CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS
|
|
|
- Willis Summers
- 10 years ago
- Views:
Transcription
1 CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS
2 CCBE guidelines on the use of cloud computing services by lawyers TABLE OF CONTENTS I. INTRODUCTION Scope of the guidelines Cloud computing Cloud computing on the European Commission agenda Cloud computing for lawyers: benefits and risks CCBE guidelines on cloud computing... 5 II. CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS... 5 A. Data protection laws and professional secrecy principles... 5 B. Preliminary examination of cloud computing services... 6 C. Pre-evaluation of data sensitivity... 7 D. Assessment of security measures... 7 E. Comparing existing in-house IT infrastructure with cloud services... 7 F. Assessment of ability to recover data in the event of the failure of the cloud service provider, failure of the law firm or contractual dispute between the provider and law firm... 7 G. Contractual precautions... 8 H. Contingencies... 8 I. Transparency... 9 J. General consideration
3 I. INTRODUCTION 1. Scope of the guidelines This paper is intended to create more awareness about the various risks associated with cloud computing. As such, the guidelines in Part II of this paper are addressed to the CCBE s member bars and law societies drawing attention to the issues which are likely to be faced by individual lawyers in making informed decisions when advising on or considering the use of cloud computing services. 2. Cloud computing Cloud computing is a general term for IT infrastructure that involves storing and processing data and software remotely in the cloud provider s data centre or interlinked centres, accessed as a service by using the Internet. According to the US National Institute of Standards and Technology (NIST), cloud computing enables omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources, such as networks, servers, storage, applications and services, that can be rapidly released with minimal management effort or service provider interaction Cloud computing on the European Commission agenda The need to develop an EU-wide strategy on cloud computing has been highlighted in the European Commission Digital Agenda for Europe. The three broad areas to be addressed in this context in order to ensure that Europe maximises the benefits from cloud computing include: The legal framework: this concerns data protection and privacy, including the international dimension. It also concerns laws and other rules that have a bearing on the deployment of cloud computing in public and private organisations. Technical and commercial fundamentals: the aim is to extend the EU s research support and focus on critical issues, such as security and availability of cloud services. The market: pilot projects will be supported aiming at cloud deployment. Really to harness the power of public procurement, the Commission will engage with public-sector partners in the Member-states and at regional levels to work on common approaches to cloud computing. As the Commission reports, work has already started in some of these areas, including a public consultation in 2011 to which the CCBE responded Cloud computing for lawyers: benefits and risks Law firms as well as other businesses use cloud computing for many reasons. The reduction of costs constitutes one consideration. Cloud computing might involve decrease in expenses to purchase servers and software or to hire IT staff to maintain the servers. In addition, since many cloud computing applications include access from anywhere, an easy setup of off-site work can save rent and travelling costs as well as facilitate joint working amongst the offices of multi-location law firms. Moreover, cloud computing can simplify computing work for many law offices. For firms with an existing IT infrastructure, cloud-based software programmes can reduce IT complexity. Likewise, for law practices starting out, with no pre-existing software systems in place, it is relatively simple matter to create an effective practice management system from the ground up using cloud-based software programmes. Cloud computing systems usually provide increased flexibility for the end user, since cloud computing services are accessed via an Internet connection from anywhere at any time. Similarly, unlike desktop or server-based software systems, cloud-based platforms can be used on any type of computer or 1 P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, US Department of Commerce (January 2011). 2 CCBE Response regarding the European Commission public consultation on cloud computing. 3
4 Internet-enabled device, using any type of operating system. As long as the users can access the Internet, they can access files stored on the cloud. As such, cloud computing might enable lawyers to provide their services in novel and more efficient ways, to the benefit of their clients. Nevertheless, alongside many significant benefits, cloud computing also brings its own set of risks and challenges for lawyers, most significantly in relation, first to questions of data protection, second, to professional obligations of confidentiality and, third, to other professional and regulatory obligations incumbent on the lawyer. Though the first and second of these areas are closely related, they are not necessarily identical. The lawyer will also require to be sensitive to purely commercial risks to which he may be exposed, for example by a temporary unavailability of his cloud service causing disruption to his business. The essence of cloud computing is the use of a third party, remote provider for computing services including the storage of data, as opposed to the use of computers or servers on the premises of the user or wholly under the user's control. The Cloud provider will often own or rent from other providers huge data centres which, in the case of the largest cloud providers may be interlinked to form a network of servers some of which may be located, in countries outside the EEA, where different and, it may be, a lower standard of data protection may apply. In a few cases, such centres may be located in countries which do not fully respect the rule of law. Furthermore, where there is a network of cloud servers, data may be disaggregated and stored on different servers (even in different countries) and even be constantly migrating amongst those servers. In most cases, even the controllers of such networks will be unaware of where, precisely, in the network an item of data may be stored at any given time. These circumstances clearly raise specific issues and possible concerns for the legal profession relating to standards of data protection and potential theft, loss or disclosure of confidential information. The most direct concerns of lawyers arising out of cloud computing include 3 : Issues relating to professional secrecy and data protection: Lawyers responsibility might need to be clarified concerning the reliability and the safety of the Cloud on which they store their Clients data Cloud computing might necessitate clarification of the extent to which lawyers need to obtain client s consent before using cloud-computing services to store or transmit confidential information. Data stored in a cloud computing environment might be susceptible to risks of unauthorised access either physically through unauthorised access to the premises in which the servers are located or electronically, either by the provider s employees or sub-contractors, or by outside parties, for example hackers, via the Internet. Issues relating to extraterritoriality: Cloud computing might involve data processing on servers in countries which have fewer or less effective legal protection mechanisms for electronically stored information than are mandated in the EU/EEA and which do not fall within the EU regulatory regime. Cloud computing providers might be subject to local rules obliging them to hand over European lawyers data stored on a cloud server to, as the case might be, non-eu national authorities. An additional risk factor is long-arm foreign legislation which might seek to impose obligations to disclose data upon request to national authorities, not only upon home state companies providing cloud services, but also on foreign companies which are ultimately owned by home state companies. In this respect, cloud computing might be subject to unclear procedures governing response or refusal of the provider to government requests for access to information. Issues relating to (local) deontological/regulatory requirements: 3 Several of these issues were identified in the following papers: The Law Society of Scotland s Cloud Computing - Advice for the profession (2012) and American Bar Association s Commission on Ethics 20/20 Working Group on the Implications of New Technologies Issues Paper Concerning Client Confidentiality and Lawyers Use of Technology (September 20, 2010). 4
5 Problems might also arise out of the fact that there may be diverging and/or conflicting local requirements of national bars or law societies to which lawyers need to adhere with regard to the handling of confidential data. Issues relating to contracts with cloud computing service providers: Cloud computing might be subject to unclear policies regarding ownership of stored data. Cloud-computing providers might fail to back up data adequately and/or provide permanent availability of their Cloud services. Cloud computing might be subject to insufficient data encryption. Cloud computing might be subject to unclear policies for notifying customers of security breaches. Cloud computing might be subject to unclear policies regarding the duration of data storage. Cloud computing might be subject to unclear policies for data destruction in cases when a law firm no longer wishes the relevant data to be available on the cloud computing server or when it wishes the data to be transferred to another law firm. Cloud computing might involve problems relating to data access using easily accessible software in the event that a law firm terminates its relationship with the cloud-computing provider or when the provider changes or goes out of business. 5. CCBE guidelines on cloud computing As outlined above, cloud computing provides a constructive alternative to traditional IT infrastructure systems for lawyers. However, alongside many significant benefits, it also entails a set of risks and challenges affecting lawyers ability to adhere to their legal obligations as data controllers under the Data Protection Directive, to their professional codes of conduct, particularly as regards obligations of client confidentiality, and to their responsibilities under the regulatory regimes to which they may be subject, for example in maintaining accounting records which might be inspected by their regulator, or providing for continuity of business in the event that their law firm ceases to be able to provide its services. It is imperative that lawyers, when considering deploying cloud computing in their offices, take necessary steps to ensure that client data is protected, that client confidentiality is maintained and that the concerns identified in paragraph 2 above are adequately addressed. Nevertheless, like other consumers, lawyers will often not know enough to be certain that security measures are sufficient. Within this context, the CCBE has developed this set of guidelines on the use of cloud-computing services by lawyers. These guidelines are intended to make lawyers more mindful of the various risks associated with cloud computing and to assist them in making informed technology decisions. II. CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS National Bars and Law Societies, in advising those of their members who are considering deploying cloud computing in their offices should seek to draw to their attention the following considerations: A. Data protection laws and professional secrecy principles As a general rule, data protection laws and professional secrecy principles should be taken into account by lawyers as a primary step when considering using cloud computing services. Particularly, lawyers should verify whether they are allowed under the rules of their home state bar or law society to store data outside their law firm and, if so, ensure that the cloud computing service provider is not subject to a jurisdiction with long-arm legislation obliging them to hand over European lawyers data stored on a cloud server to, as the case might be, non-eu national authorities. Lawyers may wish to consider whether, in view of these concerns, it might not in any given case, be more appropriate to 5
6 use a cloud service provider established within the EEA and (wherever situated) so far as practicable not subject to such long-arm jurisdiction. B. Preliminary examination of cloud computing services Law firms are invariably engaged in processing different types of data to which various requirements in terms of handling and protection may apply, subject to the overriding obligation of professional confidentiality/secrecy. Lawyers considering using cloud computing services should first think about the type of service model, which would suitably fulfil current and future needs of their offices. When using Cloud Software as a Service (SaaS) 4 or Cloud Infrastructure as a Service (IaaS) 5 laywers will have to assure that both of them include processing and storage of data which may well include personal data and sensitive personal data, as well as information protected by client confidentiality. Lawyers have thus to be informed and aware of these considerations when processing data externally. Establishing encryption procedures of data in data transmission and storage should also be considered. In these circumstances, if a lawyer intends to use cloud computing, the first decision to be made will be whether to adopt the SaaS or the IaaS models. Further, cloud computing services may be provided by a public cloud provider or a private cloud provider. A public cloud provider is one who offers his services to all, whereas a private cloud provider will typically be owned and/or controlled by a small group. For example, in some Member States, lawyers have themselves grouped together to form private clouds. The public/private cloud distinction may be highly pertinent in an evaluation of which provider presents the lower risk factor, for example in relation to the possibility of storage of data on servers situated outside the EEA or data which may be the subject of long-arm jurisdiction. The use of a public cloud should by no means regarded as always being unsuitable, provided that the lawyer has first done due diligence on the provider itself, on the security of the data centre used by the provider and on the detail of the Service Level Agreement. In the event that such due diligence reveals concerns, it may well be that providers (particularly small and medium sized ones) would be prepared to adapt their services and/or negotiate contract terms so as to address those concerns. Before contracting, a lawyer, as the end user of the cloud service, should verify: [a] [b] [c] [d] the experience, the reputation, the specialisation, the registered address and location of the cloud computing service provider. In addition, a separate verification of the following should be conducted: [a] [b] [c] [d] [e] the providers solvency, reliability, ownership and capital adequacy, any potential conflicts of interests, risks of any misuse of the stored information, exact localisation of the storing servers, so far as practicable, the security both physical and electronic of the servers and the data centre in which they are located, 4 SaaS (Cloud Software as a Service): a provider delivers, via the web, various application services and makes them available to end-users. These services are often meant to replace conventional applications to be installed by users on their local systems; accordingly, users are ultimately meant to outsource their data to the individual provider. This is the case, for instance, of typical web-based office applications such as spreadsheets, text processing tools, computerized registries and agendas, shared calendars, etc.; however, the services in question also include cloudbased applications. Source: Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing 5 IaaS: a provider leases a technological infrastructure, i.e. virtual remote servers the end-user can rely upon in accordance with mechanisms and arrangements such as to make it simple, effective as well as beneficial to replace the corporate IT systems at the company s premises and/or use the leased infrastructure alongside the corporate systems. Such providers are usually specialized market players and can rely actually on a physical, complex infrastructure that often spans over several geographic areas.source: Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing. 6
7 [f] the applicable civil, criminal and public laws and regulations C. Pre-evaluation of data sensitivity Law firms are invariably engaged in processing different types of data to which various requirements in terms of handling and protection apply. Any decision to store information on the cloud server should be necessarily accompanied by considerations on the type of information (employee data, criminal data, general legal archives, etc.) and the level of protection measures that should be adopted accordingly. D. Assessment of security measures Any assessment of cloud-service providers should involve evaluation of adopted technical, physical and organisational security measures in accordance with national and international IT-riskmanagement standards, such as ISO 27001:2005 (security management) and ISO 9001 (quality management) Certificates issued by acknowledged IT auditors could also serve as a test criterion. When applicable, a lawyer would also need to assess reliability of his own in-house security standards by setting up ICT rules, providing information and training staff. Since effective password management is rarely accomplished in its entirety by law firms, tokenisation or introduction of electronic ID-card registration on desk should be considered. In general, a lawyer should always consider obtaining professional support and advice when selecting and monitoring cloud-service providers. E. Comparing existing in-house IT infrastructure with cloud services When evaluating cloud services, lawyers should make a comparison with their current in-house IT infrastructure. Such evaluation would enable the law firm to decide if switching to a separate cloud service might reduce or increase risks. F. Assessment of ability to recover data in the event of the failure of the cloud service provider, failure of the law firm or contractual dispute between the provider and law firm A lawyer will not wish to suffer business disruption in the event of the failure of his cloud service provider. Additionally, in many jurisdictions, lawyers are under professional and regulatory requirements to have client data and other material which may not be personal or client data (such as their firm's accounting records) available for inspection by appropriate professional and national regulatory bodies. If such material is not able to be made available when required by such authorities, whether by reason of the failure of the cloud service provider, the failure of a lawyer's own business (leading to a breach or the termination of the contract with the cloud service provider) or by reason of a contractual dispute with the cloud service provider which might give rise to a lien or right of retention by the provider over the lawyer's data, then that may expose the lawyer to a finding of professional misconduct or to the commission by the lawyer of a regulatory offence, as a result of his not having produced the data or other material. Such offence or misconduct may be continuous or repeated so long as the inability to produce the material continues. Therefore, in evaluating cloud service providers, a lawyer should assess his own vulnerability to adverse professional or regulatory consequences arising through such an unavailability of data. He should consider whether it is necessary to seek to negotiate appropriate contractual terms to ensure such continued availability, even in the event of a contractual dispute or failure of either the provider or his own law firm. He may also require to assess whether it is necessary also to seek technical means to overcome such unavailability. For example, a contractual right to recover data may be of limited utility if the data is in a form which is not easily readable. It may be necessary to ensure the continued availability of the software required to read the data, for example, by means such as the licence of the relevant software being held in escrow for the benefit of the lawyer. 7
8 G. Contractual precautions It is important to at least consider the following aspects: [a] [b] [c] [d] [e] [f] [g] [h] [i] [j] [k] [l] [m] [n] [o] [p] [q] [r] [s] [t] [u] [v] [w] scope of service, system availability, deadlines for error corrections and removal of malfunctions, contractual fines for non-performance and delays (if enforceable under the applicable national laws), changes in service requirements, service provider s obligation to system adaptations required due to regulatory or legislative amendments, exclusion of engagement of sub-contractors without prior consent, licenses, particularly assurance that the software used by the provider has been properly licensed to it, ownership of data stored and exclusive right of access, data protection agreements, in particular if and to the extent required by applicable national laws 6, security measures and responsibility, non-disclosure obligations, monitoring and reporting, technical documentation, process documentation and user/system administrator documentation, right to control and audit, including standard certifications, back-up, disaster recovery contingency plan, provision for Software-ESCROW in case of insolvency or business incapability of the cloud-service provider, location of servers - national, EEA or outside of the EEA but with the European standards in respect to privacy and confidentiality, insurance, guarantees, warranties, damages, term, termination, end of service and exit-management provisions, including on transmission and deletion of data, mediation, conciliation and/or arbitration, applicable law and jurisdiction. H. Contingencies Attention should always be paid to the fact that cloud-service availability depends on an uninterrupted network connection. The lawyer should consider whether it may be necessary to have an alternative or back-up means of connecting to the internet in the event that his primary connection should fail. 6 For example, such as under Section 11 of the German Data Protection Act. 8
9 I. Transparency In order to ensure transparency of legal services, a lawyer might consider informing his future clients that the law firm uses cloud computing services. This could be achieved by inserting the information into the general conditions of any legal-service agreement, subject to changes as negotiated with individual clients. This formula would enable the giving of more detailed information on cloud computing exclusively upon individual request. It should be noted that there may be certain jurisdictions where client consent is necessary. The insertion of information into the general conditions of a legal-service agreement would be particularly advisable in cases when a law firm uses services of a cloud provider with servers located in a different jurisdiction. In such a case, a lawyer might need to obtain informed consent from his client to store confidential data on such servers. Information on the cloud-service provider as well as legal standards on data protection, privacy law and professional privileges of lawyers in a country where the servers are located should be provided to the client. J. General consideration Cloud computing involves many risks and issues as outlined in these guidelines, particularly with regard to confidentiality/legal professional privilege and data retention. The CCBE invites Bars and Law Societies to increase awareness among their members for greater vigilance and to adopt highlevel precautions. Legal and technical safeguards should be provided to them by their cloud computing providers (i.e. long-term data backup guarantee, etc.). In practice, it might not always be possible for individual lawyers to satisfy all these considerations. Bars and law societies are therefore encouraged to determine mechanisms to facilitate lawyers to be able to comply with these guidelines, such as developing in-house cloud computing infrastructures in compliance with the above mentioned considerations. In this case, they may wish to carry out an impact assessment. 9
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Financial Services Guidance Note Outsourcing
Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
Cloud Computing. Introduction
Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
The Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 CONTENTS Page 1. Introduction 3-4 2. The Commission s Policy 5 3. Outsourcing
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013
Public Record Office Victoria Cloud Computing Policy Guideline 1 Cloud Computing Decision Making Version Number: 1.0 Issue Date: 26/06/2013 Expiry Date: 26/06/2018 State of Victoria 2013 Version 1.0 Table
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK This Guideline does not purport to be a definitive guide, but is instead a non-exhaustive
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Authorisation Requirements and Standards for Debt Management Firms
2013 Authorisation Requirements and Standards for Debt Management Firms 2 Contents Authorisation Requirements and Standards for Debt Management Firms Contents Chapter Part A: Authorisation Requirements
CLOUD CONTRACTS WHAT PROVIDERS AND CUSTOMERS SHOULD DISCUSS
CLOUD CONTRACTS WHAT PROVIDERS AND CUSTOMERS SHOULD DISCUSS Catalogue of recommended contractual components in General Terms and Conditions of Business (AGB) and Service Level Agreements (SLA) for Cloud
CLOUD COMPUTING GUIDELINES FOR LAWYERS
INTRODUCTION Legal practices are increasingly using cloud storage and software systems as an alternative to in-house data storage and IT programmes. The cloud has a number of advantages particularly flexibility
RS Official Gazette, No 23/2013 and 113/2013
RS Official Gazette, No 23/2013 and 113/2013 Pursuant to Article 15, paragraph 1 and Article 63, paragraph 2 of the Law on the National Bank of Serbia (RS Official Gazette, Nos 72/2003, 55/2004, 85/2005
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING
AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in
Cloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
GUIDANCE NOTE ON OUTSOURCING
GN 14 GUIDANCE NOTE ON OUTSOURCING Office of the Commissioner of Insurance Contents Page I. Introduction.. 1 II. Application...... 1 III. Interpretation.... 2 IV. Legal and Regulatory Obligations... 3
Managing Outsourcing Arrangements
Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Information Sheet: Cloud Computing
info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
HIPAA Compliance and the Protection of Patient Health Information
HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
Mapping of outsourcing requirements
Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
Anatomy of a Cloud Computing Data Breach
Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Outsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
August 2011. Report on Cloud Computing and the Law for UK FE and HE (An Overview)
August 2011 Report on Cloud Computing and the Law for UK FE and HE (An Overview) Please Note: This guidance is for information only and is not intended to replace legal advice when faced with a risk decision.
SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA
INSTRUMENT FOR PRE ACCESSION ANNUAL PROGRAM 2012 SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA Project number: Europe Aid/133806/C/SER/XK Contract number: 2013/333-753
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Outsourcing by UK-based Fund Managers: Identifying and Applying the Rules
Outsourcing by UK-based Fund Managers: Identifying and Applying the Rules Amanda Lewis, Partner and Rosali Pretorius, Partner, Dentons 1 October 2014 UK-based fund managers must comply with increasingly
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
APES GN 30 Outsourced Services
APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: [DATE] Copyright 2012 Accounting Professional & Ethical Standards Board Limited (
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Application of Data Protection Concepts to Cloud Computing
Application of Data Protection Concepts to Cloud Computing By Denitza Toptchiyska Abstract: The fast technological development and growing use of cloud computing services require implementation of effective
Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.
International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction
How To Understand Cloud Computing
CLOUD COMPUTING Jillian Raw Partner, Kennedys http://www.kennedys-law.com/jraw/ Cloud Computing- what they say about it the cloud will transform the information technology industry profoundly change the
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
14 December 2006 GUIDELINES ON OUTSOURCING
14 December 2006 GUIDELINES ON OUTSOURCING CEBS presents its Guidelines on Outsourcing. The proposed guidelines are based on current practices and also take into account international, such as the Joint
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Legal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
Managing General Agents (MGAs) Guideline
Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission
AIRBUS GROUP BINDING CORPORATE RULES
1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES 1 1 Definitions In these conditions:- We means Scotland s Commissioner for Children and Young People,
Microsoft Online Services - Data Processing Agreement
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID This Amendment consists of
