SlideShare una empresa de Scribd logo
1 de 38
Dr Christine Sexton

Director, Corporate Information and
        Computing Services
       University of Sheffield
Our Cloud Story
Why?
• Poor student email service   • Mobile strategy
• Email servers getting old    • Concentrate on added
• Quick wins (timetable)         value
• Calendar product not         • Pace of Innovation
  supported                    • Carbon footprint
• Improved service
How
• Students – normal governance
• Decision May 2009
• Implementation August 2009
• Staff – approval of UEB
• Implemented email during
  2011
• Calendar August 2011
Implementation
• Open & transparent

• Engage user community

• No big deal

• Risks identified
   –   Charging
   –   Resistance to change
   –   Volatility of development
   –   Impact on skills
Email
• Tools provided by Google
• All mail migrated

• Student
   – Migration of existing mail
   – Friendly email aliases

• Staff
   –   Users can continue to use client
   –   IT Support staff early adoptors.
   –   Support Staff in Departments, personal service
   –   Feedback sessions after dept is complete.
Calendar
• Students
   – Population of Calendars with
     timetables


• Staff
   – Big Bang approach needed
   – Data Migration out-sourced
   – Users used to Oracle Calendar
   – Major business change involved
Issues
• Disruptive technology
• Integration
• Training for different communities of users
• Benefits
• Other “Core Apps” - Docs, Sites, Groups, Labs
• Client configuration
• Google changing things
Multiple accounts
“That's great news for students,
now when can staff have it?”

A member of staff
Security
“After careful assessment of Google Apps for
Education against UK Data Protection Law and
the University’s own privacy policies the
University is satisfied that personal data is being
processed appropriately”
Risk
The University has a modified contract with
Google, based on Google’s standard terms and
conditions.

Google have agreed to only process personal data in
accordance with the standards set out by the EU
directive on data protection.

The University has assessed the risk in relation to the
US Patriot Act is satisfied that the increased risk
presented by this is very small and is manageable.
Safe Harbor
Export Control
• Technical information covered by
  UK export law
• Legal advice
  The use of Google mail … would not
  in itself qualify as exporting data.
• Data transmitted by email can pass
  through national boundaries
  regardless of destination
• Therefore, although the risk is very
  low …… careful consideration should
  always be given as to how
  controlled technology is transmitted
  and where it is stored.
The future
Thank you
                 c.sexton@sheffield.ac.uk



http://cicsdir.blogspot.com/




                                   @cloggingchris

Más contenido relacionado

Destacado

Application Security
Application SecurityApplication Security
Application Securityflorinc
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый деньUISGCON
 
Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsVincent Kwon
 
Nuclear power-india
Nuclear power-indiaNuclear power-india
Nuclear power-indiauweandhum
 
An overview on music magazines
An overview on music magazinesAn overview on music magazines
An overview on music magazinesjordiniho
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)Mark Heid
 
Culture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsCulture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsFrank Polack
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom
 

Destacado (11)

Application Security
Application SecurityApplication Security
Application Security
 
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день[Short 10-00] Глеб Пахаренко - Криптография на каждый день
[Short 10-00] Глеб Пахаренко - Криптография на каждый день
 
Exploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration SolutionsExploring IBM's Advanced Collaboration Solutions
Exploring IBM's Advanced Collaboration Solutions
 
106
106106
106
 
SIMSREEProtectors
SIMSREEProtectorsSIMSREEProtectors
SIMSREEProtectors
 
Nuclear power-india
Nuclear power-indiaNuclear power-india
Nuclear power-india
 
An overview on music magazines
An overview on music magazinesAn overview on music magazines
An overview on music magazines
 
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
LBI 4153 - From Social Insigts to Business Advantage - IOD Conf (IBM)
 
U.9 La 2ª Guerra Mundial
U.9 La 2ª Guerra MundialU.9 La 2ª Guerra Mundial
U.9 La 2ª Guerra Mundial
 
Culture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise ImplementationsCulture Change Challenges in Enterprise Implementations
Culture Change Challenges in Enterprise Implementations
 
TechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter CommerceTechSolCom présente IBM Smarter Commerce
TechSolCom présente IBM Smarter Commerce
 

Similar a Dr Christine Sexton on the University of Sheffield's Cloud Story

Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Faindra Jabbar
 
Section 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudSection 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudAssociation of Colleges
 
Home Working and the University of Bath
Home Working and the University of BathHome Working and the University of Bath
Home Working and the University of BathMarieke Guy
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide showCheryl Simon
 
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Jisc
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Marieke Guy
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsMarieke Guy
 
Connecting Remote Workers
Connecting Remote WorkersConnecting Remote Workers
Connecting Remote WorkersMarieke Guy
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud servicesEduserv
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013SALCTG
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 

Similar a Dr Christine Sexton on the University of Sheffield's Cloud Story (20)

E mail & storage in the cloud
E mail & storage in the cloud E mail & storage in the cloud
E mail & storage in the cloud
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
Section 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloudSection 4.7 email and storage in the cloud
Section 4.7 email and storage in the cloud
 
Home Working and the University of Bath
Home Working and the University of BathHome Working and the University of Bath
Home Working and the University of Bath
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide show
 
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
Aligning IT and University Strategy - Paul Curran - Jisc Digital Festival 2014
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...
 
RDM @ Edinburgh - Arkivum Workshop
RDM @ Edinburgh - Arkivum WorkshopRDM @ Edinburgh - Arkivum Workshop
RDM @ Edinburgh - Arkivum Workshop
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy Steps
 
Moving to moodle 2 gregynog 2012
Moving to moodle 2 gregynog 2012Moving to moodle 2 gregynog 2012
Moving to moodle 2 gregynog 2012
 
Connecting Remote Workers
Connecting Remote WorkersConnecting Remote Workers
Connecting Remote Workers
 
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning EnvironmentRavi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
 
Inspela presentation
Inspela presentationInspela presentation
Inspela presentation
 
Eduserv cloud services
Eduserv cloud servicesEduserv cloud services
Eduserv cloud services
 
Vle in the cloud final version
Vle in the cloud final versionVle in the cloud final version
Vle in the cloud final version
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 
RDM @ UoE
RDM @ UoERDM @ UoE
RDM @ UoE
 
RDM@Edinburgh
RDM@EdinburghRDM@Edinburgh
RDM@Edinburgh
 
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
Birgit Plietzsch “RDM within research computing support” SALCTG June 2013
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Dr Christine Sexton on the University of Sheffield's Cloud Story

  • 1. Dr Christine Sexton Director, Corporate Information and Computing Services University of Sheffield
  • 3. Why? • Poor student email service • Mobile strategy • Email servers getting old • Concentrate on added • Quick wins (timetable) value • Calendar product not • Pace of Innovation supported • Carbon footprint • Improved service
  • 4. How • Students – normal governance • Decision May 2009 • Implementation August 2009 • Staff – approval of UEB • Implemented email during 2011 • Calendar August 2011
  • 5. Implementation • Open & transparent • Engage user community • No big deal • Risks identified – Charging – Resistance to change – Volatility of development – Impact on skills
  • 6. Email • Tools provided by Google • All mail migrated • Student – Migration of existing mail – Friendly email aliases • Staff – Users can continue to use client – IT Support staff early adoptors. – Support Staff in Departments, personal service – Feedback sessions after dept is complete.
  • 7. Calendar • Students – Population of Calendars with timetables • Staff – Big Bang approach needed – Data Migration out-sourced – Users used to Oracle Calendar – Major business change involved
  • 8. Issues • Disruptive technology • Integration • Training for different communities of users • Benefits • Other “Core Apps” - Docs, Sites, Groups, Labs • Client configuration • Google changing things
  • 10. “That's great news for students, now when can staff have it?” A member of staff
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. “After careful assessment of Google Apps for Education against UK Data Protection Law and the University’s own privacy policies the University is satisfied that personal data is being processed appropriately”
  • 28. Risk
  • 29. The University has a modified contract with Google, based on Google’s standard terms and conditions. Google have agreed to only process personal data in accordance with the standards set out by the EU directive on data protection. The University has assessed the risk in relation to the US Patriot Act is satisfied that the increased risk presented by this is very small and is manageable.
  • 31. Export Control • Technical information covered by UK export law • Legal advice The use of Google mail … would not in itself qualify as exporting data. • Data transmitted by email can pass through national boundaries regardless of destination • Therefore, although the risk is very low …… careful consideration should always be given as to how controlled technology is transmitted and where it is stored.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38. Thank you c.sexton@sheffield.ac.uk http://cicsdir.blogspot.com/ @cloggingchris

Notas del editor

  1. WhyWhatHow Issues, including data security and privacy
  2. Improved service egfilestore
  3. Paper to UEB was two sides of A4
  4. Changed name of project from “Next Generation email & Calendar” to ”Google Apps”Paper to UEB was 2 sidesResistance to change risk had security behind it
  5. Good quality comms neededAbout 200 Users a night is viable 
  6. Disruptive technology - what do you do with all the existing stuffIntegration with your stuffTraining for different communities of usersMaking sure you get the benefitsWhat to do about other “Core Apps” - Docs, Sites, Groups, LabsIMAP access to mail
  7. Built own servers and netorksAll designed with failure in mind
  8. Back up
  9. Can afford to spend more than us on security. In fact, more than most governements.
  10. The contract specifies how and where different types of data will be held and processed by Google.The contract specifies that both Google and the University must abide by a comprehensive Privacy Policy.The contract has specific clauses that cover when and how data will be processed and the retention periods for data.The contract and Privacy Policy are clear that data will not be shared with third parties except where required to do so by lawGoogle adheres to the United States Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program. The US Patriot Act has strict legal processes that must be followed, and Google make it clear in their Privacy Policy that they will only respond to lawful requests where there is evidence that the correct processes have been followed.
  11. As you know, our stance is that we adhere to the principles of the European Directive on Data Protection through participation in Safe Harbor. We don't disclose where our Data Centres are and the EU Directive does not require that we do so. What's important is knowing whether the Data Processor takes appropriate measures to protect data - which of course we do.And, in case you're asked, we do not commit to maintaining data in the US/EU but we do commit to maintaining Safe Harbor compliance during the Term of the Agreement.EUData Protection Directive, which sets comparatively strict privacy protections for EU citizens. It prohibits European firms from transferring personal data to overseas jurisdictions with weaker privacy laws, but creates exceptions where the overseas recipients have voluntarily agreed to meet EU standards under the Directive's Safe Harbor Principles.These principles must provide:Notice - Individuals must be informed that their data is being collected and about how it will be used.Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third parties.Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles.Security - Reasonable efforts must be made to prevent loss of collected information.Data Integrity - Data must be relevant and reliable for the purpose it was collected for.Access - Individuals must be able to access information held about them, and correct or delete it if it is inaccurate.Enforcement - There must be effective means of enforcing these rules.
  12. A small number of researchers in the University handle technical information that is covered by UK export law (this is usually, but not limited to, defence related technologies).  As the data in Google Apps for Education may be held on servers outside of the UK, the University has obtained legal advice on the specific matter of technical information controlled by export law:The use of Google mail to send, receive or store emails that contain information controlled by export law would not in itself qualify as exporting data. For example if both the sender and recipient are in the UK.The use of any mail system to send, receive or store emails that contain information controlled by export law to those outside of the UK would qualify as exporting data.Data transmitted by email can pass through national boundaries regardless of destination and can also be accidentally forwarded to unintended recipients.  Data stored in Google Apps for Education could in theory be made available to US law enforcement agencies.  Therefore, although the risk is very low, and as should be the case anyway, careful consideration should always be given as to how controlled technology is transmitted and where it is stored.
  13. The New Privacy Policies only affect users of our Consumer Services. It does not affect the standard, core Google Apps for Education ToS, which are governed by the Google Apps for Education Agreement that the institution accepts (either online or offline). However, if you provision any of the Consumer Services (Google+, Picassa, YouTube, etc.) through the Apps for EDU Control Panel, users of those services will be presented with the Consumer Terms and those terms and the new Privacy Policies will govern the use of those products/services. 
  14. One potential answer to the “what can we stop doing?” question.
  15. YHMAN regional facility based on VMWAre. Community Cloud. Currently sheffield, leedsleeds metPrivate network with virtual security.IaaS.Pathfinder project.Back up, business continuity, temporary capacity.