Frequently Asked Questions

Size: px
Start display at page:

Download "Frequently Asked Questions"

Transcription

1 FAQ INTELLECTUAL PROPERTY MANAGEMENT Escrow Verification Services Frequently Asked Questions overview The value of an escrow arrangement is heavily dependent on the quality of the deposit materials a fact increasingly recognised by users and developers. Over 70% of all deposits sent in to Iron Mountain for analysis were determined to be incomplete and required additional input from the developer in order to be compiled. You can learn about Iron Mountain Escrow Verification Services at In addition, listed below are answers to frequently asked questions about Iron Mountain s escrow verification services. We ve also included answers to common questions about software development and licensing, including definitions of technical terms. Over 70% of all deposits sent in to Iron Mountain for analysis were determined to be incomplete and required additional input from the developer in order to be compiled. Iron Mountain escrow verification faq Q. Why would I need Iron Mountain to verify my technology escrow deposit? A. A technology escrow arrangement is an excellent vehicle to protect all parties involved in licensing intellectual property, but the value of the escrow arrangement is seriously compromised if the deposit materials are incomplete. A thorough verification of the materials provides assurance that, in the event of a deposit release, the technology user (also known as the licensee or the escrow beneficiary) would be able to read, recreate and maintain the developer s technology in-house in essence, step into the shoes of their vendor. Iron Mountain s experience has shown that over 70% of deposits sent into Iron Mountain for analysis are incomplete, and therefore would compromise that user s ability to benefit from having access to the deposit materials. Most times the technology placed into escrow is software source code, but other technology can be escrowed as well. At Iron Mountain, we ve escrowed secret formulas, a jet engine and even a cookie recipe! / 1

2 Intellectual Property Management Q. What are some of the possible ramifications of an incomplete deposit? A. Should there be a release of incomplete deposit materials the following realities can result: Costs associated with replacing licensed software and hardware Lost profits and/or savings Lost time Client dissatisfaction Breach of contract(s) Costs associated with consultants fees, court costs, arbitration fees, and legal fees Costs associated with retraining personnel Q. How can Iron Mountain s verification services reduce my company s risk? A. Iron Mountain s verification services provide your company with insight into the composition of your escrow deposits. We identify what is needed to use the technology, including anything that is missing from your deposit. Iron Mountain can also recreate the technology for you. The information we collect through our analysis is developed into an easy-to-read report, which you can use as a guide to reconstruct the technology from the deposit materials, should you ever need to do so. Performing the testing to recreate the product independently, away from the developer s office or environment, is a crucial process as it replicates the conditions the beneficiary will likely experience if there is an issue with developer support. Q. What does my company need to do to use source code released from escrow? A. Your company must accomplish the following to use source code released from escrow: Obtain the deposit media provided to Iron Mountain Read the media Understand and recreate the developer s software development environment (which is often very complex) Have access to all third party tools Compile the source code Recreate executable code Install the code onto appropriate production systems Iron Mountain can perform one or more of these tasks for you when software source code is placed into escrow depending on the level of verification you select. This verification process will ensure that you can recreate these tasks if the source code needs to be released in the future. Q. When should the escrow deposit be verified? A. Iron Mountain recommends verifying a deposit at the outset when the escrow account is established. In all cases, verification should be performed before a release condition has occurred, in order to most effectively limit your exposure to risk. Q. How frequently should deposits be tested? A. This requires a cost-benefit analysis. If there is material change to the technology or if the risk profile of the developer changes detrimentally, new deposits should be verified. However, for mission-critical applications, Iron Mountain recommends testing each deposit update at some level. In less critical cases, technology users typically require testing with each major version release or bug fix. Iron Mountain s verification service levels are designed to allow for the maximum flexibility in protection during the life of the technology and escrow /

3 Q. What problems does Iron Mountain typically find with escrow deposits? A. Recent data on deposit testing has revealed the following: Over 70% of all deposits sent in for analysis were determined to be incomplete. 92% of examined deposits required additional input from the developer in order to be compiled. 38% of all verified deposits did not contain any configuration or build instructions, which are critical to putting escrowed materials into deployment. As a result, much of the software source code that is deposited into escrow is not ready to use upon release. Iron Mountain verification services ensure that any problems are resolved before storing and protecting the software source code. Without verification there could be considerable delays with creating a functional deposit. Q. How does the verification process work? A. Prior to performing verification tests, Iron Mountain requests that the software developer (depositor) complete an escrow deposit questionnaire (Exhibit Q). This enables Iron Mountain to understand the scope of the work required so that a detailed Statement of Work (SOW) and cost estimate for the testing can be prepared. The SOW is fixed price based on our experience and good faith estimates that the developer s representations are accurate on build times and adequacy of the instructions. Upon execution of the Statement of Work, receipt of payment and receipt of appropriate deposit materials, Iron Mountain begins testing the deposit. During testing, Iron Mountain notifies the parties of its progress. Once the testing is complete, Iron Mountain provides detailed reports of its findings to all parties. Iron Mountain will also follow up with a technical resource to review the test results with the user of the technology. Parties interested in requesting a verification of deposited materials should contact their Iron Mountain sales representative / 3

4 Intellectual Property Management Q. What are the types of technical verification offered by Iron Mountain? A. Level 1 - Inventory and Analysis Test Provides a complete audit and inventory of your deposit, including analysis of deposited media to verify the presence of build instructions and identification of materials necessary to recreate the original development environment. Level 2 - Compile Test Validates whether the development environment can be recreated from the documentation and files supplied in the escrow deposit. Level 3 - Binary Comparison Test Tests the functionality of the compiled deposit materials by comparing the files built in compile testing to the licensed, executable file running at your site. Level 4 - Full Usability Test Confirms that the source code placed in escrow will be fully functional in the event of a release. We run a series of tests to ensure that replicated software runs properly, and then create a detailed report of these tests, which includes demonstrations of the functioning software in action. Iron Mountain s Verification Service Levels Level 4 Full Usability Test Level 3 Binary Comparison Test Does the software work properly? Verify and confirm that the built application works properly when installed Level 2 Compile Test Do the files match? Verify that the compiled files on deposit compare identically to the technology licensed Level 1 Inventory & Analysis Test Do the deposited materials compile? Verify the ability to compile the deposit materials and build executable code Can the environment be recreated? Verify that information required to recreate the depositor s development environment has been stored in escrow /

5 Q. How do I know which verification level I need? A. Iron Mountain s dedicated staff of verification experts will consult with you to determine which verification level best suits your requirements. The recommended type of testing largely depends on the criticality of your licensed technology and the business risks of your developer. For mission-critical software, Iron Mountain recommends seeking the most thorough verification testing for optimal protection against incomplete or inoperable technology escrow deposits. Software Development and Licensing FAQ Q. What is source code? A. Source code is the written version of a software application that is readable by programmers. It is like a secret recipe and is often deemed a trade secret. That s why software development companies do their best to protect their source code it is their most valuable piece of intellectual property. Licensed software cannot be repaired or upgraded without the source code. Q. What is object code? A. Object code is the translation of source code into a language that only computers can read. It consists of a series of ones and zeros. Object code is generally created by taking proprietary source code and running it through a software program that transforms the source code into object code. Object code is then bound into executable code / 5

6 Intellectual Property Management Q. Why is it necessary to know what third-party software is required to support the deposited code? A. Third-party applications are utilised in nearly every software development environment and are needed to recreate the depositor s executable code. A beneficiary that does not know what additional third-party software is needed to run in conjunction with the source code will have an extremely difficult time learning this on its own. Iron Mountain s verification process helps to identify third-party applications that are required to build executable code. Q. What is executable code? A. Near the end of the software development process, object code is linked or bound together with other object code (which may be created by third parties) to create executable code. Typically, executable code is licensed to beneficiaries and installed in a live operating environment. Software developers feel confident in licensing executable code because it is extremely difficult to reverse the process and discover the nature of the source code by examining the object code. Q. How do typical software licensing arrangements creat risk for licensees? A. Most software licences involve the licensing of executable code and not source code, which is needed to modify the technology. Because of this, the software user (licensee) is only able to correct bugs in the software, upgrade the product, and maintain the software through the software developer (licensor) the only one who has access to the source code. This puts most software licensees in an extremely vulnerable position, especially if the software vendor goes out of business, is bought by a competitor, files for bankruptcy, or discontinues providing maintenance support for any reason. The most widely used solution to this problem is to establish a technology escrow account that contains a copy of the source code and maintenance materials needed to compile and support the program. Q. What unique risks do Software As A Service (SaaS) Application Providers create? A. Since SaaS applications are running in the cloud, and not on-premises in the beneficiary s environment, the operating environment is often unfamiliar. Therefore, for SaaS environments, information about the Application Service Providers (ASPs) operating environment should be included in the escrow deposit. In addition, your company s user data also must be placed in escrow (since this also lives in the cloud) or other arrangements need to be made ensure access to the data. If these additional steps are not taken, the escrow deposit will not be useful to you upon release. Iron Mountain offers specific SaaS escrow services designed at mitigating risks of doing business with SaaS companies by addressing application continuity, service sustainability and unfettered access to data. Q. What is included in a standard Iron Mountain inspection of deposit materials? A. Iron Mountain opens every sealed escrow deposit and visually checks the deposit materials against the documentation provided by the developer (depositor). This ensures that the description of materials matches the deposit (Exhibit B). For example, if the Exhibit B states that the deposit should include three CDs and that those CDs are labeled A, B and C, then Iron Mountain will count the number of CDs in the deposit and check that they are labeled correctly. Once the visual inspection is completed, notifications are sent to the parties according to the contract terms. Of course, this is only a visual inspection, and we recommend adding additional verification services for optimal protection /

7 Q. Verification next steps A. By establishing an escrow arrangement with Iron Mountain, you have recognised that your licensed missioncritical technology is an important aspect of your organisation s business operations. Complementing your escrow arrangement with verification services will help to mitigate potential risks by providing complete intellectual property protection and management, and ensuring a more rapid recovery for your organisation should circumstances require it. To find out more information or to request verification services for deposited escrow materials, contact your local Iron Mountain sales representative or call us on Note: Statistics in this document are being reviewed constantly and may change; these are accurate as of time of publication / 7

8 Intellectual Property Management About Iron Mountain. Iron Mountain Incorporated (NYSE: IRM) provides information management services that help organisations lower the costs, risks and inefficiencies of managing their physical and digital data. Founded in 1951, Iron Mountain manages billions of information assets, including backup and archival data, electronic records, document imaging, business records, secure shredding, and more, for organisations around the world. Visit the company Web site at for more information Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners /

Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain.

Software Escrow Service Workflow. Comprehensive and Trusted Software Escrow Services from Iron Mountain. escrow Software Escrow Service Workflow Comprehensive and Trusted Software Escrow Services from Iron Mountain. Get it right every time. Mission-critical technology is everywhere, and you depend on it every

More information

Software Escrow: Practical Strategies for Bolstering Licensing Agreements

Software Escrow: Practical Strategies for Bolstering Licensing Agreements INFORMATION MANAGEMENT INTELLECTUAL PROPERTY MANAGEMENT Place image here Software Escrow: Practical Strategies for Bolstering Licensing Agreements April 27, 2010 Legal IT Lynda P.S. Covello, LL.M. & John

More information

CLOUD COMPUTING PROTECTION STRATEGIES

CLOUD COMPUTING PROTECTION STRATEGIES CLOUD COMPUTING PROTECTION STRATEGIES WHITE PAPER STRATEGIES FOR SaaS CONTINGENCY PLANNING CONTENTS Executive Summary What is Contingency Planning for SaaS Applications? The Crux of SaaS Enablement How

More information

:: market pulse :::: market pulse :::: market pulse :::: market pulse :::: market

:: market pulse :::: market pulse :::: market pulse :::: market pulse :::: market How to Minimize Risk with a Software Vendor Prenup :: market pulse :::: market pulse :::: market pulse :::: market pulse :::: market Safeguard technology investments against contract breaches, discontinued

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our

More information

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services ONE SOLUTION Maximize the Business Value of Your Information Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services In today s world, information whether in paper or digital

More information

WHITE PAPER. How Software as a Service (SaaS) Providers Can Instill Customer Confidence IRON MOUNTAIN DIGITAL

WHITE PAPER. How Software as a Service (SaaS) Providers Can Instill Customer Confidence IRON MOUNTAIN DIGITAL WHITE PAPER How Software as a Service (SaaS) Providers Can Instill Customer Confidence IRON MOUNTAIN DIGITAL Table of Contents Introduction........................................................................................3

More information

Thinking about tomorrow today

Thinking about tomorrow today Thinking about tomorrow today Depositing software source code with TÜV SÜD Software Escrow TÜV SÜD Product Service GmbH Ideal for software suppliers and software users In order to manufacture products

More information

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS IMPORTANT: PLEASE READ BEFORE DOWNLOADING, INSTALLING OR USING THE XANGATI, INC. ("LICENSOR") SOFTWARE YOU HAVE LICENSED ("SOFTWARE"). BY EXECUTING

More information

SOFTWARE ESCROW AGREEMENT. ( Effective Date ), this Software Escrow Agreement ( Agreement ) is

SOFTWARE ESCROW AGREEMENT. ( Effective Date ), this Software Escrow Agreement ( Agreement ) is SOFTWARE ESCROW AGREEMENT As of ( Effective Date ), this Software Escrow Agreement ( Agreement ) is entered into by and between a (insert state of incorporation) corporation, located at ( Licensor ); a

More information

The Keys to a Reliable Escrow Agreement

The Keys to a Reliable Escrow Agreement The Keys to a Reliable Escrow Agreement Richard Sheffield 3539 A Church St. Clarkston, GA 30021-1717 1-800-875-5669 escrow@mindspring.com "Forethought in any part of life is seldom regretted and always

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1 White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

Desktop Solutions SolutioWhitepaper

Desktop Solutions SolutioWhitepaper Author: Mike Herrmann With organizations looking for new ways to cut costs and increase productivity, the use of cloud computing has grown. The most common form of cloud computing is for vendors making

More information

CRM in a Day Support Services Agreement

CRM in a Day Support Services Agreement CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft

More information

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card

More information

CRM Support Services Agreement

CRM Support Services Agreement CRM Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: Points Purchased in Initial Minimum Term: This Agreement sets forth the terms and conditions under which The CRM

More information

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades. Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance

More information

Escrow is dead? WHITE PAPER

Escrow is dead? WHITE PAPER Escrow is dead? WHITE PAPER June 2012 Table of Contents Executive summary........3 The growth of the Cloud and SaaS.4 Why are businesses migrating to the Cloud?.4 Why are businesses using SaaS technology?...6

More information

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT THE VERTEXFX TRADER API (THE SOFTWARE ) AND THE ACCOMPANYING DOCUMENTATION (THE RELATED MATERIALS ) (COLLECTIVELY, THE PRODUCT ) ARE PROTECTED BY

More information

Change & configuration management

Change & configuration management 2008-01-18 12:42:00 G007_CHANGE_AND_CONFIGURATION_MANAGEMENT Change & configuration management Guidelines Page 1 of 11 1. Preliminary 1.1 Authority This document is issued by the (the Commission) pursuant

More information

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA

FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 8: Prepared by DoD ESI January 2013 Chapter Overview Source Code is the human readable form of software as written by the Publisher while Object Code is the machine

More information

How To Write A Successful Automation Project

How To Write A Successful Automation Project ch01.fm Page 1 Thursday, November 4, 1999 12:19 PM Chapter 1 Lights Out Exposed Planning and executing a successful automation project begins by developing realistic expectations for the purpose and scope

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding

secure shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Secure Shredding secure shredding Secure Shredding Services Secure, Compliant, Cost-Effective, Environmentally Responsible Information Destruction Does This Sound Familiar? I want to protect my company s reputation and

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

IMPROVE YOUR DATA MANAGEMENT

IMPROVE YOUR DATA MANAGEMENT IMPROVE YOUR DATA MANAGEMENT IQ In this short guide, we ll help you assess and accelerate your approach to data management. SEE INFORMATION DIFFERENTLY ASSESS YOUR APPROACH THE PACE OF REGULATORY CHANGE

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Information and Communication Technology. Patch Management Policy

Information and Communication Technology. Patch Management Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Licensor: Deveo Oy Customer: [address line 2] LICENSE NUMBER:

Licensor: Deveo Oy Customer: [address line 2] LICENSE NUMBER: 1/8 DEVEO SOFTWARE LICENSE AGREEMENT COVER PAGE LICENSE CERTIFICATE AND LICENSE NUMBER Licensor: Deveo Oy Customer: [address line 1] [address line 2] Product Deveo on-premises Software version License

More information

Open Source Voting Systems

Open Source Voting Systems Presented to: 2015 State Certification Testing of Voting Systems National Conference Paul W. Craft Kathleen A. McGregor May, 19, 2015 Introduction One concern raised in the aftermath of Election 2000 was

More information

Customer: Address: Support Contact:

Customer: Address: Support Contact: MaxxVault MaxxDocs Software Subscription and Support Agreement 3340 Veterans Memorial Highway Suite 400 Bohemia, NY 11716 631-446-4800 www.maxxvault.com Customer: Address: Support Contact: Effective Date:

More information

SOFTWARE ESCROW AGREEMENTS: A BUSINESS CONTINUITY STRATEGY PAPER PRESENTED FOR NEW ZEALAND COMPUTER SOCIETY THE LAW OF IT SEMINARS

SOFTWARE ESCROW AGREEMENTS: A BUSINESS CONTINUITY STRATEGY PAPER PRESENTED FOR NEW ZEALAND COMPUTER SOCIETY THE LAW OF IT SEMINARS SOFTWARE ESCROW AGREEMENTS: A BUSINESS CONTINUITY STRATEGY PAPER PRESENTED FOR NEW ZEALAND COMPUTER SOCIETY THE LAW OF IT SEMINARS Wellington and Auckland March and April 2003 2 Where software is licensed,

More information

COMPLIANCEDESKTOP TECHNOLOGY PLATFORM SUPPORT AND MAINTENANCE SERVICES

COMPLIANCEDESKTOP TECHNOLOGY PLATFORM SUPPORT AND MAINTENANCE SERVICES COMPLIANCEDESKTOP TECHNOLOGY PLATFORM SUPPORT AND MAINTENANCE SERVICES TERMS AND CONDITIONS The Red Flag Group ( RFG ) shall provide Support and Maintenance Services for the ComplianceDesktop Technology

More information

Windows Server 2003 End of Support: Your Opportunity for Transformation

Windows Server 2003 End of Support: Your Opportunity for Transformation Windows Server 2003 End of Support: Your Opportunity for Transformation In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only.

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our stock price tumbling. I need to minimize our

More information

6-8065 Payment Card Industry Compliance

6-8065 Payment Card Industry Compliance 0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT

OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures.

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures. Symantec Corporation TM Symantec Product Vulnerability Management Process Best Practices Roles & Responsibilities INSIDE Vulnerabilities versus Exposures Roles Contact and Process Information Threat Evaluation

More information

Software License Agreement

Software License Agreement Software License Agreement October 26, 2010 Contents 1 Definitions... 3 2 License Concession... 3 3 Scope of Software Agreement and License Restrictions... 3 5 Obligations of the Customer... 5 6 Audit

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

MTS GUI LICENCE SCHEDULE TO. MTS Data Terms & Conditions End Customer; or. MTS and EuroMTS Membership Documentation; or. MTS Registered ISV Agreement

MTS GUI LICENCE SCHEDULE TO. MTS Data Terms & Conditions End Customer; or. MTS and EuroMTS Membership Documentation; or. MTS Registered ISV Agreement MTS GUI LICENCE SCHEDULE TO MTS Data Terms & Conditions End Customer; or MTS and EuroMTS Membership Documentation; or MTS Registered ISV Agreement * * * * * TERMS AND CONDITIONS 1. INTERPRETATION 1.1 The

More information

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0 1 Module 3 Licensed Software Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. LICENCE TERMS... 3 3. SUPPLY OF... 8 4. UPDATES AND NEW RELEASES... 9 5. OPEN SOURCE SOFTWARE... 10

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

The Art of the Deal: Negotiating a Winning EHR Contract

The Art of the Deal: Negotiating a Winning EHR Contract The Art of the Deal: Negotiating a Winning EHR Contract Rural Hospital Information Technology Conference October 20, 2010 Austin, Texas Diana J.P. McKenzie Partner and Chair, Information Technology & Outsourcing

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

ESCROW AGREEMENT PRELIMINARY UNDERSTANDING

ESCROW AGREEMENT PRELIMINARY UNDERSTANDING ESCROW AGREEMENT This Manufacturing Escrow Agreement ( Escrow Agreement ) is entered into as of ( Effective Date ), by and among Cisco Systems, Inc., a California corporation, with offices at 170 West

More information

The State of Kansas Information Technology Executive Council

The State of Kansas Information Technology Executive Council The State of Kansas Information Technology Executive Council Information Technology Policy #1100 Revision #1 1.0 TITLE: Software Use and Licensing 1.1 EFFECTIVE DATE: October 26, 2000 REVISED: January

More information

May 2013. Dispute Perspectives Dispute Management of Software Escrow Agreements

May 2013. Dispute Perspectives Dispute Management of Software Escrow Agreements May 2013 Dispute Perspectives Dispute Management of Software Escrow Agreements From the Editor s desk Dear Friends, Welcome to our fifth issue of Dispute Perspectives a periodic newsletter that will provide

More information

NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification. May 7, 2007 Revision 1.1

NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification. May 7, 2007 Revision 1.1 NSI Policy Supplement for XML Retail Accounting Reports Certification/Verification May 7, 2007 Revision 1.1 Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Scope... 3 1.2.1 Scope of certification

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Quick Guide: Managing ICT Risk for Business

Quick Guide: Managing ICT Risk for Business Quick Guide: Managing ICT Risk for Business This Quick Guide is one of a series of information products aimed at helping small to medium sized enterprises identify and manage risks when assessing, buying

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Paychex Accounting Online Terms of Use

Paychex Accounting Online Terms of Use Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with

More information

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP) Statement of Work for Online Event Registration Product Deployment for Salesforce Implementation for Open Web Application Security Project (OWASP) July 9, 2010 TABLE OF CONTENTS INTRODUCTION... 3 SCOPE...

More information

This License Agreement applies to the Real Vision Software

This License Agreement applies to the Real Vision Software P.O. Box 12958 Alexandria, LA 71315 REAL VISION SOFTWARE INC. LICENSE AGREEMENT COVER This License Agreement, by and between Real Vision Software, Inc., a Louisiana Corporation, hereinafter referred to

More information

Stiftung SIC Java Crypto-Software Development Kit Licence Agreement

Stiftung SIC Java Crypto-Software Development Kit Licence Agreement Stiftung SIC Java Crypto-Software Development Kit Licence Agreement Valid from November 14, 2013 The Stiftung SIC (Stiftung Secure Information and Communication Technologies, Inffeldgasse16a, A- 8010 Graz,

More information

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT

MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT MEDICAL-OBJECTS SOFTWARE LICENCE AGREEMENT YOU ARE ABOUT TO ENTER INTO A LEGAL AGREEMENT WITH MEDICAL- OBJECTS PTY LTD ( MEDICAL-OBJECTS ). BY USING ALL OR ANY PORTION OF THE SOFTWARE IN ANY WAY YOU ACCEPT

More information

Commercial Software Licensing

Commercial Software Licensing Commercial Software Licensing CHAPTER 6: Prepared by DoD ESI January 2013 Chapter Overview Government contracts must comply with FAR and DFARS. They include terms and conditions (Ts & Cs) from GSA, BPAs,

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

Cloud Agreements: Do s, Don ts, and Cautions

Cloud Agreements: Do s, Don ts, and Cautions Cloud Agreements: Do s, Don ts, and Cautions 4 th Annual Grand Rapids IT Symposium June 11, 2015 Nate Steed & Ken Coleman 2015 Warner Norcross & Judd LLP. All rights reserved. WNJ.com Disclaimer 2015 Warner

More information

ECC Board of Trustees

ECC Board of Trustees ECC Board of Trustees Executive Summary Date: February 27, 2014 Subcommittee: Academic Affairs Agenda Item: Master Software License Agreement between ECC and Xenegrade Corporation This item is for: For

More information

[Contractor] and. [European Space Agency] ESA Intellectual Property Licence for the Agency s Own Requirements

[Contractor] and. [European Space Agency] ESA Intellectual Property Licence for the Agency s Own Requirements AGENCY S OWN REQUIREMENTS ESA STANDARD LICENCE 4 [Contractor] and [European Space Agency] ESA Intellectual Property Licence for the Agency s Own Requirements ESA Partly Funded Contract No. [ ] [TITLE based

More information

SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy)

SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy) SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy) THIS AGREEMENT is entered into as of XXXX ("Effective Date") by and between NIELSEN ENGINEERING & RESEARCH, INC. (NEAR), with offices at 605 Ellis Street,

More information

What s the Path? Information Life-cycle part of Vendor Management

What s the Path? Information Life-cycle part of Vendor Management Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered

More information

Security Patch Management

Security Patch Management The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1

More information

GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER

GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER GALLAGHER SECURITY SOFTWARE MAINTENANCE TERMS AND CONDITIONS PLEASE READ THESE SOFTWARE MAINTENANCE TERMS AND CONDITIONS CAREFULLY

More information

PUBLIC RELEASE PATENT AND TRADEMARK OFFICE. Inadequate Contractor Transition Risks Increased System Cost and Delays

PUBLIC RELEASE PATENT AND TRADEMARK OFFICE. Inadequate Contractor Transition Risks Increased System Cost and Delays PUBLIC RELEASE PATENT AND TRADEMARK OFFICE Inadequate Contractor Transition Risks Increased System Cost and Delays Inspection Report No. OSE-10084-8-0001 / December 1997 Office of Systems Evaluation PTO

More information

LEGAL ISSUES IN CLOUD COMPUTING

LEGAL ISSUES IN CLOUD COMPUTING LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing

More information

7 Mistakes Businesses Make When Moving To the Cloud

7 Mistakes Businesses Make When Moving To the Cloud WHITE PAPER 7 Mistakes Businesses Make When Moving To the Cloud by Matt Murren, CEO September 2013 True North ITG, Inc. 16504 9th Ave SE, Suite #203 Mill Creek, WA 98012 1.800.372.1660 425.743.3765 gethelp@truenorthitg.com

More information

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge

Contents. Best Practices Guide. 3 Physical Records: The Ongoing Compliance Challenge Best Practices Guide HIPAA Primer series HEALTHCARE Iron Mountain Records Management Services HIPAA-Compliant Solutions that keep you compliant Contents 3 Physical Records: The Ongoing Compliance Challenge

More information

SAMPLE CLINIC ADDENDUM TO SAMPLE PRO-VENDOR MAINTENANCE AGREEMENT

SAMPLE CLINIC ADDENDUM TO SAMPLE PRO-VENDOR MAINTENANCE AGREEMENT Comment: This sample Addendum is one example of how a clinic might respond to a typical, one-sided, unfair, provendor Maintenance Agreement. Most vendors will not accept clinics form of agreements, but

More information

End User Agreement. between. Secure Backup Limited. and [END USER]

End User Agreement. between. Secure Backup Limited. and [END USER] End User Agreement between Secure Backup Limited and [END USER] Commercial in Confidence Secure Backup Limited 1 Table of Contents 1. THE SERVICE 3 2. SOFTWARE LICENCE 3 4. PAYMENT 4 5. OWNERSHIP OF DATA

More information

SOURCE CODE ESCROW. Katheryn A. Andresen and Jen C. Salyers

SOURCE CODE ESCROW. Katheryn A. Andresen and Jen C. Salyers SOURCE CODE ESCROW Katheryn A. Andresen and Jen C. Salyers 21:1. Generally 21:2. Escrow provisions for license agreements 21:3. Escrow provisions for license agreements Two-party vs. three-party escrow

More information

Master Services Terms & Conditions

Master Services Terms & Conditions 1. Application 1.1 These Master Services Terms & Conditions ( Agreement ) are between URL Networks Pty Ltd (ACN 122 756 138) ( URL Networks ) and you for the provision of certain Services. 1.2 The Agreement

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

Taming ERP for good: How Australian organisations can improve ERP success rates through better planning

Taming ERP for good: How Australian organisations can improve ERP success rates through better planning Taming ERP for good: How Australian organisations can improve ERP success rates through better planning A complimentary report from enterprise software provider Epicor Contents 3 Introduction 4 Australia

More information

Understanding the Value of Symantec Managed Enterprise Vault

Understanding the Value of Symantec Managed Enterprise Vault REPORT: UNDERSTANDING THE VALUE OF SYMANTEC MANAGED.......... ENTERPRISE........... VAULT................... Understanding the Value of Symantec Managed Enterprise Vault Who should read this paper IT managers

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI

PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that

More information

CHRISTIE ONSITE AGREEMENT

CHRISTIE ONSITE AGREEMENT CHRISTIE ONSITE AGREEMENT EFFECTIVE FEBRUARY 1 ST, 2013 www.christieemea.com Christie ONSITE Agreement is a bespoke onsite call to repair service providing Customers access to a team of Christie engineers

More information

We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions

We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions SCHEDULE 8 ASSET MANAGEMENT 1. Scope 1.1 The requirement

More information

PCI DSS Top 10 Reports March 2011

PCI DSS Top 10 Reports March 2011 PCI DSS Top 10 Reports March 2011 The Payment Card Industry Data Security Standard (PCI DSS) Requirements 6, 10 and 11 can be the most costly and resource intensive to meet as they require log management,

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Quantum Q-Cloud Backup-as-a-Service Reference Architecture

Quantum Q-Cloud Backup-as-a-Service Reference Architecture Quantum Q-Cloud Backup-as-a-Service Reference Architecture NOTICE This Technology Brief may contain proprietary information protected by copyright. Information in this Technology Brief is subject to change

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

Software Source Code Escrow Agreement

Software Source Code Escrow Agreement Software Source Code Escrow Agreement You pay someone to develop a software program for you (could even be a website, could even be something else), but they keep the source code (they often want to until

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information