School Information Security and Privacy in the Cloud

Size: px
Start display at page:

Download "School Information Security and Privacy in the Cloud"

Transcription

1 School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The challenge is to reap the benefits of cloud computing and online applications, while still maintaining information privacy and data security. The information below examines the following questions: 1. Why should our school be concerned? 2. What are the issues and risks? 3. What current practices should our school be concerned about? 4. What does the law require? 5. What is BCE doing to assist schools? 6. Should our school stop using all other online tools and services? 7. What should our school consider before signing up to a service or entering into a contract? 8. What are the overall dos and don ts 9. Who can I contact for further information? 10. Definitions 1. Why should our school be concerned? As a result of changes to the Privacy Act, we must be more mindful of the kinds of personal student and parent information and school data being stored and exchanged through online services and devices. School communities today expect to transmit and store vast amounts of information instantly and access this information on PC s, tablets and mobile devices. To do this, many of our day to day learning, teaching and administrative activities take place in online, cloud based environments. These environments can provide access to the latest software applications, hardware and network pathways to store and process information. They offer 24/7 accessibility and involve less staff time maintaining on site servers and equipment. Along with these benefits however, come some serious challenges. In particular, these involve the potential for privacy breaches that accompany the transfer of personal information to public cloud based services and external service providers. But it s not just cloud based applications that need careful management. Onsite servers, housing local applications and files containing student and parent information, can also create opportunities for the unintentional release of personal data. These concerns are real and must be addressed by school communities. Copyright 2014 Catholic Education, Archdiocese of Brisbane Page 1

2 2. What are the issues and risks? As soon as student or parent information is transferred or stored in the public cloud, it is housed on shared systems operated by others. This means that the school does not have physical control over the data, and must entrust the service provider with the school s information. When data is extracted from a secure, identity managed BCE enterprise system and rehoused in a local application, file server or mobile device, it is also at risk of security breaches. The following potential issues may arise in these cases: Data loss by users or service providers who, knowingly or not, expose information by sharing or sending it Collection and aggregation of personally identifiable data for use by third parties Data breaches or content loss, caused by faulty server configuration, security setup, patching and updates, or by software viruses. Out of date data as a result of being exported from a BCE enterprise system and republished in a non supported application 3. What current practices should our school be concerned about? a. Storing enterprise data and resources in the public cloud. All data created by students, teachers and staff related to students, is an education record. Schools should retain control over such records by creating and storing the data onsite or in an enterprise system where possible, and not in a public cloud service. eg storing student and teacher work in Google Drive, Dropbox etc instead of in SharePoint School Portals or LIFE b. Exporting data and storing it on local servers or devices School servers and other external storage devices, that store exported student data in either files, folders or locally managed applications, must be regularly updated, securely managed and audited. Schools should also ensure that appropriate and ongoing network and server change management practices are in place. eg exporting student information from eminerva, saving it, and importing it into locally maintained student management systems c. Using Web 2.0 services with students and parents Schools are responsible for the privacy and security of personal student, parent and educational data in the cloud. This means that schools must fully understand the purpose for which any personal information or content is collected and how it is to be used or shared. They should also have investigated the service s Terms and Conditions and how the provider complies with the Privacy Act, before endorsing the use of a online, cloud based or Web 2.0 service with students. eg using externally hosted online services, which require students to sign up to gain access and result in student work being saved in a public cloud service d. Providing student information and educational data to external service providers Schools must ensure that parents are aware of the types of information that may be disclosed to third parties and external service providers and must enable them to opt out of such disclosures. They should also have investigated how the provider complies with the Privacy Act and inform users and parents if their personal information is to be sent offshore. eg providing student and parent information to online VET or learning management vendors Copyright 2014 Catholic Education, Archdiocese of Brisbane Page 2

3 4. What does the law require? Under the Privacy Act, a school that uses cloud computing facilities located offshore to store school data, will in many instances, be held responsible to the person whose personal information has been the subject of a data breach by the cloud service provider. Schools must not send personal information about an individual outside Australia without first obtaining their consent. This consent can be obtained by informing the individual at the time of the collection of the information, that the school may send the personal information offshore. When entering into a contract with a service provider, it is suggested that specialist advice is obtained prior to entering into contract with providers to determine if appropriate customer protection is provided to the school under the terms of the contract. 5. What is BCE doing to assist schools? BCE is working to protect student and parent privacy through the use of BCE enterprise systems, online tools and endorsed providers of cloud based and Web 2.0 services. Use of these systems and services will ensure that: Configuration and security setups are in place to protect student and parent privacy and organisational data Identity management and single sign on is available Ongoing maintenance and technical change management practices are in place Due diligence has been undertaken before terms and conditions are accepted or before a contract is entered into BCE also provides privacy and data collection information for use by schools and school communities through the following publications: BCE Information Collection Notice Media Consent forms Privacy Statement 6. Should our school stop using all other online tools and services? Not necessarily where a genuine gap in service or functionality is identified, schools may need to source their own solution. In the first instance however, schools should make use of BCE s enterprise systems and service providers. They should also talk with BCE about their needs and functional requirements in order to identify available solutions or to inform future system development and product acquisition. If schools have decided to go outside of the endorsed BCE suite of products, they should review the service by undertaking the following activities: Review the providers terms and conditions Ensure that the services comply with the Privacy Act Use services that allow the school to retain control over the data Request formal confirmation of the location in which the data will be stored Ensure ongoing ICT governance and technical change management practices and are clearly defined Consult and educate school communities, including parents, about the schools use of public cloud services Enter into a formal contract/service level agreement to ensure the items below are addressed and agreed to Seek advice from BCE s legal counsel team if in doubt Copyright 2014 Catholic Education, Archdiocese of Brisbane Page 3

4 7. What should our school consider before signing up to a service or entering into a contract? The following questions are part of the due diligence a school should undertake when considering cloudcomputing services or when working with an external service provider. Does the service provider comply with the Australian Privacy Principles in the Commonwealth Privacy Act? How does the service provider inform users of changes to their Terms and Conditions? Does the school have the right to audit the service provider to ensure it is complying with the Privacy Act? Who maintains data ownership? Where will the data be stored? (NB Some vendors, who may be locally based, rely on infrastructure for the hosting of services which may be offshore but do not disclose this in a transparent manner. If hosting services are located offshore, parents must be informed.) How is the security of the data maintained? What procedures will be followed in the case of potential security breaches? How is the data segregated from other customers? Who will have access to the data including system administrators and staff of the provider? Is the service provider owned or controlled by a foreign company? What are the ongoing service levels, back up, restore and support capabilities? What are the technical change management and maintenance activities? Does the provider agree not use or disclose personal information except for the limited purpose of storing and managing the data? What procedures exists to destroy or retrieve personal information, in compliance with the Privacy Act, when it is not longer needed or when the contract comes to an end? 8. What are the overall dos and don ts When investigating public cloud computing services and online school based applications, schools should consider the following dos and don ts. Do Use BCE Enterprise systems and service providers in the first instance Conduct a due diligence assessment of other cloud based services and online applications Contact BCE for support before entering into a contract Discuss privacy issues with staff students and parents/legal guardians Don t Store educational records or enterprise data in the public cloud Export data from enterprise systems before ensuring the necessary security is in place Ask students to sign up to Web 2.0 services before checking the terms and conditions Provide personal student or parent information to external service providers without checking their credentials and adherence to the conditions of the Privacy Act. 9. Who can I contact for further information? Please contact the BCE Service Desk to speak with a member of BCE s Legal Counsel or Information Services team. Copyright 2014 Catholic Education, Archdiocese of Brisbane Page 4

5 10. Definitions BCE Enterprise Systems a range of integrated technology systems and associated services endorsed by BCE for the whole of organisation use. These systems are secured, managed and maintained by BCE s Information Services team or by endorsed service providers. They make use of BCE identity management system and are hosted in a central data center or private cloud eg eminerva, Dynamics AX, LIFE, SRS, BI, SharePoint Portals and My Sites etc Educational Records written and electronic files containing data relating to a student s education. They may include interactions such as s and other learning and teaching communications or educational files and documents created by students, teachers or administrators. Online or Cloud based a range of services, applications or data stores made available to schools via the Internet. Parents in the context of this document, the term parent refers to a person who has parental responsibility for a child on a day to day basis, including carers and legal guardians. Personal Information information or opinion about an individual where their identity is apparent, or where the information allows an individual to be identified. Privacy Act the Commonwealth Privacy Act 1988 and Privacy Amendment (Enhancing Privacy Protection) Act 2012 which came into operation in March A key component is the mandatory requirement for a school to comply with the Australian Privacy Principals (APPs). The APPs set minimum standards which relate to the collection, security, storage, use, correction and disclosure of personal information and access to that information. Private or Enterprise Cloud an isolated data center created, controlled and maintained by BCE or their endorsed service providers. Data and computing workloads are separated to ensure security. Public Cloud large data centers spanning multiple geographical areas running the workload of many customers at once. Managed and owned by the service provider. Security/Data Breach when personal information held by the school is lost or subjected to unauthorised access, use, modification, disclosure, or other misuse. Service Providers external companies or vendors providing Internet based educational services or technical support. Copyright 2014 Catholic Education, Archdiocese of Brisbane Page 5

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

Type of Personal Data We Collect and How We Use It

Type of Personal Data We Collect and How We Use It Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the

More information

LAN/WAN TECHNICAL SUPPORT Level 2

LAN/WAN TECHNICAL SUPPORT Level 2 Applications are invited from suitably qualified and experienced persons for the following position. LAN/WAN TECHNICAL SUPPORT Level 2 The Catholic Education Office is seeking a Level 2 LAN and WAN Technical

More information

ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet

ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12. Policy and Guidelines Booklet ST MARY S COLLEGE STUDENT 1:1 LAPTOP PROGRAM YEARS 7-12 Policy and Guidelines Booklet Contents 1. St. Mary s College Vision for Learning and teaching... 2 2. Overview of Student and Parent Responsibilities...

More information

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources

More information

LAN/WAN TECHNICAL SUPPORT Level 1

LAN/WAN TECHNICAL SUPPORT Level 1 Applications are invited from suitably qualified and experienced persons for the following position. LAN/WAN TECHNICAL SUPPORT Level 1 The Catholic Education Office is seeking a LAN and WAN Technical Support

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0 ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright

More information

Information Sheet: Cloud Computing

Information Sheet: Cloud Computing info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

Privacy Policy Australian Construction Products Pty Limited

Privacy Policy Australian Construction Products Pty Limited Privacy Policy Australian Construction Products Pty Limited What is this privacy policy about? This Privacy Policy describes how Australian Construction Products 63 091 618 781 (we or us) will treat the

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

PRIVACY POLICY. Privacy Statement

PRIVACY POLICY. Privacy Statement PRIVACY POLICY Privacy Statement Blue Care is one of Australia's leading providers of retirement living, community health, help at home services and aged care homes, caring for more than 12,500 people

More information

Privacy Policy. Approved by: College Board, 01/12/2005 Principal from 14/02/2014

Privacy Policy. Approved by: College Board, 01/12/2005 Principal from 14/02/2014 Privacy Policy Approved by: College Board, 01/12/2005 Principal from 14/02/2014 Revised Date: 11/01/2008 26/08/2011 19/03/2013 14/02/2014 Review Date: 14/02/2016 PLEASE NOTE: Version control for this document

More information

www.corrs.com.au OFFSHORING Data the new privacy laws

www.corrs.com.au OFFSHORING Data the new privacy laws www.corrs.com.au OFFSHORING Data the new privacy laws OFFSHORING DATA THE NEW PRIVACY LAWS Transfer of data by Australian organisations to other jurisdictions is increasingly common. This is a result of

More information

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy

Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed

More information

DISCLOSURE STATEMENT PREPARED BY

DISCLOSURE STATEMENT PREPARED BY DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Policy 3520.13 Student Data Protection and Privacy/Cloud-based Issues

Policy 3520.13 Student Data Protection and Privacy/Cloud-based Issues Policy 3520.13 Student Data Protection and Privacy/Cloud-based Issues DATE: March 7, 2016 PREVIOUS ITEM: None ENCLOSURES: CABE s Suggested Policy 3520.13 CABE s January 23, 2015 Policy Update REASON: To

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

AASA Online Privacy Policy CRP.020

AASA Online Privacy Policy CRP.020 Introduction Alzheimer s Australia SA Inc values your privacy and takes reasonable steps to protect your personal information (that is, information which identifies or may reasonably be used to identify

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Information Sheet for Principals. Child and Youth Risk Management Strategy - BCE and BCE Schools

Information Sheet for Principals. Child and Youth Risk Management Strategy - BCE and BCE Schools Introduction Information Sheet for Principals Child and Youth Risk Management Strategy - BCE and BCE Schools BCE and every BCE school is required under the Working with Children (Risk Management and Screening)

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

Privacy Policy Draft

Privacy Policy Draft Introduction Privacy Policy Draft Please note this is a draft policy pending final approval Alzheimer s Australia values your privacy and takes reasonable steps to protect your personal information (that

More information

CCMS Software Provider Business Assurance Statement Deed Poll

CCMS Software Provider Business Assurance Statement Deed Poll CCMS Software Provider Business Assurance Statement Deed Poll I, the of (Name of CCMS Software Provider s representative) (insert position/title) ( the Software Provider ), (insert legal entity name and

More information

PRIVACY POLICY Personal information and sensitive information Information we request from you

PRIVACY POLICY Personal information and sensitive information Information we request from you PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013 CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street

More information

Captain Compare Privacy Policy

Captain Compare Privacy Policy Captain Compare Privacy Policy This Privacy Policy contains important information about the type of personal information we collect from you on the Captain Compare website (www.captaincompare.com.au) (Website),

More information

ITCRA Response. Request for Submissions on the Draft Version of the APP Guideline Chapters A to D and 1 to 5 covering APPs 1 to 5

ITCRA Response. Request for Submissions on the Draft Version of the APP Guideline Chapters A to D and 1 to 5 covering APPs 1 to 5 ITCRA Response Request for Submissions on the Draft Version of the APP Guideline Chapters A to D and 1 to 5 covering APPs 1 to 5 To: The Office of the Australian Information Commission Submitted: 20th

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

BRISBANE CATHOLIC EDUCATION CHILD AND YOUTH RISK MANAGEMENT STRATEGY 2015

BRISBANE CATHOLIC EDUCATION CHILD AND YOUTH RISK MANAGEMENT STRATEGY 2015 PART 1: COMMITMENT BRISBANE CATHOLIC EDUCATION CHILD AND YOUTH RISK MANAGEMENT STRATEGY 2015 Statement of Commitment (mandatory requirement 1) Brisbane Catholic Education ( BCE ) is committed to the safety

More information

This policy applies to all individuals that provide Leading Age Services Australia Victoria (LASA Victoria) with their personal information.

This policy applies to all individuals that provide Leading Age Services Australia Victoria (LASA Victoria) with their personal information. The purpose of this policy This policy applies to all individuals that provide Leading Age Services Australia Victoria (LASA Victoria) with their personal information. What personal information do we collect?

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Privacy Policy. 30 January 2015

Privacy Policy. 30 January 2015 Privacy Policy 30 January 2015 Table of Contents 1 Overview 3 Purpose 3 Scope 3 2 Collection 3 What information do we collect? 3 What if you do not give us the information we request? 4 3 Use of information

More information

OUR LADY HELP OF CHRISTIANS SCHOOL CHILD AND YOUTH RISK MANAGEMENT STRATEGY

OUR LADY HELP OF CHRISTIANS SCHOOL CHILD AND YOUTH RISK MANAGEMENT STRATEGY OUR LADY HELP OF CHRISTIANS SCHOOL CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) Our Lady Help of Christians School (OLHC) is committed to

More information

Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual

Daltrak Building Services Pty Ltd ABN: 44 069 781 933. Privacy Policy Manual Daltrak Building Services Pty Ltd ABN: 44 069 781 933 Privacy Policy Manual Table Of Contents 1. Introduction Page 2 2. Australian Privacy Principles (APP s) Page 3 3. Kinds Of Personal Information That

More information

Our Lady of the Sacred Heart School, Darra CHILD AND YOUTH RISK MANAGEMENT STRATEGY

Our Lady of the Sacred Heart School, Darra CHILD AND YOUTH RISK MANAGEMENT STRATEGY Our Lady of the Sacred Heart School, Darra CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) Our Lady of the Sacred Heart School is committed

More information

FISHER & PAYKEL PRIVACY POLICY

FISHER & PAYKEL PRIVACY POLICY FISHER & PAYKEL PRIVACY POLICY 1. About this Policy Fisher & Paykel Australia Pty Limited (ABN 71 000 042 080) and its related companies ('we', 'us', 'our') understands the importance of, and is committed

More information

Collection and Use of Information

Collection and Use of Information AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we

More information

St Joachim s Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY

St Joachim s Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY St Joachim s Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) St Joachim s Catholic Primary School is committed to the

More information

Assisi Catholic College CHILD AND YOUTH RISK MANAGEMENT STRATEGY

Assisi Catholic College CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Assisi Catholic College CHILD AND YOUTH RISK MANAGEMENT STRATEGY Statement of Commitment (mandatory requirement 1) Assisi Catholic College is committed to the safety and wellbeing of

More information

St Peter Chanel Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY

St Peter Chanel Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY St Peter Chanel Catholic Primary School CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) St Peter Chanel is committed to the safety and wellbeing

More information

St Pius School, Banyo CHILD AND YOUTH RISK MANAGEMENT STRATEGY

St Pius School, Banyo CHILD AND YOUTH RISK MANAGEMENT STRATEGY St Pius School, Banyo CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) St Pius School is committed to the safety and wellbeing of all students.

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Privacy fact sheet 17

Privacy fact sheet 17 Privacy fact sheet 17 Australian Privacy Principles January 2014 From 12 March 2014, the Australian Privacy Principles (APPs) will replace the National Privacy Principles Information Privacy Principles

More information

that it has no right to have access to the Software in source code form;

that it has no right to have access to the Software in source code form; Attachment 2: TERMS & CONDITIONS SECTION 1: CAT CS Pty Ltd CAT Plus Software Distribution Agreement things to know: For the Practice 1. The Practice acknowledges that all Intellectual Property Rights in

More information

St Ita s Dutton Park CHILD AND YOUTH RISK MANAGEMENT STRATEGY

St Ita s Dutton Park CHILD AND YOUTH RISK MANAGEMENT STRATEGY St Ita s Dutton Park CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment St Ita s School is committed to the safety and wellbeing of all students. St Ita s School respects

More information

Bruce Allison. Steve Moran

Bruce Allison. Steve Moran Bruce Allison Steve Moran ASK A QUESTION POST A COMMENT SUBMIT TECHNICAL QUERIES SHARE YOUR TIPS PROVIDE FEEDBACK DIAL IN AND LISTEN VIA YOUR TELEPHONE! 1800 896 323 81178679# Virtual Desktops A simple,

More information

Bring your own device - Legal Whitepaper

Bring your own device - Legal Whitepaper A Legal Whitepaper from the Technology Group Bring your own device - Legal Whitepaper The consumerisation of IT is the latest technology trend posing challenges to Australian businesses. As workplaces

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Questions to ask about a cloud service. enter

Questions to ask about a cloud service. enter Questions to ask about a cloud service enter How should this guide be used? This guide provides a list of questions you may wish to consider about a cloud service you are considering or already using.

More information

POLICY STATEMENT 5.17

POLICY STATEMENT 5.17 POLICY STATEMENT 5.17 DENTAL RECORDS 1 (Including ADA Guidelines for Dental Records) 1. Introduction 1.1 Dentists have a professional and a legal obligation to maintain clinically relevant, accurate and

More information

MARYMOUNT PRIMARY CHILD AND YOUTH RISK MANAGEMENT STRATEGY

MARYMOUNT PRIMARY CHILD AND YOUTH RISK MANAGEMENT STRATEGY MARYMOUNT PRIMARY CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) Marymount Primary is committed to the safety and wellbeing of all students.

More information

Privacy Policy and Notice of Information Practices

Privacy Policy and Notice of Information Practices Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

XIT CLOUD SOLUTIONS LIMITED

XIT CLOUD SOLUTIONS LIMITED DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Cloud Storage Policy (Draft for consultation)

Cloud Storage Policy (Draft for consultation) (Draft for consultation) Please note that this draft is under consultation with stakeholders in colleges and university services, before refinement and approval by the appropriate University Committee.

More information

OUR LADY OF THE ASSUMPTION, ENOGGERA CHILD AND YOUTH RISK MANAGEMENT STRATEGY

OUR LADY OF THE ASSUMPTION, ENOGGERA CHILD AND YOUTH RISK MANAGEMENT STRATEGY Student OUR LADY OF THE ASSUMPTION, ENOGGERA CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) Our Lady of the Assumption School is committed

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

PRIVACY IN THE CLOUD AND BIG DATA WHAT FRANCHISORS NEED TO KNOW!

PRIVACY IN THE CLOUD AND BIG DATA WHAT FRANCHISORS NEED TO KNOW! PRIVACY IN THE CLOUD AND BIG DATA WHAT FRANCHISORS NEED TO KNOW! By Alec Christie, Partner, DLA Piper Franchisors will already be dealing with a number of day-to-day privacy issues arising from their implementation

More information

Australia s unique approach to trans-border privacy and cloud computing

Australia s unique approach to trans-border privacy and cloud computing Australia s unique approach to trans-border privacy and cloud computing Peter Leonard Partner, Gilbert + Tobin Lawyers and Director, iappanz In Australia, as in many jurisdictions, there have been questions

More information

Our Lady of Fatima School, Acacia Ridge CHILD AND YOUTH RISK MANAGEMENT STRATEGY

Our Lady of Fatima School, Acacia Ridge CHILD AND YOUTH RISK MANAGEMENT STRATEGY Our Lady of Fatima School, Acacia Ridge CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) Our Lady of Fatima School is committed to the safety

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

Privacy Charter. Protecting Your Privacy

Privacy Charter. Protecting Your Privacy Privacy Charter Protecting Your Privacy 1 1. Introduction 3 2. Collection of personal information 3 What sort of personal information do we collect and hold? 3 Anonymity and Pseudonymity 3 Why do we collect

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

Student Laptop Program

Student Laptop Program Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4

More information

FMCS SECURE HOSTING GUIDE

FMCS SECURE HOSTING GUIDE FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

Zubi Advertising Privacy Policy

Zubi Advertising Privacy Policy Zubi Advertising Privacy Policy This privacy policy applies to information collected by Zubi Advertising Services, Inc. ( Company, we or us ), on our Latino Emoji mobile application or via our Latino Emoji

More information

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 This Microsoft privacy statement sets out how your personal information is used by Vodafone in connection with the provision of the Microsoft

More information

2. What personal information do we collect and hold?

2. What personal information do we collect and hold? PRIVACY POLICY Conexus Financial Pty Ltd [ABN 51 120 292 257], (referred to as Conexus, us, we" or our"), are committed to protecting the privacy of the personal information that we collect and complying

More information

ST MARTIN S CHILD AND YOUTH RISK MANAGEMENT STRATEGY

ST MARTIN S CHILD AND YOUTH RISK MANAGEMENT STRATEGY ST MARTIN S CHILD AND YOUTH RISK MANAGEMENT STRATEGY PART 1: COMMITMENT Statement of Commitment (mandatory requirement 1) St Martin s is committed to the safety and wellbeing of all students. St Martin

More information

IBM Implementation Services for Power Systems IBM Systems Director

IBM Implementation Services for Power Systems IBM Systems Director Sample Statement of Work for Services This an example and your Statement of Work may vary given your specific requirements and the related IBM engagement. IBM Implementation Services for Power Systems

More information

Disclosure Requirements of CloudCode Software

Disclosure Requirements of CloudCode Software DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

ICT MANAGER ROLE DESCRIPTION

ICT MANAGER ROLE DESCRIPTION Classification: Education Support Officer Level 5 Hours: 8.30am 4.30pm Term of appointment: Ongoing, commencing Term 1, 2015 OVERVIEW OF COLLEGE Catholic Regional College North Keilor was founded in 1982

More information

Module 12 Managed Services TABLE OF CONTENTS. Use Guidelines

Module 12 Managed Services TABLE OF CONTENTS. Use Guidelines 1 Module 12 Managed Services Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. TERM OF... 4 3. TRANSITION IN... 4 4. SERVICES... 10 5. SERVICE LEVELS... 12 6. CHANGE CONTROL... 13

More information

Whether information is on paper or online, the basic privacy rights for students and parents remain the

Whether information is on paper or online, the basic privacy rights for students and parents remain the We live in an increasingly connected world where information flows between us and the organizations and companies we deal with every day. Historically that information was stored in filing cabinets but,

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route

More information

VES Privacy Policy Effective Date: June 25, 2015

VES Privacy Policy Effective Date: June 25, 2015 VES Privacy Policy Effective Date: June 25, 2015 1. Privacy Statement 2. Information Collected by VES (i) Information that you Knowingly and Willingly Provide (ii) Student Information from Partner Schools.

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

Guidelines for the application of advertised Religious Education Coordinator position

Guidelines for the application of advertised Religious Education Coordinator position Guidelines for the application of advertised Religious Education Coordinator position APPLICATION: 1. Cover Letter Briefly outline your strengths, professional experience and accomplishments, why you are

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

How not to lose your head in the Cloud: AGIMO guidelines released

How not to lose your head in the Cloud: AGIMO guidelines released How not to lose your head in the Cloud: AGIMO guidelines released 07 December 2011 In brief The Australian Government Information Management Office has released a helpful guide on navigating cloud computing

More information

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,

More information