DocuSign Digital Transaction Management Capabilities and xdtm Standard V1.0 Certification

Size: px
Start display at page:

Download "DocuSign Digital Transaction Management Capabilities and xdtm Standard V1.0 Certification"

Transcription

1 DocuSign Digital Transaction Management Capabilities and xdtm Standard V1.0 Certification

2 Introduction Today, DocuSign has over 225,000 customers and 85 million users, who generate nearly 950,000 Digital Transaction Management (DTM) transactions per day and growing. DocuSign is a leader in DTM, both as a global provider of DTM solutions and as a participant in xdtm.org, a crossindustry standards organization that helps companies accelerate their transition to digital transactions and workflows safely, securely, and with a strong return on their investment. DocuSign is certified for the xdtm Standard, Version 1.0, the first of its kind to focus specifically on the quality and reliability of digital transactions. In this white paper, DocuSign s capabilities, policies, and technologies are presented within the context of the of the eight requirement areas of the xdtm Standard: Security Assurance Privacy Validity Availability Scalability Interoperability Universality DocuSign s Digital Transaction Management Solution and the xdtm Standard With DocuSign, you can make any decision, agreement, or approval process 100-percent digital end-to-end. You can also be assured that your digital transactions will be safe, secure, and executed reliability, because DocuSign meets and exceeds the requirements set for by the xdtm Standard. Summary of DocuSign s Adherence to s Security: Assurance: Privacy: Validity: Availability: Scalability: Universality: Interoperability: DocuSign delivers world-class security and meets or exceeds U.S. and international security standards. DocuSign warrants its compliance to the US ESIGN act and complies with applicable laws, regulations, and industry standards around the world. DocuSign business and technology measures ensure customer privacy and the protection of proprietary customer information and data. The DocuSign platform provides an audit trail, chain of custody, tamper-evident seals, and other measures to assure the validity of transactions executed on the platform. DocuSign has maintained more than 99.99% average availability over the past 5 years and doesn t schedule any downtime maintenance. DocuSign undertakes robust capacity planning to provide resilient system performance and ensure scalability for future growth With DocuSign, users can conduct business globally via an app or their platform of choice while both connected and offline. With platform APIs, a mobile SDK, out-of-the-box integrations, and a rich partner ecosystem, DocuSign integrates with a choice of solutions.

3 Table of Contents Security... 1 Assurance... 8 Privacy Validity Availability Scalability Universality Interoperability... 21

4 Security DocuSign delivers world-class security and meets or exceeds U.S. and international security standards. DocuSign is ISO/IEC 27001:2013 and xdtm certified, as well as SSAE 16, SOC 1 Type 2, SOC 2 Type 2 examined and tested across the entire company. In particular, DocuSign s organization-wide commitment to security is reflected in the scope of its ISO/IEC 27001:2013 compliance, which includes all 114 controls. The Information Security Management of DocuSign s electronic signature and enterprise support services, including Product Development, Engineering, Quality Assurance, Operations, Security, BCP/DR, Legal, Human Resources, IT, Customer Service, and the Datacenters, delivers a secure infrastructure and resilient environment. This is in accordance with the ISO/IEC 27001:2013 Statement of Applicability vers. 22 9/24/2014 (Certificate issued by British Standards Institute). Security technology at DocuSign spans encryption, system monitoring, penetration testing, environmental segmentation, data center security, robust authentication and encryption key management practices, and proactive monitoring of potential security threats. Details on DocuSign security technology and policies as they relate to xdtm Standard requirements are detailed below: 1. Sensitive customer data, encrypted or tokenized at rest or in transit, adheres to referable standard, such as NIST, ISO, or equivalent. How DocuSign Delivers World-Class Security No DocuSign employee, vendor, or contractor has access or visibility into customer documents within a DocuSign envelope. This includes envelopes resident on the DocuSign service, as well as envelopes the customer has transferred from the service. DocuSign maintains an Information Classification Policy to assure the security and protection of proprietary customer information and data. The policy defines classifications such as Secret, Restricted, Internal, and Public that specify the required security and handling of data. For example, customer documents in the production environment are classified as Secret and protected through systemic encryption, while customer recipient information utilized to route envelopes for signing is classified as Restricted, with access limited to customer service staff only. As noted above, only transactional data surrounding envelopes is permitted to be accessed such as username, address, phone number, address, and envelope metadata and is limited to customer validation, customer service, support, and similar purposes. Only DocuSign employees with a demonstrated need to know and specific job responsibilities may have access. As an additional safeguard, DocuSign tier-1 customer support is ISO 27001:2013 certified. DocuSign encrypts data end-to-end on its systems to ensure that data is secure while both in transit and at rest. In transit, DocuSign relies on TLS protocols using strong cipher suites (including 256-bit keys). For data at rest, DocuSign utilizes Advanced Encryption Standard (AES) 256-bit encryption with multiple layers of encryption keys. DocuSign stores two primary kinds of information on behalf of users: - 1 -

5 2. Secure segmentation or containment of data is provided. How DocuSign Delivers World-Class Security o Transactional metadata (who sent what, when, and to whom), stored in an authenticated SQL Server on an isolated back-end network (BEN) with Transport Layer Security (TLS) encryption o Customer documents inside DocuSign envelopes, stored using Binary Large Object (BLOB) with AES 256-bit encryption. During replication, data is encrypted at AES 256-bit encryption with multiple layers of encryption keys and is replicated via private fiber to secure datacenters, physically segregated from DocuSign's corporate networks (see Security: Section 6). Please see Figure 1: DocuSign s Network Architecture DocuSign maintains physically and logically separate networks for its electronic signature production service and corporate business systems. Any service not specifically allowed on DocuSign s networks is disallowed, and no customer data is used during development or testing. Within the production network, DocuSign maintains a formal secure segmentation program. Separate managed environments exist for development, quality assurance, pre-deployment staging, customer development, demonstration, and customer production. The secure segmentation program includes a demilitarized zone (DMZ) structure composed of a pair of firewalls separating the production Web and application hosts from direct Internet exposure. It also includes an internal firewall separating the DMZ servers from direct access to related storage data. The front-end firewall filters traffic that enters a data center, and traffic passes through a back-end firewall before reaching the BEN storage. As part of its multitenant architecture, all envelope and encrypted document data is keyed to its associated customer account using unique account and user identifiers. Every six months, DocuSign authorizes a third-party review of corporate and production firewalls. DocuSign maintains a third-party security assessment program and conducts security assessments against business partners important to DocuSign s service. Please see Figure 1: DocuSign s Network Architecture - 2 -

6 How DocuSign Delivers World-Class Security Figure 1: DocuSign Network Architecture Customer Data Is Encrypted at All Times 3. Standards-based encryption key management is offered (ISO, NIST, or equivalent). Standards-Based Encryption Key Management DocuSign maintains an encryption key management system that is certified and examined under ISO 27001:2013, PCI DSS, and SSAE. A qualified third-party audit firm validates and tests DocuSign s key management methodology, which is reported annually in DocuSign s SSAE 16 report. Comprehensive Technical Measures for Key Security DocuSign BLOBs are encrypted using a randomly assigned 256-bit key from a DocuSign Encryption Key Manager. No one person maintains the full encryption key to decrypt customer data. Keys in the DocuSign Encryption Key Manager are protected by a Database Master Key and an Operations Master Key, both of which must be present to access the document encryption key. This methodology results in a double-blind encryption key process as a further security measure (see Strict Segregation of Duties below). There are 1,000 active encryption keys at any point in time, with keys rotated quarterly. Key rotation process: o A purpose-built tool consumes keys from both the database credentials and the Operations Master Key on a quarterly basis. o The system generates 1,000 new encryption keys and uses them to encrypt all new documents that enter the system. All previous key batches remain to decrypt existing documents. Strict Segregation of Duties - 3 -

7 How DocuSign Delivers World-Class Security DocuSign enforces segregation of key custodianship duties to ensure customer data remains safe. Two different teams manage the two sets of keys that must be present together to access the document encryption key (Operations Master Key and Database Master Key). A member of each team is required in order to gain access to the document encryption keys. The technical operations team never has access to the Database Master Key, and the database team never has access to the Operations Master Key. As a further segregation measure, DocuSign personnel in trusted roles within the key management process don t have system accounts. Their role is limited to only providing authorizations during an emergency event. Please see Figure 2: Multilayered Protection of Encryption Keys Figure 2: Multi-layered Protection of Encryption Keys 4. Standards-based encryption key management is offered, including the ability for customers to hold encryption keys. How DocuSign Delivers World-Class Security For customers who may be required or choose to directly manage their encryption keys, DocuSign offers a Security Appliance. The DocuSign Security Appliance offloads the key storage and release policies from the DocuSign cloud onto a customer s private network, while also allowing them full use of the DocuSign platform. The physical and logical separation of cloud-based data and customer-retained - 4 -

8 encryption keys is designed to address customer scenarios where the highest level of security is required. The DocuSign Security Appliance follows cloud security best practices for high-security implementations, as recommended by the Cloud Security Alliance. 5. The company performs periodic penetration testing by qualified third parties. 6. Standard-based security systems at data centers (ISO or equivalent) are utilized. DocuSign is ISO 27001:2013 certified and PCI DSS compliant, with annual penetration testing conducted against both the DocuSign application and its infrastructure by credentialed, industry-recognized organizations. The testing scope includes phases such as architectural review, security assessment, and execution of attacks against the DocuSign external and internal network infrastructure. Penetration testing includes validation of anti-tampering controls. Actionable test findings become inputs into a remediation and response plan, where they re assigned a severity rating and tracked to closure. Comprehensive Standards-Based Data Center Security DocuSign uses data centers that are ISO 27001:2013, PCI DSS, and SSAE 16 certified. DocuSign maintains strong physical, environmental, and security access controls for its data centers, and these policies are ISO 27001:2013, PCI DSS, and SSAE 16 certified. Data centers employ measures such as 7x24x365 guards, mantraps, keyed access to DocuSign cages, and CCTV. Stringent Access Control Data center access is authorized by DocuSign s director of technical operations and includes notification to the security management team. DocuSign tracks access to the data center, with visitor logs reviewed daily and kept for 90 days. 7. Multifactor authentication methods are deployed and documented. Secure Access to Critical Environments DocuSign employs internal tools and controls to manage access to applications containing or retrieving sensitive or critical data sources. This includes internal access to the production environment as well as access to the administrative panel of the DocuSign service, which is used by DocuSign personnel to configure customer implementations. Access is restricted to designated personnel and connectivity utilizes a twofactor authorized VPN tunnel. Encryption is AES 256-bit, and two-factor authentication utilizes Active Directory credentials plus a soft token requiring a PIN and token code. Auditing of Users DocuSign captures and correlates logged events in real-time from systems and devices to both the operations and security teams. Examples include: o Identity of persons accessing the system; successful/unsuccessful login attempts o Additions, deletions, and modifications to user accounts/privileges o Switching of IDs during an online session o Attempts to perform unauthorized functions or access data that is unauthorized - 5 -

9 o Source of connection and system-level events. DocuSign maintains an authorization chain for employee access that requires management approval commensurate to the sensitivity of applications and data sources. Access is reviewed at least quarterly to verify that access levels are appropriate. In an initial configuration and provision, DocuSign staff configure some security-related settings, with customer permission. The administration interface provides an audit log of settings made to the account and by whom, enabling customers to see a record of changes. 8. The xdtm solution monitors for malicious and inappropriate activity on an ongoing basis. 9. The organization focuses on intelligence collection, leading to security breach detection and prevention. 10. The organization provides the ability to anonymize data for participation in threat intelligence networks. 11. The company employs a response model that adheres to applicable laws. DocuSign implements a defense-in-depth approach to hardening the production and corporate environments against exposure and attack. Network management controls in use include an intrusion detection system (IDS), malware protections, and system monitoring. Monitoring frequency: A qualified third-party performs monthly internal vulnerability scans and quarterly application scanning. Intrusion detection: Production systems are configured to send event and log data to a security information and event management (SIEM) system where a dedicated team correlates and analyzes events on a 24x7 basis. Antivirus/anti-malware: DocuSign utilizes enterprise-class antivirus/antimalware software. Endpoint workstations and other devices are monitored, and non-pdf documents are scanned for malicious content on conversion to PDF. Antivirus signatures are automatic and performed daily. Users are prevented from disabling these controls or altering their configuration. protection: DocuSign s production service utilizes both DomainKeys Identified Mail (DKIM) for signing outbound and TLS to assure that confidential communication occurs over an encrypted session. DocuSign maintains professional relationships for security notifications with organizations that include the Computer Emergency Readiness Team (CERT), High Tech Crime Consortium (HTCC), the Information Technology-Information Sharing and Analysis Center (IT-ISAC), and others. DocuSign operations and security operations personnel subscribe to multiple vendor and industry security advisory mailing lists. Threat intelligence is monitored throughout the organization and aggregated via DocuSign s security council. When a threat/risk is identified, its potential impact is assessed by the security organization and documented via the company s risk register for tracking and resolution. Due to security considerations, additional information regarding data anonymization may be made available upon request or in response to specific questions. DocuSign does participate in threat intelligence networks as means of helping to mitigate security threats. DocuSign maintains an ISO 27001:2013, PCI DSS, and SSAE 16 examined and tested incident response program that provides guidance and procedures to enact in the event of an incident. A Comprehensive Response Model The response policy classifies incidents by type and severity, sets the likely scope of response, and assigns roles and responsibilities. Requirements for incident detection and reporting are defined, and a range of - 6 -

10 specific containment measures are prescribed. Required response times are defined for incidents based on nature and severity. Requirements for evidence gathering are detailed, as well as eradication/recovery measures. Notification Program DocuSign maintains a data breach notification program to promptly notify customers in the event their information is lost or experiences unauthorized access. DocuSign will contact credit card issuers in the event of a compromise or removal of cardholder data. 12. The company has an incident playbook in place. 13. The company maintains a mature security/risk council. DocuSign maintains and executes an incident response playbook specialized to security threats and events. It addresses incidents both proactively and reactively, when necessary. The scope of the playbook includes guidance and procedures for detection, containment response, resolution, and iteration/improvement. Inputs are used to detect anomalies or identify policy violations and include security policies, legal and compliance violations, and threat and risk information. Guidance includes areas such as defining the scope of monitoring, use cases, and triggers/thresholds for monitoring systems. As part of the response process, all security incidents are prioritized based on impact and urgency. Service level agreements set response times for all stakeholders involved in the incident management process and provide an accurate measure of organizational performance. After resolution, incident management metrics are tracked and reported to ensure the process is performing as expected and to further fine-tune the response process. To ensure the playbook evolves to incorporate updated regulations and standards, as well as best practices, the process is reviewed semi-annually. DocuSign s security council manages security risk for DocuSign; addresses all areas of security risk, including operational risk, compliance, design, and legal/contractual risk; and ratifies the company s security policy. The security council maintains authority for verifying that compliance is maintained across identified controls and oversees a governance, risk, and compliance (GRC) program for the organization. The program assures GRC across areas, such as: o Customer information security o Security operations o Data breach notification o Business continuity o Key management o Security change approval o Security assessments o Secure segmentation o Incident response program - 7 -

11 o Third-party security assessment program. Risks to DocuSign are monitored throughout the organization via security council meetings. When a risk is identified, the risk level is assessed by the security team and added to the risk register. The risk register, including mitigation strategies, is reported to the security council on a regular basis. To ensure it has visibility and authority to meet its responsibilities, the council annually assesses the company s organizational structure, reporting lines, authorities, and responsibilities as part of ongoing risk assessment and management. Additionally, DocuSign has a deputy chief risk officer (CRO) who oversees the chief information security officer (CISO). In addition to defining security strategy, the deputy CRO performs in an independent audit and assessment capacity. Assurance DocuSign warrants its compliance to the US ESIGN act and complies with applicable laws, regulations, and industry standards around the world. DocuSign is directly certified for ISO 27001: 2103, PCI-DSS, and TRUSTe. The DocuSign platform contains capabilities that enable customers to meet their required compliance to specialized industry regulations, such as HIPAA, FDA Title 21 CFR Part 11, and specialized rules from the FTC FHA, IRS, and FINRA. Figure 3: DocuSign Highest and Broadest Set of Standards 1. The xdtm solution will comply with applicable laws, Certified to Leading Global Standards DocuSign complies with applicable laws, regulations, and industry standards around the world governing digital transactions and electronic signatures

12 regulations and industry standards. Certified to Leading Global Standards Engineered to Support a Breadth of Laws, Regulations, and Industry Standards The DocuSign service either complies directly with the laws and regulations below, or helps customers meet requirements needed for their own compliance: DocuSign warrants to the US ESIGN Act, EU legislation (European Regulation 910/2014), and the UK Electronic Communications Act. ISO 27001:2013: DocuSign is certified across all 133 controls and is the only esignature company certified as an information security management system (ISMS). SSAE 16, SOC 1 Type 2, SOC 2 Type 2: DocuSign complies with the reporting requirements stipulated by the by the American Institute of Certified Public Accountants (AICPA), undergoes yearly audits across all aspects of its enterprise business and production operations, and has sustained and surpassed all requirements. TRUSTe: DocuSign is certified by TRUSTe, and securely and safely handles customer data as outlined in its privacy policy (see Privacy: section 2). PCI DSS 3.1: DocuSign is PCI certified for safe and secure handling of credit card holder information; and while smaller companies may self-certify, DocuSign has reached a threshold of transactions that requires a third-party audit, ensuring the deepest level of examination. HIPAA, FDA Title 21 CFR Part 11: the DocuSign service supports the esignature practices that help organizations meet their compliance requirements for these regulations. DocuSign is certified as Skyhigh Enterprise-Ready under the Skyhigh CloudTrust program, which evaluates security controls and enterprise readiness based on Cloud Security Alliance (CSA) criteria. DocuSign meets specialized rules from the FDA, FTC, FHA, IRS, FINRA, and others. Detailed information can be provided on request. Obtains Required Consents DocuSign obtains required customer consent to do business electronically: Consent for business transactions is achieved through steps in the service s workflow. Consumer consent is obtained by the DocuSign service through the use of required disclosure documents and by obtaining a customer s affirmative consent to use electronic records for the transaction. The solution also enables a customer to withdraw consent

13 Privacy DocuSign is committed to customer privacy and the protection of proprietary information and data, and employs measures across multiple business and technology areas. With DocuSign: Contractual privacy protections assure confidentiality of customer information and prohibit employees from viewing customer documents. Customers set their own privacy and document management settings on the platform. Independent, external organizations, such as TRUSTe, certify the platform as part of the company s compliance with global privacy and data protection regulations. 1. Personal data is used for the purpose it was intended and is consistent with the organization s privacy policy. How DocuSign Protects Your Privacy DocuSign maintains a comprehensive privacy policy and is committed to the privacy principles of notice, choice, onward transfer, security, data integrity, access, and enforcement. DocuSign has received TRUSTe's Privacy Seal, signifying that its privacy policy and practices have been reviewed for compliance with the TRUSTe program. TRUSTe reviews DocuSign s privacy policy annually across both the business and production site. Transparency in Data Usage The collection and use of personal data described below is included in DocuSign s publicly posted privacy policy. Personal data collected by DocuSign includes user-provided information, such as name, addresses, mailing address, and billing information. It also includes technical information, such as IP address, location information, device identifiers, usage data related to how a user interacts with the service, and transactional data associated with contracts uploaded or signed on the DocuSign service. Personal information is used for the services of the DocuSign platform, the creation of records reflecting users transactions, identity verification, and fraud prevention. This applies to data collected by the service, externally facing websites, or other means of data collection. Employees are prohibited from viewing the content in customer documents, and customer support personnel are limited to viewing only data that describes digital transactions on the service (see Security: Section 1). In the case of a merger, acquisition, or sale, DocuSign will notify users of any changes in how personal data is used, as well as any choices users have regarding their information. Third parties that provide services to DocuSign are required to only use data shared with them for the services they re providing to DocuSign

14 2. Treatment of notice, consent, and choice is clearly reflected in a publicly available, written privacy policy. How DocuSign Protects Your Privacy DocuSign s posts its privacy policy on the company s public-facing website and describes the privacy practices of the company, including notice and consent. Clear Notice on Consent, Choice, and Notifications A customer s use of DocuSign s websites or mobile applications constitutes consent to the privacy policy and to the collection and use of information described in it. Customers are requested to not use DocuSign s services if they don t agree to the policy. Visitors to DocuSign s public-facing website may opt out of receiving tailored advertising or data tracking. DocuSign does send s related to completing signings or other transactions on the service (required as part of the services under customer contracts). In the course of a transaction, users of the DocuSign service may access personal information of other participants in a transaction. The company s privacy policy specifies that this information may only be used in connection with DocuSign s services and may not be used for unsolicited commercial messages. Adherence to International Privacy Considerations DocuSign has a corporate commitment to pursue Binding Corporate Rules, a binding organizational data governance policy framework reviewed and approved by European data protection authorities. DocuSign will make a data processing addendum to customers that incorporates the European Commission s model clauses. 3. Policies addressing transaction retention and purging are clearly stated. Customers Set Their Management Policies With DocuSign, customers set their own document management policies. Customers may keep their documents on DocuSign s secure servers, download them, or purge them from the DocuSign service, at their discretion. Retention Most customers leave signed documents in the DocuSign system indefinitely as a means to retain an independent third party that can warrant the documents have been securely stored and not altered. Customers may also utilize the DocuSign Connect publisher service to transfer copies of signed documents to document repositories behind their own firewall. Deletion Deleted documents are removed from a user s view, but are not explicitly purged as a result of deleting them. When a user moves an envelope into the deleted folder, only a pointer to the envelope is removed. It s only when no pointers are left, that the envelope and documents are purged (meaning the envelope no longer resides in any DocuSign user folder). Purging Customers can configure document retention to specify the number of days to retain documents (measured from the date the envelope is completed, voided, or declined). Once the purge date for an envelope arrives, it s put into the purge

15 4. Private information is only provided to government organizations when there is a good faith belief that such disclosure is reasonably necessary to comply with any applicable subpoena or other legal process, or to protect the rights, property, or safety of anyone. 5. Company policies include measures to evaluate the potential to cause harm by releasing private data. How DocuSign Protects Your Privacy queue and purged from the system 14 days later. Notification s are sent to both the sender and recipients as an envelope enters the purge queue. Envelopes and the documents that are purged from DocuSign are permanently removed. While the DocuSign service will remove a document from the system, it will maintain the audit log to vouch for the execution history of the documents. DocuSign has a policy of providing notice to its customers when there s an external request for information about their accounts, such as law enforcement. DocuSign s publicly posted policy, Responding to User Data Requests, details how the company responds to requests, what information DocuSign may provide, and the circumstances where it works with law enforcement. DocuSign maintains multiple policies and measures for evaluating the potential harm from a release of private data (for example, due to a data breach or accidental data disclosure). The approaches below enable both an assessment of the scale and impact from a release of private data as well as the effectiveness of available mitigations. DocuSign has a formal risk management program that s ISO 27001:2013 certified and includes likelihood, impact, qualitative and quantitative analysis, and regulatory requirements. DocuSign s CRO oversees the company s GRC program that assesses risk and ensures that controls applicable to a breach are in place (see Security: Section 13). DocuSign maintains a security/risk council as an accountability point for the reporting, assessing, tracking, and mitigating of identified risks (see Security: Section 13). DocuSign has an incident response model that includes impact assessment, corresponding service level agreements (SLAs) for response, and SLAs for resolution activities (see Security: Section 11). DocuSign maintains an incident response playbook that requires proactive measures to detect potential incidents, such as a security threat. It also prescribes DocuSign s response to such an incident, including assessing impact and responding within the required SLAs, (see Security: Section 12). DocuSign maintains a breach notification program to notify users after a breach and other incidents are discovered. DocuSign will identify the individuals whose personal information was affected and provide descriptions of the categories of personal information involved for each person, how and when the incident occurred, how and when the incident was discovered, steps taken to address the incident, and any steps taken to prevent a recurrence (see Security: Section 10)

16 Validity The DocuSign platform provides an audit trail, chain of custody, tamper-evident seals, and other measures that provide complete transaction detail and assure the validity of transactions executed on the platform. Multiple methods of authentication are available to validate transaction participants, and customers may combine authentication methods if warranted by the sensitivity of their documents. Finally, the structure of the DocuSign workflow provides evidence of agreement and intent to transact. 1. Transparency into relevant transaction attributes, such as message origin, author, content, and transmission time. How DocuSign Protects Your Privacy The DocuSign solution logs and provides detailed information on transactions that take place on the service. It also provides documents that customers can admit into court, as well as measures to prevent a transaction participant from repudiating their signature. The information-capture capabilities of DocuSign assure: Transparency to customers on the progress of their digital transactions A full audit trail (see Validity: Section 4). Complete Details of the Digital Transaction A document list indicates recipients and the status for each document, such as completed, waiting for others, voided, or draft. A document detail area provides information on each recipient's activity in the document. Examples include date viewed, which recipients have signed, or which have yet to complete the signing transaction. xdtm Compliance DocuSign provides the following transaction validation details: Number of items and pages for all documents or data in a transaction Identity or contact detail for the person or system that sent the documents or data, as well as the IP address Transaction status information, covering initiation through in-process and completion Storage information on where the completed documents and final data are held Recipient contact information for each document or data component Information that reports the authentication method used and whether it was satisfied Content and confirmation of disclosures agreed to by the recipient Event and action timestamps to support a detailed audit trail for the transaction with integrity protection. 2. A verifiable chain of custody for each custodian that includes document/transaction, metadata, and history/ The DocuSign solution includes capabilities spanning encryption, logging, and data security that support the legality of transactions by maintaining the integrity of data and documents. A digital audit trail, known as a certificate of completion, is created for every envelope and captures the signing parties names, addresses,

17 future length of contract. 3. Appropriate credentialing, such as criteria for credentials, credential creation, and documented treatment of cotransactors. How DocuSign Protects Your Privacy authentication method, public IP address, signing location (if provided), envelope action, and timestamps. In-system checks using a digital checksum (mathematical hash value) validate that the documents in an envelope haven t been tampered with outside of each signing event. Documents exported from DocuSign are digitally signed for the purpose of detecting any evidence of tampering. The tamper seal is an X.509 public key infrastructure (PKI), standards-based "digital signature" issued by a certificate authority. It s applied to a document at the time of download from DocuSign and indicates whether a document was changed since it was downloaded. DocuSign provides customers with multiple capabilities to authenticate participants to a transaction. Customers may also authorize different privileges among the participants. Multiple Options for Authenticating Participants in a Transaction Supported methods to authenticate signers in a digital transaction include: Access code: the recipient enters a code provided to them separately from DocuSign communications. SMS: the recipient enters a code received as an SMS text message at a specified phone number. Phone authentication: the recipient answers a phone call at a number supplied by the recipient and provides an authentication code. (Note: an additional available option enables the recording and generation of a biometric voiceprint as an additional layer to the authentication process). Knowledge-based authentication: This method requires the recipient to answer detailed questions about themselves based on data available in public records. Social ID: The recipient enters his or her social ID information, which is validated against that service, to access the documents for signing. Supported services include Salesforce.com, Google, Yahoo!, or Microsoft account credentials, with additional options for social network credentials from Facebook, Twitter, and LinkedIn. Require a Digital Certificate: The sender can require the signer to apply a digital certificate at the time of signing. This creates a final document that has been digitally signed. Two-factor authentication: DocuSign also allows a sender to require two authentication methods from the document signer. Specifically, access code authentication and one other type may be used for a single recipient. Ability for Senders to Set Privileges and Permissions for Co-Transactors DocuSign supports different roles for participants in a transaction: Participants may be signers. Participants may be designated as recipients or authorized for actions, such as manage envelopes, address recipients, manage recipients, receive a copy, or acknowledge receipt. Each recipient in a workflow may be assigned individualized authentication requirements. Envelope recipients can be reassigned by the sender or also by a specific

18 4. Clear evidence of agreement, including manifestation of assent, intent to transact, and attribution and audit trails. How DocuSign Protects Your Privacy recipient. Particular signing orders among the participants may be enforced. In situations with multiple documents in a DocuSign envelope, access may also be controlled at the document level, where a particular document may only be viewed by the intended signer. Clear Evidence of Agreement With DocuSign, the signer must agree to the use of electronic records and signatures in connection with the review and signing of any document and is given an electronic consent disclosure (ECD) before they can access document(s). Users are prompted by DocuSign to adopt a signature graphic. This graphic is related explicitly to their identity, establishes their mark in the transaction, and is applied directly to the document to indicate their assent at that location. Further, users may personalize their signature graphic by drawing it with their mouse or touchscreen, selecting from predefined styles, or uploading an image they already have. Audit processes within the DocuSign system securely capture all of these consent-related actions by the signer. Example granularity includes the date and time of the ECD acceptance or a unique identifier of the acceptance event. A Complete Audit Trail DocuSign provides digital audit trails for customers to track signing and access events over the lifetime of a document. They include a document history, a formal certificate of completion created upon signature of all document parties, and record permanence, as well as other capabilities. In combination, these serve to confirm the validity of transactions executed by the service. Document history: DocuSign tracks and logs all aspects of each transaction (name, address, IP address, date/time, authentication, and activity) and captures it all in a detailed transaction history that is stored in perpetuity as hashed and encrypted data within the DocuSign system. This data is available on demand from the system and may also be programmatically exported in realtime as transactions progress to a completed state. Certificate of completion: Once the transaction is complete, DocuSign issues a certificate of completion that contains transaction-level information, such as the unique transaction ID, the sender and all recipients, the timestamp of all events, DocuSign account information, and the executed consumer disclosure. The certificate of completion has been tested in court and found to be legally valid. Record permanence: Document audit logs are kept permanently even if the underlying document is delivered and purged by the owning account. This maintains DocuSign's ability to prove a transaction indefinitely. 5. Complete records management, including long-term records management with proof of integrity, designated document retention periods, and All retained customer data is stored at the level of security and encryption prescribed in DocuSign s customer data policy (see Security: Section 1). Customers may leave signed documents in the DocuSign system indefinitely. DocuSign will warrant that the documents have been securely stored and not altered. DocuSign also offers the DocuSign Connect publisher service that customers can

19 transferability. 6. An industry-standard clock time convention from a trusted third-party source of time. How DocuSign Protects Your Privacy use if they wish to keep a local copy behind their firewall. DocuSign Connect can push signed documents to a customer application or push status updates to a customer listener application. Once notified, customers can retrieve signed documents via the DocuSign API, in line with their workflow. DocuSign integrates with external third-party vault solutions, such as eoriginal, that provide customers with additional records management capabilities. Customers may also download stored documents and transaction data, which are secured with an X.509 PKI, standards-based "digital signature" that is applied at the time of download. The certificate of completion is also secured with a tamper-evident seal to ensure that it can t be modified after download, just like the document. DocuSign utilizes the National Institute of Standards & Technology (NIST) atomic clock service as a synchronized time-service protocol to ensure all systems have a common time reference. Availability DocuSign has maintained more than 99.99% average availability over the past 5 years. The service is engineered to provide always-on availability and DocuSign doesn t post or schedule any planned downtime for maintenance. DocuSign s system architecture includes multiple, simultaneously active DocuSign systems in different geographic locations, each supporting customer transactions while staying synchronized with each other. This way, data for in-process and completed transactions is saved in multiple locations, providing high availability and a superior protection against data loss and corruption. Figure 4: DocuSign System Status (Publicly available in the DocuSign Trust Center)

20 1. The solution offers carrier-grade availability/system uptime. 2. The solution is continuously available online/offline with no maintenance downtime. 3. Customer data is continuously accessible for customer use. 4. Redundant geographically dispersed data centers are used. 5. There is zero data loss during catastrophic events. 6. There is a sub-minute service restoration after disruption. Carrier-Grade Performance and Reliability DocuSign has maintained more than 99.99% average availability over the past five years DocuSign posts twelve months of uptime data for its service, across four different environments on its publically available Trust Center DocuSign provides customers with credits against fees, if service levels aren t met DocuSign has a zero-maintenance downtime service. The company doesn t schedule offline maintenance. Under DocuSign's architecture, secure replication of customer data is performed at both the data center in use, as well as in near real-time to geo-diverse data centers. Data is replicated at the OLTP level, and all historical and document data is synchronized using a proprietary document replication service. DocuSign makes eight perpetual backups of BLOB data; and data replication takes the place of traditional backups. DocuSign data is replicated to geographically dispersed data centers. In the US, three active sites are located in different geographical regions. In Europe, two active sites are more than 400 km apart. In the event of a failure in any of the active systems, all user activity may be served by the remaining centers DocuSign s infrastructure is constructed to deliver a recovery point objective of five minutes in the event of a single site catastrophic failure. In support of data protection, DocuSign designs all deployments to be fully redundant and fault tolerant to eliminate single points of failure. Data travels via half-gigabit fiber to facilitate the required data replication (see Availability: Section 3). DocuSign maintains a disaster recovery plan (DR) to be implemented in the event of a disaster (or prolonged interruption of service) and a business continuity plan (BCP). The table of contents of the plan and the last annual test results are available for inspection but for security reasons aren t shared outside of DocuSign. DocuSign s infrastructure is constructed to meet a recovery time objective of 15 minutes. DocuSign s architecture features simultaneously active and redundant systems and near-real-time data replication. Additionally, DocuSign s datacenters are commercial-grade, PCI DSS compliant, and SSAE 16 examined and tested (see Security: Section 5). Combined, this enables DocuSign s service to consistently demonstrate high availability (as shown in publicly available site statistics) and be capable of surviving disruptions, such as a full site outage. Failover capabilities are tested monthly along with a full, formal BCP/DR test conducted annually. Per company policy, these test results are validated and signed by stakeholders, including the chief technology officer, chief security

21 7. Customer transaction support is provided. Carrier-Grade Performance and Reliability officer, and chief legal officer. Comprehensive Support Resources DocuSign support resources include: 24x7 live support, along with full-time system availability monitoring Online case submission and management, with response SLAs Escalated tier-two support A support team that, on average, answers calls in less than 10 seconds, responds to s within 2 business hours, and has an average first-contact completion rate of over 80 percent; and has access to DocuSign professional services, a customer s assigned strategic account manager, and DocuSign engineering teams. Robust Capabilities for Integration and Compatibility Support DocuSign provides free developer accounts into a full-featured environment for development and testing. Sample code, SDKs, and code libraries are also provided at the DocuSign Developer Center. DocuSign offers preview and demonstration environments for customers to validate their system integrations and give feedback on new releases. DocuSign supplies support and documentation for out-of-the-box integrations to complementary solutions from Salesforce, Microsoft, Google, and others (see Interoperability: Section 1). Supplemental Training Resources DocuSign offers training, courses, and certifications through DocuSign University, such as administrator training, specialized training for Salesforce users, training for workflow developers, API use, and more. Courses are available online, in-person at DocuSign training facilities, or on premise at a customer s site. 8. The organization maintains a trust center for transparency into service performance, availability, certification status, and privacy. DocuSign maintains a public-facing Trust Center that provides continuous updates on service availability, 12 months of uptime data, and technical best practices. The Trust Center provides status confirmations that services are available and operating normally and will communicate information about service disruptions or security alerts. The Trust Center enables customers to report to DocuSign any security concerns, suspected fraudulent , or system issues. On the Trust Center, DocuSign publicly confirms compliance with a number of security certifications, including: o ISO 27001:2013 o SSAE 16, SOC 1 Type 2, SOC 2 Type 2 o xdtm Standard, Version 1.0 o PCI DSS 3.1 o TRUSTe

22 Scalability To provide resilient system performance during peak traffic in the near term, as well as ensure scalability for required future growth, DocuSign undertakes robust capacity planning. Every day, DocuSign processes approximately 30 billion pieces of telemetry to monitor and assess the end-to-end customer experience as one of multiple inputs into planning for required scalability. Currently, the multi-tenant structure ensures that the DocuSign platform runs at less than 50 percent of total capacity and that no single customer's spike in usage impinges on other customers. 1. There is a formal process in place to anticipate future business growth/needs with the ability to provide ongoing system capacity monitoring. 2. There is a formal lifecycle management in place with proactive implementation of architectural changes and hardware purchasing. How DocuSign Manages Scale DocuSign maintains a formal planning process that includes both real-time performance indicators and long-term capacity planning mechanisms to ensure adequate capacity. System load is evaluated and projected via a scheduled process, and ongoing projections using gathered data are made for server load, storage load, database load, and network load/bandwidth. Projections are tracked and compared with current load to ensure accuracy, and adjustments are made to the overall environment to ensure projected load is met or exceeded. DocuSign maintains a baseline configuration program for software and hardware. All production systems are configured according to these standards to ensure capacity requirements. Benchmarks from the Center for Information Security (CIS) are part of the program s verification process. Capacity increases are achieved by scaling the platform both vertically and horizontally, using collected data on usage trends as well as projections of contractual commitments in an 18-month moving window. In addition, DocuSign has developed automated performance testing tools that create a static load on DocuSign via both the API and the user interface. The system is loaded and then dynamic evaluation is done to compare both the formal and observed system characteristics. Universality With DocuSign, users can conduct business globally, use an app or site built for their device or platform of choice, and transact while both connected and offline. DocuSign offers 13 sending languages and 43 languages for signing, and the system is compatible with leading browsers and mobile platforms. It s also available as a dedicated app on multiple platforms, and offline capabilities allow users to continue the transaction process when carrier service isn t available. 1. The solution is available across heterogeneous computing platforms. DocuSign Supports Transactions Worldwide The DocuSign service requires only a Web browser for signing and a PDF reader to optionally view documents. No additional software, browser plug-ins, extensions, or add-ons are necessary

23 DocuSign Supports Transactions Worldwide Available on Multiple Platforms DocuSign is available to over 90 percent of desktop and mobile users in the regions where it s offered because of the range of platforms supported by the service. o Desktop: DocuSign supports final release versions of Internet Explorer 8.0 or above, Windows Edge, Mozilla Firefox 3.0 or above (Windows and Mac), Safari 3.0 or above (Mac OS only), and Google Chrome 5.0 (Windows and Mac). Although other browsers aren t officially supported, signing typically works on any application that can render HTML. o Mobile Web: DocuSign supports Apple ios 6.0 and above, and Android 2.3 or above. o Mobile applications: DocuSign offers native apps for ios, Android, and Windows. Respective requirements are Apple ios 8.0 and above, Android 4.0 and above, Windows 8.1 and above, Windows 10, and Windows phone 8.1. In addition, DocuSign s interface is responsive and will automatically optimize its interface to fit the device and form factor on which it s being viewed. Capabilities for Working Offline DocuSign s solution includes offline functionality for continued productivity when network or carrier service isn t available. While offline, document senders can tag a document to indicate required signatures and selected recipients. Once a network connection is available, the document will be sent out for signature. Document recipients can sign a document while offline, and once reconnected to a network, signed documents will be uploaded to the DocuSign cloud, routing to other signatories, if required, or confirming a completed transaction. 2. The solution is accessible worldwide. DocuSign offers users the ability to sign documents in 43 localized languages: English (US), Spanish (Latin America), Japanese, German, French, Italian, Spanish (Spain Modern Sort), French (Canada), Chinese Simplified, Portuguese (Brazil), Russian, Turkish, Korean, Portuguese (Portugal), Chinese Traditional, Polish, Romanian, Dutch, Hungarian, Czech, Greek, Swedish, Finnish, Danish, Norwegian, Ukrainian, Serbian-Latin, Bulgarian, Croatian, Slovakian, Lithuanian, Slovenian, Latvian, Estonian, British English, Arabic, Hebrew, Farsi, Hindi, Bahasa Indonesia, Bahasa Melayu, Thai, and Vietnamese. DocuSign offers 13 languages for global users to send documents for signature in their native language: English (U.S.), Chinese Simplified, Chinese Traditional, Dutch, French, German, Italian, Japanese, Korean, Portuguese (Brazil), Portuguese (Portugal), Russian, and Spanish. The DocuSign solution can automatically detect a customer s browser language and present information in the appropriate language. Alternatively, a transaction initiator may specify language settings, or a transaction receiver may select from supported languages. With DocuSign, users aren t required to sign up for an account before signing

24 Interoperability Everyday, the DocuSign platform services over 8 million API calls in support of over 1,000 API integrations. With platform APIs, a mobile SDK, out-of-the-box integrations with leading solution providers, and a rich partner ecosystem, customers can integrate DocuSign with their choice of solutions. DocuSign exposes the entire core platform functionality through its API and includes prebuilt integrations with Salesforce, Microsoft, Google, SAP, and others. Taken together, these integration options give customers flexibility and control across their organization, infrastructure, workflow, and technology partners, allowing them to scale from simple esignature integrations to complex company-specific solutions. DocuSign also accepts multiple digital/ PKI certificates as part of its support for digital signatures and provides solutions for enterprises to manage digital signing in their organization. DocuSign is also a certificate authority and issues digital certificates. 1. The solutions has published integration guidelines. DocuSign Exposes Its Full Platform for Complete Integration Support DocuSign offers robust interoperability capabilities, including REST/SOAP APIs, dedicated integrations with market-leading solution providers, and DocuSign s Connect service that provides status updates within integrations. Multiple APIs and SDKs DocuSign offers both REST and SOAP APIs and exposes the entire core DocuSign platform functionality so that features and functionality can be integrated into any website, app, or embedded system that makes http requests. Example workflows supported by the DocuSign API include: o Bringing users directly to specific views within the transaction workflow o Requesting legally binding signatures on the document types supported by the system o Embedding the signing or sending workflow into a customer s UI or app o Retrieving form-field data o Enabling multifactor recipient authentication o Simplifying authentication via reuse of existing credentials from other authorities (via standards-based SSO). DocuSign offers a mobile SDK for ios to integrate DTM and esignature functionality into mobile apps. With it, developers can create a DocuSign sending and signing experience fully native to their app. The DocuSign Development Center includes a developer sandbox and developer keys, as well as SDKs, code libraries, sample code, and other developer resources. Out-of-the-Box Integrations with Leading Applications DocuSign has business partnerships and technical integrations with leading enterprise solutions to provide more seamless signing services and enable more complex DTM use cases. Out-of-the-box integrations include: Salesforce.com includes Send with DocuSign functionality from any Salesforce

25 DocuSign Exposes Its Full Platform for Complete Integration Support object and integrates Salesforce contact data into DocuSign, eliminating rekeying of data. Microsoft: DocuSign and Microsoft have a strategic relationship in place and have worked together to enable users to securely send, sign, and track documents within Microsoft Office 365 using DocuSign. The partnership has since been expanded to include deeper integration of DocuSign within Microsoft Dynamics CRM online. In addition to these products, DocuSign also integrates with many earlier editions of Microsoft products, including Outlook, SharePoint, Dynamics CRM, and Windows. Google: DocuSign integrates with Gmail and Google Drive and offers a Google Chrome extension. These integrations enable users to sign documents, send to others, and complete other workflow integrations from within the Google applications they may already be using. DocuSign also integrates with Google Apps for Work suite, enabling administrators to install DocuSign and provision accounts for all users in the domain. SAP: Integrations with Ariba Contract Management and Success Factors Recruiting Management allow users to leverage SAP technology and DocuSign s DTM platform in their workflow. DocuSign s Solution Showcase provides details on 120+ integrations with DocuSign s partner ecosystem. DocuSign Connect Status Updates for Integrations DocuSign Connect is a push service that sends real-time envelope and recipient data updates to customer listener applications using HTTP or SOAP messages. These updates are generated by changes to the DocuSign envelope as it progresses from sending to completion. DocuSign Connect provides organizations with a centralized location and a realtime view of transactions across their user base. This information may also be customized to support reporting or workflow specific to a customer organization. 2. The solution accepts multiple digital/pki certificates. DocuSign enables DTM solutions globally and accepts multiple certificates to align with customer needs and regional requirements. Certificate Acceptance With DocuSign, customers can require use of a digital signature to complete a signing transaction. The DocuSign service accepts digital/pki certificates that conform to X.509 standards. Certificates that conform to EU Directive 1999/93/EC or European Regulation 910/2014 (as applicable) are accepted. DocuSign currently supports digital certificates from the following root certificate authorities: OpenTrust, DocuSign, and SAFE-BioPharma (approved for use with FDA- or EMA-regulated processes). Certificate Issuance DocuSign also acts as the certificate authority with Express or OpenTrust certificates (an accredited E.U.-based digital signature provider certified against key ETSI esignature standards). This provides customers with an additional

26 DocuSign Exposes Its Full Platform for Complete Integration Support means to obtain PKI-standard and X.509-compliant digital signatures for any DocuSign transaction. Certificate Policy DocuSign maintains certificate policies covering their role as both a certificate authority (issuer) and which certificate authorities they ll accept certificates from within the context of digital signatures. These policies address: o Accepted third-party certificate providers, including criteria for validating user identity o The ways a user attests to their identity in order for DocuSign to create a signature on their behalf o Operational and physical controls (e.g. specific trusted roles and functions, backup, segregation of duties, revocation, and audit trails). Solutions for Enterprise Digital Signing, and the DocuSign Signature Appliance With DocuSign s Signature Appliance, users within an enterprise can digitally sign documents directly from their document authoring or management application or through the DocuSign Appliance (desktop, mobile, or Web interfaces). DocuSign s Signature Appliance can integrate with a company s existing ID management system or use digital certificates issued by a company s preferred certificate Authority. This capability enables companies to manage their certificates from within their own data center and is geared to highly regulated industries. The appliance is certified for the Common Criteria organization and FIPS (Federal Information Processing Standard) security standards. Please see Figure.5: DocuSign Signature Appliance (below) DocuSign also supports card/token-based digital signatures where required by law. Customers sign using existing physical or software-based certificates in their possession, including smartcard-based National ID s or employee badges

27 Figure 5: DocuSign Signature Appliance 3. Data will migrate to current standards over time to enable ongoing accessibility and document longevity. DocuSign Exposes Its Full Platform for Complete Integration Support Regulatory Compliance DocuSign complies with regulatory requirements that necessitate documents remain accessible in a form that can be accurately reproduced for later reference. Adoption of New File Formats, End-of Life, and Ongoing Support for Older File Formats On a periodic basis, DocuSign will assess the feasibility of supporting new document and data formats for the platform. DocuSign will also assess the viability of continuing to accept older file and data formats, using commercially available data and internal benchmarks to determine whether a particular format is obsolete. If necessary, DocuSign will communicate a timeframe when the format will no longer be accepted by the platform for new documents. DocuSign will announce successor formats, if required. DocuSign will also indicate whether data or agreements already on the platform will migrate to a new format (consistent with upholding regulatory requirements and its internal determination of feasibility). Accepted Data Formats DocuSign accepts a broad range of file formats and provides supplemental tools to ensure that documents can be accepted into the platform for setup

DocuSign and 21 CFR Part 11

DocuSign and 21 CFR Part 11 WHITE PAPER DocuSign and 21 CFR Part 11 Using DocuSign to Facilitate Compliance with FDA Regulations Paperless. It is the nirvana that Life Sciences organizations have been chasing for the past 30 years.

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

Make Your Local Government A Lean, Green, Constituent-Centric Machine

Make Your Local Government A Lean, Green, Constituent-Centric Machine Make Your Local Government A Lean, Green, Constituent-Centric Machine Best Practices for Local Government Entities WEBINAR SUMMARY Make Your Local Government A Lean, Green, Constituent-Centric Machine

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Get Compliant and Stay Compliant with Department of Labor (DOL) Final Rule Fiduciary Regulations. White Paper

Get Compliant and Stay Compliant with Department of Labor (DOL) Final Rule Fiduciary Regulations. White Paper Get Compliant and Stay Compliant with Department of Labor (DOL) Final Rule Fiduciary Regulations White Paper Get Compliant and Stay Compliant with the New Department of Labor (DOL) Final Rule Fiduciary

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

System Audit Checklist

System Audit Checklist System Audit Checklist Contents 1 Gaming System... 3 1.1 System Architecture... 3 1.2 Application Architecture... 3 1.3 Infrastructure Network... 3 1.4 Licence Category... 3 1.5 Random Number Generator...

More information

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation. Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

Strategy for a Digital Preservation Program. Library and Archives Canada

Strategy for a Digital Preservation Program. Library and Archives Canada Strategy for a Digital Preservation Program Library and Archives Canada November 2017 Table of Contents 1. Introduction... 3 2. Definition and scope... 3 3. Vision for digital preservation... 4 3.1 Phase

More information

Pickens Savings and Loan Association, F.A. Online Banking Agreement

Pickens Savings and Loan Association, F.A. Online Banking Agreement Pickens Savings and Loan Association, F.A. Online Banking Agreement INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.2 July 25, 2005 Table of Contents 1 Introduction...1 1.1

More information

Nymity Demonstrating Compliance Manual: A Structured Approach to Privacy Management Accountability

Nymity Demonstrating Compliance Manual: A Structured Approach to Privacy Management Accountability A Structured Approach to Privacy Management Accountability Copyright 2016 by Nymity Inc. All rights reserved. All text, images, logos, trademarks and information contained in this document are the intellectual

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Privacy Procedure SOP-031. Version: 04.01

Privacy Procedure SOP-031. Version: 04.01 SOP-031 Version: 04.01 Effective Date: 01-Mar-2017 Table of Contents 1. DOCUMENT HISTORY... 3 2. APPROVAL STATEMENT... 3 3. PURPOSE... 4 4. SCOPE... 4 5. ABBREVIATIONS... 4 6. PROCEDURES... 5 6.1 COLLECTION

More information

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and Effective Date: 2017/05/10 Updated date: 2017/05/25 This Privacy Policy describes the types of personal information SF Express Co., Ltd. and its affiliates (collectively as "SF") collect about consumers

More information

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3

University of Massachusetts Amherst Libraries. Digital Preservation Policy, Version 1.3 University of Massachusetts Amherst Libraries Digital Preservation Policy, Version 1.3 Purpose: The University of Massachusetts Amherst Libraries Digital Preservation Policy establishes a framework to

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

Extending On-Premises Network-Attached Storage to Google Cloud Storage with Komprise

Extending On-Premises Network-Attached Storage to Google Cloud Storage with Komprise IN PARTNERSHIP WITH: Extending On-Premises Network-Attached Storage to Google Cloud Storage with Komprise This article details how you can use the Google Cloud Platform (GCP) service Cloud Storage and

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

PaperCut Cloud Services: FAQs and Troubleshooting. Channel Availability Release: 18.3

PaperCut Cloud Services: FAQs and Troubleshooting. Channel Availability Release: 18.3 PaperCut Cloud Services: FAQs and Troubleshooting Channel Availability Release: 18.3 Notice While every effort has been taken to ensure the accuracy and usefulness of this guide, we cannot be held responsible

More information

1 SERVICE DESCRIPTION

1 SERVICE DESCRIPTION DNV GL management system ICP Product Certification ICP 4-6-3-5-CR Document number: ICP 4-6-3-5-CR Valid for: All in DNV GL Revision: 2 Date: 2017-05-05 Resp. unit/author: Torgny Segerstedt Reviewed by:

More information

IE11, Edge (current version), Chrome (current version), Firefox (current version)

IE11, Edge (current version), Chrome (current version), Firefox (current version) Quick Start Guide DocuSign for SharePoint Online v3.4 Published: October 13, 2017 Overview DocuSign for SharePoint Online allows users to sign or send documents for signature from a SharePoint Online library.

More information

What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012

What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012 What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012 What We Heard Report: The Case for Change 1 Report of What We Heard: The Case for Change Consultation

More information

The Trend Toward Digital: How DocuSign Can Help. DocuSign helps insurers improve the customer experience, lower costs, and grow their business

The Trend Toward Digital: How DocuSign Can Help. DocuSign helps insurers improve the customer experience, lower costs, and grow their business The Trend Toward Digital: How DocuSign Can Help DocuSign helps insurers improve the customer experience, lower costs, and grow their business How Insurers Compete All aspects of the insurance industry

More information

Guidelines for the Stage of Implementation - Self-Assessment Activity

Guidelines for the Stage of Implementation - Self-Assessment Activity GUIDELINES FOR PRIVACY AND INFORMATION MANAGEMENT (PIM) PROGRAM SELF-ASSESSMENT ACTIVITY Guidelines for the Stage of Implementation - Self-Assessment Activity PURPOSE This tool is for the use of school

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

DocuSign Workflow for Springer Licensing Contracts. Customer Manual

DocuSign Workflow for Springer Licensing Contracts. Customer Manual 1 DocuSign Workflow for Springer Licensing Contracts Customer Manual Table of Contents Step-by-step guide: Forwarding and siging Springer Licensing Contracts electronically on the DocuSign esigning platform...

More information

TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS.

TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS. TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS. 1. Document objective This note presents a help guide for

More information

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA) Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA 30030 Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES I. COMMITMENT TO YOUR PRIVACY: DIANA GORDICK,

More information

e-submission Quick Reference Guide for Economic Operators

e-submission Quick Reference Guide for Economic Operators e-submission Quick Reference Guide for Economic Operators e-submission Quick Guide for Economic Operators Page 1 Welcome to e-submission. This quick reference guide contains: Introduction to e-submission

More information

Live Agent for Administrators

Live Agent for Administrators Salesforce, Spring 18 @salesforcedocs Last updated: January 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other

More information

ITI Comment Submission to USTR Negotiating Objectives for a U.S.-Japan Trade Agreement

ITI Comment Submission to USTR Negotiating Objectives for a U.S.-Japan Trade Agreement ITI Comment Submission to USTR-2018-0034 Negotiating Objectives for a U.S.-Japan Trade Agreement DECEMBER 3, 2018 Introduction The Information Technology Industry Council (ITI) welcomes the opportunity

More information

Back to TOC. KUKA Connect FAQ

Back to TOC. KUKA Connect FAQ FAQ 2019 KUKA U.S. Holdings Company LLC. All rights reserved. Reproduction, modification, publication, distribution, or display of this document, in whole or in part, is prohibited except with the prior

More information

DNVGL-CG-0214 Edition September 2016

DNVGL-CG-0214 Edition September 2016 CLASS GUIDELINE DNVGL-CG-0214 Edition September 2016 The content of this service document is the subject of intellectual property rights reserved by ("DNV GL"). The user accepts that it is prohibited by

More information

A Guide for Structuring and Implementing PIAs

A Guide for Structuring and Implementing PIAs WHITEPAPER A Guide for Structuring and Implementing PIAs Six steps for your next Privacy Impact Assessment TRUSTe Inc. US: 1-888-878-7830 www.truste.com EU: +44 (0) 203 078 6495 www.truste.eu 2 CONTENTS

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Information & Communication Technology Strategy

Information & Communication Technology Strategy Information & Communication Technology Strategy 2012-18 Information & Communication Technology (ICT) 2 Our Vision To provide a contemporary and integrated technological environment, which sustains and

More information

SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01

SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01 SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01 Table of Contents ABOUT THIS DOCUMENT... 3 Glossary... 3 CONSOLE SECTIONS AND WORKFLOWS... 5 Sensor & Rule Management...

More information

Kaseya 2. User Guide. Version 7.0

Kaseya 2. User Guide. Version 7.0 Kaseya 2 vpro User Guide Version 7.0 May 30, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from time

More information

Technology transactions and outsourcing deals: a practitioner s perspective. Michel Jaccard

Technology transactions and outsourcing deals: a practitioner s perspective. Michel Jaccard Technology transactions and outsourcing deals: a practitioner s perspective Michel Jaccard Overview Introduction : IT transactions specifics and outsourcing deals Typical content of an IT outsourcing agreement

More information

SmartZone Rack Energy Kits. Power and Environmental Monitoring for Small Data Centers

SmartZone Rack Energy Kits. Power and Environmental Monitoring for Small Data Centers SmartZone Rack Energy Kits Power and Environmental Monitoring for Small Data Centers 3 Simple Steps to Success Step 1: Order + Step 2: Install + Step 3: Monitor = Simple To Order All necessary hardware

More information

Current Systems. 1 of 6

Current Systems. 1 of 6 Current Systems Overview Radio communications within the State of California s adult correctional institutions are vital to the daily safety and security of the institution, staff, inmates, visitors, and

More information

Live Agent for Administrators

Live Agent for Administrators Live Agent for Administrators Salesforce, Summer 16 @salesforcedocs Last updated: July 28, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Supplemental end user software license agreement terms

Supplemental end user software license agreement terms Terms of Service Docusign, Inc. Supplemental end user software license agreement terms These Supplemental Terms and Conditions (the "Terms") govern your ("Customer") use of the DocuSign Subscription Service,

More information

Public Information and Disclosure RD/GD-99.3

Public Information and Disclosure RD/GD-99.3 Public Information and Disclosure RD/GD-99.3 March, 2012 Public Information and Disclosure Regulatory Document RD/GD-99.3 Minister of Public Works and Government Services Canada 2012 Catalogue number CC172-82/2012E-PDF

More information

Live Agent for Administrators

Live Agent for Administrators Live Agent for Administrators Salesforce, Spring 17 @salesforcedocs Last updated: April 3, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

TERMS AND CONDITIONS. for the use of the IMDS Advanced Interface by IMDS-AI using companies

TERMS AND CONDITIONS. for the use of the IMDS Advanced Interface by IMDS-AI using companies TERMS AND CONDITIONS for the use of the IMDS Advanced Interface by IMDS-AI using companies Introduction The IMDS Advanced Interface Service (hereinafter also referred to as the IMDS-AI ) was developed

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT The template below is designed to assist you in carrying out a privacy impact assessment (PIA). Privacy Impact Assessment screening questions These questions

More information

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 Legislative and Regulatory Update Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 2009 Pharma market research state and Federal Massachusetts Vermont Minnesota Proposed

More information

DNVGL-CP-0338 Edition October 2015

DNVGL-CP-0338 Edition October 2015 CLASS PROGRAMME DNVGL-CP-0338 Edition October 2015 The electronic pdf version of this document, available free of charge from http://www.dnvgl.com, is the officially binding version. FOREWORD DNV GL class

More information

DocuSign for ios: For Field Sales & Field Services

DocuSign for ios: For Field Sales & Field Services DocuSign for ios: For Field Sales & Field Services How DocuSign for ios enables field sales and field services to transact business anytime, anywhere on ios devices Key Challenges FOR FIELD SALES AND SERVICES

More information

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines Fifth Edition Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines April 2007 Ministry of the Environment, Japan First Edition: June 2003 Second Edition: May 2004 Third

More information

View Terms and Conditions: Effective 12/5/2015 Effective 6/17/2017

View Terms and Conditions: Effective 12/5/2015 Effective 6/17/2017 View Terms and Conditions: Effective 12/5/2015 Effective 6/17/2017 Comerica Mobile Banking Terms and Conditions - Effective 12/5/2015 Thank you for using Comerica Mobile Banking combined with your device's

More information

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is

More information

AGENTLESS ARCHITECTURE

AGENTLESS ARCHITECTURE ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little

More information

Digital Preservation Program: Organizational Policy Framework (06/07/2010)

Digital Preservation Program: Organizational Policy Framework (06/07/2010) UNIVERSITY OF UTAH J. Willard Marriott Library Digital Preservation Program: Organizational Policy Framework (06/07/2010) SECTION A 2-5 Purpose Mandate Objectives Scope Attributes and Responsibilities

More information

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION

PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION CASE STUDY TAKING ACTION BASED ON REAL-TIME PLAYER BEHAVIORS Peak Games is already a household name in the mobile gaming industry.

More information

Secure identity and electronic signatures essential for digital trust

Secure identity and electronic signatures essential for digital trust Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the

More information

Air Monitoring Directive Chapter 9: Reporting

Air Monitoring Directive Chapter 9: Reporting Air Monitoring Directive Chapter 9: Reporting Version Dec 16, 2016 Amends the original Air Monitoring Directive published June, 1989 Title: Air Monitoring Directive Chapter 9: Reporting Number: Program

More information

2017 W-Systems All Rights Reserved

2017 W-Systems All Rights Reserved Contents 2 Table of Contents 3 Part I Introduction... 3 1 Introducing DocuSign for SugarCRM 4 Part II Installation... 8 1 Upgrading 11 Part III Configuration... 11 1 Configuring the DocuSign Module...

More information

ADDENDUM D COMERICA WEB INVOICING TERMS AND CONDITIONS

ADDENDUM D COMERICA WEB INVOICING TERMS AND CONDITIONS Effective 08/15/2013 ADDENDUM D COMERICA WEB INVOICING TERMS AND CONDITIONS This Addendum D is incorporated by this reference into the Comerica Web Banking Terms and Conditions ( Terms ). Capitalized terms

More information

Office of the Director of National Intelligence. Data Mining Report for Calendar Year 2013

Office of the Director of National Intelligence. Data Mining Report for Calendar Year 2013 Office of the Director of National Intelligence Data Mining Report for Calendar Year 2013 Office of the Director of National Intelligence Data Mining Report for Calendar Year 2013 I. Introduction The Office

More information

DocuSign. Customer Success Case Study Sampler

DocuSign. Customer Success Case Study Sampler DocuSign Customer Success Case Study Sampler CASE STUDY DocuSign Helps Comcast Business Sales Reps Close More Deals On The Spot Summary Reduced average number of meetings for new customer onboarding from

More information

PRODUCT INFORMATION FORM (PIF TM )

PRODUCT INFORMATION FORM (PIF TM ) PRODUCT INFORMATION FORM (PIF TM ) PIF Version 6.0 Frequently Asked Questions September 2017 CONTENTS The following headings are hyperlinked to the section of the Q&A where the information related to the

More information

Phase 2 Executive Summary: Pre-Project Review of AECL s Advanced CANDU Reactor ACR

Phase 2 Executive Summary: Pre-Project Review of AECL s Advanced CANDU Reactor ACR August 31, 2009 Phase 2 Executive Summary: Pre-Project Review of AECL s Advanced CANDU Reactor ACR-1000-1 Executive Summary A vendor pre-project design review of a new nuclear power plant provides an opportunity

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

GUITAR PRO SOFTWARE END-USER LICENSE AGREEMENT (EULA)

GUITAR PRO SOFTWARE END-USER LICENSE AGREEMENT (EULA) GUITAR PRO SOFTWARE END-USER LICENSE AGREEMENT (EULA) GUITAR PRO is software protected by the provisions of the French Intellectual Property Code. THIS PRODUCT IS NOT SOLD BUT PROVIDED WITHIN THE FRAMEWORK

More information

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO 17-007 SUBJECT: TITLE: Administration SOP Revision-04-05-07 Social Media 04-05-08 Digital Imagery Implementation Office of the Chief PURPOSE:

More information

This guide provides information on installing, signing, and sending documents for signature with

This guide provides information on installing, signing, and sending documents for signature with Quick Start Guide DocuSign for Dynamics 365 CRM 5.2 Published: June 15, 2017 Overview This guide provides information on installing, signing, and sending documents for signature with DocuSign for Dynamics

More information

RESEARCH DATA MANAGEMENT PROCEDURES 2015

RESEARCH DATA MANAGEMENT PROCEDURES 2015 RESEARCH DATA MANAGEMENT PROCEDURES 2015 Issued by: Deputy Vice Chancellor (Research) Date: 1 December 2014 Last amended: 8 June 2017 (administrative amendments only) Signature: Name: Professor Jill Trewhella

More information

Digital Preservation Policy

Digital Preservation Policy Digital Preservation Policy Version: 2.0.2 Last Amendment: 12/02/2018 Policy Owner/Sponsor: Head of Digital Collections and Preservation Policy Contact: Head of Digital Collections and Preservation Prepared

More information

Getting the evidence: Using research in policy making

Getting the evidence: Using research in policy making Getting the evidence: Using research in policy making REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 586-I Session 2002-2003: 16 April 2003 LONDON: The Stationery Office 14.00 Two volumes not to be sold

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

SLAVERY AND HUMAN TRAFFICKING

SLAVERY AND HUMAN TRAFFICKING 1 SLAVERY AND HUMAN TRAFFICKING Pursuant to Section 3 of the California Transparency in Supply Chains Act of 2010 and the United Kingdom (UK) Modern Slavery Act 2015, Chapter 30, Part 6, Provision 54,

More information

GDPR Implications for ediscovery from a legal and technical point of view

GDPR Implications for ediscovery from a legal and technical point of view GDPR Implications for ediscovery from a legal and technical point of view Friday Paul Lavery, Partner, McCann FitzGerald Ireland Meribeth Banaschik, Partner, Ernst & Young Germany mccannfitzgerald.com

More information

Ansible Tower on the AWS Cloud

Ansible Tower on the AWS Cloud Ansible Tower on the AWS Cloud Quick Start Reference Deployment Tony Vattathil Solutions Architect, AWS Quick Start Reference Team April 2016 Last update: May 2017 (revisions) This guide is also available

More information

Validation Plan: Mitchell Hammock Road. Adaptive Traffic Signal Control System. Prepared by: City of Oviedo. Draft 1: June 2015

Validation Plan: Mitchell Hammock Road. Adaptive Traffic Signal Control System. Prepared by: City of Oviedo. Draft 1: June 2015 Plan: Mitchell Hammock Road Adaptive Traffic Signal Control System Red Bug Lake Road from Slavia Road to SR 426 Mitchell Hammock Road from SR 426 to Lockwood Boulevard Lockwood Boulevard from Mitchell

More information

SMART PLACES WHAT. WHY. HOW.

SMART PLACES WHAT. WHY. HOW. SMART PLACES WHAT. WHY. HOW. @adambeckurban @smartcitiesanz We envision a world where digital technology, data, and intelligent design have been harnessed to create smart, sustainable cities with highquality

More information

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2

https://www.icann.org/en/system/files/files/interim-models-gdpr-compliance-12jan18-en.pdf 2 ARTICLE 29 Data Protection Working Party Brussels, 11 April 2018 Mr Göran Marby President and CEO of the Board of Directors Internet Corporation for Assigned Names and Numbers (ICANN) 12025 Waterfront

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

GOVERNANCE, RISK & CONTROL: ARTIFICIAL INTELLIGENCE (AI) & ROBOTIC PROCESS AUTOMATION (RPA)

GOVERNANCE, RISK & CONTROL: ARTIFICIAL INTELLIGENCE (AI) & ROBOTIC PROCESS AUTOMATION (RPA) GOVERNANCE, RISK & CONTROL: ARTIFICIAL INTELLIGENCE (AI) & ROBOTIC PROCESS AUTOMATION (RPA) GUIDANCE FOR EFFECTIVE DEPLOYMENT, MANAGEMENT AND OVERSIGHT Version 1.1 29 th June 2017 express written permission

More information

Xena Exchange Users Agreement

Xena Exchange Users Agreement Xena Exchange Users Agreement Last Updated: April 12, 2018 1. Introduction Xena Exchange welcomes You ( User ) to use Xena Exchange s online software ( Xena s Software ) described herein in accordance

More information

Gerald G. Boyd, Tom D. Anderson, David W. Geiser

Gerald G. Boyd, Tom D. Anderson, David W. Geiser THE ENVIRONMENTAL MANAGEMENT PROGRAM USES PERFORMANCE MEASURES FOR SCIENCE AND TECHNOLOGY TO: FOCUS INVESTMENTS ON ACHIEVING CLEANUP GOALS; IMPROVE THE MANAGEMENT OF SCIENCE AND TECHNOLOGY; AND, EVALUATE

More information

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD)

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) The GDPR and Upcoming mhealth Code of Conduct Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) EU General Data Protection Regulation (May 2018) First major reform in 20 years 25 th May 2018 no

More information

Public and Aboriginal engagement Public Information and Disclosure REGDOC-3.2.1

Public and Aboriginal engagement Public Information and Disclosure REGDOC-3.2.1 Public and Aboriginal engagement Public Information and Disclosure REGDOC-3.2.1 August 2017 Public Information and Disclosure Regulatory document REGDOC-3.2.1 Canadian Nuclear Safety Commission (CNSC)

More information

Guide to the Requirements for Public Information and Disclosure GD-99.3

Guide to the Requirements for Public Information and Disclosure GD-99.3 Guide to the Requirements for Public Information and Disclosure GD-99.3 November 2010 Guide to the Requirements for Public Information and Disclosure Guidance Document GD-99.3 Minister of Public Works

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

Legal Aspects of Identity Management and Trust Services

Legal Aspects of Identity Management and Trust Services Legal Aspects of Identity Management and Trust Services Anna Joubin-Bret Secretary What is Identity Management (IdM)? Fundamental issue for the use of electronic means Answers the basic questions: Who

More information

Independent Communications Authority of South Africa Pinmill Farm, 164 Katherine Street, Sandton Private Bag X10002, Sandton, 2146

Independent Communications Authority of South Africa Pinmill Farm, 164 Katherine Street, Sandton Private Bag X10002, Sandton, 2146 Independent Communications Authority of South Africa Pinmill Farm, 164 Katherine Street, Sandton Private Bag X10002, Sandton, 2146 ANNEXURE A TECHNICAL SPECIFICATIONS ICASA 09/2018 1. Purpose of the Request

More information

Public and Aboriginal Engagement Public Information and Disclosure REGDOC-3.2.1

Public and Aboriginal Engagement Public Information and Disclosure REGDOC-3.2.1 Public and Aboriginal Engagement Public Information and Disclosure REGDOC-3.2.1 May 2018 Public Information and Disclosure Regulatory document REGDOC-3.2.1 Canadian Nuclear Safety Commission (CNSC) 2018

More information

GENERAL DESCRIPTION OF THE CMC SERVICES

GENERAL DESCRIPTION OF THE CMC SERVICES STANDARD FOR CERTIFICATION No.1.1 GENERAL DESCRIPTION OF THE CMC SERVICES MAY 2007 FOREWORD (DNV) is an autonomous and independent foundation with the objectives of safeguarding life, property and the

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner

More information

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers

More information

ediscovery and Digital Evidence Online Course

ediscovery and Digital Evidence Online Course ediscovery and Digital Evidence Online Course The Convergence Between Law & Technology Instructor: Michael R. Arkfeld Dates February 26, 2014 to April 16, 2014 Day and Time of Online Sessions Wednesday

More information

Staffordshire Police

Staffordshire Police Staffordshire Police ANPR ANPR Project Document Reference: Author: D PLATT Date: 16 TH NOV 2012 Change Control Record Date Document Reference Change By 16/11/12 Initial version, for review D PLATT Contents

More information