Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3.
|
|
|
- Clifford Edwards
- 10 years ago
- Views:
Transcription
1 Bank of Israel Supervisor of Banks Jerusalem, 12 Tammuz 5775 June 29, LM2087 To: The Banking Corporations Attn: Chief Executive Officer Re: Risk management in a cloud computing environment 1. Background In recent years, there has been an increasing trend of moving to various forms of cloud computing. These technologies enable the efficient and convenient use of computer resources by sharing these resources and using them on demand. In addition with savings in equipment costs, dataa center floor, electricity, etc., which contribute to more environmentally friendly green computing. Alongside the advantages, the use of such technology may expose the banking corporation to significant operational risks related to information security, business continuity, command and control of IT assets, etc. These risks are derived, inter alia, from dependency on specific suppliers or technologies; management, security, command and control tools that have not yet been matured; difficulties in protecting information and in implementing adequate controls; increasing the potential damage in the case of failure, particularly regarding single points of failure; sensitivity of the technology s designated components; difficulty in separating roles, and more. While some of these riskss are known, they contain unique aspects in view of the specific characteristics of these technologies and the fact thatt these technologies are developing and that the information security tools are not necessarily mature. 2. Applicability The provisions of this letter shall apply in accordance with the applicability provisions set out in Section 2 of Proper Conduct of Banking Business Directive 357 (hereinafter: the Directive ). 3. General 3.1 A banking corporation shall not make use activities and/or core systems. of cloud computing services for core
2 3.2 A banking corporation shall not store customer information or data on the cloud outside the borders of the State of Israel, unless it has ascertained that the cloud service provider meets the level of protection in accordance with the directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data directive of the European Union. 3.3 Cloud computing constitutes a private instance of outsourcing as defined in Chapter F of the Directive. Therefore, the banking corporation must act in accordance with Proper Conduct of Banking Business Directive number 357, particularly in relation to that stated in Sections 17, 18 and 30 of the Directive. 3.4 We hereby refer the banking corporations to the relevant laws and regulations for the use of cloud computing technologies, including to the Privacy Protection Law and to the Privacy Protection Regulations (Transfer of Information to Information Databases Outside the Borders of the Country), In addition, we refer to the Registrar of Information Databases Guideline number 2/2011 Use of Outsourcing Services for the Processing of Personal Information. 3.5 It is recommended that the banking corporation consult, as relevant, external consultants with expertise in reducing the risks inherent in the use of cloud technologies. 4. Corporate governance 4.1 A banking corporation examining the use of cloud computing technologies, must bring the matter for prior discussion by the Board of Directors, before using cloud computing technologies. At this discussion, the risks inherent in cloud computing technologies and the implemented controls and those planned to be implemented to mitigate the risks, are to be presented. The Board of Directors must discuss these risks, decide whether to grant preliminary approval to the process, and instruct the senior management regarding the actions it must take including according to those specified in this letter. As relevant, the Board of Directors shall instruct management to formulate and present for its approval a policy document for the use of cloud computing technologies. 4.2 Further to that stated in Section 4.1 above, the Board of Directors shall discuss and approve policy for the use of cloud computing technologies. The policy document shall relate to the accountability, responsibility and operations of cloud service management functions, controls and supervision functions, the types and scope of services, approval processes and approval ranks, the responsibility of various parties at the bank for handling legal, maintenance, monitoring, information security, and other aspects. The policy shall provide a response, inter alia, to the requirements of this letter. 4.3 Before any engagement with cloud computer service provider (hereinafter: cloud service providers or the supplier or "the provider"), a discussion must be held by management and, as relevant, by the Board of Directors.
3 4.4 The banking corporation s senior management must make sure that any use of cloud computer technologies shall be in accordance with the policy set forth as stated. 5. Risk management 5.1 Before engaging with cloud service providers, the banking corporation must carry out due diligence, including regarding the provider s financial resilience, professional ability and experience in providing similar services. It is expected that such an examination shall be carried out periodically, during the service period. 5.2 A banking corporation shall carry out risk identification and assessment process for any engagement with a cloud service provider. The risk assessment shall be done prior to the engagement, and shall be updated on an on-going basis during the service period, inter alia in accordance with the following changes: technological; business and organizational changes at the banking corporation or at the cloud service provider; and regulatory. The banking corporation must ascertain the existence of appropriate compensatory controls. Even though cloud computing constitutes a private instance of outsourcing, the risk assessment must also include unique risks (technological and other) related to the use of cloud computing. Examples of aspects that must be taken into account are provided in the appendix. Accordingly, the banking corporation shall ensure that it receives the required information from the cloud service provider for the purpose of carrying out the risk assessment, including that required in Section below. 5.3 The banking corporation shall ensure that it has the ability to monitor information security incidents related to its use of cloud computing systems. If this monitoring is done through tools provided by the provider, the banking corporation shall ensure that the tools meet the accepted standards and enable integration with the bank s current monitoring tools. 5.4 The banking corporation s information must be encrypted when being transferred over communications lines and when being stored in a multi-tenancy system (a system that is not exclusively for the use of the banking corporation). In cases where it is difficult for the banking corporation to encrypt all of the information as stated, it must encrypt at least the information that it classifies as sensitive, that may harm the banking corporation or its customers if being exposed. The encryption keys shall be stored at the banking corporation and not at the provider. 6. Agreement with the cloud service provider 6.1 The service agreement with the provider shall include, among other things, the following requirements: Receiving from the provider internal and external audit reports conducted on its operations, including audit reports carried out by regulatory entities. In addition, the agreement shall enable the banking corporation to require the provider to carry out, on particular cases, an audit on a specific subject.
4 6.1.2 The existence of a unilateral possibility that the banking corporation may cease the engagement with the provider or move to a different provider, including transferring its relevant data from the provider s system within a short time, their deletion from the provider s system, and the provider s obligation that it will not be possible to review these data in its system Granting the Banking Supervision Department the ability to conduct an audit at the provider's premises. 6.2 In any change in ownership of the cloud service provider, the banking corporation must re-examine the engagement in order to ensure the new ownership s fulfillment of obligations toward the banking corporation. 7. Obtaining a permit from the Supervisor of Banks Notwithstanding that stated in Section 3.3 above, the banking corporation is required to obtain in advance a written permit from the Supervisor of Banks, prior to any engagement with a cloud service provider, as part of which information is stored with the provider, even if it is not customer information. In order to obtain the permit, the bank must apply to the Banking Supervision Department at least 60 days before using the service. 8. Start date The provisions of this letter will come into force on the date of its publication. Sincerely, David Zaken Supervisor of Banks
5 Appendix Risk assessment Examples of cloud computing aspects Corporate governance, policy and procedures, internal and external audits Do the policy documents properly relate to the use of cloud computing? Regulatory risk difficulty in adhering to the laws and regulations of the State of Israel and of the state in where the system operates, or the system and/or the data are stored. It is important, inter alia, to take into consideration issues such as the provider s obligation to provide information to law and enforcement entities even without the knowledge of the banking corporation. There are many legal aspects related to the non-uniformity of definitions and the requirements in various countries. Systemic risk derived from a cloud service provider who provides services to a number of banking corporations. Life cycle of the data, including location, multiplicity of copies and exposure of data. Data transferring, components and systems - for instance, does the use of a particular provider s cloud components limit the banking corporation and could prevent it from being able to move to another provider or transfer the information and/or systems back to the bank s premises? Information security, including changes in the traditional concept and the use of designated security tools. Access controls, while using the appropriate tools for the cloud computing environment. Change management and information technology asset management for instance, does the banking corporation have control over changes in the systems and are the changes in line with the banking corporation s policy and procedures? Risks related to business continuity and BCP/DRP, including changes in the banking corporation s network configuration. Management tools and environments that may add a level of complexity and sophistication to the systems. Legal risks, including aspects of confidentiality, data maintenance, ownership of information and licensing of software. Incident management, including reporting and handling procedures, and responsibilities definition.
Mapping of outsourcing requirements
Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
Practical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency [email protected] Security measures Agenda: The rol of DPO on security measures
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Green Credit Guidelines
Notice of the China Banking Regulatory Commission CBRC on Issuing the Green Credit Guidelines CBRC local offices, policy banks, state-owned commercial banks, jointstock commercial banks, financial assets
Outsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
Third Party Security Guidelines. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
Charter of the Compliance and Operational Risk Management Office (CORMO)
Charter of the Compliance and Operational Risk Management Office (CORMO) Compliance Risk Compliance risk is defined as the risk of legal sanctions, material financial loss, or loss to reputation the Bank
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Principles of Best Practice applicable to the distribution of Life Insurance Products on a Cross-border Basis within the EU or a Third Country
2015 Principles of Best Practice applicable to the distribution of Life Insurance Products on a Cross-border Basis within the EU or a Third Country 1 Principles of Best Practice applicable to the distribution
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Investigation Report: The Hong Kong Police Force. Leaked Internal Documents Containing Personal Data. via Foxy
Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: The Hong Kong Police Force Leaked Internal Documents Containing Personal Data via Foxy (English translation)
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
6/8/2016 OVERVIEW. Page 1 of 9
OVERVIEW Attachment Supervisory Guidance for Assessing Risk Management at Supervised Institutions with Total Consolidated Assets Less than $50 Billion [Fotnote1 6/8/2016 Managing risks is fundamental to
RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT
RESERVE BANK OF VANUATU DOMESTIC BANK PRUDENTIAL GUIDELINE NO 12 OPERATIONAL RISK MANAGEMENT 1. This Guideline outlines a set of principles that provide a framework for the effective management of operational
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS
SUPERVISORY AND REGULATORY GUIDELINES Guidelines Issued: 22 December 2015 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS 1. INTRODUCTION 1.1 The Central Bank of The Bahamas ( the Central
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations Presented by Janine Anthony Bowen, Esq., CIPP/US [email protected] (678) 823-6611 Janine Anthony Bowen, Esq., CIPP/US
PART I - PRELIMINARY...1 Objective...1 Applicability...2 Legal and Regulatory Provision...2
PART I - PRELIMINARY...1 Objective...1 Applicability...2 Legal and Regulatory Provision...2 PART II POLICY REQUIREMENTS...3 Investment and Risk Management Policy...3 Monitoring and Control...5 Roles of
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Israeli Law Information and Technology Authority. Privacy and Data Security in the Cloud - The Israeli Perspective
הרשות למשפט, טכנולוגיה ומידע Israeli Law Information and Technology Authority Privacy and Data Security in the Cloud - The Israeli Perspective Amit Ashkenazi, Head of the Legal Department Outline Introduction
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions
Financial Conduct Authority Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions Introduction 1. A firm has many choices when designing its operating model
REQUEST FOR PROPOSALS PERFORMANCE MANAGEMENT SYSTEM CDEMA-CU
TERMS OF REFERENCE CONSULTANCY SERVICES FOR REVIEW AND DEVELOPMENT OF A PERFORMANCE MANAGEMENT SYSTEM AT THE CDEMA COORDINATING UNIT 1.0 BACKGROUND The Caribbean Disaster Emergency Management Agency is
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Vendor Assessment Worksheet:
Vendor Assessment Worksheet: A sample set of IT security controls for evaluation of third party vendors capacity to protect institutional research data 1 Table of Contents Executive Summary... 3 Vendor
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Insurance Inspection Manual
(Provisional translation) *This translation is provisionally prepared and subject to change without notice. Insurance Inspection Manual (Inspection Manual for Insurance Companies) January 2012 Insurance
Information for Management of a Service Organization
Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure
State of Israel Ministry of Finance - Capital Market, Insurance and Savings Division
Note: This is a non-binding English courtesy translation of the "Procedure for applying for license - insurer, retirement savings management company and provident fund management company", which was published
Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers
Morgan Stanley Policy for the Management of Third Party Residential Mortgage Servicing Providers Title Policy for the Management of Third Party Residential Mortgage Servicing Providers Effective Date Owner
OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Aegon's Internal Cloud Broker
Aegon's Internal Cloud Broker Cloud FS Americas Metropolitan West, NYC July 21, 2015 John Linn Aegon at a glance Focus History Rating About Aegon Life insurance, pensions & asset management Dating back
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
CORPORATE GOVERNANCE GUIDELINES (As Revised on November 14, 2007)
CORPORATE GOVERNANCE GUIDELINES (As Revised on November 14, 2007) The following Corporate Governance Guidelines have been adopted by the Board of Directors of Quicksilver Resources Inc. to assist the Board
ELECTRICITY SUPPLY/ TRADE LICENSE KORLEA INVEST A.S
Hamdi Mramori Street, No 1 Prishtina 10000 Kosovo Tel: +381 (0) 38 247 615 ext. 103 Fax: +381 (0) 38 247 620 e-mail: [email protected] www.ero-ks.org ELECTRICITY SUPPLY/ TRADE LICENSE GRANTED TO: KORLEA
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Authorisation Requirements and Standards for Debt Management Firms
2013 Authorisation Requirements and Standards for Debt Management Firms 2 Contents Authorisation Requirements and Standards for Debt Management Firms Contents Chapter Part A: Authorisation Requirements
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.
Vendor Management: An Enterprise-wide Focus Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd. Why Focus on Vendor Management Increased financial regulatory scrutiny GLBA and Identity Theft Red
Pharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
Operational Risk. Operational Risk Policy
Operational Risk Operational risk can be defined as a risk arising from direct or indirect loss to the bank. The causes of loss can be associated with inadequate or failed internal process, people and
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
COMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy
DESIGN SERVICES AGREEMENT
DESIGN SERVICES AGREEMENT This Agreement, dated this day of, 2004 is entered into by and between International Corporation ( IC ) and Roger A. Brown ( DESIGNER"). IC and DESIGNER agree as follows: 1.0
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
Exhibit 2. Business Associate Addendum
Exhibit 2 Business Associate Addendum This Business Associate Addendum ( Addendum ) governs the use and disclosure of Protected Health Information by EOHHS when functioning as a Business Associate in performing
ICMA Private Wealth Management Charter of Quality
ICMA Private Wealth Management Charter of Quality Preamble 1. The Private Wealth Management Charter of Quality ( the Charter of Quality ) is a voluntary standard of recommended minimum good market practice.
CORPORATE GOVERNANCE. 1 Introduction. 2 Board composition and conduct
CORPORATE GOVERNANCE 1 Introduction The club comprises members from the international shipping community and seeks to follow good governance principles that would be generally recognised throughout world
2) applied methods and means of authorisation and procedures connected with their management and use;
Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
9/13/2013. 20/20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99
20/20 Vision for Vendor Management & Oversight 2013 WBA Technology Conference September 17, 2013 Ken M. Shaurette, CISSP, CISA, CISM, CRISC, IAM Director IT Services Disclaimer The views set forth are
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security [email protected]
Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security [email protected] Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
