Student Service Improvements Executive Background Brief

Size: px
Start display at page:

Download "Student Email Service Improvements Executive Background Brief"

Transcription

1 Student Service Improvements Executive Background Brief Executive Summary Despite the ubiquity of consumer services and the fact that virtually all students coming to York have been using electronic mail for many years there remains an expectation among students that the University will provide them with a University account. And indeed the vast majority of Universities in Canada and beyond continue to provide their student with this service. The rise of consumer services, like Gmail (Google) and Hotmail/Outlook (Microsoft) with their associated capacity and functionality, has also created a great gulf in expectations between what students expect from an service and what legacy University services have generally offered. Approximately six years ago Google, followed later by Microsoft began to offer their services to educational institutions at no cost for students. This proposition has proven quite attractive and as of 2014 the vast majority of Universities in North America have opted to migrate their student service to either Google or Microsoft. In Ontario virtually all Universities have gone in this direction (only one has not signaled a move to a third party service provider). In October of 2011 York started a process to examine the possibility of migrating its student service to a third-party provider via a formal RFP process. That process began in late 2011 and continued through to 2012 and included an assessment of product features etc. as well as an evaluation by students. A second period of student consultation was held in late 2012 and into The RFP process concluded in April 2013 with a recommendation from the evaluation group that the University use Google as a provider for student . A move to Google for student will provide students with a vastly improved service and will bring York in line with the service provided by other schools in the province. This is the major driver for change. This move is not without risk, however, it is felt that the contract terms provided by Google sufficiently mitigate the major risks. The University has also done a privacy impact assessment in order to assess information risks and make recommendations to protect privacy. Background and Current State Like almost all Universities, York provides its students with service - all students are provided with a "@yorku.ca" account (via the York central service) when they start their studies with York. This account is available as long as students are active. Upon graduation or otherwise leaving York the accounts are made inactive. In addition to the central service, a number of Faculties (Schulich School of Business, Osgoode, and Education) also provide service to their students. Most of the Faculties also extend access to their service to alumni. In a 2011 student survey of IT services, the University s service ranked second in the service most needing improvement indicating the need to consider changes. It is

2 reasonable to assume that the dissatisfaction related in part to the fact that the central service has changed little over the past 10 years and its web interface and capacity both lag behind services that students have experience with. The central service also provides only, no calendaring or other services. In the same student survey cited above we also learned that most students use the account but only in a limited way: Over 98% of students use their University issued account; Only 15% of students use a University issued account as their primary address; From additional data on student accounts (from October 2012) about 10% of students forward to a third-party service: Student central October 2012 Number of accounts: 71,809 Total number of forwards: 7,216 (10%) Forward to gmail: 3,306 (4.6%) Forward to hotmail/live: 2,616 (3.6%) Forward to yahoo: 344 (0.5%) Other forwards: 950 (1.3%) As of March 2014, the statistics remain relatively the same and percentages of splits are as follows. The October 2012 statistics continue to be reflective of peak usage in a typical academic year. March 2014 percentages Percentage of total forwards (8.3%) Percentage forwarded to gmail (3.9%) Percentage forwarded to hotmail/live (2.9%) Percentage forwarded to yahoo (0.4%) Percentage of other forwards: (1.1%) Over the past number of years a strong trend has emerged for Universities and Colleges to maintain their service for students by moving the provision and support for the service to a "third party" service provider (Google or Microsoft) - providing an institutionally branded service hosted in the "cloud". Both Google and Microsoft provide a package of , file storage and productivity applications at no cost to Universities. The vast majority of U.S. University and colleges have moved in this direction and the trend has begun to pick up in Canada in recent years. In Ontario Universities that have transitioned their service to a third-party provider include: Ryerson University student, faculty and staff to Google University of Toronto student to Microsoft (consultation on moving faculty and staff in progress) University of Windsor student to Google McMaster University student to Google

3 Carleton University student to Microsoft Wilfred Laurier University student to Google Lakehead University student, faculty and staff to Google University of Ottawa student to Google Laurentian University student to Google Queens student to Microsoft UOIT student to Google Trent University student to Google Nipissing student to Google Western University student to Microsoft University of Guelph student to Google In October of 2011 York launched a process to explore the possibility of using an external provider for its student . The goals of the initiative included: Performing a structured assessment of alternative providers that offer free services the assessment to include both functional and technical requirements. Identifying issues and requirements of a solution related to information privacy. The process was guided by a steering committee consisting of representatives from information technology groups, alumni, division of students and the University information privacy office. The initiative was also introduced to students via a presentation to the Student Representative Roundtable in October 2011 (The SRR also received updates on the progress of the initiative annually through ). It was determined that a possible move of student to a third party provider would be best informed by a formal RFP process. Through the winter of 2011 requirements were developed and the RFP issued in February The evaluation of responses began in March 2012 synchronous with a student evaluation of alternatives. The assessment of RFP responses was completed by a working group comprised of representatives from the same groups represented on the steering group and led by Procurement Services. Two rounds of consultations with students in March-April 2012 and again in November-December 2012 also provided input into the decision. The recommendation of the working group was to award the RFP to Google (via the reseller Aprio). The Student Representative Roundtable received updates on the progress of the initiative annually through Risk Analysis - The major risks associated with a move of student to Google include: - The service is currently offered at no cost, at the end of the term Google s business model could change to require fees. - Google is responsible for service quality. - The service feature set and upgrades are in control of Google. - Student information will reside with Google while the University remains accountable for its protection and handling. - There are perceptions of particular risks associated with the information being in the custody of a U.S. corporation.

4 In early 2013 the University engaged with Google to discuss contractual arrangements for the service that would include terms to mitigate some of these risks. Contract review was led by York Procurement, and involved York s legal and information privacy office. The terms in the Google contract are felt by the University to be sufficient and appropriate for the student service. The very broad adoption of this service by Universities and Colleges also would be expected to serve as a force that would reduce the likelihood of radical negative change by the company. With respect to information privacy risks, the University's guidelines and procedures on use state that, "By its nature, is not a confidential medium; it is possible for messages to be intercepted, modified, copied or redirected without the knowledge of the sender or recipient by those with sufficient access to the transport systems or networks". Nevertheless the expectation of the users of our services is that they are operated and maintained in such a way to ensure appropriate access, security and custody of information. The University maintains these same responsibilities even if the service is operated by a third party on the University s behalf. Attachment 1 contains a set of questions and answers prepared to respond to potential concerns around information privacy (drafted for student information on the new service). Included in the questions in Attachment 1 is a section addressing potential concerns around the fact that the Google service would be subject to the U.S.A. patriot act. A number of legal authorities have expressed opinions that the patriot act does not represent a special risk to information. A similar opinion was expressed by the Ontario Privacy Commissioner in a report in June of 2012 (report PC12-39): There may be no greater area of confusion and misunderstanding than fear of the PATRIOT Act. The PATRIOT Act has invoked unprecedented levels of apprehension and consternation far more than I believe is warranted. For the reasons outlined on pages 5 and 6, the feared powers were available to law enforcement long before the passage of the PATRIOT Act, through a variety of other legal instruments. In my view, these fears are largely overblown, and focusing on them unduly constitutes a pointless exercise. I believe it is far more productive to compel organizations to be fully responsible and accountable for the services they provide or outsource. Finally, the University Information Privacy Office and UIT worked together on a privacy impact analysis that examined the information risks related to Google s hosting of student and made recommendations for protecting privacy within the context of York s implementation of the new service.

5 ATTACHMENT 1 - Responding To Questions About Privacy York University is committed to maintaining and protecting the confidentiality and privacy of our students' personal information. Before implementing this new service, we looked at the privacy implications and ways to help ensure that personal information is protected in accordance with the University's policies on personal information and with applicable legislation governing personal information. As part of the implementation, we: looked at different service provider options conducted our own internal review of our privacy needs in relation to student consulted with Canadian universities that had already implemented, or were in the process of implementing, a cloud- based student solution consulted students as part of the service provider selection process conducted a Privacy Impact Assessment (PIA) with a view to identifying major risks and implementing remediation measures to help reduce those risks consulted with the University's Information and Privacy Office and with the Office of the Counsel Will Google own the data that is stored in Google or passes through Google servers? Google does not own student data. Data Google accounts is the property of York University and/or the student, the end user. The agreement that York University has entered into with Google has no impact on the intellectual property rights or ownership of student data. What steps has the University taken to ensure that my privacy is protected? We have taken the appropriate steps to ensure that your privacy rights, as outlined in the University's policy on Access to Information and Protection of Privacy, are safeguarded. Passwords are not shared with Google. Our contract with Google prohibits Google s access to content, except to exercise rights and fulfill its obligations under our Agreement, including situations of Services abuse or technical threat. Google is also committed to your privacy and to ensuring the confidentiality and security of your personal information. Their security policies include provisions on the protection of your data against threats and unauthorized access. What personal information is shared with Google?

6 A limited amount of student information is shared with Google in order to create a Google- powered student account. The following personal information is provided: first name, last name, username, and address to validate against our authentication services. Will Google log my activity or scan my content? Google has some access to your account as explained in the Terms of Service. Google has agreed that the University is not granting Google any rights, implied or otherwise, to content. Google is not permitted to conduct data mining. Google has also agreed that Google is not permitted to include advertising in our student accounts. Google employees may be granted temporary access to your for troubleshooting purposes or to ensure the integrity of the services provided, but only with the approval of York University Administrators. Can Google share my personal information with any third parties? No. Our agreement with Google states that Google is not allowed to share students' personal information. Who is responsible for protecting the data stored in or sent from Google account? Students continue to be responsible for how they use their University- provided accounts in accordance with the University s computing policies. Students have an obligation to promote responsible, ethical and secure use of services. Google is also responsible for protecting and maintaining the security standards of the facilities it uses to store and process end- user data. Where is Google account data stored? Student account data is stored at one of Google's global facilities; access to these facilities is governed by the laws of the jurisdiction in which the data is stored, including the USA PATRIOT Act. Note that both Canada s Privacy Commissioner and Ontario s Information and Privacy Commissioner have stated that privacy risks from the USA PATRIOT Act are no greater than the risks from domestic or other foreign law enforcement bodies. Account data may be stored in multiple locations to protect information against system failures and IT security risks. For further information about how your personal data is treated, see Google Inc.'s Privacy Policy.

7 How secure is my information? , by its very nature, is neither completely private nor secure, regardless of the type of system being used or where the server is located. Any may be the target of Internet predators, which is why it is important to have a strong password and not to share your confidential information with others. Never provide your password or other personal, secure information via . Google offers a number of security features, and also offers tips on keeping your account secure. Read more about choosing secure passwords on the Computing website. Are users offered any spam protection? Google includes spam protection with their service. Spam is automatically directed to a spam folder and purged after 30 days. The service also includes safeguards for virus checks and verifications before downloading data. However, not all spam protection is 100% effective. It is still up to you to exercise some caution when communicating with unfamiliar sources or downloading attachments.

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August

More information

Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective

Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Professor Michael Geist Canada Research Chair in Internet and E-commerce Law University of Ottawa, Faculty of Law Cloud Computing - Canada

More information

Protecting Saskatchewan data the USA Patriot Act

Protecting Saskatchewan data the USA Patriot Act Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,

More information

Table of Contents. Background... 1. The Complaint...2 The Investigative Process...3. Issues Arising from the Investigation... 3. Discussion...

Table of Contents. Background... 1. The Complaint...2 The Investigative Process...3. Issues Arising from the Investigation... 3. Discussion... Table of Contents Background... 1 The Complaint...2 The Investigative Process...3 Issues Arising from the Investigation... 3 Discussion... 4 Issue 1: Is the information in question personal information

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY

Technology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY Technology Standard Electronic Communications Standard Version: 2.0 Status: Approved 06/17/09 Contact: Director, Technology Services PURPOSE The Virginia Community College System is committed to using

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

PURPOSE APPROVAL SCOPE UNIVERSITY PROPERTY AUTHORIZED USAGE NAME OF POLICY: EMAIL

PURPOSE APPROVAL SCOPE UNIVERSITY PROPERTY AUTHORIZED USAGE NAME OF POLICY: EMAIL EMAIL POLICY #BP001 Abstract This policy applies to all Evangel University email users. The policy covers appropriate use, material distribution, rights and permissions, and authorized access. Information

More information

TO: Vice-Presidents DATE: April 28, 2009

TO: Vice-Presidents DATE: April 28, 2009 TO: Vice-Presidents DATE: April 28, 2009 RE: Performance review and compensation A. Preamble The roles of the vice presidents are central to the activities of the University of Windsor. The positions require

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

Interim Threat / Risk Assessment. Student E- Communications Outsourcing Project

Interim Threat / Risk Assessment. Student E- Communications Outsourcing Project Interim Threat / Risk Assessment Student E- Communications Outsourcing Project Martin Loeffler Information Security, I+TS Creation Date: Version 1.0 June 24, 2010 Last Updated: Version 2.0 July 6, 2010

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

Best Practices for Protecting Individual Privacy in Conducting Survey Research

Best Practices for Protecting Individual Privacy in Conducting Survey Research Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

TERMS and CONDITIONS OF USE - NextSTEPS TM

TERMS and CONDITIONS OF USE - NextSTEPS TM TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/

More information

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY Student Email Use page 1 NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY SEC. VII E-MAIL 3.0 STUDENT EMAIL USE University Policy I. Scope The purpose of this policy is to ensure the proper use

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

Town of Brunswick. Computer Use Policy

Town of Brunswick. Computer Use Policy Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation

More information

Cloud Computing Security

Cloud Computing Security Cloud Computing Security How Google handles your data in Canada Open this slide deck from any device: goo. gl/i9rhff Blair Collins, CPA, CMA Interlockit.com Blair Collins, CMA, CPA - Background 1988 to

More information

The PerspecSys PRS Solution and Cloud Computing

The PerspecSys PRS Solution and Cloud Computing THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

Hosting Solutions Made Simple. Hosted Exchange - Email for Small & Medium Businesses

Hosting Solutions Made Simple. Hosted Exchange - Email for Small & Medium Businesses Hosting Solutions Made Simple Hosted Exchange - Email for Small & Medium Businesses Compete More Effectively with Hosted Exchange Today s economy is especially hard on small businesses. How does your small

More information

Schulich School of Education

Schulich School of Education Schulich School of Education www.nipissingu.ca Bachelor of Education (BEd ) Consecutive Program An Internationally Recognized Leader The Schulich School of Education at Nipissing University is built on

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

The cloud thing: Privacy and cloud computing

The cloud thing: Privacy and cloud computing The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author

More information

Cloud Computing: Trust But Verify

Cloud Computing: Trust But Verify Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet

More information

Table of Contents. Acknowledgement

Table of Contents. Acknowledgement OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

M&T BANK CANADIAN PRIVACY POLICY

M&T BANK CANADIAN PRIVACY POLICY M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

Guideline for E-mail Services

Guideline for E-mail Services Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

Master s Degree Programs in Canada

Master s Degree Programs in Canada 1 Master s Degree Programs in Canada The following is a selected list of Master s degree programs in Canada, chosen specifically with graduates of Nipissing s BA in Social Welfare & Social Development

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

Client Training Manual

Client Training Manual Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Privacy Best Practices

Privacy Best Practices Privacy Best Practices Mount Royal University Electronic Collection/Storage/Transmission of Personal (Google Drive/Forms/Docs) Google Suite: Document, Presentation, Spreadsheet, Form, Drawing Overview

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

HIPAA: The Role of PatientTrak in Supporting Compliance

HIPAA: The Role of PatientTrak in Supporting Compliance HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use

Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

(Updated 7 February 2011)

(Updated 7 February 2011) (Updated 7 February 2011) What is being proposed and why? UH Information Technology Services (ITS) is recommending moving all @hawaii.edu email to Google, referred to as Google@UH. The purposes are: To

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Southern Law Center Law Center Policy #IT0004. Title: Email Policy

Southern Law Center Law Center Policy #IT0004. Title: Email Policy Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of

More information

Insights and Commentary from Dentons

Insights and Commentary from Dentons dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more

More information

UH Mail Server Retirement

UH Mail Server Retirement University Information Technology UH Mail Server Retirement Technology Services and Support Davis, Ivey S!" Table of Contents The University of Houston s Mail.Uh.edu Server Retirement... 2 Introduction...

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

ChangeIt Privacy Policy - Canada

ChangeIt Privacy Policy - Canada ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

B. Terms of Agreement; Google Terms of Service; Conflicting Provisions

B. Terms of Agreement; Google Terms of Service; Conflicting Provisions OHSU Email Address for Life Terms and Conditions These Terms and Conditions govern your activation, receipt, and use of an @alumni.ohsu.edu email account. Activating an @alumni.ohsu.edu email account constitutes

More information

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005 Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005

More information

Top Five UV Universities

Top Five UV Universities Selected performance measures January 2012 UVic excellence internationally recognized UVic ranked among the top 200 universities in the world Faculty success: research funding Over the past ten years,

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

PRIVACY NOTICE. Last Updated: March 24, 2015

PRIVACY NOTICE. Last Updated: March 24, 2015 PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement

More information

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...

More information

Park Avenue motor cars

Park Avenue motor cars Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Index All entries in the index reference page numbers.

Index All entries in the index reference page numbers. Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125

More information

ICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction

ICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction ICG PRIVACY POLICY Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction Version 1.3, updated 5th May 2014 "Protecting the personal privacy interests

More information

Gmail Security - Concerns About Privacy

Gmail Security - Concerns About Privacy Office of Risk Management and Access to Information MEMORANDUM Tel.: (807) 343-8518; 343-8267 Fax: (807) 346-7735 Email: mshaw1@lakeheadu.ca TO: FROM: Inquirers about Lakehead University s Adoption of

More information

Fact Sheet Summary of Ontario elearning Surveys of Publicly Assisted PSE Institutions

Fact Sheet Summary of Ontario elearning Surveys of Publicly Assisted PSE Institutions February 22, 2011 Fact Sheet Summary of Ontario elearning Surveys of Publicly Assisted PSE Institutions INTRODUCTION As part of the Open Ontario Plan outlined in the 2010 Speech from the Throne and the

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

THINKING ABOUT BECOMING A TEACHER? Career & Placement Services Information Session 2015

THINKING ABOUT BECOMING A TEACHER? Career & Placement Services Information Session 2015 THINKING ABOUT BECOMING A TEACHER? Career & Placement Services Information Session 2015 5 Steps to Becoming a Teacher Step 1: Get a well-rounded high school education, including good marks in mathematics,

More information

Pamela Gravestock & Emily Gregor Greenleaf University of Toronto

Pamela Gravestock & Emily Gregor Greenleaf University of Toronto OVERVIEW OF TENURE AND PROMOTION POLICIES ACROSS CANADA Pamela Gravestock & Emily Gregor Greenleaf University of Toronto The accompanying documents provide summaries of tenure and promotion policies from

More information

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website

Terms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Email Basics Webmail versus Internet Mail

Email Basics Webmail versus Internet Mail Email Basics Webmail versus Internet Mail First of all, what is Webmail? It is service that provides access to send, receive, and review e mail using only your Web browser from any computer in the world,

More information

The privacy of DataLogic CRM, Inc. s customers and affiliates is important to us. Therefore:

The privacy of DataLogic CRM, Inc. s customers and affiliates is important to us. Therefore: Privacy Policy DataLogic CRM, Inc. is committed to the security and privacy of our customer s data. This Privacy Policy explains our commitment to safeguarding our customers data and serves as our agreement

More information

Code - A Date Approved: July 24/01

Code - A Date Approved: July 24/01 Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network

More information

1. The information we collect and how we collect it.

1. The information we collect and how we collect it. PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage Dean Bank Primary and Nursery School Secure Storage of Data and Cloud Storage January 2015 All school e-mail is disclosable under Freedom of Information and Data Protection legislation. Be aware that anything

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

The following terms apply to your purchase of Shopify brought to you by Rogers, provided by Rogers supplier, Shopify Inc.

The following terms apply to your purchase of Shopify brought to you by Rogers, provided by Rogers supplier, Shopify Inc. Shopify brought to you by Rogers The following terms apply to your purchase of Shopify brought to you by Rogers, provided by Rogers supplier, Shopify Inc. 1. Scope of Products and Services. Rogers licenses

More information

Service Line Warranties of Canada PRIVACY STATEMENT

Service Line Warranties of Canada PRIVACY STATEMENT Service Line Warranties of Canada PRIVACY STATEMENT We at Service Line Warranties of Canada ( us, our we, or Company ) consider the protection of your personal information to be a priority when you visit

More information

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information