Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Size: px
Start display at page:

Download "Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013"

Transcription

1 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004E Payment Card Industry (PCI) Netwrk Security (prpsed) 01.1 Purpse The purpse f this Netwrk Security Rule is t ensure the effective management, peratin, integrity and security f the University f Utah ( University ) s infrmatin systems and netwrks invlved with string, prcessing, r transmitting PCI infrmatin Scpe The Netwrk Security Rule applies t all infrmatin systems, resurces and netwrks cnnected t the University s netwrk which stre, prcess, r transmit PCI Rule Statement University Infrmatin Technlgy ( UIT ) and Infrmatin Security shall implement a netwrk security prgram with netwrk perating prcedures and technical cntrls t manage the design, implementatin and maintenance f the University s PCI technlgy infrastructure Netwrk Access fr PCI Systems Use f Netwrk Services Well-defined cntrls and/r prcesses shall be fllwed when granting access t the University's netwrk services. [Ref: CS348, PCI] [Rules] The fllwing cntrls and/r prcesses shall be fllwed when granting access t the University's netwrk services: Cnnectins shall be authrized by the Infrmatin Security Office and Incme Accunting fr PCI. Any remte supprt services ffered by the netwrk service prviders shall cmply with University and/r PCI standards with regard t remte vendr supprt All netwrk services shall pass thrugh the University's firewall which will nly allw the defined prtcls and services required t prvide the functinality The functinality f defined prtcls and prts shall be analyzed as part f the risk assessment effrt during the initial firewall setup. Justificatin and dcumentatin shall be captured fr allwed risky prtcls including reasn fr use and security features

2 implemented. (Use f prtcls ffering a high degree f functinality that may pse a risk t the University's systems shall als be identified in the Risk Assessment Prcess) Apprpriate cntrls shall be put in place n the University's side f the netwrk t minimize the risk f unauthrized access r activity within PCI systems. When pssible, the cnnectin shall be initiated by the internal client t the netwrk service supplier Ensure that prper agreements are in place with infrmatin suppliers and held by Incme Accunting, the Privacy Office and the Office f General Cunsel. Firewalls will lg and mnitr all unauthrized activity Netwrk services prvided by third parties may have unique, cmplex security characteristics. Administrative units leveraging these netwrk services shall request detailed dcumentatin n the security attributes f all netwrk services prvided by third parties. [Ref: CS359] Inventry f Netwrk Access Pints All access pints t the University's netwrk shall be identified and dcumented by [UIT]. [Ref: CS350, PCI] [Rules] Netwrk access pints that shall be identified include: Wireless Ethernet Frame relay Dedicated lines Remte dial-up access Extranets Internet [UIT] shall als identify and dcument the applicatins and user grups that are accessed via the netwrk and map the internal and external cnnectivity between varius netwrk segments. The infrmatin shall be used by UIT in the design, cnfiguratin and maintenance f the University's netwrk Remte Diagnstic Prts Remte maintenance prts fr the University's infrmatin and cmmunicatin resurces shall be disabled until the specific time they are needed by a vendr wh has received prir

3 authrizatin by University persnnel. Audit lgs shall be reviewed fr all remte maintenance sessins and prts shall be disabled immediately after use. [Ref: CS351, PCI] An infrmatin system security plan shall address the installatin and use f remte diagnstic links. [Ref: CS582]

4 Netwrk Segregatin Netwrks shall be segregated r divided int separate lgical dmains, s access between dmains can be cntrlled by means f secure devices. [Ref: CS352] Switched netwrk technlgy shall be utilized when pssible, t prevent eavesdrpping, sessin stealing r ther explits based n the accessibility f netwrk traffic. A firewall shall be installed at all cnnectins frm an internal t any ther internal r external netwrk. [Ref: CS353] Servers which access external netwrks r are accessed frm external netwrks shall be lgically islated frm the private Intranet. [Ref: CS354] Netwrk Cnnectins The Infrmatin Security Office shall explicitly authrize all new cnnectins t external public netwrks (e.g. extranets). If the new cnnectin is an additinal cnnectin t a previusly certified external cnnectin, and the cnnectin is made fllwing the same cnfiguratin, then n prir apprval frm the Infrmatin Security Office is required. [Ref: CS355] All external access frm untrusted systems r netwrks (e.g. extranets) t any University netwrk shall be cntrlled thrugh the implementatin f an apprved firewall. A listing f apprved firewall prducts can be accessed by cntacting the Directin f Cmmn Infrastructure Services [Ref: CS363, PCI] Persnal cmputers, wrkstatins, and servers shall nt be cnnected t mre than ne netwrk at a time by using unauthrized means f bridging tw netwrks. This may include inserting mre than ne Netwrk Interface Card (NIC) r using a mdem while cnnected t anther netwrk. Dual-hmed systems require apprval by the Infrmatin Security Office. [Ref: CS512] Denial f Service ( DS ) attacks are actins that are designed t prevent r impair the use f netwrks, systems r applicatins by stressing system resurces such as prcessing units r netwrk bandwidth. The University shall implement specific cntrls t prevent DS attacks. [Ref: CS879] [Rules] The fllwing cntrls shall be implemented t prevent DS attacks: The [technical manager] respnsible fr [netwrk management] shall establish cmmunicatin prtcls and preventin and respnse prcedures with all Internet Service Prviders ( ISPs ) in the case f a DS attack. Intrusin detectin devices deplyed shall be cnfigured t specifically identify pssible DS situatins. Netwrk management prcedures shall be in place t mnitr netwrk bandwidth and usage and alert when threshlds indicate a ptential issue.

5 Netwrk devices cnnected t public netwrks shall be cnfigured specifically t prevent DS attacks including: Blcking the usage f services, such as ech and chargen, which n lnger serve a legitimate purpse and are used in DS attacks. Perfrming egress and ingress filtering t blck bviusly spfed packets. Blcking traffic frm unassigned IP address ranges, knwn as bgn lists. Attack tls that spf IP addresses may use addresses that have nt yet been assigned fr Internet usage. Writing and sequencing firewall rules and ruter access cntrl lists t blck traffic prperly. Cnfiguring brder ruters nt t frward directed bradcasts. Limiting incming and utging ICMP traffic t nly the necessary types and cdes. Blcking utging cnnectins t cmmn IRC, peer-t-peer service and instant messaging prts if the usage f such services is nt permitted. [Rules] The University shall define specific prcedures t respnd t a DS attack including: Prtcls t ntify and wrk with Internet Service Prviders. Backup cpies f critical infrmatin (prcedures, call lists, etc.) that may nt be accessible due t the DS attack. Cntainment strategies r prcedures fr cmmn scenaris f DS attacks. Evidential prcedures fr the cllectin f data in the case f a pssible criminal attack Netwrk Ruting Shared netwrks that extend acrss rganizatinal bundaries shall incrprate ruting cntrls t ensure cmputer cnnectins and infrmatin d nt breach the access cntrls f the applicatin. [Ref: CS356, PCI] Ruting cntrls shall be based n a psitive surce and destinatin address-checking mechanism. Only authrized University resurce administratrs shall be allwed t have physical and lgical access t netwrk ruters. [Ref: CS357] Prprietary ruting infrmatin pertaining t the private Intranet shall nt be prpagated t any untrusted netwrk. [Ref: CS358] [Rules] The fllwing prprietary ruting infrmatin shall nt be prpagated t any untrusted netwrk:

6 Ruting tables Dmain Name Service ( DNS ) names IP addresses Netwrk Address Translatin ( NAT ) tables Access Cntrl Lists ( ACLs ) Limitatin f Cnnectin Time Fr applicatins that supprt infrmatin classified as Restricted r Sensitive, resurce administratrs shall cnsider placing restrictins n the cnnectin times during which cnnectins are allwed t cmputer services, thus reducing the windw f pprtunity fr unauthrized access. Limiting cnnectin times is especially imprtant fr infrmatin resurces that are lcated in public r external areas that are utside the University's dmain f cntrl [management]. [Ref: CS471] 01.5 Netwrk Security Cntrl Devices fr PCI Systems Use f Firewalls All external access frm untrusted systems r netwrks (e.g. extranets) t any University netwrk shall be cntrlled thrugh the implementatin f an apprved firewall. A listing f apprved firewall prducts can be accessed by cntacting the Directr f Cmmn Infrastructure Services [Ref: CS363, PCI] All rules within the firewall rule base shall be restricted t nly allw the apprpriate traffic thrugh the firewall. All rules defined within the firewall shall be dcumented with a clear descriptin and definitin fr the business purpse f the rule. Firewall/ruter rule sets shall be reviewed quarterly. [Ref: CS364, PCI] [Rules] The firewall rule base shall: Restrict surce and destinatin IP addresses, prtcls, prts and applicatins (e.g. utbund traffic frm payment card applicatins shall be restricted t Internet Prtcl (IP) addresses within the Demilitarized Zne ( DMZ )). Be cnfigured t deny and lg suspicius packets (e.g. packets that have suspicius surce and destinatin prts). In the event a firewall fails, and a standby firewall is used, all active sessins n the firewall shall be re-authenticated n the standby firewall. [Ref: CS477] The Infrmatin Security Office shall be respnsible fr creating and maintaining the University's Firewall Management Prcedures. The Firewall Management Prcedures shall state

7 describe hw firewalls shall functin by establishing rules fr traffic cming int and ging ut f the security dmain, and fr hw the firewall will be managed and updated. [Ref: CS500, PCI] [Rules] The Firewall Management Prcedures shall address: Firewall tplgy and architecture (include applicatin firewalls in frnt f web-facing applicatins) Type f firewall(s) being used Physical placement t the firewall cmpnents Mnitring f firewall traffic Permissible traffic (generally based n the premise that all traffic nt expressly allwed is denied, detailing which applicatins can traverse the firewall and under what exact circumstances such activities can take place) Firewall updating Crdinatin with intrusin detectin and respnse mechanisms Respnsibility fr mnitring and enfrcing the Firewall Plicy Descriptin f grups, rles, and respnsibilities fr lgical management f netwrk cmpnents Prtcls and applicatins permitted Regular auditing f a firewall's cnfiguratin and testing f the firewall's effectiveness Cntingency planning Placement f firewalls within the netwrk architecture including n all cnnectins t public netwrks and between internal systems and perimeter devices such as wireless access pints r dial-in pints Use f Demilitarized Znes (DMZs) The University's Internet servers shall always be placed in a DMZ. By placing Internet servers and any ther servers in the DMZ, the University can reduce the ptential risk f unauthrized access t its infrmatin resurces. [Ref: CS356, PCI] Intrusin Detectin Sftware shall be implemented inside all DMZs t mnitr the firewall and t mnitr cmmunicatins allwed thrugh the firewall. [Ref: CS366, PCI] Packet Filter Cnfiguratin Well-defined cnfiguratin standards shall be applied t packet filters. [Ref: CS367, PCI]

8 [Rules] The fllwing standards shall be applied in relatin t packet filters: Cnfiguratin and cntrl f the packet filters shall be assumed internally and shall nly be pssible frm an internal interface All privileged prts, with the exceptin f explicitly required prts, shall be clsed All incming traffic t nn-privileged prts, except fr acknwledgement packets, shall be rejected. External packets with an internal surce IP address shall be identified and rejected, and an attacker alarm shall be triggered Internal packets with an external surce IP address shall be identified and rejected, and an attacker alarm shall be triggered Attacker alarms are defined as a ntificatin sent via r pager t supprt persnnel Ruter Cnfiguratin Well-defined ruter cnfiguratin standards shall be fllwed when cnfiguring ruters. The ruter cnfiguratin files shall be backed up and secured. [Ref: CS368, PCI] [Rules] The fllwing cnfiguratin standards shall be fllwed when cnfiguring ruters: Surce ruting shall be switched ff n the ruter External OSPF, RIP r ther ruting infrmatin prtcls shall be blcked Amngst the ICMP prtcls, nly ping may be accepted The TFTP prtcl shall be blcked SNMP traffic may nly be accepted by administratin wrkstatins and shall nt accept a public string At a minimum, the ruter shall lg rejected packets Remte access t the ruter requires strng authenticatin Remte access t the ruter shall be limited t internal wrkstatins Remte access t the ruter shall be limited t a static IP address Each administratr shall be identified with a persnal User ID All changes shall be dcumented IPv6 shuld be disabled unless it is apprved by the Directr f Cmmn Infrastructure Services

9 Running and startup cnfiguratin files shall be synchrnized Hst Cnfiguratin The cnfiguratin f the firewall perating system shall fllw well-defined security requirements in additin t the relevant baseline security cnfiguratin standard (e.g. UNIX, NT, etc.). [Ref: CS369] [Rules] The cnfiguratin f the firewall perating system shall satisfy the fllwing requirements: Packet frwarding shall be switched ff Remte access t the hst can nly be permitted frm specific internal hsts and requires strng authenticatin Each administratr shall be identified with a persnal User ID All unnecessary netwrk services shall be switched ff The "Berkeley r" prtcls shall be blcked NFS shall nt be used Neither cmpilers nr debuggers can be installed All changes shall be dcumented The perating system errr mde shall be set in such a manner that packets cannt pass thrugh if the firewall sftware crashes The firewall sftware shall be started befre the interfaces Apart frm the administratrs, n user is permitted t access the firewall cmputer It shall be ensured that vendr security patches are installed Regular basis integrity checks (e.g. at least nce a day) shall be cmpleted File Transfer Prtcl (FTP) Cnfiguratin standards shall be defined fr File Transfer Prtcls ( FTP ) used with untrusted systems. [Ref: CS372] [Rules] The fllwing standards fr FTP are applicable t use with untrusted systems: Incming file transfers shall be treated as external cnnectins and require apprval Incming annymus file transfer is nt permitted FTP cnfiguratin shall implement cntrls fr prtecting data channels

10 Outging file transfers (e.g. t an external server) are t be handled in accrdance with the University's Internet Security Plicy Hyper Text Transfer Prtcl (HTTP) Cnfiguratin standards shall be defined fr HTTP used with untrusted systems. [Ref: CS373] [Rules] The fllwing standards fr HTTP are applicable t use with untrusted systems: Prt 80 shall be blcked against external access Alternative prts such as 8080 shall be prtected against external access All HTTP servers that can be accessed externally shall be in a DMZ Prxying and/r stateful inspectin shall be used fr all cnnectins t and frm the public Internet and ther untrusted netwrks Rules f the University's Internet Security Plicy apply when accessing internal bjects Nn-Essential Services Cnfiguratin standards shall be defined fr services used with untrusted systems. [Ref: CS376] [Rules] The fllwing standards are applicable t services used with untrusted systems: All nn-ip prtcls shall be blcked by the firewall. SNMP traffic shall be blcked in bth directins NTP traffic is nly permitted t a central, internal timeserver The use f "Berkeley r" prtcls by the firewall is generally frbidden The firewall shall prevent the fllwing prtcls frm entering: NFS RPC prtmapper NIS TFTP X11 Finger UDP packets are nly permitted in cnjunctin with a "status-creating" prxy

11 All unused netwrk services (e.g. Telnet) and unnecessary shells and interpreters (e.g. Perl) shall be disabled n all WWW hst machines Dmain Name Server Cnfiguratin standards shall be defined fr DNS used with untrusted systems. [Ref: CS378] [Rules] The fllwing DNS standards are applicable t use with untrusted systems: Internal hst names and IP addresses are classified as "internal" and shall nt be visible externally Queries t nn-existent hst names shall be lgged and rejected A split DNS cnfiguratin shall be used External DNS entries are limited t servers externally accessible N queries may be frwarded t internal DNS services frm external DNS services Requirements fr Netwrk Traffic Filtering Filtering f netwrk traffic t cntrl and restrict access acrss the University's netwrk perimeter shall be utilized. [Ref: CS382, PCI] [Rules] This filtering f netwrk traffic shall include: Destinatin and surce IP addresses Prts Applicatins Prtcls Any nn-business justified traffic that is prhibited by the University's infrmatin security plicies Prprietary Ruting Infrmatin Methds shall be utilized t prevent prprietary ruting infrmatin frm being prpagated. [Ref: CS383, PCI] [Rules] Methds t bscure prprietary ruting infrmatin may include: Netwrk Address Translatin ( NAT ) Placing servers cntaining cardhlder data behind prxy servers/firewalls r cntent caches

12 Remval r filtering f rute advertisements fr private netwrks that emply registered addressing Internal use f RFC1918 address space instead f registered addresses 01.6 Cntacts A. Rule Owner: Questins abut this rule shuld be directed t the CISO, IT_plicy@utah.edu B. Plicy Officer: Only the CIO, , has the authrity t grant exceptins t this rule.

13 01.7 References A. Plicy 4-002: Infrmatin Resurces Plicy B. Plicy 4-004: University f Utah Infrmatin Security Plicy C Plicy Meta-Data A. Plicy Owner B. Audience C. Status D. Published Date E. Effective Date F. Next Review Date 01.9 Revisin Histry

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd ch beredskap 1 (10) ROS-ISÄK Rnny Janse 010-2404426 rnny.janse@msb.se Firewall Prtectin Prfile Extended Package: NAT samhällsskydd ch beredskap 2 (10) Innehållsförteckning 1. Intrductin...

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011

PBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011 PBX Remte Line Extensin using Mediatrix 4104 and 1204 June 22, 2011 Prprietary 2011 Media5 Crpratin Table f Cntents Intrductin... 3 Applicatin Scenari... 3 Running the Unit Manager Netwrk Sftware... 4

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Internet Service Definition. SD012v1.1

Internet Service Definition. SD012v1.1 Internet Service Definitin SD012v1.1 Internet Service Definitin Service Overview InTechnlgy Internet Service is a permanent Internet cnnectivity slutin. The service cnnects custmers t the InTechnlgy natinal

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

Managed Firewall Service Definition. SD007v1.1

Managed Firewall Service Definition. SD007v1.1 Managed Firewall Service Definitin SD007v1.1 Managed Firewall Service Definitin Service Backgrund It is imprtant t nte that the functin f any firewall service is t filter traffic cming int the netwrk (als

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Plycm RealPresence Access Directr 29 May 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.cm Table f Cntents Executive Summary... 1 System Cmpnents... 3

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information

SMART Active Directory Migrator 9.0.2. Requirements

SMART Active Directory Migrator 9.0.2. Requirements SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Change Management Process For [Project Name]

Change Management Process For [Project Name] Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Pexip Infinity and Cisco UCM Deployment Guide

Pexip Infinity and Cisco UCM Deployment Guide Intrductin Pexip Infinity and Cisc UCM Deplyment Guide The Cisc Unified Cmmunicatins Manager (CUCM) is a SIP registrar and call cntrl device. This guide describes hw t integrate a single Pexip Infinity

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Nuance Healthcare Services Project Delivery Methodology

Nuance Healthcare Services Project Delivery Methodology NUANCE PROFESSIONAL SERVICES Nuance Healthcare Services 2008 Nuance Cmmunicatins, Inc. All rights reserved. Nuance Healthcare Services 1 INTRODUCTION This dcument describes the prject management methdlgy

More information

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall Netwrk Device Prtectin Prfile (NDPP) Extended Package Stateful Traffic Filter Firewall Infrmatin Assurance Directrate 19 December 2011 Versin 1.0 Table f Cntents 1 Intrductin... 3 1.1 Cnfrmance Claims...

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

FY-2006 Networking and Security Engineering and Operations NASA Task TM: Richard Kurak

FY-2006 Networking and Security Engineering and Operations NASA Task TM: Richard Kurak FY-2006 Task A-03: Netwrking and Security Engineering and Operatins NASA Task TM: Richard Kurak Task Summary: The Office f Chief Infrmatin Office (OCIO) is respnsible fr prviding ttal cmmunicatins capabilities

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Security Standard for General Information Systems

Security Standard for General Information Systems Ohi University Security Standard fr General Infrmatin Systems A Standard fr the Cnfiguratin and Operatin f Infrmatin Systems at Ohi University System Security Wrking Grup 10/24/2008 Security Standard fr

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

SANsymphony-V Storage Virtualization Software Installation and Getting Started Guide. February 5, 2015 www.datacore.com

SANsymphony-V Storage Virtualization Software Installation and Getting Started Guide. February 5, 2015 www.datacore.com SANsymphny-V Strage Virtualizatin Sftware Installatin and Getting Started Guide February 5, 2015 www.datacre.cm This dcument is the prperty f DataCre Sftware. It is intended slely as an aid fr installing

More information

Instructions for Configuring a SAFARI Montage Managed Home Access Expansion Server

Instructions for Configuring a SAFARI Montage Managed Home Access Expansion Server Instructins fr Cnfiguring a SAFARI Mntage Managed Hme Access Expansin Server ~ Please read these instructins in their entirety befre yu begin. ~ These instructins explain hw t add a SAFARI Mntage Managed

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD XTM SOLUTION

MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD XTM SOLUTION MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD XTM SOLUTION JULY 2010 Intrductin The gal f the Payment Card Industry Data Security Standard (PCI DSS) is t create a framewrk fr gd security practice

More information

GETTING STARTED With the Control Panel Table of Contents

GETTING STARTED With the Control Panel Table of Contents With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT The PCI Security Standards Cuncil Releases PCI DSS Versin 3.2 May 9, 2016 On April 28, 2016, the PCI Security Standards Cuncil (PCI SSC) released PCI Data Security Standard (PCI

More information

Service Level Agreement Distributed Hosting and Distributed Database Hosting

Service Level Agreement Distributed Hosting and Distributed Database Hosting Office f Infrmatin Technlgy Services Service Level Agreement Distributed Hsting and Distributed Database Hsting Nvember 12, 2013 Service Descriptin Distributed Hsting and Distributed Database Hsting Service

More information

How to deploy IVE Active-Active and Active-Passive clusters

How to deploy IVE Active-Active and Active-Passive clusters Hw t deply IVE Active-Active and Active-Passive clusters Overview Juniper Netscreen SA and SM series appliances supprt Active/Passive r Active/Active cnfiguratins acrss a LAN r a WAN t prvide high availability,

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

BME Smart-Colo. Smart-Colo is a solution optimized for colocating trading applications, built and managed by BME.

BME Smart-Colo. Smart-Colo is a solution optimized for colocating trading applications, built and managed by BME. BME Smart-Cl 1. Intrductin The aim f this dcument is t describe the BME Smart-Cl service fr accessing BME Cash, BME Derivative markets and market data feeds. Smart-Cl service prvides at the BME Data Center

More information

High Speed Internet Services

High Speed Internet Services Cnventin Center High Speed Internet Services Wired high-speed Internet access inside a meeting rm, fyer r ther cmmn area: $550 fr the first IP address/device per meeting rm/lcatin, ONE TIME charge fr the

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

How To Set Up Call Hme On A Brcade Data Center Powerbook

How To Set Up Call Hme On A Brcade Data Center Powerbook TECH NOTE: BROCADE DCFM CALL HOME CAPABILITY The Call Hme event ntificatin capability allws a user t cnfigure a Brcade Data Center Fabric Manager (DCFM ) Enterprise Server t autmatically send an e-mail

More information

Connector for Microsoft Dynamics Installation Guide

Connector for Microsoft Dynamics Installation Guide Micrsft Dynamics Cnnectr fr Micrsft Dynamics Installatin Guide June 2014 Find updates t this dcumentatin at the fllwing lcatin: http://g.micrsft.cm/fwlink/?linkid=235139 Micrsft Dynamics is a line f integrated,

More information

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Customer Service Description

Customer Service Description Page: 1 f 10 Hewlett-Packard Cmpany HP Services Slutin Center Custm Prjects Prgram http://www.hp.cm/hps/ perfrmance & availability sftware services per event supprt & cnsulting Custmer Service Descriptin

More information

CHANGE MANAGEMENT STANDARD

CHANGE MANAGEMENT STANDARD The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the

More information

Database Services - Extended

Database Services - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and Database Services t dcument: The technlgy services Database Services prvides t the custmer. The targets fr respnse times, service

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

IT CHANGE MANAGEMENT POLICY

IT CHANGE MANAGEMENT POLICY IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Corente Cloud Services Exchange (CSX) Corente Cloud Services Gateway Site Survey Form

Corente Cloud Services Exchange (CSX) Corente Cloud Services Gateway Site Survey Form Crente Clud Services Exchange (CSX) Crente Clud Services Gateway Site Survey Frm Use this site survey frm t prvide yur Crente CSX administratr r service prvider with the necessary infrmatin t register

More information

Support Services. v1.19 / 2015-07-02

Support Services. v1.19 / 2015-07-02 Supprt Services v1.19 / 2015-07-02 Intrductin - Table f Cntents 1 Intrductin... 3 2 Definitins... 4 3 Supprt Prgram Feature Overview... 5 4 SLA fr the Supprt Services... 6 4.1 Standard Supprt... 6 4.2

More information