SlideShare une entreprise Scribd logo
1  sur  38
Dr Christine Sexton

Director, Corporate Information and
        Computing Services
       University of Sheffield
Our Cloud Story
Why?
• Poor student email service   • Mobile strategy
• Email servers getting old    • Concentrate on added
• Quick wins (timetable)         value
• Calendar product not         • Pace of Innovation
  supported                    • Carbon footprint
• Improved service
How
• Students – normal governance
• Decision May 2009
• Implementation August 2009
• Staff – approval of UEB
• Implemented email during
  2011
• Calendar August 2011
Implementation
• Open & transparent

• Engage user community

• No big deal

• Risks identified
   –   Charging
   –   Resistance to change
   –   Volatility of development
   –   Impact on skills
Email
• Tools provided by Google
• All mail migrated

• Student
   – Migration of existing mail
   – Friendly email aliases

• Staff
   –   Users can continue to use client
   –   IT Support staff early adoptors.
   –   Support Staff in Departments, personal service
   –   Feedback sessions after dept is complete.
Calendar
• Students
   – Population of Calendars with
     timetables


• Staff
   – Big Bang approach needed
   – Data Migration out-sourced
   – Users used to Oracle Calendar
   – Major business change involved
Issues
• Disruptive technology
• Integration
• Training for different communities of users
• Benefits
• Other “Core Apps” - Docs, Sites, Groups, Labs
• Client configuration
• Google changing things
Multiple accounts
“That's great news for students,
now when can staff have it?”

A member of staff
Security
“After careful assessment of Google Apps for
Education against UK Data Protection Law and
the University’s own privacy policies the
University is satisfied that personal data is being
processed appropriately”
Risk
The University has a modified contract with
Google, based on Google’s standard terms and
conditions.

Google have agreed to only process personal data in
accordance with the standards set out by the EU
directive on data protection.

The University has assessed the risk in relation to the
US Patriot Act is satisfied that the increased risk
presented by this is very small and is manageable.
Safe Harbor
Export Control
• Technical information covered by
  UK export law
• Legal advice
  The use of Google mail … would not
  in itself qualify as exporting data.
• Data transmitted by email can pass
  through national boundaries
  regardless of destination
• Therefore, although the risk is very
  low …… careful consideration should
  always be given as to how
  controlled technology is transmitted
  and where it is stored.
The future
Thank you
                 c.sexton@sheffield.ac.uk



http://cicsdir.blogspot.com/




                                   @cloggingchris

Contenu connexe

En vedette

Application Security
Application SecurityApplication Security
Application Securityflorinc
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый деньUISGCON
 
Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsVincent Kwon
 
Nuclear power-india
Nuclear power-indiaNuclear power-india
Nuclear power-indiauweandhum
 
An overview on music magazines
An overview on music magazinesAn overview on music magazines
An overview on music magazinesjordiniho
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)Mark Heid
 
Culture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsCulture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsFrank Polack
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom
 

En vedette (11)

Application Security
Application SecurityApplication Security
Application Security
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
 
Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration Solutions
 
106
106106
106
 
SIMSREEProtectors
SIMSREEProtectorsSIMSREEProtectors
SIMSREEProtectors
 
Nuclear power-india
Nuclear power-indiaNuclear power-india
Nuclear power-india
 
An overview on music magazines
An overview on music magazinesAn overview on music magazines
An overview on music magazines
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
 
U.9 La 2ª Guerra Mundial
U.9 La 2ª Guerra MundialU.9 La 2ª Guerra Mundial
U.9 La 2ª Guerra Mundial
 
Culture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsCulture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise Implementations
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter Commerce
 

Similaire à Dr Christine Sexton on the University of Sheffield's Cloud Story

Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Faindra Jabbar
 
Section 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudSection 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudAssociation of Colleges
 
Home Working and the University of Bath
Home Working and the University of BathHome Working and the University of Bath
Home Working and the University of BathMarieke Guy
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide showCheryl Simon
 
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Jisc
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Marieke Guy
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsMarieke Guy
 
Connecting Remote Workers
Connecting Remote WorkersConnecting Remote Workers
Connecting Remote WorkersMarieke Guy
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud servicesEduserv
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013SALCTG
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 

Similaire à Dr Christine Sexton on the University of Sheffield's Cloud Story (20)

E mail & storage in the cloud
E mail & storage in the cloud E mail & storage in the cloud
E mail & storage in the cloud
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
Section 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudSection 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloud
 
Home Working and the University of Bath
Home Working and the University of BathHome Working and the University of Bath
Home Working and the University of Bath
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide show
 
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...
 
RDM @ Edinburgh - Arkivum Workshop
RDM @ Edinburgh - Arkivum WorkshopRDM @ Edinburgh - Arkivum Workshop
RDM @ Edinburgh - Arkivum Workshop
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy Steps
 
Moving to moodle 2 gregynog 2012
Moving to moodle 2 gregynog 2012Moving to moodle 2 gregynog 2012
Moving to moodle 2 gregynog 2012
 
Connecting Remote Workers
Connecting Remote WorkersConnecting Remote Workers
Connecting Remote Workers
 
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning EnvironmentRavi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
 
Inspela presentation
Inspela presentationInspela presentation
Inspela presentation
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
Vle in the cloud final version
Vle in the cloud final versionVle in the cloud final version
Vle in the cloud final version
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 
RDM @ UoE
RDM @ UoERDM @ UoE
RDM @ UoE
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Dr Christine Sexton on the University of Sheffield's Cloud Story

  • 1. Dr Christine Sexton Director, Corporate Information and Computing Services University of Sheffield
  • 3. Why? • Poor student email service • Mobile strategy • Email servers getting old • Concentrate on added • Quick wins (timetable) value • Calendar product not • Pace of Innovation supported • Carbon footprint • Improved service
  • 4. How • Students – normal governance • Decision May 2009 • Implementation August 2009 • Staff – approval of UEB • Implemented email during 2011 • Calendar August 2011
  • 5. Implementation • Open & transparent • Engage user community • No big deal • Risks identified – Charging – Resistance to change – Volatility of development – Impact on skills
  • 6. Email • Tools provided by Google • All mail migrated • Student – Migration of existing mail – Friendly email aliases • Staff – Users can continue to use client – IT Support staff early adoptors. – Support Staff in Departments, personal service – Feedback sessions after dept is complete.
  • 7. Calendar • Students – Population of Calendars with timetables • Staff – Big Bang approach needed – Data Migration out-sourced – Users used to Oracle Calendar – Major business change involved
  • 8. Issues • Disruptive technology • Integration • Training for different communities of users • Benefits • Other “Core Apps” - Docs, Sites, Groups, Labs • Client configuration • Google changing things
  • 10. “That's great news for students, now when can staff have it?” A member of staff
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. “After careful assessment of Google Apps for Education against UK Data Protection Law and the University’s own privacy policies the University is satisfied that personal data is being processed appropriately”
  • 28. Risk
  • 29. The University has a modified contract with Google, based on Google’s standard terms and conditions. Google have agreed to only process personal data in accordance with the standards set out by the EU directive on data protection. The University has assessed the risk in relation to the US Patriot Act is satisfied that the increased risk presented by this is very small and is manageable.
  • 31. Export Control • Technical information covered by UK export law • Legal advice The use of Google mail … would not in itself qualify as exporting data. • Data transmitted by email can pass through national boundaries regardless of destination • Therefore, although the risk is very low …… careful consideration should always be given as to how controlled technology is transmitted and where it is stored.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38. Thank you c.sexton@sheffield.ac.uk http://cicsdir.blogspot.com/ @cloggingchris

Notes de l'éditeur

  1. WhyWhatHow Issues, including data security and privacy
  2. Improved service egfilestore
  3. Paper to UEB was two sides of A4
  4. Changed name of project from “Next Generation email & Calendar” to ”Google Apps”Paper to UEB was 2 sidesResistance to change risk had security behind it
  5. Good quality comms neededAbout 200 Users a night is viable 
  6. Disruptive technology - what do you do with all the existing stuffIntegration with your stuffTraining for different communities of usersMaking sure you get the benefitsWhat to do about other “Core Apps” - Docs, Sites, Groups, LabsIMAP access to mail
  7. Built own servers and netorksAll designed with failure in mind
  8. Back up
  9. Can afford to spend more than us on security. In fact, more than most governements.
  10. The contract specifies how and where different types of data will be held and processed by Google.The contract specifies that both Google and the University must abide by a comprehensive Privacy Policy.The contract has specific clauses that cover when and how data will be processed and the retention periods for data.The contract and Privacy Policy are clear that data will not be shared with third parties except where required to do so by lawGoogle adheres to the United States Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program. The US Patriot Act has strict legal processes that must be followed, and Google make it clear in their Privacy Policy that they will only respond to lawful requests where there is evidence that the correct processes have been followed.
  11. As you know, our stance is that we adhere to the principles of the European Directive on Data Protection through participation in Safe Harbor. We don't disclose where our Data Centres are and the EU Directive does not require that we do so. What's important is knowing whether the Data Processor takes appropriate measures to protect data - which of course we do.And, in case you're asked, we do not commit to maintaining data in the US/EU but we do commit to maintaining Safe Harbor compliance during the Term of the Agreement.EUData Protection Directive, which sets comparatively strict privacy protections for EU citizens. It prohibits European firms from transferring personal data to overseas jurisdictions with weaker privacy laws, but creates exceptions where the overseas recipients have voluntarily agreed to meet EU standards under the Directive's Safe Harbor Principles.These principles must provide:Notice - Individuals must be informed that their data is being collected and about how it will be used.Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third parties.Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles.Security - Reasonable efforts must be made to prevent loss of collected information.Data Integrity - Data must be relevant and reliable for the purpose it was collected for.Access - Individuals must be able to access information held about them, and correct or delete it if it is inaccurate.Enforcement - There must be effective means of enforcing these rules.
  12. A small number of researchers in the University handle technical information that is covered by UK export law (this is usually, but not limited to, defence related technologies).  As the data in Google Apps for Education may be held on servers outside of the UK, the University has obtained legal advice on the specific matter of technical information controlled by export law:The use of Google mail to send, receive or store emails that contain information controlled by export law would not in itself qualify as exporting data. For example if both the sender and recipient are in the UK.The use of any mail system to send, receive or store emails that contain information controlled by export law to those outside of the UK would qualify as exporting data.Data transmitted by email can pass through national boundaries regardless of destination and can also be accidentally forwarded to unintended recipients.  Data stored in Google Apps for Education could in theory be made available to US law enforcement agencies.  Therefore, although the risk is very low, and as should be the case anyway, careful consideration should always be given as to how controlled technology is transmitted and where it is stored.
  13. The New Privacy Policies only affect users of our Consumer Services. It does not affect the standard, core Google Apps for Education ToS, which are governed by the Google Apps for Education Agreement that the institution accepts (either online or offline). However, if you provision any of the Consumer Services (Google+, Picassa, YouTube, etc.) through the Apps for EDU Control Panel, users of those services will be presented with the Consumer Terms and those terms and the new Privacy Policies will govern the use of those products/services. 
  14. One potential answer to the “what can we stop doing?” question.
  15. YHMAN regional facility based on VMWAre. Community Cloud. Currently sheffield, leedsleeds metPrivate network with virtual security.IaaS.Pathfinder project.Back up, business continuity, temporary capacity.