THE GOVERNMENT OF THE REPUBLIC OF CROATIA

Size: px
Start display at page:

Download "THE GOVERNMENT OF THE REPUBLIC OF CROATIA"

Transcription

1 THE GOVERNMENT OF THE REPUBLIC OF CROATIA 2433 Pursuant to Article 8, paragraph 4 of the Act on the Protection of Personal Data (Official Gazette, No. 103/2003) and subject to the prior opinion of the Agency for the Protection of Personal Data, at its session held on 30 June 2004 the Government of the Republic of Croatia passed the following REGULATION ON THE PROCEDURE FOR STORAGE AND SPECIAL MEASURES RELATING TO THE TECHNICAL PROTECTION OF SPECIAL CATEGORIES OF PERSONAL DATA I. GENERAL PROVISIONS Article 1 This Regulation lays down measures, tools and conditions for the storage, safety and protection and for the transfer of special categories of personal data and the corresponding data filing systems; measures for the maintenance and control of correct functioning of the computer and telecommunication equipment and of the software of the system for the maintenance ("system") of filing systems containing special categories of personal data; provision of working premises for such equipment; persons authorised for the implementation of anticipated measures, and persons competent for the supervision of their implementation. The provisions of this Regulation shall also apply to filing systems containing special categories of personal data that are processed manually. Article 2 For the purposes of this Regulation, the following definitions shall apply: 1. System for the personal data filing system maintenance is any system consisting of the computer, telecommunication and control equipment and of the corresponding software, as well as consisting of all personal data that are entered, stored and transferred by this system. 2. Computer for the filing system maintenance is any computer with the installed control equipment and software of the system for the personal data filing system maintenance. 3. Central computer of the filing system is any computer with the installed control and software equipment for the processing and storage of personal data filing system. 4. Developing computer is any computer with the installed control equipment and software under development, the equipment that is being checked and the equipment that is completely identical to the equipment installed in the computer for the personal data filing system maintenance. 5. Administrator of the personal data filing system is any person authorised to take care of personal data filing systems and all aspects of data safety and storage. 6. Network administrator is any person authorised to take care of telecommunication equipment, access paths, network, modem and other connections between computer systems. 7. Control system administrator is any person authorised to take care of the installation and correct functioning of the control system and other control software.

2 8. The uninterruptible power supply device is the device that enables the undisturbed use of the computer and other equipment through a specified short period of time in the event of power failure so that the ongoing activities can be completed without any threat related to the completeness of information being processed and that the computer and other equipment can be turned off during that time. 9. The system data storage is the procedure for storage of the backup copy in the event of data loss, damage or destruction. 10. The restoring of stored data is the procedure for restoring the data from the backup copy to their previous status after loss, damage or destruction. The restored set of data has to comply with its latest status and no data can be lost. 11. The resetting of the computer system is the set of procedures for resetting the computer system and all initiated activities to their latest compliant status. 12. The restarting of the system is the set of procedures for restarting the computer system after any unusual stoppage. II. SAFETY MEASURES Connection of computers and other system components Article 3 The connection of computers, telecommunication equipment and other system components to the mains shall be carried out in accordance with the instructions of equipment manufacturer and in line with valid technical standards. Obligatory use of the uninterruptible power supply device Article 4 The computers for the personal data filing system maintenance and the central computers of filing systems shall be connected to the mains via the uninterruptible power supply devices. Modem connections for system access Article 5 Modem connections and their numbers, which are used for access to the system storing the filing systems with special categories of personal data, shall not be published in telephone directories and shall not be available via the services providing information about telephone numbers. Positioning, placing and installation of computers and computer network Article 6 In accordance with the project documentation, the computers for the personal data filing system maintenance, central computers of filing systems and computer network shall be positioned, placed and installed by the qualified person subject to the approval of the head of the personal data filing system and compliant with valid standards and technical instructions. One copy of project documentation from paragraph 1 of this Article shall be kept at a safe place in both the office of the head of the personal data filing system and of the processor, if any, and it shall be made available for review to the Agency for the Protection of Personal Data. Mechanisms for the protection of special categories of personal data Article 7 The computer for the maintenance of filing systems containing special categories of personal data and the central computer shall have: the mechanism for security logging with the possibility of storing the logging data in

3 order to monitor and limit the computer access; the mechanism for the prevention of unauthorised data export and import by applying the devices with removable storage, communication connections and connections for data printout; the mechanism for the protection from computer viruses and other harmful software; the mechanism for cryptologic protection of special categories of personal data on devices with removable storage and during the transfer of such data by IT and telecommunication systems. Access to the rooms with computers and telecommunication equipment Article 8 Computers and telecommunication equipment shall be placed and installed in specially protected rooms as defined by the project documentation. The access to the rooms with the central computers of the personal data filing system or the computers for the personal data filing system maintenance shall be allowed only to the authorised staff having a special access permit. The head of the personal data filing system or processor, subject to the heads approval, shall appoint the authorised persons who can enter the rooms from paragraph 2 of this Article. The rooms from paragraph 2 of this Article shall be equipped with a video surveillance system and a two-way system for the control of entry and exit in order to limit and supervise the access and stay in such rooms. Access to system data Article 9 The access to personal data stored in data filing systems shall be allowed only to the head of the personal data filing system or processor's authorised staff ("authorised staff) and to the authorised persons responsible for the maintenance and development of the system for the personal data filing system maintenance ("authorised experts"). The head of the personal data filing system shall appoint the persons from paragraph 1 of this Article. The processor shall not be entitled to appoint the persons from paragraph 1 of this Article. The request for access or processing and the request for the cancellation of authorised access to personal data filing systems or the request for the cancellation of authorised processing of personal data shall be filed with the head of the personal data filing system, who shall either grant or revoke the access permit. Access to the telecommunication, computer and software system Article 10 The access to the telecommunication, computer and software system for the maintenance of personal data filing systems or for data processing shall be allowed subject to the use of appropriate user names and the corresponding passwords. Obligatory use of unique user names and passwords for system access Article 11 The access to data stored in personal data filing systems shall be allowed by the allocation of the unique user name and password. The cancelled user name cannot be allocated to another person. The user name and the password must not be disclosed and given to another person for use. Article 12

4 The procedure for the allocation and the obligation to change the password shall be laid down by the head of the personal data filing system. Records, access monitoring and attempts of unauthorised system access Article 13 Any access to the telecommunication and computer system for the maintenance of personal data filing systems shall be automatically recorded, indicating the user name, date and the log in and log out times. Any attempt of unauthorised system access shall be automatically recorded, indicating the user name, date and time, and, if possible, the place from which such access was attempted. The processor, the network administrator, the computer administrator and the administrator of the personal data filing system shall notify the head of the personal data filing system of any attempt of unauthorised system access. Fire protection Article 14 The computer and telecommunication equipment shall be placed in the rooms with fire detectors and automatic fire alarms. The rooms housing the equipment from paragraph 1 of this Article shall have the automatic fire extinguishers (based on halons, etc.), and in the vicinity, i.e. in front of these rooms and in the rooms themselves, the written fire fighting procedures shall be placed at visible and easily noticeable points. Protection from electrical and magnetic fields Article 15 No sources of strong electrical or magnetic field shall be placed in the vicinity of the computer and telecommunication equipment. Protection from ionising radiation Article 16 No sources of ionising radiation shall be placed in the vicinity of the computer and telecommunication equipment. Protection from electrostatic electricity Article 17 No sources of electrostatic electricity shall be placed in the vicinity of the computer and telecommunication equipment. Protection from humidity, cold and heat Article 18 The relative humidity between 20% and 80% and the temperature between 5 and 30 C shall be maintained in the rooms with the computer and telecommunication equipment. Protection from corrosive and volatile liquids, explosives and similar substances Article 19 No corrosive and volatile liquids, explosives and similar dangerous or harmful substances shall be placed in the rooms and in the vicinity of rooms with the system equipment. Protection from dust Article 20

5 No equipment releasing dust particles shall be placed in the rooms with computers. The dust sensitive instruments shall be adequately protected. The particularly sensitive air-cooled equipment air shall have air filters. When not in use and if this is allowed by technical instructions, the instruments can be protected with dust bags. Safety measures in the event of earthquake or other natural disasters, war and imminent threat of war Article 21 In the event of earthquake and other natural disasters, war and imminent threat of war, the head of the personal data filing system shall arrange the transfer of the computercommunication equipment to a safe place. The obligation of data storage Article 22 The head of the personal data filing system shall store all special categories of personal data on devices with removable storage that guarantee the safety and confidentiality of stored personal data. The administrators of personal data filing systems shall be responsible for the implementation of measures relating to the storage of system data on devices with removable storage. Daily, weekly, monthly and annual data storage Article 23 The filing systems with special categories of personal data shall be stored on devices with removable storage on daily, weekly, monthly and annual bases, as well as upon the completion of all assignments relating to the maintenance of the personal data filing system, for the purpose of the filing system renewal in the event of fire, flood, earthquake or any other force majeure. The number of daily copies for the storage of system data shall comply with the number of working days in the week. The weekly storage of system data shall be carried out on the last working day of the week after the completed daily storage of data. The number of weekly copies for the storage of system data shall comply with the number of the last working days in the week of that month (4 or 5). The monthly storage of system data shall be carried out on the last working day in the month, for each month separately, in 12 copies per year. The annual storage of system data shall be carried out on the last working day in the year. Each copy of data stored annually shall be kept in the period defined by special regulations. The oldest copy of the device with removable storage for daily, weekly and monthly storage of data shall be used during the first next daily, weekly or monthly data storage. Each copy of data stored on a device with removable storage shall be identified with a number, type (daily, weekly, monthly, annually), date of storage and name of the person who stored the data. The head of the personal data filing system shall keep the records of all copies of devices with removable storage containing the filing systems with special categories of personal data. The reproduction of devices with removable storage containing the filing systems with special categories of personal data shall be subject to the head of the personal data filing system supervision and approval. Authorisation for data storage

6 Article 24 The head of the personal data filing system or the processor shall nominate the person authorised for the storage of data on devices with removable storage. Distance for data storage Article 25 The system data stored on devices with removable storage on a daily basis shall be kept in the safe in the head of the personal data filing system office. The system data stored on devices with removable storage shall be kept in a safe place at least 20 km far from the building housing the personal data filing system. The system data stored on devices with removable storage on monthly and annual bases shall be kept in a safe place at least 50 km far from the building housing the personal data filing system. Place and equipment for storage of backup copies Article 26 The place for the storage of system data on devices with removable storage shall be protected from natural disasters. Devices with removable storage containing personal data filing systems shall be placed in a water- and fire-resistant safe. Transfer of devices with data filing systems Article 27 The water- and fire-resistant and password-protected safes shall be used for the transfer of devices containing the filing systems with special categories of personal data. Control of functioning of backup copies Article 28 The usability of the annual backup copy of personal data filing system shall be checked at least once a year along with the check of the procedure for restoring the filing systems stored on devices with removable storage so that the restored data are completely available and that no information is lost after the performed control. The usability of the monthly backup copy of filing systems containing special categories of personal data shall be checked at least semi-annually subject to the same conditions as those given in paragraph 1 of this Article. Time intervals for device quality control Article 29 The filing systems containing special categories of personal data stored annually on devices with removable storage shall be renewed after the expiry of a half of the guaranteed period of record duration on that particular type of medium. Persons responsible for the implementation of safety measures and for the storage and protection of filing systems containing special categories of personal data Article 30 The administrator of personal data filing systems shall be responsible for the adequate implementation of safety measures and for the storage and protection of personal data. Persons authorised for the production of backup copies and data restoring Article 31 The head of the personal data filing system or the processor shall appoint persons

7 authorised for the production of backup copies and for restoring the personal data filing systems. Persons authorised for import and export of devices with removable storage containing filing systems with special categories of personal data Article 32 The head of the personal data filing system shall appoint the persons authorised to export the system data stored on devices with removable storage from the rooms of the head of the personal data filing system or the processor for their storing in a distant safe place and their return to the rooms of the head of the personal data filing system or the processor. Persons authorised for the allocation of user names and passwords Article 33 The head of the personal data filing system shall appoint the persons authorised for the allocation and cancellation of user names and for the allocation of initial passwords to the persons authorised to work in the system and to access the personal data filing systems. Cryptologic protection of special categories of personal data in the transfer by IT and telecommunication systems Article 34 The head of the personal data filing system shall establish the system for the cryptologic protection of personal data during their transfer via IT and telecommunication systems to other authorised users. Verification of data transferred by IT and telecommunication systems Article 35 The excerpts from the filing systems containing special categories of personal data that are transferred via the telecommunication equipment to authorised persons shall have the cryptologic protection and they shall be verified by electronic signature, based on which the recipient can check the authenticity of the received excerpt. Control of authenticity of data transferred from the filing systems containing special categories of personal data Article 36 The recipients of excerpts from the filing systems containing special categories of personal data shall check the authenticity of the received excerpt by applying the sender's public key. The recipient shall forthwith notify the head of the personal data filing system about the received excerpts that are not accompanied with the certificate of authenticity. Weekly, monthly and annual check of system functionality Article 37 The head of the personal data filing system shall check the functionality of all system components on weekly, monthly and annual bases. Control of determined measures, procedures and persons authorised for system safety, storage and protection Article 38 Measures, procedures and staff authorised for system safety, storage and protection shall be defined, implemented and controlled in accordance with the plan adopted by the head of the personal data filing system in line with the respective international recommendations (ISO

8 17799). Maintenance and repair of system equipment Article 39 The computer and telecommunication equipment shall be maintained and repaired by the person stipulated in the contract on equipment purchasing or other relevant contract. The system software shall be maintained and replaced by the authorised expert. Article 40 The implementation of this Regulation shall be supervised by the Agency on the Protection of Personal Data. III. TRANSITIONAL AND FINAL PROVISIONS Harmonisation with the provisions of the Regulation Article 41 The head of the personal data filing systems and processors shall approximate the measures, tools and conditions for the safety, storage and protection of data with the provisions of this Regulation within six months of its coming into force. Coming into force Article 42 This Regulation shall come into force on the eighth day of its publication in the Official Gazette. Classification: /04-01/02 Number: Zagreb, 30 September 2004 Prime Minister Ivo Sanader, Ph.D., m.p.

Decision on adequate information system management. (Official Gazette 37/2010)

Decision on adequate information system management. (Official Gazette 37/2010) Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)

More information

RS Official Gazette, No 23/2013 and 113/2013

RS Official Gazette, No 23/2013 and 113/2013 RS Official Gazette, No 23/2013 and 113/2013 Pursuant to Article 15, paragraph 1 and Article 63, paragraph 2 of the Law on the National Bank of Serbia (RS Official Gazette, Nos 72/2003, 55/2004, 85/2005

More information

Decision on outsourcing. Article 1

Decision on outsourcing. Article 1 Pursuant to Article 166 of the Credit Institutions Act (Official Gazette 117/2008), and Article 29 and Article 43, paragraph (2), item (9) of the Croatian National Bank Act (Official Gazette 75/2008),

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

2) applied methods and means of authorisation and procedures connected with their management and use;

2) applied methods and means of authorisation and procedures connected with their management and use; Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.

More information

LAW. ON ELECTRONIC SIGNATURE (Official Gazette of the Republic of Montenegro 55/03 and 31/05)

LAW. ON ELECTRONIC SIGNATURE (Official Gazette of the Republic of Montenegro 55/03 and 31/05) LAW ON ELECTRONIC SIGNATURE (Official Gazette of the Republic of Montenegro 55/03 and 31/05) I GENERAL PROVISIONS Article 1 This Law shall regulate the use of electronic signature in legal transactions,

More information

FIRE RULES. Article 1. Organization of fire safety

FIRE RULES. Article 1. Organization of fire safety Number: 014 1-05-03-01 Date: 28 June 2013 Pursuant to Article 35 of the Fire Safety Act (Official Gazette of the Republic of Slovenia nos. 03/07-UPB 1, 9/2011, 83/2012), Fire safety rules (Official Gazette

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA

SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA INSTRUMENT FOR PRE ACCESSION ANNUAL PROGRAM 2012 SUPPORT TO KOSOVO INSTITUTIONS IN THE FIELD OF FOR PROTECTION OF PERSONAL DATA Project number: Europe Aid/133806/C/SER/XK Contract number: 2013/333-753

More information

State Records Guidelines No 23. Certification for Places of Deposit of State archives

State Records Guidelines No 23. Certification for Places of Deposit of State archives State Records Guidelines No 23 Certification for Places of Deposit of State archives Issued: August 2013 Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Certification... 4 3

More information

WORKING IN CONFINED SPACES GUIDELINES

WORKING IN CONFINED SPACES GUIDELINES WORKING IN CONFINED SPACES GUIDELINES Contents 1 Introduction... 2 2 Scope... 2 3 Definitions... 2 4 Responsibilities... 3 4.1 Permit Authoriser... 3 4.2 Permit Receiver... 3 4.3 Responsible UOW Officer...

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

Ordinance on Specialised Waste Management Companies (Entsorgungsfachbetriebeverordnung - EfbV) *) of 10 September 1996

Ordinance on Specialised Waste Management Companies (Entsorgungsfachbetriebeverordnung - EfbV) *) of 10 September 1996 Ordinance on Specialised Waste Management Companies (Entsorgungsfachbetriebeverordnung - EfbV) *) of 10 September 1996 The Federal Government, having heard the parties concerned, and pursuant to Article

More information

Official Journal of RS, No. 86/2006 of 11. 08. 2006 REGULATION

Official Journal of RS, No. 86/2006 of 11. 08. 2006 REGULATION Official Journal of RS, No. 86/2006 of 11. 08. 2006 Pursuant to Articles 10, 23, 36, 40, 43, 47, 53, 54, 63, 71, 72, 73, 74, 88 and 91 of the Protection of Documents and Archives and Archival Institutions

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT GENERAL DISTRIBUTION OCDE/GD(95)115 OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA Hybrid Cloud

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Corporate ICT Availability

Corporate ICT Availability Policy Corporate ICT Availability Please note this policy is mandatory and staff are required to adhere to the content Summary DECD ICT facilities and information must be available during agreed operational

More information

Appendix to Resolution No. 646/2011 of the Warsaw Stock Exchange Management Board dated 20 May 2011 (as amended)

Appendix to Resolution No. 646/2011 of the Warsaw Stock Exchange Management Board dated 20 May 2011 (as amended) Appendix to Resolution No. 646/2011 of the Warsaw Stock Exchange Management Board dated 20 May 2011 (as amended) Rules of providing current and periodical information in the alternative trading system

More information

GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT

GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT 1. Definitions 1.1. SK AS Sertifitseerimiskeskus. 1.2. Client adult, natural person with active legal capacity or legal person

More information

PERSONAL INTERNET BANKING APPLICATION FORM

PERSONAL INTERNET BANKING APPLICATION FORM FOR BANK USE ONLY PERSONAL INTERNET BANKING APPLICATION FORM Total number of Signatories on Account Application Form Number of Signatures required to Authorise Access Type Personal Details Title: Surname:

More information

(Unofficial Translation)

(Unofficial Translation) Readers should be aware that only the original Thai text has legal force and that this English translation is strictly for reference. The Stock Exchange of Thailand cannot undertake any responsibility

More information

State Records Guideline No 13. Certification for secondary storage providers

State Records Guideline No 13. Certification for secondary storage providers State Records Guideline No 13 Certification for secondary storage providers Table of Contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Authority... 3 2 How to gain and renew certification... 4 3 Background

More information

SCHEDULE 25. Business Continuity

SCHEDULE 25. Business Continuity SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable

More information

SCHEDULE 25. Business Continuity

SCHEDULE 25. Business Continuity SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or is likely (in TfL s absolute discretion (subject to paragraph

More information

archiving documents in electronic format

archiving documents in electronic format LAW No. 135 of May 15 th 2007 on archiving documents in electronic format ISSUER: THE PARLIAMENT OF ROMANIA PUBLISHED WITH: THE OFFICIAL GAZETTE NO. 345 of May 22 nd 2007 The Parliament of Romania passes

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

CROATIAN PARLIAMENT 1364

CROATIAN PARLIAMENT 1364 CROATIAN PARLIAMENT 1364 Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON PERSONAL DATA PROTECTION I hereby promulgate the Act on

More information

This policy is not designed to use systems backup for the following purposes:

This policy is not designed to use systems backup for the following purposes: Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

ON FIRE PROTECTION LAW ON FIRE PROTECTION CHAPTER I GENERAL PROVISIONS

ON FIRE PROTECTION LAW ON FIRE PROTECTION CHAPTER I GENERAL PROVISIONS Republika e Kosovës Republika Kosovo - Republic of Kosovo Kuvendi - Skupština - Assembly Law No. 04/L-012 ON FIRE PROTECTION Assembly of Republic of Kosovo; Based on Article 65 (1) of the Constitution

More information

One Education Internet Services SLA 2014-2015

One Education Internet Services SLA 2014-2015 One Education Internet Services SLA 2014-2015 1. Commencement a. The Contract begins on the date One Education or agents working on its behalf communicate its acceptance of the customer s order for the

More information

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client

More information

Implementation and Customer Services ( ICS") Installation Services Standard Terms and Conditions of Supply. (Effective September 2013)

Implementation and Customer Services ( ICS) Installation Services Standard Terms and Conditions of Supply. (Effective September 2013) Implementation and Customer Services ( ICS") Installation Services Standard Terms and Conditions of Supply 1. General (Effective September 2013) This web page content defines the standard terms and conditions

More information

TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING

TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING In this document, the following words and phrases shall have the meanings set out below unless indicated otherwise. You should read every

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (Status 31 October 2009) 1. Scope of services (1) The Bank is available to its Customers (account holders) for remote transmission of data by electronic

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Terms and Conditions for Certification, Assessment Services and TradeMark Licence

Terms and Conditions for Certification, Assessment Services and TradeMark Licence Terms and Conditions for Certification, Assessment Services and TradeMark Licence To be read in conjunction with your application. For contact information, please refer to the back page. Terms and Conditions

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014 The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems)

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Law on Fire Safety of the Republic of Azerbaijan

Law on Fire Safety of the Republic of Azerbaijan Chapter I. General provisions Law on Fire Safety of the Republic of Azerbaijan Article 1. Key definitions used in this Law Following definitions are applied for the purposes of this Law: 1) Fire- uncontrolled

More information

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7 Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.

More information

www.echoromeo.co.uk Web Hosting Contract

www.echoromeo.co.uk Web Hosting Contract www.echoromeo.co.uk Web Hosting Contract 47 Glenmoor Road Ferndown Dorset BH22 8QE Ferndown: +44 (0)845 508 96 21 Aldershot: +44 (0)845 154 98 97 E-Mail: info@echoromeo.co.uk This Agreement is Between:

More information

Does it state the management commitment and set out the organizational approach to managing information security?

Does it state the management commitment and set out the organizational approach to managing information security? Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated

More information

Standard of the Government Supervision over Betting Games and Lotteries

Standard of the Government Supervision over Betting Games and Lotteries Ministry of Finance Government Supervision over Betting Games and Lotteries Letenská 15, Prague 1-Malá Strana 118 10 Office: Legerova 69, Prague 2, 110 00 Secretariat tel.: 25704 3322 Ref.: MF-121975/2012/34

More information

How To Make A Contract Between A Client And A Hoster

How To Make A Contract Between A Client And A Hoster Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby

More information

Chapter 1 General Provisions

Chapter 1 General Provisions System of security measures for information systems Government of the Republic Regulation No. 252 of 20 December 2007 RT 1. I, 28.12.2007, 71, 440 Entered into force 01.01.2008 The Regulation is established

More information

Merchants and Trade - Act No 28/2001 on electronic signatures

Merchants and Trade - Act No 28/2001 on electronic signatures This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and

More information

CROATIAN PARLIAMENT 242

CROATIAN PARLIAMENT 242 Important Disclaimer The English language text below has been provided by the Translation Centre of the Ministry for European Integration for information only; it confers no rights and imposes no obligations

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

FACTORING LAW I. BASIC PROVISIONS II. DEFINITIONS

FACTORING LAW I. BASIC PROVISIONS II. DEFINITIONS FACTORING LAW I. BASIC PROVISIONS Article 1 This Law governs the concept and subjects of factoring; parties to factoring; conditions and manner of providing factoring services; types of factoring; rights

More information

Rulebook on Information Security Incident Management General Provisions Article 1

Rulebook on Information Security Incident Management General Provisions Article 1 Pursuant to Article 38 of the Law on State Administration (Official Gazette of the Republic of Montenegro 38/03 from 27 June 2003, 22/08 from 02 April 2008, 42/11 from 15 August 2011), The Ministry for

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

Application Development within University. Security Checklist

Application Development within University. Security Checklist Application Development within University Security Checklist April 2011 The Application Development using data from the University Enterprise Systems or application Development for departmental use security

More information

Sensus BPM Cloud Service Level Agreement

Sensus BPM Cloud Service Level Agreement Sensus BPM Cloud Service Level Agreement Cloud Services General This Service Level Agreement (SLA) applies to all Cloud agreements entered into by Sensusmethode B.V., specifying the general terms and conditions

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Specification. State Archives POD Storage. Public Record Office Victoria PROS 11/01 Storage. Version Number: 1.0. Issue Date: 25/01/2011

Specification. State Archives POD Storage. Public Record Office Victoria PROS 11/01 Storage. Version Number: 1.0. Issue Date: 25/01/2011 Public Record Office Victoria PROS 11/01 Storage Specification 2 State Archives POD Storage Version Number: 1.0 Issue Date: 25/01/2011 Expiry Date: 25/01/2016 State of Victoria 2011 Version 1.0 Table of

More information

Information Security Team

Information Security Team Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007, amend. SG.

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

CONDITIONS FOR ELECTRONIC DATA EXCHANGE VIA ČSOB MULTICASH 24 SERVICE

CONDITIONS FOR ELECTRONIC DATA EXCHANGE VIA ČSOB MULTICASH 24 SERVICE This translation of the Conditions for Electronic Data Exchange via ČSOB MultiCash 24 Service from Slovak to English language is for information purposes only and does not represent a binding version.

More information

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text)

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) On basis of article 153 of the National Assembly of Slovenia Rules of Procedure the National Assembly of the Republic

More information

PUBLIC POWER CORPORATION S.A. DISTRIBUTION

PUBLIC POWER CORPORATION S.A. DISTRIBUTION PUBLIC POWER CORPORATION SA DISTRIBUTION NETWORK DEPARTMENT NOTICE OF CALL FOR TENDERS no ND-193: CONTRACT: PROJECT: Installation of Telemetering System for Major Low Voltage Customer Meters ISSUE 7 INSURANCES

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

ONLINE BANKING AGREEMENT AND DISCLOSURE

ONLINE BANKING AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT AND DISCLOSURE REDNECK BANK, A DIVISION OF BANK OF THE WICHITAS P.O. BOX 852 MUSTANG, OK 73064 Redneck Bank & Bank of the Wichitas are the same financial institution. Deposits

More information

Act on Insurance Mediation and Reinsurance Mediation

Act on Insurance Mediation and Reinsurance Mediation Act on Insurance Mediation and Reinsurance Mediation The full wording of Act No. 340/2005 Coll. dated 23 June 2005 on insurance mediation and resinsurance mediation and on amendments to certain laws, as

More information

ANNEXURE 07: CHECK-LIST FOR OFF-SITE STORAGE FACILITIES

ANNEXURE 07: CHECK-LIST FOR OFF-SITE STORAGE FACILITIES ANNEXURE 07: CHECK-LIST FOR OFF-SITE STORAGE FACILITIES NAME OF PRIVATE STORAGE FACILITY: DATE VISITED: 1. COMPANY PROFILE 1.1 What is the company's mission? 1.2 How does that mission compare with the

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

Agreement No On Electronic Service of Current Accounts

Agreement No On Electronic Service of Current Accounts Agreement No On Electronic Service of Current Accounts Yerevan " '' 20 This Contract was signed by and between the entities mentioned below, (further respectively referred to as Party or Parties ). : Ameriabank

More information

Guidelines on Accreditation of Designated Certification Business based on the Act on Electronic Signatures and Certification Business

Guidelines on Accreditation of Designated Certification Business based on the Act on Electronic Signatures and Certification Business [Interim Translation (official: Japanese)] Public Notice No. 2 Ministry of Internal Affairs and Communications Ministry of Justice Ministry of Economy, Trade, and Industry In order to implement the Act

More information

London Stock Exchange Testing Services Order Form

London Stock Exchange Testing Services Order Form London Stock Exchange Testing Services Order Form For the purposes of the Data Protection Act 1998 and the Privacy and Electronic Communications (EC Directive) Regulations 2003, the information provided

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

CLOUD SERVICES SERVICE LEVEL AGREEMENT. Cloud Services

CLOUD SERVICES SERVICE LEVEL AGREEMENT. Cloud Services Article 1: Definitions CLOUD SERVICES SERVICE LEVEL AGREEMENT Support for all Customers on all Problems with the exception of 1 st line Help desk those which initial investigation shows are directly related

More information

ISLE OF MAN FIRE & RESCUE SERVICE FIRE PRECAUTIONS LOGBOOK. Website www.iomfire.com

ISLE OF MAN FIRE & RESCUE SERVICE FIRE PRECAUTIONS LOGBOOK. Website www.iomfire.com ISLE OF MAN FIRE & RESCUE SERVICE FIRE PRECAUTIONS LOGBOOK Website www.iomfire.com ADDRESS OF PREMISES FIRE CERTIFICATE No. (where applicable).. LOCATION OF LOG BOOK. CONTENTS OF LOG BOOK Useful telephone

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Online Banking Security Guide Internet-based version

Online Banking Security Guide Internet-based version Online Banking Security Guide Internet-based version Contents Introduction to the Security Guide... 2 Security Guide... 2 Using the internet securely... 2 Security solutions in Online Banking... 3 What

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

General card terms for corporate customers

General card terms for corporate customers Page 1 / 9 General card terms for corporate customers Valid from 16.2.2014 1. Scope and definitions These General Terms and Conditions for Corporate Cards apply to cards issued by (referred to herein as

More information

ACT. on the amendment of the Gambling Law and some other Acts 1

ACT. on the amendment of the Gambling Law and some other Acts 1 Journal of Laws No. 134, item 779 ACT of 26 May 2011 on the amendment of the Gambling Law and some other Acts 1 Article 1 The following amendments are made to the Gambling Law of 19 November 2009 (Journal

More information

How To Recover From A Disaster

How To Recover From A Disaster BELA-BELA LOCAL MUNICIPALITY Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 BELA-BELA 0480 Tel: 014 736 8000 Fax: 014 736 3288 Website: www.belabela.gov.za OFFICE OF THE MUNICIPAL MANAGER Information

More information

Document Management Plan Preparation Guidelines

Document Management Plan Preparation Guidelines Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations

More information

Video surveillance policy (PUBLIC)

Video surveillance policy (PUBLIC) 29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security

More information

INTERNET BANKING AGREEMENT & DISCLOSURE

INTERNET BANKING AGREEMENT & DISCLOSURE INTERNET BANKING AGREEMENT & DISCLOSURE This Agreement and Disclosure sets forth your and our rights and responsibilities concerning the use of our Internet Banking Product. In this Agreement, the words

More information

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc. CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8

More information

Chapter I: Anti-counterfeiting measures

Chapter I: Anti-counterfeiting measures Foreword 1. Counterfeiting is a real scourge on today s society. It can fool consumers and threaten their health and safety, especially when counterfeit products do not respect applicable standards or

More information