Cloud Computing Policy
Cloud Computing Policy
Policy:
The confidentiality, integrity and availability of the University’s information must be preserved when
stored, processed or transmitted by a third party cloud computing provider.
Purpose:
This Policy defines the security requirements on the use of cloud computing in order to protect
confidential and personal information being processed, stored or transmitted by cloud computing
services.
Scope:
This Policy applies to the use of public cloud computing (i.e. offsite) by University staff and faculty.
Procedures:
Cloud computing is the provision of services and applications through shared services or resources.
These can be:
Internal with the infrastructure owned and operated by the University (private)
External to the University (public, remotely hosted)
A combination of both public and private clouds
Public cloud computing and applications introduce risks that must be considered in the selection of
cloud computing providers. Risks include but are not limited to the:
Loss of information confidentiality and potential brand damage to Carleton; e.g., data
breaches
Non-compliance with federal and provincial privacy legislation
Cloud computing providers unilateral change of their terms of service
Loss of information; e.g., disappearance of cloud provider, with no backup at the University
Loss of information ownership
Availability of information; e.g., Denial of Service
Loss of control over information; e.g., information stored in non-University cloud accounts
Inability to investigate the loss of information confidentiality or availability
Inability to satisfy timely information requests for legal, investigatory or compliance purposes
Page 1 of 3
Hijacking of cloud computing account or service
Inability of the University to control information access controls
To address these and other risks, formal agreements are required with third party service providers.
Where personal information is involved, a Privacy Impact Assessment must be performed prior to the
exchange of information and awarding of a contract.
Page 2 of 3
Compliance
Non-compliance to this Policy may result in disciplinary action.
Contacts:
Chief Information Officer, ITS
Page 3 of 3