Cloud Computing Guidelines

Guidelines for the Use of 3rd Party or Cloud Computing Services at the 好色tv of 好色tv

 

Why is this important to me?

If you manage a service and plan to outsource one, or are already and the service will house key university data regarding students, staff, faculty, finances or research, you need to read the remainder of the guide.

Cloud computing, shared services, vendor hosted solutions are becoming more common in information technology and often bring advances in capability and capacity to organizations. They also bring challenges. What 好色tv of 好色tv departments and organizations once controlled exclusively, now involve relationships that need management to insure they work effectively and that the best interests of the 好色tv are managed well. Failure to properly understand and manage cloud computing relationships can result in significant institutional and individual liability, including criminal charges. It is essential that you seek review of any contract or agreement for cloud computing services, as outlined in this document.

All outsourced or vendor hosted contracts and terms and conditions should be reviewed by your Chief Information Officer, IT Security staff and the 好色tv Office of General Counsel, prior to entering into an agreement.

The General Counsel's Office will review:

  • governance
  • information and data security
  • vendor qualifications
  • contract suitability
  • risk assessment

Before engaging in a formal relationship all of these elements need to be in order to avoid getting stuck with what you do not want, did not intend or other surprises. To do this we need to be familiar with the issues and consequences of:

  • our choices
  • what needs to be considered
  • organizational needs
  • types of data
  • methods of protection
  • liability and limitations
  • service level
  • performance metrics

 

Table of Contents

 

Exhibit A: 好色tv of 好色tv Purchase Order Confidentiality and Privacy Requirement
Exhibit B: Information Resources Proposal Review Form

 

Cloud Computing

The Internet is sometimes referred to as the 鈥渃loud鈥. Cloud computing is the array of Internet-based services, often available to the public, for gathering, storing, processing and sharing information. Some cloud services, such as those offered by Apple, Microsoft, or Google, may be free to end-users. For the general user who wants a convenient, Internet-based solution for storing or sharing personal information, cloud computing may provide a reasonable option. 好色tv departments seeking such services need to be aware that all services need to adhere to security policy and standards as well as confidentiality laws. This document identifies security and data privacy concerns that must be considered when purchasing or using cloud- computing services at the 好色tv. In this context, the 好色tv is a cloud-computing consumer.

 

Examples

There are numerous types of cloud computing services available on the Internet that may be appropriate for individual or 好色tv use. Some examples of public cloud services are:

  • External Email Services (e.g., Hotmail, Gmail, O365, etc.)
  • Chat & Instant Messaging Services (e.g., Yahoo, AIM, MSN, IRC, etc.)
  • Social Networking Services (e.g., Twitter, Facebook, Instagram, Tumblr, etc.)
  • Hosted Application Services (e.g., Google Docs, PageUp, etc.)
  • File Sharing (e.g., Dropbox, Box.net , etc.)

Virtual Machines (e.g., GoGrid and Amazon Web Services Elastic Compute Cloud and Azure are commercial web services that allow customers to rent any number of virtual computers upon which they can load and run their own software applications.)

 

Your Responsibility

As a member of the 好色tv community, be aware of the sensitivity or conditional uses of the data you generate, have access to, or receive. Should you ever need to store or share 好色tv information in a manner not currently provided within the 好色tv's computing environment, always consider its sensitivity before doing so. Storage and transmission of sensitive information should be limited to cloud computing resources protected by the 好色tv鈥檚 physical, technical and/or administrative processes for safeguarding data. If you are unsure of what is appropriate you can contact your campus CIO regarding what is and is not safe. When considering cloud computing services that may be entrusted with 好色tv of 好色tv data or communication tools working with IT security staff to help understand and navigate issues of security and confidentiality is a good idea. In the event the service is being purchased, General Counsel, purchasing, and risk management offices may also need to be engaged to review, negotiate contracts and/or determine liability. Some data comes with licensing or other usage agreements that need to be known and followed. These can include software, commercial data products or information received by virtue of partnerships.

Any time data fitting the Universities definition of internal use or restricted is going to be exchanged with or access given to vendors, service providers, contractors, organizations, etc. outside the 好色tv the UA Information Security Officer is be notified in the process of making arrangements for this exchange or access along with the data custodian.

Units or departments that are considering using cloud-computing services should contact their purchasing and IT departments, as well as 好色tv General Counsel, prior to entering into any contract. The Institutional Review Board (IRB) should be consulted if a unit or department is planning to share human subjects鈥 research data within a cloud computing service.

 

Considerations

If in doubt ask your local information security staff or campus CIO as there can be significant hidden or duplicated cost and risk.
This can include Google Apps for 好色tv (email, chat, document sharing, etc.) or other resources that can provide the functionality desired.
This will be a good indicator of an approved cloud computing resource. However discretion still needs to be used with respect to what kind of data you plan to introduce to the service.
Often when data leaves the 好色tv it is viewable by administrative and other staff at the service provider. Sensitive information regarding staff, students, affiliates, agreements, correspondence etc. should not be hosted off 好色tv IT resources or with services not contractually engaged.
Often there are agreements, governing regulation, 好色tv policy or legal requirements that need to be reviewed and provided for in disclosure of sensitive or restricted data. If you are unsure of what might be required it never hurts to ask. Your campus CIO or Information Security Officer can identify requirements and risks that need to be provided for and assist with their implementation.
Personally identifiable information (PII) according to 好色tv Regulation R05.08.023 is the combination of a persons first and last name or first initial and last name when either is accompanied by any of the following:
  • social security number
  • driver's license number or state identification card number
  • the individual's account number, credit card account number, or debit card account number in combination with any required security code, access code, or password that would permit access to an individual鈥檚 financial account
  • passwords, PINs, or access codes for financial accounts
PII placed outside the 好色tv鈥檚 control puts the 好色tv and the individual(s) it identifies at risk. Placing it in cloud computing resources not provided by the 好色tv is inconsistent with the protection the 好色tv and applicable law affords PII. You could create a large expense and embarrassment for the 好色tv and yourself if required confidentiality is lost.
If the answer to this is yes, cloud computing services without 好色tv approval are not suitable for this material. Additionally it may cause the 好色tv to have to notify the state and individual(s) involved in accordance with the 好色tv Personal Information Protection Act (AS 45.48.010 - .090).

 

Guidelines

There are a number of information security and data privacy concerns regarding use of cloud computing services at the 好色tv. They include:

  • Loss of 好色tv control of data, leading to a loss of security or reduced effectiveness
  • Loss of privacy of data, potentially due to aggregation with data from other cloud consumer
  • 好色tv dependency on a third party for critical infrastructure and data handling processes
  • Potential security and technological defects in the infrastructure provided by a cloud vendor
  • No 好色tv control over the third parties that a cloud vendor might contract with
  • Loss of the 好色tv鈥檚 own competence in managing the security of computing infrastructure

There are also legal concerns with the use of cloud computing. A cloud-computing relationship is governed by contract law. Disputes over the terms of the contract could be costly and lengthy to resolve. Since cloud-computing relationships are governed by contract, it is important that the following items be considered prior to entering into any contract to use or purchase cloud computing services:

  • Data definition and use
  • General data protection terms
  • Compliance with legal and regulatory requirements
  • Data access and handover process at the end of the relationship
  • Breach liability assignment
  • Service level expectations and performance metrics

All of these items should be addressed in a cloud-computing contract, as well as items that are particular to the specific infrastructure or application services that are used or purchased.

 

Data Definition and Use

Both the 好色tv and cloud-computing vendor must understand the type of data that they might transfer back and forth because of their relationship. A contract must have clear terms that define the data owned by each party and the stages of data use, transmission and storage. The parties also must clearly define data that must be protected, whose custody it is in at various stages and an assignment of liability at each stage.

The contract must specifically state what data the 好色tv owns. It must also classify the type of data shared in the contract according to the 好色tv鈥檚 classification schema: Public, Internal Use, or Restricted.

Units must exercise extreme caution when sharing 好色tv internal-use or restricted data within a cloud computing service. The contract must specify how the cloud-computing vendor can use 好色tv data. Vendors cannot use 好色tv data in any way that violates the law or 好色tv policies.

There are times when the 好色tv requires access to data in the accounts or under the control of an identity they sponsored in a cloud computing services. Data ownership and the 好色tv鈥檚 right to access data regardless of what user or identity it is associated with needs to be established. The process for obtaining this kind of access needs to be detailed in procedure.

 

General Data Protection Terms

The 好色tv must specify particular data protection terms in a contract with a cloud-computing vendor. The 好色tv does this to create a minimum level of security for 好色tv data. A minimum level of security ensures that the 好色tv data is kept confidential, is not changed inappropriately, and is available to the 好色tv as needed.

The 好色tv will consider the following contract terms to ensure a minimum level of information security protection:

  • Data transmission and encryption requirements
  • Authentication and authorization mechanisms
  • Intrusion detection and prevention mechanisms
  • Logging and log review requirements
  • Security scan and audit requirements
  • Security training and awareness requirements
  • Establish breach responsibility boundaries
  • Data disposition
  • Service termination terms

Contracting parties in consultation with their associated campus IT department can use resources developed by the National Institute of Standards and Technology (NIST) to make sure that a contract includes the appropriate controls. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) has also prepared information security controls guidance.

 

Compliance with Legal and Regulatory Requirements

The 好色tv has many federal laws that it must follow, these include Family 好色tval Rights and Privacy Act of 1974 (FERPA), the Health Insurance Portability and Accountability Act (HIPAA), the U.S. Department of State International Traffic in Arms Regulations (ITAR) 22 CFR 120- 130, U.S. Department of Commerce Export Administration Regulations (EAR) 15 CRF 730 鈥 774 and the Gramm-Leach-Bliley Act (GLBA Pub.L. 106-102, 113 Stat. 1338), and the Americans with Disabilities Act (ADA) of 2008 (P.L. 110-325)

State laws may also affect a relationship with a cloud-computing vendor. For instance, in 好色tv the 好色tv must follow rules about protecting Social Security and credit card numbers and follow requirements for notification of a breach (AS 45.48.010 好色tv Personal Information Protection Act). The actions of 好色tv employees are also governed by the 好色tv Executive Branch Ethics Act.


A relationship with a cloud-computing vendor may also be impacted by private industry regulations. For example, units at the 好色tv that accept credit cards also must follow the Payment Card Industry (PCI) Data Security Standard (DSS) issued by the major credit card companies.


Requirements

Finally, cloud-computing services that use, store, or process 好色tv data must also follow applicable 好色tv policies and regulations. Such policies may include Information Technology policies and the 好色tv's data handling requirements. At a minimum, a cloud-computing contract should address the following regulatory requirements:

  • FERPA language if student data is used or transmitted between the parties (units or departments will also need to notify the Office of the Registrar if they plan to share student information within a cloud computing service).
  • GLBA language if financial data is used or transmitted between the parties (units or departments will also need to notify the Chief Information Security Officer they plan to share financial information within a cloud computing service).
  • HIPAA language if health information is used or transmitted between the parties (units or departments will also need to notify the Chief Information Security Officer at the 好色tv if they plan to share health information within a cloud computing service).
  • ADA language to ensure compliance for individuals with disabilities.
  • Language protecting the intellectual property rights of the 好色tv.
  • Language requiring the cloud-computing vendor to notify the 好色tv, in advance and prior to responding, if it receives any court order, subpoena, discovery request, or any request of any kind seeking access or production of any 好色tv data.
  • Language requiring a cloud-computing vendor to cooperate with security incident investigation so that the 好色tv can meet its own regulatory notification requirements.
  • Language requiring a cloud-computing vendor to assist the 好色tv with third party litigation that occurs because of the cloud-computing relationship.
    鈥 Language outlining a cloud computing vendor鈥檚 obligation to preserve data for a specified period of time and indefinitely in the event of litigation to which hosted data may be related.
  • Language requiring a cloud-computing vendor to notify the 好色tv if the security of any cloud-computing service is compromised in a breach and any 好色tv data is potentially exposed.
  • Language requiring the cloud-computing vendor to assist with entering into a cloud services contract and exiting a cloud services contract.
  • Language regarding contract termination and return or destruction of 好色tv owned data.

Each cloud-computing contract presents unique legal and regulatory issues. Before entering any contract, you should consult with the 好色tv General Counsel and Chief Information Security Officer to ensure compliance.


Accessibility

If the Cloud solution includes any end-user-facing human interface, such as an end-user device software component or web site form, file upload 好色tv, etc. the Contractor hereby warrants that the products or services to be provided under this agreement comply with the accessibility guidelines of 鈥淪ection 508 of the Rehabilitation Act of 1973鈥 as amended as of the date of this agreement, and the 鈥淲eb Content Accessibility Guidelines (WCAG) 2.0鈥 published by the Web Content Accessibility Guidelines (WCAG) 2.0 website.

If the solution includes any end-user-facing human interface, such as an end-user device software component, web pages or site, video or audio playback, file upload 好色tv, mobile device components, etc., the Contractor agrees to promptly respond to and resolve any complaint regarding accessibility of its products or services which is brought to its attention and vendor further agrees to indemnify and hold harmless the 好色tv or any university entity using the Contractor's products or services from any claim arising out of its failure to comply with the aforesaid requirements.

The 好色tv, at its discretion, may at any time test the vendor鈥檚 products or services covered by this agreement to ensure compliance with Section 508 and WCAG 2.0. Testing that results in findings of non-compliance, shall result in a 25% reduction in the total cost of the products and/or services covered by this agreement if the non-compliance is not corrected within 30 days of being reported to the vendor in writing. The 好色tv will pay all withheld amounts to the vendor upon correction of the non-compliance and acceptance. Said acceptance not to be unreasonably withheld.

Failure to comply with these requirements shall constitute a breach and be grounds for termination of this agreement and a pro-rated refund of fees paid from the 好色tv for the remainder of original contract period.

 

Data Access and Handover Process at the End of the Relationship

Before a relationship is established the conditions under which it can be ended, the responsibilities of involved parties and steps to disengage should be defined. Without these pieces the process of ending a relationship can become daunting and costly. Starting with a defined set of conditions either side can use to initiate discontinuation of services reduces the unknowns. The following should be established up front and before engagement:

  • Who can elect termination of service and how notice is given.
  • Elements of the disentanglement such as how reacquisition of real, data or intellectual property is handled.
  • Assignment of duties of the 好色tv, the vendor and/or a new cloud-computing services vendor.
  • Time requirements for responses or actions that need to be taken.
  • Responsibility for costs associated with disentanglement.
  • Procedures for maintaining the integrity of data or intellectual property throughout the process, and any penalties for not doing so and how integrity is to be established.

Breach Liability Assignment

When entrusting a 3rd party with access to 好色tv data the process of transferring, storing and processing that data needs to be evaluated and minimum levels of assurance established for the data in each of those states. Establishing who has possession of it and the responsibility to protect it needs to be done before an adverse event involving 好色tv data takes place. Ideally the cloud computing service vendor should accept liability for any data loss that takes place on the 好色tvs, networks or applications they manage to deliver a service. Without General Counsel鈥檚 approval an agent of the 好色tv should not agree to indemnify a cloud-computing vendor.

 

Service Level Expectations and Performance Metrics

When entering into a cloud-computing contract, it is also important to make sure that the contract specifies service level expectations and includes performance metrics. The 好色tv should consider the following contract terms to address service level and performance metrics:

  • Language regarding service availability time and service outages
  • Language regarding routine maintenance timeframes
  • Language regarding hardware upgrades to cloud-computing services
  • Language regarding software updates to cloud-computing services
  • Language regarding changes to the cloud-computing services

 

Reference Material

U.S. Department of Commerce Export Administration Regulations (EAR) 15 CRF 730 - 774
U.S. Department of State International Traffic in Arms Regulations (ITAR) 22 CFR 120 - 130)