Total Data Protection for Sensitive Data Wherever It May Flow
|
|
- Matilda Parks
- 8 years ago
- Views:
Transcription
1 Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince.
2 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow Executive Summry The requirement to protect sensitive dt is n importnt responsibility for mngers of the modern enterprise. No one wnts to lose control of sensitive informtion nd empower competitors, threten csh flow, or expose the orgniztion to lwsuits or civil penlties due to non-complince with lws, contrctul obligtions nd/or regultions. The points of risk re endless. Sensitive dt cn reside in enterprise dtbses, pplictions, files, nd emil; nd moves from internl servers onto desktops, lptops nd mobile endpoints. Devices my be owned by business prtners, consultnts, nd nyone else with legitimte need to use the informtion. Sensitive dt cn go nywhere, thus it is vitl tht it be secured. Once dt hs been creted it is lwys t risk. Using strong encryption is the most relible, cost-effective wy to ensure protection of sensitive dt. The best solution is utomted nd pplies encryption t the point where dt is cquired. Automted key mngement ensures uthorized use of the dt. And encryption will continuously protect the dt to the point of being rchived or deleted. End-to-end encryption hs become n importnt requirement for ll sensitive dt nd helps meet ongoing obligtions to verify complince with business policies, industry rules, lws, nd regultions. Key Points Deploy end-to-end encryption for totl dt protection Automte key mngement Centrlize reporting & dministrtion for policy complince Use solutions from PGP Corportion & Protegrity for totl dt protection This white pper presents comprehensive solution for totl dt protection using products from PGP Corportion nd Protegrity. This totl dt protection solution provides continuous end-to-end security of sensitive dt throughout its lifecycle, nd wherever it flows. In ddition, your orgniztion cn tp leding security technologies to ensure dt ccess is lwys governed by policy, long with the bility to verify complince with policy to business uditors. Pge 2
3 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow I. Identifying Risk Points for Sensitive Dt Protecting the sensitive dt in your orgniztion begins with the identifiction of dt flow throughout its lifecycle. As illustrted in Fig. 1, stndrd business requirements my llow dt to move between servers nd to vriety of endpoint devices not just within your enterprise, but lso to computing devices owned nd operted by business prtners nd other potentil destintions. Thus, protecting this dt is big chllenge. A solution for totl protection of sensitive dt requires using security technology nd processes tht ddress ll points of vulnerbility. Protecting the confidentility, integrity, nd ccessibility of sensitive dt lso requires identifiction of ll employees, contrctors, nd other individuls who ccess this informtion, including the physicl loctions where ccess occurs. Moreover, the use of encryption should be governed by specific policies tht re centrlly mnged for udit nd complince. Fig. 1. Risk Points for Sensitive Dt in the Extended Enterprise Pge 3
4 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow II. Setting Complince Policy for Sensitive Dt Your orgniztion s policy for sensitive dt protection defines wht informtion must be protected nd who hs ccess to it. Policy ffects the selection of technicl nd process controls used for enforcement. Policy lso rticultes requirements for protecting different sets of sensitive informtion. For instnce, every orgniztion needs to protect informtion tht is criticl to the enterprise, such s intellectul property, plns for product development or distribution, dtbses of customers or business prtners, nd competitive intelligence. Other requirements re defined by uditors, industry rules, government regultions, nd stte, federl, nd interntionl lws. Policies my require tht enforcement be specificlly pplied to defined roles, deprtments, or physicl loctions within the enterprise. Policies my cover the entire enterprise, nd include externl business prtners who require ccess to the dt. Exmples of Sensitive Dt Defined by Regultion Personl helth informtion is one type of sensitive dt governed by the Helth Insurnce Portbility nd Accountbility Act (HIPAA) nd the HITECH provisions of the Americn Recovery nd Reinvestment Act. These regultions require protection of Protected Helth Informtion (PHI) stored in electronic nd pper-bsed Personl Helth Records. These lws define PHI bsed on section of title 45, Code of Federl Regultions. Relted policy must cover: Common Dt Protection Policy Mndtes PCI DSS HIPAA / HITECH Grmm-Lech-Bliley Srbnes-Oxley Bsel II Europen Directive on Protection of Dt Privcy lws in the UK, Jpn, Austrli, nd other ntions U.S. stte dt protection nd brech notifiction lws informtion tht is subset of helth informtion, including demogrphic informtion collected from n individul, nd: (1) is creted or received by helth cre provider, helth pln, employer, or helth cre cleringhouse; nd (2) reltes to the pst, present, or future physicl or mentl helth or condition of n individul; the provision of helth cre to n individul; or the pst, present, or future pyment for the provision of helth cre to n individul; nd (i) Tht identifies the individul; or (ii) With respect to which there is resonble bsis to believe the informtion cn be used to identify the individul. Pge 4
5 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow Credit or debit crdholder dt is sensitive dt defined by the PCI Dt Security Stndrd. According to the PCI Security Stndrds Council (p.14) which oversees this stndrd: Crdholder dt refers to ny informtion printed, processed, trnsmitted, or stored in ny form on pyment crd. Orgniztions ccepting pyment crds re expected to protect crdholder dt nd prevent their unuthorized use whether the dt is printed or stored loclly, or trnsmitted over public network to remote server or service provider. III. Using End-to-End Encryption for Protecting Sensitive Dt There re mny security technologies on the mrket tht use perimeter pproch to securing sensitive dt, but only few tht directly protect the dt itself. Of these, strong encryption is the leding nd most dvnced technology for protecting sensitive dt. End-to-End Encryption A function of cryptogrphy Trnsforms informtion ( plintext ) with n lgorithm ( cipher ) to render plintext unredble Uses key to decipher dt into plintext Protects dt wherever it flows Using n encryption-bsed solution for protecting sensitive dt used to be dunting process. The technicl chllenges nd prcticl hurdles of enforcing the use of encryption nd decryption blocked widespred doption of the technology. Key mngement ws n overwhelming nd expensive struggle. To ddress these impediments orgniztions should deploy centrlized nd utomted totl dt protection solution tht enbles nd enforces encryption cross the extended enterprise to provide mximum protection for sensitive dt without imposing mjor chnges to norml user or dministrtive workflow. Finlly: True End-to-End Encryption The solutions provided by PGP Corportion nd Protegrity deliver the bility to crete true end-to-end encryption for ny enterprise requirement. End-toend encryption mens exctly tht: encryption occurring t the point where sensitive dt is cquired, to intermediry points cross networks, operting systems, storge systems, pplictions, dtbses, emils, files, nd to ny endpoint device. In every instnce, ny ttempt to red the dt requires use of n uthorized key. Without the key, the sensitive dt remins unredble nd protected. Pge 5
6 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow Reping Benefits of End-to-End Encryption End-to-end encryption solutions by PGP Corportion nd Protegrity utilize pltform nd suite-bsed utomtion to provide rnge of benefits: Protects sensitive dt with effective, stndrds-bsed technology Uses strong key mngement Segregtes opertionl mngement between dtbse nd security dministrtors Works virtully nywhere storge devices, servers, dtbses, pplictions, emil, files Centrlizes monitoring nd reporting for complince Controls nd/or restricts ccess to sensitive dt Defines nd mintins cler nd robust security policy Totl Dt Protection Supports Flexible Modes of Dt Protection A totl dt protection solution should provide options for technicl implementtions of encryption. Some mndtes require strong encryption in n end-to-end solution such s pyment crd uthentiction nd uthoriztion (see Section V. Cse Study: Retil). Other requirements, especilly those stemming from legcy nlytic pplictions nd other circumstnces my not need the strongest form of encryption or even n end-to-end solution. In those cses, prtil encryption solution will suffice, such s msking ll but the lst four digits of pyment crd number when ccessed by customer service representtive. Ech mode of dt protection brings unique performnce nd security trde-offs. Key evlution fctors re shown in Tble 1. The totl dt protection solution from PGP Corportion nd Protegrity supports ll of these modes of protection. Tble 1. Evlution Fctors for Modes of Dt Protection Pge 6
7 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow IV. Components of Totl Dt Protection Solution Solutions from PGP Corportion nd Protegrity protect n orgniztion s dt throughout its lifecycle. Tennts of totl dt protection re bsed on three pillrs: (1) flexible end-to-end encryption for ny kind of sensitive dt in ny loction; (2) utomted key mngement; nd (3) centrlized dministrtion nd reporting to ddress policy complince. Technology components of the totl dt protection solution re shown in Fig. 2. Totl Dt Protection Solution from Protegrity nd PGP Corportion Endpoint Dtbse Desktop Dt Protection File Emil Mngement Key Mngement Policy Administrtion Appliction File Storge Server Dt Protection Reporting Fig. 2. Technology Components of the Totl Dt Protection Solution The technology components blend strengths from both prtners PGP Corportion for desktop dt protection nd Protegrity for server dt protection nd meld ll the technologies with centrlized nd utomted key mngement, policy mngement, nd dministrtion. Leverging Automtion for Prcticl Use of the Solution Automted trnsprency is the criticl prt of deploying nd cost-effectively dministering end-to-end encryption. Automtion of key mngement is crucil in lrge enterprise with n extended chin of business prtners, which cn require ctive dministrtion of tens of thousnds of cryptogrphic keys throughout their lifecycle. Cryptogrphy uses these keys to encrypt nd decrypt dt, which mens your orgniztion s dt protection is only s good s the security of those keys. Security depends on severl fctors, including where the keys re stored nd who hs ccess to them. It is essentil tht dt privcy solution include the bility to securely generte nd mnge keys. Pge 7
8 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow This is why regultions such s PCI DSS require proper key mngement bsed on pproved industry stndrds. The totl dt protection solution from PGP Corportion nd Protegrity chieves this result by centrlizing ll key mngement tsks nd utomting their dministrtion. Additionl benefits include opertionl efficiency nd reduced dministrtive costs. Ultimtely, solutions from PGP Corportion nd Protegrity ensure your orgniztion s sensitive dt stys sfe, without excuses or exceptions. The product portfolio for the totl dt protection solution is shown in Tble 2. Protegrity Enterprise Security Administrtor centrl security policy mngement, key mngement, lerting, reporting, nd uditing for dt security events orgniztion-wide Dt Protection System (for File, Dtbse, nd Appliction) encryption for pplictions, dtbses, storge, nd files Tokeniztion Server centrl mngement of tokeniztion cross the enterprise, including dt in pplictions, dtbses, nd files PGP Corportion PGP Key Mngement Server mnges cryptogrphic keys throughout the enterprise PGP Whole Disk Encryption high-performnce full disk encryption for desktops, lptops, nd USB devices PGP NetShre policy-enforced file nd folder encryption for tem collbortion PGP Commnd Line centrllymnged file encryption for server protection nd file trnsfer PGP Universl Gtewy Emil secure emil communictions without client softwre PGP Desktop Emil emil encryption for desktops nd lptops Tble 2. Product Portfolio for the Totl Dt Protection Solution from PGP Corportion nd Protegrity Pge 8
9 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow V. Cse Study: Retil The PCI Dt Security Stndrd prescribes requirements for protecting crdholder dt throughout their lifecycle nd hndling by retilers nd business prtners. The process flows in Tble 3 show where n end-to-end encryption solution provides totl protection for crdholder dt t ech of the points tht potentilly expose sensitive dt. Note tht strong encryption lwys protects the sensitive dt, wherever it is ccessed. Crdholder Dt Flows () Crd is swiped t retil register, entered electroniclly through n online pyment system, or entered mnully by clerk (b) Credit pprovl is executed by the pyment processor (c) Trnsction dt is encrypted t the POS (d) Trnsction is sent to the home office for processing (e) Trnsction is moved into the merchnt opertionl nd nlyticl systems (f) Trnsction moves into the pyment processor network gin for settlement (g) As prt of nlysis, sensitive dt is plced into office documents in file shre for collbortion (h) As prt of nlysis, sensitive dt moves into merchnt nlyst s desktop PC (i) Merchnt nlyst sends the sensitive dt to collegue vi emil (j) Merchnt nlyst sends sensitive dt to business prtner to initite chnges bsed on nlysis PCI Security Control q Trnsction dt utomticlly encrypted t POS or pyment processing system q Encryption by pyment processor q Encryption by Protegrity q Encryption by Protegrity q Encryption nd/or tokeniztion by Protegrity q Encryption by pyment processor q Encryption by PGP Corportion q Encryption by PGP Corportion q Encryption by PGP Corportion q Encryption by PGP Corportion Tble 3. End-to-End Encryption Provides Totl Protection for Crdholder Dt Pge 9
10 Protegrity nd PGP Corportion Totl Dt Protection for Sensitive Dt Wherever It My Flow VI. Lern More About Our Solutions for Totl Dt Protection Solutions from PGP Corportion nd Protegrity will protect your orgniztion s sensitive dt t ll times, nywhere the dt my flow. This totl dt protection solution is flexible nd comprehensive since it is built on: (1) end-toend encryption for ny kind of sensitive dt in ny loction; (2) utomted key mngement; nd (3) centrlized dministrtion nd reporting to ddress policy complince. By using this new solution for totl dt protection, your orgniztion will chieve true protection only offered by strong end-to-end encryption, nd the bility to effectively enforce nd verify complince with ny type of dt protection policy. To lern more bout totl dt protection solutions vilble from PGP Corportion nd Protegrity, plese contct lerntdp@protegrity.com. About Protegrity USA, Inc. Protegrity is the leding globl security softwre compny providing high performnce, infinitely sclble, end-to-end dt security solutions. Protegrity customers centrlly develop, mnge nd control dt security policy tht protects sensitive informtion cross the enterprise in dtbses, pplictions nd file systems from the point of cquisition to deletion. Protegrity s solutions give corportions the bility to implement vriety of dt protection methods, including strong encryption, sclble tokeniztion, msking nd monitoring to ensure the protection of their sensitive dt nd enble complince for PCI-DSS, HIPAA nd other dt security requirements. To lern more visit or cll Key to Dt Security Encryption is vitl security control for protecting sensitive dt throughout the enterprise nd beyond. For this reson, it is importnt for your solution to provide encryption deployment options tht enble utomted coverge of both new nd legcy systems. Eric Ouellet Reserch VP, Grtner PGP Corportion PGP Corportion is globl leder in emil nd dt encryption softwre. PGP solutions re used by more thn 110,000 enterprises, businesses, nd governments worldwide, helping to protect confidentil informtion, secure customer dt, chieve regultory nd udit complince, nd sfegurd compnies brnds nd reputtions. For more informtion, plese visit Symntec is trdemrk or registered trdemrk of Symntec Corportion or its ffilites in the U.S. nd other countries. Pge 10
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationFile Storage Guidelines Intended Usage
Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationAgenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A
Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationDEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
More informationPETER M. ROSS 22 Four Oaks Crescent London, Ontario N6J 4B7 Telephone: 51 9-661-4005/Facsimile: 5 19-471-0085 Email: pmross@,uwo.
PETER M. ROSS 22 Four Oks Crescent London, Ontrio N6J 4B7 Telephone: 51 9-661-4005/Fcsimile: 5 19-471-0085 Emil: pmross@,uwo.c April 2lS', 2005 Corportion of the City of London City Clerk's Office Room
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationYour Image through Client Reporting
Your Imge through Client Reporting Prtnerships: Logits is n escrow gent, prtner of Softwre editors nd users, to design, control nd preserve ccurte deposits of sources. Contct: For ny dditionl informtion
More informationcollection, dissemination and security of data. inform the access and utilisation of data within the organisation.
Corporte Policies & Procedures Generl Administrtion Document CPP123 Dt Governnce Policy First Produced: Current Version: Pst Revisions: Review Cycle: Applies From: 17/07/13 17/07/13 Nil 3 yer cycle Immeditely
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More information2001 Attachment Sequence No. 118
Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished
More informationFDIC Study of Bank Overdraft Programs
FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on
More informationPsychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013
Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl
More informationCurrent Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015
Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,
More informationHealth Information Systems: evaluation and performance of a Help Desk
536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the
More informationElectrical Engineering
Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationSavvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery
Svvis IT Infrstructure Svvis SS Infrstructure Solutions Enterprise-clss Resources for SS Delivery Softwre-s--Service (SS) Cretes New Opportunities Originlly ppeling to mostly smller businesses, SS is now
More informationGAO HOME MORTGAGE INTEREST DEDUCTION. Despite Challenges Presented by Complex Tax Rules, IRS Could Enhance Enforcement and Guidance
GAO United Sttes Government Accountbility Office Report to the Joint Committee on Txtion July 2009 HOME MORTGAGE INTEREST DEDUCTION Despite Chllenges Presented by Complex Tx Rules, IRS Could Enhnce Enforcement
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationHow To Improve Network Performance
Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationIndustrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen
Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks
More informationDATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY
Brought to you by HTTP://WWW.ANALYTICS-MAGAZINE.ORG DRIVING BETTER BUSINESS DECISIONS JULY/AUGUST 2013 ADVENT OF THE DATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY ALSO INSIDE: Anlytics &
More informationIn addition, the following elements form an integral part of the Agency strike prevention plan:
UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 CHIEF INFORMATION OFFICER December 9. 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
More informationQUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.
QUESTIONNAIRE A. PERSONAL DETAILS: 1. Your Nme: 2. Age-group: Below 25 yers 26-35 yers 36-45 yers Over 45 yers 3. Gender : Mle Femle 4. Eduction : H.S.C or Below H.S.C. Grdution Post-Grdution Any other
More informationYour duty, however, does not require disclosure of matter:
Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or
More informationPay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details
With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationThe 8 Essential Layers of Small-Business IT Security
The 8 Essentil Lyers of Smll-Business IT Security While there is no technology tht cn gurntee your network is truly impenetrble, you cn significntly reduce your risk by deploying multiple lyers of defense.
More informationBusiness Continuity Planning
Business Continuity Plnning A Stte of the Art Dt Bckup nd Disster Recovery Solution tht bullet proofs your dt. TechAdvisory.org SME Reports sponsored by Highlights of the Service: A complete solution tht
More informationSTATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services
Dtes of Review: FY '09 Evluttor(s): S. Crpenter DESK REVIEW: Accredittion: Acredittion is no longer required by the stte contrct. Significnt Events from the Agency: Developomentl Disbilities Progrm Comprehensive
More informationData quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors
Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one
More informationRecognition Scheme Forensic Science Content Within Educational Programmes
Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationPrescriptive Program Rebate Application
Prescriptive Progrm Rebte Appliction Check the pproprite progrm box for your rebte. OID Internl Use Only Cooling FSO (Fluid System Optimiztion) Foodservice Equipment Heting Lighting Motors & Drives Customer
More informationAnthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20%
Anthem Blue Cross Life nd Helth Insurnce Compny University of Southern Cliforni Custom Premier 800/20%/20% Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge Period: 01/01/2015-12/31/2015
More informationGovernance, Risk, Compliance
A SEARCHCOMPLIANCE.COM/SEARCHSECURITY.COM E-BOOK Governnce, Risk, Complince POLICY MANAGEMENT: METHODS AND TOOLS IT mngers re looking to governnce structures nd the discipline of risk mngement to help
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationl,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -
rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified
More informationCombined Liability Insurance. Information and Communication Technology Proposal form
Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationHow To Get A Free Phone Line From A Cell Phone To A Landline For A Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationPROPERTY AND CASUALTY INSURANCE. Effects of the Nonadmitted and Reinsurance Reform Act of 2010
United Sttes Government Accountbility Office Report to Congressionl Committees Jnury 2014 PROPERTY AND CASUALTY INSURANCE Effects of the Nondmitted nd Reinsurnce Reform Act of 2010 GAO-14-136 Jnury 2014
More informationSmall Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
More informationMONITOR AND CONTROL SOFTWARE FOR GROUND SYSTEMS IN THE DEEP SPACE NETWORK
MONITOR AND CONTRO OFTWARE FOR GROUND YTEM IN THE DEEP PACE NETWORK Pul Pechkm Network Control Tsk NAA/ Jet Propulsion bortory July 22,22 ABTRACT NAA s Deep pce Network (DN) is n interntionl network of
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationUnderstanding Cloud Accounting and QuickBooks Online
Understnding Cloud Accounting nd QuickBooks Online This guide is intended to provide comprehensive look t the prcticl benefits of working in the cloud, nd how QuickBooks Online cn help your business chieve
More informationHow To Reduce Telecommunictions Costs
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationMeeting Your Data-Sharing Needs Now that Oracle Streams is Deprecated
Meeting Your Dt-Shring Needs Now tht Orcle Strems is Deprected Switch to ShrePlex Written by Jim Collings, senior product rchitect, Dell Softwre Abstrct Now tht Orcle hs formlly nnounced 1 the deprection
More informationThe Morgan Stanley FTSE Protected Growth Plan. Investor Pack
The Morgn Stnley FTSE Protected Growth Pln Investor Pck The Morgn Stnley FTSE Protected Growth Pln Introduction The current investment environment with its extreme levels of uncertinty nd voltility, mkes
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationGAO IRS AUDIT RATES. Rate for Individual Taxpayers Has Declined But Effect on Compliance Is Unknown
GAO United Sttes Generl Accounting Office Report to the Chirmn, Subcommittee on Oversight, Committee on Wys nd Mens, House of Representtives April 2001 IRS AUDIT RATES Rte for Individul Txpyers Hs Declined
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationHow To Be A Successful Mobile Ppliction And Regression Tester
July/August 2009 Volume 3 SOFTWARE This issue of Softwre Testing delves into mobile ppliction nd regression testing. HOTSPOTS 1 Mobile pplictions nd regression testing p WANT JOB SECURITY? This issue of
More informationCommercial Cooling Rebate Application
Commercil Cooling Rebte Appliction Generl Informtion April 1 st 2015 through Mrch 31 st 2016 AMU CUSTOMER INFORMATION (Plese print clerly) Business Nme: Phone #: Contct Nme: Miling Address: City: Stte:
More informationFROM: John Na tmo Audito
COUNTY OF LOS ANGELES DEPARTMENT OF AU DITOR.CONTROLLER KENNETH HAHN HALL OF ADMINISTRATION 5OO WEST TEMPLE STREET, ROOM 525 LOS ANGELES, CALIFORNIA 9OO1 2-3873 PHONE: (213) 974-8301 FAX: (213) 626-5427
More informationprevention loss Data loss strategies, data practices and tools are more important than ever. Here s what you need to know. i n s i d e p DLP: It s
A S E A R C H C O M P L I A N C E. C O M / S E A R C H S E C U R I T Y. C O M E - B O O K Dt loss prevention strtegies, dt prctices prevention nd tools re more importnt thn ever. loss Here s wht you need
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More information2 Admission requirements 3 Duration of the program 4 Courses 5 Types of course units and number of participants
The English version of the curriculum for the Mster Progrm in Bnking nd Finnce is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationCOMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials
COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,
More informationHow To Outsource Forms Processing
Vendor Outsourcing Models Steve Hnks, IBM & Sty Lnk, IBM FTA Technology Conference nd Exhibition Spokne, Wshingn August 13, 2001 Overview Outsourcing Models Outsourcing Models nd Trends Business Process
More information802.16e requirements from an operator s perspective
802.16e requirements from n opertor s perspective IEEE 802.16 Presenttion Submission Templte (Rev. 8.3) Document Number: IEEE S802.16e-03/23 Dte Submitted: 2003-03-10 Source: Anthony (Tony) Klinkert Voice:
More information