requirements applicable depending n whether the party is a data cntrller r a data prcessr. Data prcessr: Any persn/cmpany, ther than an emplyee f the data cntrller (r that the data cntrller has the pwer t instruct), wh utilises r prcesses persnal data n behalf f the data cntrller, fr example as part f an utsurcing agreement. The prcessr may be situated in anther cuntry ( ffshre ). Please nte that the categrizatin f data cntrller (cfr. abve) and data prcessr may be difficult, and that there are substantially different legal requirements applicable depending n whether the party is a data cntrller r a data prcessr. Why are the guidelines imprtant? In recent years, the media has been inundated with stries relating t data breaches in bth the public and private sectrs. In respnse t the public s cncerns abut the security f their data, EU regulatrs have becme mre practive in raising awareness f individual s rights and enfrcing cmpliance. In turn rganisatins are becming increasingly mre fcused n addressing data security and data prtectin issues, recgnising that data is ften an rganisatin s mst valuable asset. Failure t cmply with the data security and data prtectin regulatry framewrk may: expse an rganisatin t financial risk (eg. delayed implementatin and/r the csts f remedying a breach); result in damage t an rganisatin s reputatin the regulatrs are quick t publicise data breaches in the press which may cmprmise trust in an rganisatin; result in enfrcement actin (eg. an rganisatin may be prevented frm prcessing data, r be required t implement cmpliant practices); expse an rganisatin t civil penalties (eg. fines by regulatrs); result in an rganisatin s fficers and directrs being cnvicted f a criminal ffence. Mst utsurcing prjects require data t be transferred frm custmer t vendr, frequently n an internatinal basis. Data security and data prtectin laws affect hw data may be transferred between the parties. Increases in glbal data use and technlgical develpments have made data security and data prtectin challenging. An additinal level f cmplexity arises where the data are transferred between multiple jurisdictins, particularly where the vendr utilises a cludbased infrastructure. Many f the bligatins rest with the custmer, as wner f the data; hwever, in an utsurcing cntext, custmers (unlike vendrs) d nt usually deal with data issues. This can result in misunderstanding f data security and data prtectin requirements. It is essential that data security and data prtectin cnsideratins are included in the initial vendr due diligence. Bth the custmer and the vendr shuld carefully analyse the prpsed slutin t ensure regulatry cmpliance issues are addressed. Crucially, if identified early in the utsurcing prcess, data issues can be dealt with in a practical, cmpliant and efficient manner. If ignred during the early stages f an utsurcing prject, data issues can delay implementatin r even require fundamental rethinking f the structure f the data prcessing activity. Hw d the guidelines wrk? These guidelines ffer a checklist f cmmn data security and data prtectin issues, structured arund an utsurcing transactin and addressing ffshre and clud aspects where applicable. The guidelines identify issues that typically arise at each f the stages f the utsurcing lifecycle and indicate which party (custmer r vendr) is usually respnsible fr dealing with the issues. The early visibility f issues determines the expectatins f bth custmer and vendr, enabling bth parties t anticipate and begin t address data issues frm the utset f the prject. This leadtime can be critical t develping efficient and csteffective slutins t issues.
5 Wh shuld use the guidelines? This set f guidelines is intended fr custmers wh, typically, d nt deal as ften as vendrs with the data security and data prtectin issues that arise in an utsurcing cntext. The guidelines will als be a useful tl fr vendrs. They prvide a resurce fr enabling the parties t wrk cllabratively t address at an early stage issues which, if ignred, can cause unnecessary and unfreseen csts and delays later in the prject. The guidelines will be relevant fr parties wrking in bth public and private sectr. Increases in glbal data use and technlgical develpments have made data security and data prtectin mre challenging. An additinal level f cmplexity arises where the data are transferred between multiple jurisdictins, such as when a vendr utilises a cludbased infrastructure. Fr what types f prjects shuld the guidelines be cnsulted? The guidelines shuld be cnsulted fr all utsurcing prjects which invlve data prcessing. They will be particularly useful where persnal data relating t individuals are prcessed. Eurpean data prtectin laws require careful cnsideratin f data security and data prtectin issues in an utsurcing cntext, especially where persnal data are transferred utside the EU, r int the clud. Several nneurpean jurisdictins als have either cmprehensive r sectral data prtectin laws and regulatins, such as India, Ukraine, China, Russia and the United States f America. Resurces relating t the data prtectin laws in key utsurcing jurisdictins are set ut in Appendix B. In additin, Appendix C prvides an verview f emerging EU data breach laws.
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
Internet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
DisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
Licensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
VCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative
Basic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
Communicating Deficiencies in Internal Control to Those Charged with Governance and Management
Internatinal Auditing and Assurance Standards Bard ISA 265 April 2009 Internatinal Standard n Auditing Cmmunicating Deficiencies in Internal Cntrl t Thse Charged with Gvernance and Management Internatinal
Outsourcing arrangements
Rules Ntice Guidance Nte Dealer Member Rules Please distribute internally t: Internal Audit Legal and Cmpliance Operatins Regulatry Accunting Senir Management Cntacts: Luis Piergeti Vice President, Financial
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins
LINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
Better Practice Guide Financial Considerations for Government use of Cloud Computing
Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
Change Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
Internal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
CMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
How Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Duration of job. Context and environment: (e.g. dept description, region description, organogram)
Rle Prfile Jb Descriptin Jb Title Ref n: Prgramme Manager, Services fr Internatinal Educatin Marketing Directrate r Regin East Asia Department/Cuntry Indnesia Lcatin f pst Jakarta Pay Band G Reprts t Senir
POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
How To Understand The Risks Of A Financial Institutin
Guidance n Managing Outsurcing Risk Divisin f Banking Supervisin and Regulatin Divisin f Cnsumer and Cmmunity Affairs Bard f Gvernrs f the Federal Reserve System December 5, 2013 Table f Cntents I. Purpse
Implementing an electronic document and records management system using SharePoint 7
Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f
PCI DSS Cloud Computing Guidelines
Standard: PCI Data Security Standard (PCI DSS) Versin: 2.0 Date: February 2013 Authr: Clud Special Interest Grup PCI Security Standards Cuncil Infrmatin Supplement: PCI DSS Clud Cmputing Guidelines Table
Fundamentals of Engineering Ethics
Fundamentals f Engineering Ethics Preface Natural sciences and engineering are imprtant frces shaping ur future. They exert bth psitive and negative influences upn ur wrld. We all cntribute t these changes.
Issue Brief. SBC Distribution Rules for Employer Sponsored Health Plans October 2012. Summary. Which Plans Are Required to Provide the SBC?
Issue Brief SBC Distributin Rules fr Emplyer Spnsred Health Plans Octber 2012 Summary The Affrdable Care Act (ACA) expands ERISA's disclsure requirements by requiring that a summary f benefits and cverage
Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.
This dcument is intended t prvide NCAA member institutins with an infrmatinal guide regarding the ptential implicatins f the Patient Prtectin and Affrdable Care Act f 2010 (PPACA) when fully implemented
Zimbra Professional Services Portfolio, Purchasing Guide & Price List
In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the
Health and Safety Training and Supervision
Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires
Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners
Guideline August 2013 Prfessinal indemnity insurance arrangements fr enrlled nurses, registered nurses and nurse practitiners Intrductin This guideline has been develped by the Nursing and Midwifery Bard
This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels
10 th May 2010. Dear Peter, Re: Audit Quality in Australia: A Strategic Review
10 th May 2010 Mr. Peter Levy Audit Quality Strategic Review Crpratins and Financial Services Divisin The Treasury Langtn Crescent PARKES ACT 2600 Dear Peter, Re: Audit Quality in Australia: A Strategic
The actions discussed below in this Appendix assume that the firm has already taken three foundation steps:
MAKING YOUR MARK 6.1 Gd Practice This sectin presents an example f gd practice fr firms executing plans t enter the resurces sectr supply chain fr the first time, r fr thse firms already in the supply
How To Deal With A Data Breach In The European Law
Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin
Process for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL
INTERNATIONAL LABOUR ORGANISATION ACT/EMP PUBLICATIONS [Tp] HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL Training Prgramme (Edited by C.S. Venkata Ratnam) [Next] Table f Cntents Intrductin
The Importance of Market Research
The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which
Guidelines on Data Management in Horizon 2020
Guidelines n Data Management in Hrizn 2020 Versin 1.0 11 December 2013 Guidelines n Data Management in Hrizn 2020 Versin 16 December 2013 Intrductin In Hrizn 2020 a limited pilt actin n pen access t research
HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
Software and Hardware Change Management Policy for CDes Computer Labs
Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces
Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS. (by: Kiriakoula Hatzikiriakos, McMillan Binch Mendelsohn)
UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS (by: Kiriakula Hatzikiriaks, McMillan Binch Mendelshn) The purpse f this paper is t highlight sme issues and recmmendatins t be cnsidered during
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
Managed Firewall Service Definition. SD007v1.1
Managed Firewall Service Definitin SD007v1.1 Managed Firewall Service Definitin Service Backgrund It is imprtant t nte that the functin f any firewall service is t filter traffic cming int the netwrk (als
Mobile Workforce. Improving Productivity, Improving Profitability
Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services
TO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel
AL 96-7 Subject: Credit Card Preapprved Slicitatins TO: Chief Executive Officers f all Natinal Banks, Department and Divisin Heads, and all Examining Persnnel PURPOSE The purpse f this advisry letter is
Privacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative
Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021
Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada
17 Construction environmental management plan (CEMP)
17 Cnstructin envirnmental management plan (CEMP) Bur Happld Cntents 17 Cnstructin Envirnmental Management Plan (CEMP) 17-1 17.1 Intrductin 17-1 17.2 Intrductin t EMS 17-1 17.2.1 Plicy 17-2 17.2.2 Planning
CHANGE MANAGEMENT STANDARD
The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the
There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type:
Wiltshire Cuncil Crprate Debt Recvery Plicy: 29102010 WILTSHIRE COUNCIL CORPORATE DEBT RECOVERY POLICY 1. Intrductin The Cuncil raises a significant prprtin f its ttal incmes thrugh lcal taxes and charges,
ISMF Standard 141 Endpoint Protection. OCIO/S4.6 Government standard on cyber security
ISMF Standard 141 OCIO/S4.6 Gvernment standard n cyber security Prepared by: Office f the Chief Infrmatin Officer Versin: v1.0 Date: 12 September 2014 GOVERNMENT STANDARD ON CYBER SECURITY OCIO/S4.6 Cnfidentiality:
Chapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
Getting Started Guide
AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins
Briefing 4 Inquests and the disclosure of information to the coroner
briefing February 2013 The Francis Reprt Briefing 4 Inquests and the disclsure f infrmatin t the crner Key chapters Key recmmendatins 2, 11, 14, 22 274, 45, 273, 282, 283, 17 There is a requirement nt
FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT
1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.
IN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
Request for Proposal. Saskatchewan Arts Board. Database Development. RFP Reference Number S AB-ADMIN001. Release Date Februar y 9, 2016
Request fr Prpsal Saskatchewan Arts Bard Database Develpment RFP Reference Number S AB-ADMIN001 Release Date Februar y 9, 2016 Clsing Date March 1, 2016 Clsing Time 2:00 pm, Lcal Sask. Time Page 2 f 7
Using PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission
Prcess Imprvement Center f Excellence Service Prpsal Recmmendatin Operatinal Oversight Cmmittee Reprt Submissin INTRODUCTION This Prpsal prvides initial infrmatin regarding a pssible additin t a service.
Growing Your Cloud Infrastructure: Planning, Design and Operation
w h i t e p a p e r p a g e 1 f 12 Grwing Yur Clud Infrastructure: Planning, Design and Operatin Abstract Clud cmputing services are expanding and evlving rapidly. But with this fast, largescale grwth
Electronic and Information Resources Accessibility Compliance Plan
Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise
REQUEST FOR PROPOSAL FOR SHAREPOINT LEGISLATIVE MANAGEMENT SERVICES
REQUEST FOR PROPOSAL FOR SHAREPOINT LEGISLATIVE MANAGEMENT SERVICES The Wyming Legislature is at a pivtal pint in the management f its infrmatin and we are lking fr an accmplished firm with SharePint technlgy
1) UNDP Lao PDR Country Office website at http://www.la.undp.org/content/lao_pdr/en/home/operations/jobs/ or 2) UNDP Jobs at http://jobs.undp.
INDIVIDUAL CONSULTANT PROCUREMENT NOTICE Natinal Cnsultant United Natins Office n Drug and Crime Date f issue: 11 th March 2016 POST TITLE: Natinal Cnsultant (Legal Expert) Research and Analysis AGENCY/PROGRAMME
IFRS Discussion Group
IFRS Discussin Grup Reprt n the Public Meeting February 26, 2014 The IFRS Discussin Grup is a discussin frum nly. The Grup s purpse is t assist the Accunting Standards Bard (AcSB) regarding issues arising
Remote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
