Student Service Improvements Executive Background Brief
|
|
- Augustus Rich
- 8 years ago
- Views:
Transcription
1 Student Service Improvements Executive Background Brief Executive Summary Despite the ubiquity of consumer services and the fact that virtually all students coming to York have been using electronic mail for many years there remains an expectation among students that the University will provide them with a University account. And indeed the vast majority of Universities in Canada and beyond continue to provide their student with this service. The rise of consumer services, like Gmail (Google) and Hotmail/Outlook (Microsoft) with their associated capacity and functionality, has also created a great gulf in expectations between what students expect from an service and what legacy University services have generally offered. Approximately six years ago Google, followed later by Microsoft began to offer their services to educational institutions at no cost for students. This proposition has proven quite attractive and as of 2014 the vast majority of Universities in North America have opted to migrate their student service to either Google or Microsoft. In Ontario virtually all Universities have gone in this direction (only one has not signaled a move to a third party service provider). In October of 2011 York started a process to examine the possibility of migrating its student service to a third-party provider via a formal RFP process. That process began in late 2011 and continued through to 2012 and included an assessment of product features etc. as well as an evaluation by students. A second period of student consultation was held in late 2012 and into The RFP process concluded in April 2013 with a recommendation from the evaluation group that the University use Google as a provider for student . A move to Google for student will provide students with a vastly improved service and will bring York in line with the service provided by other schools in the province. This is the major driver for change. This move is not without risk, however, it is felt that the contract terms provided by Google sufficiently mitigate the major risks. The University has also done a privacy impact assessment in order to assess information risks and make recommendations to protect privacy. Background and Current State Like almost all Universities, York provides its students with service - all students are provided with a "@yorku.ca" account (via the York central service) when they start their studies with York. This account is available as long as students are active. Upon graduation or otherwise leaving York the accounts are made inactive. In addition to the central service, a number of Faculties (Schulich School of Business, Osgoode, and Education) also provide service to their students. Most of the Faculties also extend access to their service to alumni. In a 2011 student survey of IT services, the University s service ranked second in the service most needing improvement indicating the need to consider changes. It is
2 reasonable to assume that the dissatisfaction related in part to the fact that the central service has changed little over the past 10 years and its web interface and capacity both lag behind services that students have experience with. The central service also provides only, no calendaring or other services. In the same student survey cited above we also learned that most students use the account but only in a limited way: Over 98% of students use their University issued account; Only 15% of students use a University issued account as their primary address; From additional data on student accounts (from October 2012) about 10% of students forward to a third-party service: Student central October 2012 Number of accounts: 71,809 Total number of forwards: 7,216 (10%) Forward to gmail: 3,306 (4.6%) Forward to hotmail/live: 2,616 (3.6%) Forward to yahoo: 344 (0.5%) Other forwards: 950 (1.3%) As of March 2014, the statistics remain relatively the same and percentages of splits are as follows. The October 2012 statistics continue to be reflective of peak usage in a typical academic year. March 2014 percentages Percentage of total forwards (8.3%) Percentage forwarded to gmail (3.9%) Percentage forwarded to hotmail/live (2.9%) Percentage forwarded to yahoo (0.4%) Percentage of other forwards: (1.1%) Over the past number of years a strong trend has emerged for Universities and Colleges to maintain their service for students by moving the provision and support for the service to a "third party" service provider (Google or Microsoft) - providing an institutionally branded service hosted in the "cloud". Both Google and Microsoft provide a package of , file storage and productivity applications at no cost to Universities. The vast majority of U.S. University and colleges have moved in this direction and the trend has begun to pick up in Canada in recent years. In Ontario Universities that have transitioned their service to a third-party provider include: Ryerson University student, faculty and staff to Google University of Toronto student to Microsoft (consultation on moving faculty and staff in progress) University of Windsor student to Google McMaster University student to Google
3 Carleton University student to Microsoft Wilfred Laurier University student to Google Lakehead University student, faculty and staff to Google University of Ottawa student to Google Laurentian University student to Google Queens student to Microsoft UOIT student to Google Trent University student to Google Nipissing student to Google Western University student to Microsoft University of Guelph student to Google In October of 2011 York launched a process to explore the possibility of using an external provider for its student . The goals of the initiative included: Performing a structured assessment of alternative providers that offer free services the assessment to include both functional and technical requirements. Identifying issues and requirements of a solution related to information privacy. The process was guided by a steering committee consisting of representatives from information technology groups, alumni, division of students and the University information privacy office. The initiative was also introduced to students via a presentation to the Student Representative Roundtable in October 2011 (The SRR also received updates on the progress of the initiative annually through ). It was determined that a possible move of student to a third party provider would be best informed by a formal RFP process. Through the winter of 2011 requirements were developed and the RFP issued in February The evaluation of responses began in March 2012 synchronous with a student evaluation of alternatives. The assessment of RFP responses was completed by a working group comprised of representatives from the same groups represented on the steering group and led by Procurement Services. Two rounds of consultations with students in March-April 2012 and again in November-December 2012 also provided input into the decision. The recommendation of the working group was to award the RFP to Google (via the reseller Aprio). The Student Representative Roundtable received updates on the progress of the initiative annually through Risk Analysis - The major risks associated with a move of student to Google include: - The service is currently offered at no cost, at the end of the term Google s business model could change to require fees. - Google is responsible for service quality. - The service feature set and upgrades are in control of Google. - Student information will reside with Google while the University remains accountable for its protection and handling. - There are perceptions of particular risks associated with the information being in the custody of a U.S. corporation.
4 In early 2013 the University engaged with Google to discuss contractual arrangements for the service that would include terms to mitigate some of these risks. Contract review was led by York Procurement, and involved York s legal and information privacy office. The terms in the Google contract are felt by the University to be sufficient and appropriate for the student service. The very broad adoption of this service by Universities and Colleges also would be expected to serve as a force that would reduce the likelihood of radical negative change by the company. With respect to information privacy risks, the University's guidelines and procedures on use state that, "By its nature, is not a confidential medium; it is possible for messages to be intercepted, modified, copied or redirected without the knowledge of the sender or recipient by those with sufficient access to the transport systems or networks". Nevertheless the expectation of the users of our services is that they are operated and maintained in such a way to ensure appropriate access, security and custody of information. The University maintains these same responsibilities even if the service is operated by a third party on the University s behalf. Attachment 1 contains a set of questions and answers prepared to respond to potential concerns around information privacy (drafted for student information on the new service). Included in the questions in Attachment 1 is a section addressing potential concerns around the fact that the Google service would be subject to the U.S.A. patriot act. A number of legal authorities have expressed opinions that the patriot act does not represent a special risk to information. A similar opinion was expressed by the Ontario Privacy Commissioner in a report in June of 2012 (report PC12-39): There may be no greater area of confusion and misunderstanding than fear of the PATRIOT Act. The PATRIOT Act has invoked unprecedented levels of apprehension and consternation far more than I believe is warranted. For the reasons outlined on pages 5 and 6, the feared powers were available to law enforcement long before the passage of the PATRIOT Act, through a variety of other legal instruments. In my view, these fears are largely overblown, and focusing on them unduly constitutes a pointless exercise. I believe it is far more productive to compel organizations to be fully responsible and accountable for the services they provide or outsource. Finally, the University Information Privacy Office and UIT worked together on a privacy impact analysis that examined the information risks related to Google s hosting of student and made recommendations for protecting privacy within the context of York s implementation of the new service.
5 ATTACHMENT 1 - Responding To Questions About Privacy York University is committed to maintaining and protecting the confidentiality and privacy of our students' personal information. Before implementing this new service, we looked at the privacy implications and ways to help ensure that personal information is protected in accordance with the University's policies on personal information and with applicable legislation governing personal information. As part of the implementation, we: looked at different service provider options conducted our own internal review of our privacy needs in relation to student consulted with Canadian universities that had already implemented, or were in the process of implementing, a cloud- based student solution consulted students as part of the service provider selection process conducted a Privacy Impact Assessment (PIA) with a view to identifying major risks and implementing remediation measures to help reduce those risks consulted with the University's Information and Privacy Office and with the Office of the Counsel Will Google own the data that is stored in Google or passes through Google servers? Google does not own student data. Data Google accounts is the property of York University and/or the student, the end user. The agreement that York University has entered into with Google has no impact on the intellectual property rights or ownership of student data. What steps has the University taken to ensure that my privacy is protected? We have taken the appropriate steps to ensure that your privacy rights, as outlined in the University's policy on Access to Information and Protection of Privacy, are safeguarded. Passwords are not shared with Google. Our contract with Google prohibits Google s access to content, except to exercise rights and fulfill its obligations under our Agreement, including situations of Services abuse or technical threat. Google is also committed to your privacy and to ensuring the confidentiality and security of your personal information. Their security policies include provisions on the protection of your data against threats and unauthorized access. What personal information is shared with Google?
6 A limited amount of student information is shared with Google in order to create a Google- powered student account. The following personal information is provided: first name, last name, username, and address to validate against our authentication services. Will Google log my activity or scan my content? Google has some access to your account as explained in the Terms of Service. Google has agreed that the University is not granting Google any rights, implied or otherwise, to content. Google is not permitted to conduct data mining. Google has also agreed that Google is not permitted to include advertising in our student accounts. Google employees may be granted temporary access to your for troubleshooting purposes or to ensure the integrity of the services provided, but only with the approval of York University Administrators. Can Google share my personal information with any third parties? No. Our agreement with Google states that Google is not allowed to share students' personal information. Who is responsible for protecting the data stored in or sent from Google account? Students continue to be responsible for how they use their University- provided accounts in accordance with the University s computing policies. Students have an obligation to promote responsible, ethical and secure use of services. Google is also responsible for protecting and maintaining the security standards of the facilities it uses to store and process end- user data. Where is Google account data stored? Student account data is stored at one of Google's global facilities; access to these facilities is governed by the laws of the jurisdiction in which the data is stored, including the USA PATRIOT Act. Note that both Canada s Privacy Commissioner and Ontario s Information and Privacy Commissioner have stated that privacy risks from the USA PATRIOT Act are no greater than the risks from domestic or other foreign law enforcement bodies. Account data may be stored in multiple locations to protect information against system failures and IT security risks. For further information about how your personal data is treated, see Google Inc.'s Privacy Policy.
7 How secure is my information? , by its very nature, is neither completely private nor secure, regardless of the type of system being used or where the server is located. Any may be the target of Internet predators, which is why it is important to have a strong password and not to share your confidential information with others. Never provide your password or other personal, secure information via . Google offers a number of security features, and also offers tips on keeping your account secure. Read more about choosing secure passwords on the Computing website. Are users offered any spam protection? Google includes spam protection with their service. Spam is automatically directed to a spam folder and purged after 30 days. The service also includes safeguards for virus checks and verifications before downloading data. However, not all spam protection is 100% effective. It is still up to you to exercise some caution when communicating with unfamiliar sources or downloading attachments.
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August
More informationCloud Computing: Privacy & Jurisdiction from a Canadian Perspective
Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Professor Michael Geist Canada Research Chair in Internet and E-commerce Law University of Ottawa, Faculty of Law Cloud Computing - Canada
More informationProtecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
More informationTable of Contents. Background... 1. The Complaint...2 The Investigative Process...3. Issues Arising from the Investigation... 3. Discussion...
Table of Contents Background... 1 The Complaint...2 The Investigative Process...3 Issues Arising from the Investigation... 3 Discussion... 4 Issue 1: Is the information in question personal information
More informationElectronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationTechnology Standard. Electronic Communications Standard PURPOSE SCOPE APPLICABILITY
Technology Standard Electronic Communications Standard Version: 2.0 Status: Approved 06/17/09 Contact: Director, Technology Services PURPOSE The Virginia Community College System is committed to using
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationCANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationCLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com
More informationPURPOSE APPROVAL SCOPE UNIVERSITY PROPERTY AUTHORIZED USAGE NAME OF POLICY: EMAIL
EMAIL POLICY #BP001 Abstract This policy applies to all Evangel University email users. The policy covers appropriate use, material distribution, rights and permissions, and authorized access. Information
More informationTO: Vice-Presidents DATE: April 28, 2009
TO: Vice-Presidents DATE: April 28, 2009 RE: Performance review and compensation A. Preamble The roles of the vice presidents are central to the activities of the University of Windsor. The positions require
More informationDoing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
More informationInterim Threat / Risk Assessment. Student E- Communications Outsourcing Project
Interim Threat / Risk Assessment Student E- Communications Outsourcing Project Martin Loeffler Information Security, I+TS Creation Date: Version 1.0 June 24, 2010 Last Updated: Version 2.0 July 6, 2010
More informationROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.
ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands
More informationBest Practices for Protecting Individual Privacy in Conducting Survey Research
Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationTERMS and CONDITIONS OF USE - NextSTEPS TM
TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/
More informationNORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY
Student Email Use page 1 NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY SEC. VII E-MAIL 3.0 STUDENT EMAIL USE University Policy I. Scope The purpose of this policy is to ensure the proper use
More informationCloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
More informationTown of Brunswick. Computer Use Policy
Town of Brunswick Computer Use Policy Town of Brunswick Computer Use Policy Table of Contents 1. General 1 2. Access 1 3. Acceptable Use 1 4. E-Mail 1 5. E-Mail Attachments 2 6. Internet & Websites 2 7.
More informationREGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
More informationThe Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationThe USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
More informationCloud Computing Security
Cloud Computing Security How Google handles your data in Canada Open this slide deck from any device: goo. gl/i9rhff Blair Collins, CPA, CMA Interlockit.com Blair Collins, CMA, CPA - Background 1988 to
More informationThe PerspecSys PRS Solution and Cloud Computing
THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationHosting Solutions Made Simple. Hosted Exchange - Email for Small & Medium Businesses
Hosting Solutions Made Simple Hosted Exchange - Email for Small & Medium Businesses Compete More Effectively with Hosted Exchange Today s economy is especially hard on small businesses. How does your small
More informationSchulich School of Education
Schulich School of Education www.nipissingu.ca Bachelor of Education (BEd ) Consecutive Program An Internationally Recognized Leader The Schulich School of Education at Nipissing University is built on
More informationService Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
More informationThe cloud thing: Privacy and cloud computing
The cloud thing: Privacy and cloud computing David T.S. Fraser (david.fraser@mcinnescooper.com / @privacylawyer) University of New Brunswick July 2011 Disclaimer What follows are the views of the author
More informationCloud Computing: Trust But Verify
Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet
More informationTable of Contents. Acknowledgement
OPA Communications and Member Services Committee February 2015 Table of Contents Preamble... 3 General Information... 3 Risks of Using Email... 4 Use of Smartphones and Other Mobile Devices... 5 Guidelines...
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationM&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
More informationORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
More informationSRG Security Services Technology Report Cloud Computing and Drop Box April 2013
SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing
More informationGuideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
More informationUnited Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
More informationAPPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
More informationService Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
More informationPrivacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
More informationMaster s Degree Programs in Canada
1 Master s Degree Programs in Canada The following is a selected list of Master s degree programs in Canada, chosen specifically with graduates of Nipissing s BA in Social Welfare & Social Development
More informationHow To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
More informationClient Training Manual
Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationPrivacy Best Practices
Privacy Best Practices Mount Royal University Electronic Collection/Storage/Transmission of Personal (Google Drive/Forms/Docs) Google Suite: Document, Presentation, Spreadsheet, Form, Drawing Overview
More informationFAX-TO-EMAIL END-USER LICENSE AGREEMENT
FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company
More informationHIPAA: The Role of PatientTrak in Supporting Compliance
HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining
More informationPolicies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
More informationVoya Financial Advisors, Inc. Registered Representative s Website Terms of Use
Voya Financial Advisors, Inc. Registered Representative s Website Terms of Use Welcome to our site. This page provides important information about use of this site and other legal matters. Please read
More informationStudent ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
More information(Updated 7 February 2011)
(Updated 7 February 2011) What is being proposed and why? UH Information Technology Services (ITS) is recommending moving all @hawaii.edu email to Google, referred to as Google@UH. The purposes are: To
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationSouthern Law Center Law Center Policy #IT0004. Title: Email Policy
Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of
More informationInsights and Commentary from Dentons
dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more
More informationUH Mail Server Retirement
University Information Technology UH Mail Server Retirement Technology Services and Support Davis, Ivey S!" Table of Contents The University of Houston s Mail.Uh.edu Server Retirement... 2 Introduction...
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationB. Terms of Agreement; Google Terms of Service; Conflicting Provisions
OHSU Email Address for Life Terms and Conditions These Terms and Conditions govern your activation, receipt, and use of an @alumni.ohsu.edu email account. Activating an @alumni.ohsu.edu email account constitutes
More informationData Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
More informationTop Five UV Universities
Selected performance measures January 2012 UVic excellence internationally recognized UVic ranked among the top 200 universities in the world Faculty success: research funding Over the past ten years,
More informationTEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
More informationPRIVACY NOTICE. Last Updated: March 24, 2015
PRIVACY NOTICE Your access to and use of this website is governed by the TERMS OF WEBSITE USE and the following PRIVACY NOTICE. Please read them carefully as they constitute a legally binding agreement
More informationCloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
More informationPark Avenue motor cars
Park Avenue motor cars DEALERSHIP COMPUTING POLICIES Mercedes-Benz of West Chester and Fort Washington maintain a variety of policies governing the use of Dealership computing and communication resources.
More informationBRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
More informationIndex All entries in the index reference page numbers.
Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125
More informationICG PRIVACY POLICY. Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction
ICG PRIVACY POLICY Developed in compliance with applicable privacy legislation in each relevant ICG operational jurisdiction Version 1.3, updated 5th May 2014 "Protecting the personal privacy interests
More informationGmail Security - Concerns About Privacy
Office of Risk Management and Access to Information MEMORANDUM Tel.: (807) 343-8518; 343-8267 Fax: (807) 346-7735 Email: mshaw1@lakeheadu.ca TO: FROM: Inquirers about Lakehead University s Adoption of
More informationFact Sheet Summary of Ontario elearning Surveys of Publicly Assisted PSE Institutions
February 22, 2011 Fact Sheet Summary of Ontario elearning Surveys of Publicly Assisted PSE Institutions INTRODUCTION As part of the Open Ontario Plan outlined in the 2010 Speech from the Throne and the
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationE-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY
E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:
More informationDraft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
More informationTHINKING ABOUT BECOMING A TEACHER? Career & Placement Services Information Session 2015
THINKING ABOUT BECOMING A TEACHER? Career & Placement Services Information Session 2015 5 Steps to Becoming a Teacher Step 1: Get a well-rounded high school education, including good marks in mathematics,
More informationPamela Gravestock & Emily Gregor Greenleaf University of Toronto
OVERVIEW OF TENURE AND PROMOTION POLICIES ACROSS CANADA Pamela Gravestock & Emily Gregor Greenleaf University of Toronto The accompanying documents provide summaries of tenure and promotion policies from
More informationTerms of Use Table of Contents 1. General Information 2. Your Agreement to the Terms 3. Changes to the Terms 4. Provision of the Website
Terms of Use Table of Contents 1. General Information. 2. Your Agreement to the Terms. 3. Changes to the Terms. 4. Provision of the Website. 5. Location of the Website. 6. User Conduct. 7. Terms Relating
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationEmail Basics Webmail versus Internet Mail
Email Basics Webmail versus Internet Mail First of all, what is Webmail? It is service that provides access to send, receive, and review e mail using only your Web browser from any computer in the world,
More informationThe privacy of DataLogic CRM, Inc. s customers and affiliates is important to us. Therefore:
Privacy Policy DataLogic CRM, Inc. is committed to the security and privacy of our customer s data. This Privacy Policy explains our commitment to safeguarding our customers data and serves as our agreement
More informationCode - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
More information1. The information we collect and how we collect it.
PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates
More informationCloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
More informationAVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
More informationDean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage
Dean Bank Primary and Nursery School Secure Storage of Data and Cloud Storage January 2015 All school e-mail is disclosable under Freedom of Information and Data Protection legislation. Be aware that anything
More informationEmail Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
More informationThe following terms apply to your purchase of Shopify brought to you by Rogers, provided by Rogers supplier, Shopify Inc.
Shopify brought to you by Rogers The following terms apply to your purchase of Shopify brought to you by Rogers, provided by Rogers supplier, Shopify Inc. 1. Scope of Products and Services. Rogers licenses
More informationService Line Warranties of Canada PRIVACY STATEMENT
Service Line Warranties of Canada PRIVACY STATEMENT We at Service Line Warranties of Canada ( us, our we, or Company ) consider the protection of your personal information to be a priority when you visit
More informationFLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION
FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION DATE: June 10, 2015 REGULATION CHAPTER NO.: Chapter 5 REGULATION CHAPTER TITLE: Miscellaneous REGULATION TITLE AND NUMBER:
More informationWelcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network
More informationCloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
More informationHosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com
Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on
More informationOffice 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
More information