Information Exchange Framework Reference Architecture

Size: px
Start display at page:

Download "Information Exchange Framework Reference Architecture"

Transcription

1 Date: November 2014 Information Exchange Framework Reference Architecture Initial Submission OMG Document Number: MARS/ Standard document URL: Normative Machine Consumable File(s): TBD This OMG document replaces the submission document (mars/ , Alpha). It is an OMG Adopted Beta specification and is currently in the finalization phase. Comments on the content of this document are welcome, and should be directed to by June 20, You may view the pending issues for this specification from the OMG revision issues web page The FTF Recommendation and Report for this specification will be published on September 26, If you are reading this after that date, please download the available specification from the OMG Specifications Catalog.

2 Copyright , Advanced Systems Management (ASMG) Group Ltd. Copyright , Thematix Partners LLC Copyright , Object Management Group, Inc. USE OF SPECIFICATION - TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royaltyfree, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification. Subject to all of the terms and conditions below, the owners of the copyright in this specification hereby grant you a fully-paid up, non-exclusive, nontransferable, perpetual, worldwide license (without the right to sublicense), to use this specification to create and distribute software and special purpose specifications that are based upon this specification, and to use, copy, and distribute this specification as provided under the Copyright Act; provided that: (1) both the copyright notice identified above and this permission notice appear on any copies of this specification; (2) the use of the specifications is for informational purposes and will not be copied or posted on any network computer or broadcast in any media and will not be otherwise resold or transferred for commercial purposes; and (3) no modifications are made to this specification. This limited permission automatically terminates without notice if you breach any of these terms or conditions. Upon termination, you will destroy immediately any copies of the specifications in your possession or control. PATENTS The attention of adopters is directed to the possibility that compliance with or adoption of OMG specifications may require use of an invention covered by patent rights. OMG shall not be responsible for identifying patents for which a license may be required by any OMG specification, or for conducting legal inquiries into the legal validity or scope of those patents that are brought to its attention. OMG specifications are prospective and advisory only. Prospective users are responsible for protecting themselves against liability for infringement of patents. GENERAL USE RESTRICTIONS Any unauthorized use of this specification may violate copyright laws, trademark laws, and communications regulations and statutes. This document contains information which is protected by copyright. All Rights Reserved. No part of this work covered by copyright herein may be reproduced or used in any form or by any means--graphic, Information Exchange Packaging Policy Vocabulary, Initial Submission ii

3 electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems-- without permission of the copyright owner. Copyright , Advanced Systems Management (ASMG) Group Ltd. Copyright , Object Management Group, Inc. Copyright , Defence Research and Development Canada, Centre for Security Sciences (CSS) USE OF SPECIFICATION - TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royaltyfree, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification. Subject to all of the terms and conditions below, the owners of the copyright in this specification hereby grant you a fully-paid up, non-exclusive, nontransferable, perpetual, worldwide license (without the right to sublicense), to use this specification to create and distribute software and special purpose specifications that are based upon this specification, and to use, copy, and distribute this specification as provided under the Copyright Act; provided that: (1) both the copyright notice identified above and this permission notice appear on any copies of this specification; (2) the use of the specifications is for informational purposes and will not be copied or posted on any network computer or broadcast in any media and will not be otherwise resold or transferred for commercial purposes; and (3) no modifications are made to this specification. This limited permission automatically terminates without notice if you breach any of these terms or conditions. Upon termination, you will destroy immediately any copies of the specifications in your possession or control. PATENTS The attention of adopters is directed to the possibility that compliance with or adoption of OMG specifications may require use of an invention covered by patent rights. OMG shall not be responsible for identifying patents for which a license may be required by any OMG specification, or for conducting legal inquiries into the legal validity or scope of those patents that are brought to its attention. OMG specifications are prospective and advisory only. Prospective users are responsible for protecting themselves against liability for infringement of patents. Information Exchange Packaging Policy Vocabulary, Initial Submission iii

4 GENERAL USE RESTRICTIONS Any unauthorized use of this specification may violate copyright laws, trademark laws, and communications regulations and statutes. This document contains information which is protected by copyright. All Rights Reserved. No part of this work covered by copyright herein may be reproduced or used in any form or by any means--graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems-- without permission of the copyright owner. DISCLAIMER OF WARRANTY WHILE THIS PUBLICATION IS BELIEVED TO BE ACCURATE, IT IS PROVIDED "AS IS" AND MAY CONTAIN ERRORS OR MISPRINTS. THE OBJECT MANAGEMENT GROUP AND THE COMPANIES LISTED ABOVE MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS PUBLICATION, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF TITLE OR OWNERSHIP, IMPLIED WARRANTY OF MERCHANTABILITY OR WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE OR USE. IN NO EVENT SHALL THE OBJECT MANAGEMENT GROUP OR ANY OF THE COMPANIES LISTED ABOVE BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, RELIANCE OR COVER DAMAGES, INCLUDING LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY ANY USER OR ANY THIRD PARTY IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS MATERIAL, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The entire risk as to the quality and performance of software developed using this specification is borne by you. This disclaimer of warranty constitutes an essential part of the license granted to you to use this specification. RESTRICTED RIGHTS LEGEND Use, duplication or disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c) (1) (ii) of The Rights in Technical Data and Computer Software Clause at DFARS or in subparagraph (c)(1) and (2) of the Commercial Computer Software - Restricted Rights clauses at 48 C.F.R or as specified in 48 C.F.R of the DoD F.A.R. Supplement and its successors, or as specified in 48 C.F.R of the Federal Acquisition Regulations and its successors, as applicable. The specification copyright owners are as indicated above and may be contacted through the Object Management Group, 109 Highland Avenue, Needham, MA 02494, U.S.A. TRADEMARKS IMM, MDA, Model Driven Architecture, UML, UML Cube logo, OMG Logo, CORBA and XMI are registered trademarks of the Object Management Group, Inc., and Object Management Group, OMG, Information Exchange Packaging Policy Vocabulary, Initial Submission iv

5 Unified Modeling Language, Model Driven Architecture Logo, Model Driven Architecture Diagram, CORBA logos, XMI Logo, CWM, CWM Logo, IIOP, MOF, OMG Interface Language (IDL), and OMG SysML are trademarks of the Object Management Group. All other products or company names mentioned are used for identification purposes only, and may be trademarks of their respective owners. COMPLIANCE The copyright holders listed above acknowledge that the Object Management Group (acting itself or through its designees) is and shall at all times be the sole entity that may authorize developers, suppliers and sellers of computer software to use certification marks, trademarks or other special designations to indicate compliance with these materials. Software developed under the terms of this license may claim compliance or conformance with this specification if and only if the software compliance is of a nature fully matching the applicable compliance points as stated in the specification. Software developed only partially matching the applicable compliance points may claim only that the software was based on this specification, but may not claim compliance or conformance with this specification. In the event that testing suites are implemented or approved by Object Management Group, Inc., software developed using this specification may claim compliance or conformance with the specification only if the software satisfactorily completes the testing suites Information Exchange Packaging Policy Vocabulary, Initial Submission v

6 Table Contents TABLE CONTENTS LIST OF FIGURES LIST OF TABLES PREFACE VI X XII XVIII ABOUT THE OBJECT MANAGEMENT GROUP XVIII PART I 1 1 INFORMATION EXCHANGE FRAMEWORK REFERENCE ARCHITECTURE SCOPE ORGANIZATION OF THIS SPECIFICATION MOTIVATION IEF APPROACH IEF DELIVERED CAPABILITIES IEF OBJECTIVES IEF RA DESIGN PRINCIPLES 8 2 COMPLIANCE INTRODUCTION SELECTING A COMPLIANCE POINT COMPLIANCE POINTS File Sharing Instant Messaging Messaging Middleware Web Services 10 3 NORMATIVE REFERENCES 11 4 TERMS AND DEFINITIONS 12 5 SYMBOLS/ACRONYMS SYMBOLS 13 6 ADDITIONAL INFORMATION INTENDED AUDIENCE ACKNOWLEDGEMENTS ADDITIONAL MATERIALS 14 Information Exchange Packaging Policy Vocabulary, Initial Submission vi

7 6.4 REFERENCE ARCHITECTURE Introduction to IEF RA Philosophy MODELING CONVENTIONS 15 7 IEF REFERENCE ARCHITECTURE IEF OVERVIEW 16 8 EXTERNAL ACTORS 19 9 POLICY ADMINISTRATION POINT PAP IN AN INTER-AGENCY ENVIRONMENT PAP DESCRIPTION PAP Use Case Diagrams PAP Class Diagrams Sequence Diagrams POLICY DECISION POINT USE CASES Authorize Action Use Case Diagram PDP Use Case Diagram File PDP Use Case Diagram IM PDP Use Case Diagram Receiver Directed Messaging PDP Use Case Diagram Session Directed Messaging PDP Use Case Diagram CLASS DIAGRAMS Policy Decision Point Class Diagram SEQUENCE DIAGRAMS Policy Decision Point Sequence Diagram POLICY ENFORCEMENT POINTS PEP OVERVIEW PEP Components Class Diagram PEP Specialization Class Diagram PEP PEP Use Cases PEP Class Diagrams PEP Sequence Diagrams 84 Information Exchange Packaging Policy Vocabulary, Initial Submission vii

8 11.3 FILE SHARING PEP File Share Use Cases File PEP Class Diagrams File PEP Sequence Diagrams INSTANT MESSAGING PEP Instant Messaging Use Cases Instant Messaging Class Diagrams IM PEP Class Diagram Sequence Diagrams SESSION DIRECTED MESSAGING PEP Session Directed Messaging Use Cases Class Diagrams Session Directed Messaging PEP Class Diagram Sequence Diagrams RECEIVER DIRECTED MESSAGING PEP DATA PACKAGING AND PROCESSING SERVICES OPTIONAL REQUIREMENTS MESSAGE PACKAGING AND PROCESSING SERVICE USE CASE DIAGRAMS Package Structured Message Use Case Diagram Assemble Information Package Use Case Diagram Assemble Releasable Data Set Use Case Diagram Process Structured Information Element Use Case Diagram Package Structured Message Use Case Diagram CLASS DIAGRAMS SEQUENCE DIAGRAMS COMMON SERVICES USE CASES Authorize User Use Case Diagram Encrypt Information Element Use Case Diagram Decrypt Information Element Use Case Diagram CLASS DIAGRAMS Authorization Class Diagram Cryptography Class Diagram 217 Information Exchange Packaging Policy Vocabulary, Initial Submission viii

9 Identity Management Class Diagram Logging Class Diagram Marking Class Diagram Secure Asset Container Class Diagram SEQUENCE DIAGRAMS POLICY VOCABULARIES 240 ANNEX F: BIBLIOGRAPHY (INFORMATIONAL) 1 ANNEX G TERMS AND ACRONYMS (INFORMATIONAL) 1 GENERAL TERMS AND DEFINITIONS 1 ACRONYMS 9 ANNEX H CONFORMANCE WITH RFP 1 Mandatory Requirements 1 OPTIONAL REQUIREMENTS 5 Information Exchange Packaging Policy Vocabulary, Initial Submission ix

10 List of Figures Figure 1 -Concept Use Case Diagram Figure 2 -Administer Policy Environment Use Case Diagram Figure 3 -Policy Administration Use Case Diagram Figure 4 -Policy Management Use Case Diagram Figure 5 -Authorize Action Use Case Diagram Figure 6 -PDP Administration Use Case Diagram Figure 7 - PDP Use Case Diagram Figure 8 -File PDP Use Case Diagram Figure 9 -IM PDP Use Case Diagram Figure 10 -Receiver Directed Messaging PDP Use Case Diagram Figure 11 -Session Directed Messaging PDP Use Case Diagram Figure 12 -Send Use Case Diagram Figure 13 -Receive Use Case Diagram Figure 14 -Access File Share Use Case Diagram Figure 15 -Manage Protected File Use Case Diagram Figure 16 -Copy File Use Case Diagram Figure 17 -Create File Use Case Diagram Figure 18 -Cut File Use Case Diagram Figure 19 -Delete File Use Case Diagram Figure 20 -List Files Use Case Diagram Figure 21 -Move File Use Case Diagram Figure 22 -Open File Use Case Diagram Figure 23 -Paste File Use Case Diagram Figure 24 -Rename File Use Case Diagram Figure 25 -Save File Use Case Diagram Figure 26 -List and Join Chat Use Case Diagram Figure 27 -Receive IM Use Case Diagram Figure 28 -Send IM Use Case Diagram Information Exchange Packaging Policy Vocabulary, Initial Submission x

11 Figure 29 -Send Session Directed Message Use Case Diagram Figure 30 -Receive Message Use Case Diagram Figure 31 -Send Session Directed Message Use Case Diagram Figure 32 -Receive Use Case Diagram Figure 33 -Package Structured Message Use Case Diagram Figure 34 -Assemble Information Package Use Case Diagram Figure 35 -Assemble Releasable Data Set Use Case Diagram Figure 36 -Process Structured Information Element Use Case Diagram Figure 37 -Package Structured Message Use Case Diagram Figure 38 -Authorize User Use Case Diagram Figure 39 -Bind Markings to Information Element Use Case Diagram Figure 40 -Encrypt Information Element Use Case Diagram Figure 41 -Decrypt Information Element Use Case Diagram Information Exchange Packaging Policy Vocabulary, Initial Submission xi

12 List of Tables Table 1 - Concept Use Case Diagram Descriptions Table 2 External Actors Table 3 - Administer Policy Environment Use Case Diagram Descriptions Table 4 - Policy Administration Use Case Diagram Descriptions Table 5 - Policy Management Use Case Diagram Descriptions Table 6 Policy Administration Point Class Diagram Descriptions Table 7 Policy Administration Point Class Diagram - Interface Descriptions Table 8 Policy Administration Point Class Diagram - Association Descriptions Table 9 Identity Attribute Administration Point Class Diagram Descriptions Table 10 Identity Attribute Administration Point Class Diagram - Interface Descriptions Table 11 Identity Attribute Administration Point Class Diagram - Association Descriptions Table 12 - Policy Administration Point Sequence Diagram - Message Descriptions Table 13 - Authorize Action Use Case Diagram Descriptions Table 14 - PDP Administration Use Case Diagram Descriptions Table PDP Use Case Diagram Descriptions Table 16 - File PDP Use Case Diagram Descriptions Table 17 - IM PDP Use Case Diagram Descriptions Table 18 - Receiver Directed Messaging PDP Use Case Diagram Descriptions Table 19 - Session Directed Messaging PDP Use Case Diagram Descriptions Table 20 Policy Decision Point Class Diagram Descriptions Table 21 Policy Decision Point Class Diagram - Interface Descriptions Table 22 Policy Decision Point Class Diagram - Association Descriptions Table 23 - Policy Decision Point Sequence Diagram - Message Descriptions Table 24 PEP Components Class Diagram Descriptions Table 25 PEP Components Class Diagram - Interface Descriptions Table 26 PEP Components Class Diagram - Association Descriptions Table 27 PEP Specialization Class Diagram Descriptions Table 28 PEP Specialization Class Diagram - Interface Descriptions Information Exchange Packaging Policy Vocabulary, Initial Submission xii

13 Table 29 PEP Specialization Class Diagram - Association Descriptions Table 30 - Send Use Case Diagram Descriptions Table 31 - Receive Use Case Diagram Descriptions Table 32 PEP Class Diagram Descriptions Table 33 PEP Class Diagram - Interface Descriptions Table 34 PEP Class Diagram - Association Descriptions Table 35 - Send Sequence Diagram - Message Descriptions Table 36 - Receive Sequence Diagram - Message Descriptions Table 37 - Access File Share Use Case Diagram Descriptions Table 38 - Manage Protected File Use Case Diagram Descriptions Table 39 - Copy File Use Case Diagram Descriptions Table 40 - Create File Use Case Diagram Descriptions Table 41 - Cut File Use Case Diagram Descriptions Table 42 - Delete File Use Case Diagram Descriptions Table 43 - List Files Use Case Diagram Descriptions Table 44 - Move File Use Case Diagram Descriptions Table 45 - Open File Use Case Diagram Descriptions Table 46 - Paste File Use Case Diagram Descriptions Table 47 - Rename File Use Case Diagram Descriptions Table 48 - Save File Use Case Diagram Descriptions Table 49 File PEP Class Diagram Descriptions Table 50 File PEP Class Diagram - Interface Descriptions Table 51 File PEP Class Diagram - Association Descriptions Table 52 - Copy File Sequence Diagram - Message Descriptions Table 53 - Create File Sequence Diagram - Message Descriptions Table 54 - Cut File Sequence Diagram - Message Descriptions Table 55 - Delete File Sequence Diagram - Message Descriptions Table 56 - List Files Sequence Diagram - Message Descriptions Table 57 - Move File Sequence Diagram - Message Descriptions Table 58 - Open File Sequence Diagram - Message Descriptions Information Exchange Packaging Policy Vocabulary, Initial Submission xiii

14 Table 59 - Paste File Sequence Diagram - Message Descriptions Table 60 - Retrieve File Sequence Diagram - Message Descriptions Table 61 - Save File Sequence Diagram - Message Descriptions Table 62 - List and Join Chat Use Case Diagram Descriptions Table 63 - Receive IM Use Case Diagram Descriptions Table 64 - Send IM Use Case Diagram Descriptions Table 65 IM PEP Class Diagram Descriptions Table 66 IM PEP Class Diagram - Interface Descriptions Table 67 IM PEP Class Diagram - Association Descriptions Table 68 - List Chat Rooms Sequence Diagram - Message Descriptions Table 69 - Join Chat Room Sequence Diagram - Message Descriptions Table 70 - Send IM Sequence Diagram - Message Descriptions Table 71 - Send Special Message Sequence Diagram - Message Descriptions Table 72 - Receive IM Sequence Diagram - Message Descriptions Table 73 - Receive Special Message Sequence Diagram - Message Descriptions Table 74 - Send Session Directed Message Use Case Diagram Descriptions Table 75 - Receive Message Use Case Diagram Descriptions Table 76 Session Directed Messaging PEP Class Diagram Descriptions Table 77 Session Directed Messaging PEP Class Diagram - Interface Descriptions Table 78 Session Directed Messaging PEP Class Diagram - Association Descriptions Table 79 - Send Message To Session Sequence Diagram - Message Descriptions Table 80 - Receive Message Sequence Diagram - Message Descriptions Table 81 - Send Session Directed Message Use Case Diagram Descriptions Table 82 - Receive Use Case Diagram Descriptions Table 83 Receiver Directed Messaging PEP Class Diagram Descriptions Table 84 Receiver Directed Messaging PEP Class Diagram - Interface Descriptions Table 85 Receiver Directed Messaging PEP Class Diagram - Association Descriptions Table 86 - Send Receiver Directed Messaging Sequence Diagram - Message Descriptions Table 87 - Receive Message Sequence Diagram - Message Descriptions Table 88 - Package Structured Message Use Case Diagram Descriptions Information Exchange Packaging Policy Vocabulary, Initial Submission xiv

15 Table 89 - Assemble Information Package Use Case Diagram Descriptions Table 90 - Assemble Releasable Data Set Use Case Diagram Descriptions Table 91 - Process Structured Information Element Use Case Diagram Descriptions Table 92 - Package Structured Message Use Case Diagram Descriptions Table 93 Data Assembly Service Class Diagram Descriptions Table 94 Data Assembly Service Class Diagram - Interface Descriptions Table 95 Data Assembly Service Class Diagram - Association Descriptions Table 96 Data Packaging Service Class Diagram Descriptions Table 97 Data Packaging Service Class Diagram - Interface Descriptions Table 98 Data Packaging Service Class Diagram - Association Descriptions Table 99 - Authorize User Use Case Diagram Descriptions Table Bind Markings to Information Element Use Case Diagram Descriptions Table Encrypt Information Element Use Case Diagram Descriptions Table Decrypt Information Element Use Case Diagram Descriptions Table 103 Authorization Class Diagram Descriptions Table 104 Authorization Class Diagram - Interface Descriptions Table 105 Authorization Class Diagram - Association Descriptions Table 106 Cryptography Class Diagram Descriptions Table 107 Cryptography Class Diagram - Interface Descriptions Table 108 Cryptography Class Diagram - Association Descriptions Table 109 Identity Management Class Diagram Descriptions Table 110 Identity Management Class Diagram - Interface Descriptions Table 111 Identity Management Class Diagram - Association Descriptions Table 112 Logging Class Diagram Descriptions Table 113 Logging Class Diagram - Interface Descriptions Table 114 Logging Class Diagram - Association Descriptions Table 115 Marking Class Diagram Descriptions Table 116 Marking Class Diagram - Interface Descriptions Table 117 Marking Class Diagram - Association Descriptions Information Exchange Packaging Policy Vocabulary, Initial Submission xv

16 Information Exchange Packaging Policy Vocabulary, Initial Submission xvi

17 Information Exchange Packaging Policy Vocabulary, Initial Submission xvii

18 Preface About the Object Management Group Founded in 1989, the Object Management Group, Inc. (OMG) is an open membership, not-for-profit computer industry standards consortium that produces and maintains computer industry specifications for interoperable, portable, and reusable enterprise applications in distributed, heterogeneous environments. Membership includes Information Technology vendors, end users, government agencies, and academia. OMG member companies write, adopt, and maintain its specifications following a mature, open process. OMG's specifications implement the Model Driven Architecture (MDA ), maximizing Return on Investment (ROI) through a full-lifecycle approach to enterprise integration that covers multiple operating systems, programming languages, middleware and networking infrastructures, and software development environments. OMG's specifications include: UML (Unified Modeling Language ); CORBA (Common Object Request Broker Architecture); CWM (Common Warehouse Metamodel); and industry-specific standards for dozens of vertical markets. More information on the OMG is available at OMG Specifications As noted, OMG specifications address middleware, modeling and vertical domain frameworks. All OMG Specifications are available from the OMG website at: Specifications are organized by the following categories: Business Modeling Specifications Middleware Specifications CORBA/IIOP Data Distribution Services Specialized CORBA IDL/Language Mapping Specifications Modeling and Metadata Specifications UML, MOF, CWM, XMI UML Profile Modernization Specifications Platform Independent Model (PIM), Platform Specific Model (PSM), Interface Specifications CORBAServices CORBAFacilities Information Exchange Packaging Policy Vocabulary, Initial Submission xviii

19 OMG Domain Specifications CORBA Embedded Intelligence Specifications CORBA Security Specifications All of OMG's formal specifications may be downloaded without charge from our website. (Products implementing OMG specifications are available from individual suppliers.) Copies of specifications, available in PostScript and PDF format, may be obtained from the Specifications Catalog cited above or by contacting the Object Management Group, Inc. at: OMG Headquarters 109 Highland Ave, Needham, MA USA Tel: Fax: Certain OMG specifications are also available as ISO standards. Please consult Typographical Conventions The type styles shown below are used in this document to distinguish programming statements from ordinary English. However, these conventions are not used in tables or clause headings where no distinction is necessary. Times/Times New Roman - 10 pt.: Standard body text. Helvetica/Arial - 10 pt. Bold: OMG Interface Language (OMG IDL) and syntax elements. Courier - 10 pt. Bold: Programming language elements. Helvetica/Arial - 10 pt: Exceptions. NOTE: Terms that appear in italics are defined in the glossary. Italic text also represents the name of a document, specification, or other publication. Issues The reader is encouraged to report any technical or editing issues/problems with this specification to Information Exchange Packaging Policy Vocabulary, Initial Submission xix

20

21 Part I Information Exchange Framework Reference Architecture, Initial Submission 1

22 1 Information Exchange Framework Reference Architecture 1.1 Scope The Information Exchange Framework (IEF) is an OMG initiative to develop a family of specifications for policy-driven, data-centric information sharing and safeguarding (ISS) services. These services target the automation of key policy decision and enforcement points to enable responsible information sharing across a broad range of business and operational scenarios. The IEF Reference Architecture (RA) will be used to guide the overall IEF effort, broaden general understanding of domain requirements, and guide the development of information sharing and safeguarding (ISS) solutions. The IEF RA is primarily targeting operational environments that require the ability to share information within and beyond agency boundaries and are often challenged by rapid, unpredictable changes in operational contexts (e.g., threat, risk, roles & responsibilities, scale, scope, and severity). These include: 1. Military (coalition and Civilian-Military) operations; 2. National Security; 3. Public Safety; 4. Crisis Management; 5. Border Security; 6. Emergency Management; 7. Peace Keeping; and 8. Humanitarian Assistance. Although these environments are the primary focus on the specification, most of the features equally support the transactional domains of a broad range of public and private sector organizations that require: 1. The ability to exchange information in a secure and trusted manner with clients, partners and subcontractors; 2. The ability to selectively share elements of an information holding with individuals and agencies in conformance with legislation regulation and policy, e.g.: a. Healthcare: Electronic Health Records (EHR); b. Finance: Banking and Insurance records; c. Justice: Criminal Case File; d. Government Programs; e. Customs and Immigration. 3. The ability to log and audit the exchange of information holdings. The IEF will adopt domain agnostic vocabulary that can easily translate to ISS in all of these domains. It will defines concepts for expressing rules governing: 1. The packaging (assemble and format) of information for release; 2. The processing (parse, process and store) of received messages or datasets; 3. The disseminations of releasable information to users (Individuals; Organizations; Role; Performer, Community or Topic; Systems; applications; or service) based on their authorizations to access specific information elements. 2 Information Exchange Framework Reference Architecture, Initial Submission

23 1.2 Organization of this Specification This specification includes seven Clauses and nine Seven: Clause 1: Provides an overview of the specification, including: Scope; Objectives; Within the Context of the Information Exchange Framework; Problem Statement; Support for Policy-driven Data-centric Information Sharing and Safeguarding; and IEF Concept. Clause 2: Defines the compliance points for the IEF RA. Clause 3: Identifies Normative References for this specification. Clause 4: Identifies Terms and their s used in various parts of the specification. This Clause does not include concepts and properties comprising the IEF RA. Clause 5: Identifies any special Symbols/Acronyms used in the development of this specification. Clause 6: Provides Additional Information about this specification. Clause 7: Provides an Overview of the IEF Reference Architecture. Clause 8: Policy Decision Point (PDP) Clause 9: Policy Administration Point (PAP) Clause 10:Policy Enforcement Points Clause 11:Policy-based Packaging Services Clause 12: Supporting Services Annex A: Annex C: Annex D: Annex E: Annex F: Clause 13: User Services Annex G: Required Discussion Points Annex H: Describes how the specification elements address the RFP requirements. 1.3 Motivation Numerous after-action and news reports on events such as SARS, the 2007 London subway bombing, the 1998 Ice Storm (eastern Canada and Northern New York State), Haiti, Afghanistan, Katrina, and 9/11 events have documented the challenges faced by even the most technologically advanced agencies to effectively and efficiently interoperate with partners. Equally prevalent are the reports documenting the growing need for agencies to increase the quantity and quality of information they share with partners when responding to an emergency or crisis situation; e.g.: Today, information sharing is critical to almost every institution. There is no more critical need for information sharing than during an international crisis, when international coalitions dynamically form. In the event of a crisis, whether it is humanitarian relief, natural disaster, combat operations, or terrorist incidents, international coalitions have an immediate need for information. These coalitions are formed with international cooperation, where each participating country offers whatever resources it can muster to support the given crisis. These situations can occur suddenly, simultaneously, and without warning. Often times, participants are Information Exchange Framework Reference Architecture, Initial Submission 3

24 coalition partners in one crisis and adversaries in another, rising difficult security issues with respect to information sharing. 1 Each participating agency requires the ability to rapidly establish pre-planned or ad hoc ISS capabilities to enable: Shared situational awareness; Collaboration (e.g., operational planning and intelligence); Coordination; and Command-and-Control. Operational users tend to emphasize the need to share; and to maximize the volume, variety and quality of information discoverable and accessible by authorized users and partners. They recognize information is vital to the formation, quality, and timeliness of decisions, as well as, the creation of decision advantage (/decision superiority). Conversely, Security and Privacy Officers, representing data owners, stewards, and custodians, apply and emphasize need-to-know practices and principles; to ensure that only users with the appropriate credentials, authorizations and need are provided access to designated information elements. These need-to-know practices result in the development and deployment of multiple selfcontained enclaves based on security level and warning terms, or caveats, such as Eyes Only, Canadian- US, and NATO. These enclaves are logically and physically separated; isolated in terms of policies, applications, platforms, networks, infrastructures, and information stores. In addition to being expensive to develop, maintain, and deploy, these enclaves are silos that are often detrimental to information provision, i.e., the realization of shared situational awareness, collaboration, coordination, and decision making. Conversely, need-to-share has introduced additional risks into information management environments. An increasing number of participants are being authorized to access security enclaves. Once a participant is authorized to enter an enclave, they are provided access to a wide range of information elements. Conventional access control solutions do not typically provide sufficient fidelity and flexibility in the application of policy/rules. They do not apply policies/rules to the actual content of individual information elements or provide defense-in-depth, i.e., layering safeguards based on the value of key data elements (e.g., security and privacy tags) within the instances of the information element. Recent security incidents illustrate the limitations of conventional access control solutions and their inability to exert sufficient control over and protect critical information assets: As part of the response to the 9/11 attacks, the US determined that increased information sharing between departments and their infrastructure was necessary to prevent future terrorist activity. The perception of departments information stores as hardened silos was seen as a barrier to effective security response. As a result, a new culture of openness was in effect at the Sensitive Compartmented Information Facility (SCIF). In this environment, Bradley Manning was able to use unrestricted and uncontrolled access to information to disclose large amounts of sensitive data. 2 1 Charles E. Phillips, Jr. et al, SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies, Pages 87-96, Information Exchange Framework Reference Architecture, Initial Submission

25 Edward Snowden's role as a systems administrator provided easy access to classified National Security Agency documents sitting in a file-sharing location on the spy agency's intranet portal. As a contracted NSA systems administrator with top-secret Sensitive Compartmented Information (SCI) clearance, Snowden could access the intranet site and move especially sensitive documents to a more secure location without triggering security incident alarms. 3 SLt. Delisle has admitted to selling secret information to the Russians over a 4 ½-year period jeopardizing Canada s ability to protect itself, as well as its standing with key partner nations. Canadian officials concede they do not know precisely what SLt. Delisle gave the Russians between 2007 and They re drawing inferences from material they intercepted just before arresting him. 4 While the two priorities sharing and safeguarding are often seen as mutually exclusive, in reality they are mutually reinforcing. Information systems that strengthen protections and the fidelity of controls for sensitive information help build trust within the user and stakeholder communities. This trust will provide data owners and custodians with the confidence to: Increase operational effectiveness Improve information sharing capability Increase information safeguarding capability Reduce operational costs Reduce management costs Reduce acquisition costs 1.4 IEF Approach The IEF defines a framework for delivering defense-in-depth solutions that address a broad range of information sharing and safeguarding requirements. The framework will include specifications defining the requirements for: A reference Architecture (this document); Formal Information Sharing and Safeguarding Policy Vocabularies; Data Centric Policy Decision and Enforcement Points; Policy Administrations Points; and Policy Development, Management and Dissemination Tools. These specifications will enable the development of information management and security measures targeting the responsible sharing of information in accordance with policy and commensurate with the sensitivity of the data being accessed or shared. The IEF Reference Architecture (this document) defines an integration layer for off-the-shelf products and services that will enable the enforcement of ISS policy at the data level rather than the networks, platforms systems and applications Information Exchange Framework Reference Architecture, Initial Submission 5

26 1.5 IEF Delivered Capabilities The IEF seeks to deliver a policy-driven data centric solution using a set of layered defense-in-depth safeguards to achieve responsible information sharing solutions. Where available, the IEF will align and integrate existing open standards and specifications for data centric practices, tools, technologies, and protocols. Where necessary, the IEF Working Group will promote the development of specifications that fill gaps in the IEF standards portfolio. The IEF Reference Architecture will provide specifications for policy driven, data-centric ISS solutions delivered as a set of shared infrastructure, integrating off-the-shelf products and services, that can rapidly tailored to the planning and spontaneous operational needs. The IEF separates the development and maintenance of policy/rules from the specific systems and services (i.e., policy decision and enforcement points) that enforce them. This separation will enable users to: Evolve ISS policy/rules independent of services and infrastructure; Specify and acquire ISS services and infrastructure without specifying the operational use cases; Re-host ISS policies to multiple ISS services and infrastructures; and Evolve and instantiate ISS policy in response to changing business and operational requirements. The capabilities provided users with the flexibility and agility to rapidly extend or enhance policy (/policy models) and accommodate: Changing mandates, roles and responsibilities; Changing mission and operational context; Evolving threats and risks; Evolving institutional policy; and Advancements in technology. By providing a model driven approach to policy development that facilitates the integration of ISS policy into segment, operational and enterprise architectures. The integration of ISS policy model into architecture frameworks and tools will: Align ISS policy models related architectural artifacts (operational topologies and deployments, platforms, systems, interfaces and data and information elements). Develop traceability to policy instruments (e.g., legislation, regulation, service Level Agreements (SLS), Memorandum of Understanding (MoU) and Operating Procedures); Provide information needed to effectively and efficiently validate, verify, and certify operational configurations and deployments. The integration of ISS policy development into architecture will promote retention of institutional knowledge and an overall reduction in overall life-cycle costs. 6 Information Exchange Framework Reference Architecture, Initial Submission

27 1.6 IEF Objectives The IEF will provide the ability and capacity for people, processes, and systems to work together efficiently and ensure that the right information is available to the right people or system at the right time. This will require solutions that: Policy-driven Data-centric Achieve Dynamic Interoperability Flexibility, Adaptability, and Agility Architecture Alignment Integration Overlay Defense-in-Depth Self-Defending Vendor Agnostic Reuse of Existing Standards and Specifications Provide a fully traceable path from information sharing an d safeguarding policy to the rules executed by decision and enforcement points in the information systems and services the execute them IEF policy decision and enforcement points operate on the data for each instance of the information and data elements being assessed for release. Solution have the ability to operate on data over time. As the context of the operation and the states of its associated systems change, ensure that systems have the ability to integrate assumptions and constraints affecting their information interchanges. Enable the rapid re-use and repurposing of policy and data patterns for both planned and spontaneous operations; and enable run-time changes to active policy environments. The IEF will define strategies that enable users to integrate IEF elements into business and system architecture views. Provide strategies, techniques and tools that enable users to translate institutional policy (policy instruments) into human consumable and machine-readable rules; the former enabling a manual process and the latter enabling automation of policy governing the sharing and safeguarding of information assets. Operate as an overlay to existing systems and infrastructure. Integrate elements manner that to safeguard individual data and information assets based on their sensitivities. Employ internal elements to safeguard its own data and information elements (e.g., policies, instructions and logs). Define specification that vendors can use to developed off-theshelf integration layers of complete ISS solutions. Integrate existing and evolving specifications and standards to define and implement of IEF component. The Platform Specific Models will represent the assignment of specific standards and specifications to the components (e.g., DDS for data Information Exchange Framework Reference Architecture, Initial Submission 7

28 1.7 IEF RA Design Principles The Key principles of the IEF and its support Environment. dissemination) and interfaces (e.g., XAMCL for exchange of policies). Support Environment (e.g., Policy Authoring Environment): Define strategies, practices and tools that: Enables rapid development and deployment of ISS Policy. Align and integrate ISS policy into an organizations segment, mission and enterprise architectures. Enable the automated translation of policy models into human consumable and machinereadable rules. Provide users with the data needed for: o Governance; o o o o Modeling and simulation; Auditing (e.g., security and privacy): Design, Real-time Monitoring, and Forensic; Retention of Institutional Memory; and Lower life-cycle costs Policy Environment: Define Policy Vocabularies that: Offer multiple Policy Language Implementations (e.g., XACML, SAML, and RulesML); Offer Modeling Language Profiles (e.g., UML); Are Domain Vocabulary agnostic; Enable multiple marking (tags, labels or metadata) schemes; and Enable automated translation between policy models, languages and executable rules; Enable the speciation of policies/rules that are enforced at the data level Policy ownership/control rests with the owner/steward of the data asset. IEF Services: Define Services that: Separate the definition of policies (/rules/instructions) from the services employed to enforce them, which will in turn provide users: o With greater control over their data and policy environment; o With the ability to re-host ISS policies to multiple vendor solutions; o With the ability evolve and align policies for specific operational/mission requirements; and o With the ability host multiple policy and data environments on a sheared infrastructure. Ingest policies at run-time without the requirements to disable running services. 8 Information Exchange Framework Reference Architecture, Initial Submission

29 That enable users to manage and administer Policies in running services. Enforcement of ISS policies/rules at the data level, enabling: o Defence-in-Depth strategies rather than perimeter protection ISS Solutions; o Greater fidelity in privacy and security decisions; o Data level redaction and the selective sharing of information using common message structures (e.g., NIEM). General: Reuse existing standards where and whenever possible Vendor neutral specifications, yielding: o Option to reuse existing infrastructure o Multiple heterogeneous implementation options o Leverage existing open-standards. Information Exchange Framework Reference Architecture, Initial Submission 9

30 2 Compliance 2.1 Introduction The Information Exchange Reference Architecture defines five (5) separate information sharing and safeguarding service patterns. Each pattern forms a separate compliance point. An implementer may select to implement one of more of the service patterns. 2.2 Selecting a Compliance Point The IEPPV is a vocabulary specification. It defines a set of concepts that combine to express the rules governing packaging, processing and dissemination of information. The compliance points allow the implementers to select the level of message complexity they need to support. CP1 through CP2c build on the concepts defined in the previous levels. CP-3 provides a set of concepts that enable users to assign information elements to specific information dissemination services. 2.3 Compliance Points To be express compliance to this specification, an implementer must implement all mandatory features of: 1. Policy Administration Point (Clause 9); 2. Policy Decision Point (Clause 10); 3. Common Elements (Clause xx) and 4. At least on following Policy Enforcement Points: a) File Share; b) Electronic Mail ( ); c) Instant Messaging (IM); d) Messaging Middleware; and e) Web Services File Sharing Instant Messaging Messaging Middleware Web Services 10 Information Exchange Framework Reference Architecture, Initial Submission

31 3 Normative References XACML IEPPV Information Exchange Framework Reference Architecture, Initial Submission 11

32 4 Terms and s The focus of this specification is the development of a formal. 12 Information Exchange Framework Reference Architecture, Initial Submission

33 5 Symbols/Acronyms 5.1 Symbols There are no additional symbols defined for this specification. All symbols used in this specification are based on standard UML. Information Exchange Framework Reference Architecture, Initial Submission 13

Business Process Modeling Notation Specification

Business Process Modeling Notation Specification Business Process Modeling Notation Specification This OMG document replaces the submission document and the draft adopted specification (dtc/06-01-01). It is an OMG Final Adopted Specification, which has

More information

Business Process Model and Notation (BPMN)

Business Process Model and Notation (BPMN) Date: August 2009 Business Process Model and Notation (BPMN) FTF Beta 1 for Version 2.0 OMG Document Number: dtc/2009-08-14 Standard document URL: http://www.omg.org/spec/bpmn/2.0 This OMG document replaces

More information

BPMN 2.0 by Example. Version Alpha 8 (non-normative)

BPMN 2.0 by Example. Version Alpha 8 (non-normative) Date: June 2010 BPMN 2.0 by Example Version Alpha 8 (non-normative) OMG Document Number: dtc/2010-06-xx Standard document URL: http://www.omg.org/spec/acronym/1.0/pdf Associated File(s)*: http://www.omg.org/spec/acronym/200xxxxx

More information

ACOT WEBSITE PRIVACY POLICY

ACOT WEBSITE PRIVACY POLICY ACOT WEBSITE PRIVACY POLICY Our commitment to privacy acot.ca (the Website ) is a website owned and operated by The Alberta College of Occupational Therapists ( ACOT ), also referred to as we, us, or our

More information

REMOVE THIS COVER PAGE WHEN DOCUMENT IS READY FOR REVIEW AND SIGNATURE.

REMOVE THIS COVER PAGE WHEN DOCUMENT IS READY FOR REVIEW AND SIGNATURE. Form M12-2500-A Model Non-Proprietary User Agreement July 2015 Edition The Department of Energy has opted to utilize the following agreement for Designated Non- Proprietary User Facilities transactions.

More information

Non-Proprietary User Agreement BETWEEN

Non-Proprietary User Agreement BETWEEN The Department of Energy has opted to utilize the following agreement for Designated Non-Proprietary User Facilities transactions. Because these transactions are widespread across Departmental facilities,

More information

Exhibit C PROGRAM PRODUCTS LICENSE TERMS

Exhibit C PROGRAM PRODUCTS LICENSE TERMS Exhibit C PROGRAM PRODUCTS LICENSE TERMS This Exhibit C to the MobileIron Authorized Training Provider Program Agreement (the Agreement ) sets forth the terms and conditions applicable to Member s use

More information

PERFORCE End User License Agreement for Open Source Software Development

PERFORCE End User License Agreement for Open Source Software Development Perforce Open Source End User License Agreement Page 1 1. Introduction PERFORCE End User License Agreement for Open Source Software Development This is a License Agreement ( Agreement ) between Perforce

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

SUBSCRIPTION SERVICES.

SUBSCRIPTION SERVICES. SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),

More information

IPInfoDB Web Service Agreement

IPInfoDB Web Service Agreement IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

Jozii LLC WEBSITE TERMS OF SERVICE

Jozii LLC WEBSITE TERMS OF SERVICE Jozii LLC WEBSITE TERMS OF SERVICE 1. Acceptance of Terms. Welcome to Jozii. By using our Internet website, you indicate your unconditional acceptance of the following Terms of Service. Please read them

More information

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC.

The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC. TERMS OF USE AGREEMENT BETWEEN USER AND Credit Control, LLC The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC. The Credit Control, LLC Web Site is offered

More information

ADP Ambassador / Referral Rewards Program Terms and Conditions of Use

ADP Ambassador / Referral Rewards Program Terms and Conditions of Use ADP Ambassador / Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") constitute an agreement between ADP Canada Co. ("ADP"), and You and apply to the ADP Canada Ambassador/Referral

More information

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT THIS IS A LEGAL AGREEMENT BETWEEN YOU ("You" or "Your") AND SLICKEDIT INC. ("SlickEdit"). SLICKEDIT IS WILLING TO (1) LICENSE THE SLICKEDIT

More information

CENTARA DATA LLC WEBSITE USER AGREEMENT TERMS AND CONDITIONS OF USE

CENTARA DATA LLC WEBSITE USER AGREEMENT TERMS AND CONDITIONS OF USE CENTARA DATA LLC WEBSITE USER AGREEMENT TERMS AND CONDITIONS OF USE This web site is owned, operated, and hosted by Centara Data LLC which has been contracted to provide online payment processing services

More information

End User License Agreement for the Intel(R) Software Development Products

End User License Agreement for the Intel(R) Software Development Products IMPORTANT - READ BEFORE COPYING, INSTALLING OR USING. Do not copy, install, or use the Materials provided under this license agreement ("Agreement"), until you have carefully read the following terms and

More information

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT This Oracle CRM On Demand Development Addendum (the " CRM On Demand Addendum ") is between you ( Developer ) and the Oracle

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

Software License Agreement

Software License Agreement Software License Agreement GRANT OF LICENSE This Accusoft Corporation ("ACCUSOFT") Agreement ("LICENSE") grants YOU ("LICENSEE") a non-exclusive and non-transferable right to use the trial mode version

More information

AMERICAN INSTITUTES FOR RESEARCH OPEN SOURCE SOFTWARE LICENSE

AMERICAN INSTITUTES FOR RESEARCH OPEN SOURCE SOFTWARE LICENSE AMERICAN INSTITUTES FOR RESEARCH OPEN SOURCE SOFTWARE LICENSE 1. DEFINITIONS. 1.1. "Contributor" means each individual or entity that creates or contributes to the creation of Modifications. 1.2. "Contributor

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT 1. LICENSE 2. TERMINATION Subject to the terms and conditions of this HSS Software License Agreement (the Agreement ), HSS hereby grants to Client (herein

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT This End User License Agreement ( Agreement ) is a legal agreement between you (either as an individual or representing an entity) and The American Institute of Architects (

More information

NEOXEN MODUS METHODOLOGY

NEOXEN MODUS METHODOLOGY NEOXEN MODUS METHODOLOGY RELEASE 5.0.0.1 INTRODUCTION TO QA & SOFTWARE TESTING GUIDE D O C U M E N T A T I O N L I C E N S E This documentation, as well as the software described in it, is furnished under

More information

The Gale Group Subscription and License Agreement

The Gale Group Subscription and License Agreement The Gale Group Subscription and License Agreement This legal document is an agreement between THE GALE GROUP, INC. (herein referred to as Gale ), a Thomson Corporation company, and you, the subscriber

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

FlightMax Flight Situation Display

FlightMax Flight Situation Display FlightMax Flight Situation Display Introduction and Release Notes Part Number 600-0054 Revision 00 Revision History Date Revision Description Sep. 7, 2000 00 Production Release Copyright 2000 Avidyne Corporation

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Inject Design General Terms & Conditions

Inject Design General Terms & Conditions Inject Design General Terms & Conditions Latest Revision: April 2015 www.injectdesign.co.nz Content No. Contents Page No. 00 01 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 General Terms & Conditions

More information

END USER LICENSE AGREEMENT ( EULA )

END USER LICENSE AGREEMENT ( EULA ) END USER LICENSE AGREEMENT ( EULA ) PLEASE READ CAREFULLY THIS EULA IS A LEGAL AGREEMENT BETWEEN YOU, EITHER AS AN INDIVIDUAL, COMPANY OR OTHER LEGAL ENTITY (IN ANY CAPACITY REFERRED TO HEREIN AS END USER,

More information

Terms & Conditions Template

Terms & Conditions Template Terms & Conditions Template AGREEMENT BETWEEN USER AND [INSERT NAME] [INSERT NAME] Web Site is comprised of various Web pages operated by [INSERT NAME]. The [INSERT NAME] Web Site is offered to you conditioned

More information

For Use of Source Code Developed By The Florida Department of Transportation

For Use of Source Code Developed By The Florida Department of Transportation STATE OF FLORIDA DEPARTMENT OF TRANSPORTATION SOFTWARE LICENSE AGREEMENT Other State Agencies Page 1 of 5 For Use of Source Code Developed By The Florida Department of Transportation Software License Agreement

More information

Non-Proprietary User Agreement No. NPUSR00xxxx SAMPLE BETWEEN

Non-Proprietary User Agreement No. NPUSR00xxxx SAMPLE BETWEEN 11//08/2012 ExT JGI - Umbrella The Department of Energy has opted to utilize the following agreement for Designated Non-Proprietary User Facilities transactions. Because these transactions are widespread

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use

ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),

More information

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT

More information

Adaptive System of School Improvement Support Tools (ASSIST ) TERMS AND CONDITIONS

Adaptive System of School Improvement Support Tools (ASSIST ) TERMS AND CONDITIONS Adaptive System of School Improvement Support Tools (ASSIST ) TERMS AND CONDITIONS Effective as of October 1, 2014 IMPORTANT THIS IS A LEGAL AGREEMENT BETWEEN YOU ("You" or the "Authorized User") AND ADVANCE

More information

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) By clicking the Accept button, I signify that I have read and accept the terms below. IMPORTANT - READ BEFORE COPYING, INSTALLING

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc.

AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. The Global Clinical Research Management, Inc. Web Site is comprised of various Web pages operated by Global Clinical Research Management,

More information

AcroTime Workforce Management Time & Labor Human Resources Payroll Service Terms and Conditions

AcroTime Workforce Management Time & Labor Human Resources Payroll Service Terms and Conditions Terms of Agreement Acroprint Time Recorder Company (referred as Acroprint ) grants you access to use its web hosted time and attendance solution AcroTime (referred as Service ), subject to your agreement

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Protective Marking for UK Government

Protective Marking for UK Government Protective Marking for UK Government WHITE PAPER Contents Introduction 3 Regulatory Requirements 3 Government Protective Marking System (GPMS) 3 The Value Beyond Regulatory Requirements 4 Leveraging Other

More information

UNIVERSITY OF NEVADA, LAS VEGAS Master Agreement Agreement No.

UNIVERSITY OF NEVADA, LAS VEGAS Master Agreement Agreement No. UNIVERSITY OF NEVADA, LAS VEGAS Master Agreement Agreement No. This agreement is made effective as of Date (Effective Date), by and between the Board of Regents, Nevada System of Higher Education on behalf

More information

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013

ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 ALMS TERMS OF USE / TERMS OF SERVICE Last Updated: 19 July 2013 Welcome to the Army Learning Management Service (ALMS), which is provided by the United States Army. These Terms of Use / Terms of Service

More information

Extension Module (XMOD): SiteMap Generator

Extension Module (XMOD): SiteMap Generator Extension Module (XMOD): SiteMap Generator 1999-Present Kryptronic, Inc. All rights reserved worldwide. Kryptronic, the Kryptronic logo and all Kryptronic software names and logos are trademarks of Kryptronic,

More information

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered

More information

ALPHA TEST LICENSE AGREEMENT

ALPHA TEST LICENSE AGREEMENT ALPHA TEST LICENSE AGREEMENT IMPORTANT NOTICE! PLEASE READ THIS STATEMENT AND THE ALPHA TEST LICENSE AGREEMENT COMPLETELY BEFORE USING THIS ALPHA SOFTWARE. BY CLICKING ON THE BUTTON MARKED YES BELOW OR

More information

IBM DB2 Data Archive Expert for z/os:

IBM DB2 Data Archive Expert for z/os: Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2

More information

Establishing a business performance management ecosystem.

Establishing a business performance management ecosystem. IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance

More information

MY BRPSKI-DOO IDEA TERMS AND CONDITIONS OF USE

MY BRPSKI-DOO IDEA TERMS AND CONDITIONS OF USE MY BRPSKI-DOO IDEA TERMS AND CONDITIONS OF USE Bombardier Recreational Products Inc. ( BRP ) owns and operates the Internet site located at http://www.skidoo.com and blog on myskidooride.com and idea mail

More information

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1 AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1 NOTICE TO USER: PLEASE READ THIS DOCUMENT CAREFULLY. THIS IS THE CONTRACT BETWEEN YOU AND

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT READ THE TERMS OF THIS AGREEMENT AND ANY PROVIDED SUPPLEMENTAL LICENCE TERMS (COLLECTIVELY "AGREEMENT") CAREFULLY BEFORE USING THE STMICROELECTRONICS SOFTWARE COMPONENTS SUPPLIED

More information

Terms of Use for the REDCap Non Profit End User License Agreement

Terms of Use for the REDCap Non Profit End User License Agreement Close print view Please note that displayed below is *not* the license agreement but only the terms of use for the agreement. Terms of Use for the REDCap Non Profit End User License Agreement This non

More information

MCC TERMS AND CONITIONS

MCC TERMS AND CONITIONS MCC TERMS AND CONITIONS Welcome to MNCred.org, which is owned by Minnesota Credentialing Collaborative, LLC ( we, us or MCC ) a joint effort of the Minnesota Council of Health Plans (MCHP), Minnesota Hospital

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Location: Site Coordinator: Phone:

Location: Site Coordinator: Phone: 8/19/99 revised 12/3/04 GOVERNMENT CONTRACTOR SOFTWARE LICENSE AGREEMENT (SITE) This Agreement is made and entered into this day of, 20, (the Effective Date ) by and between the MASSACHUSETTS INSTITUTE

More information

CBCDashboard Management, LLC Website and Web-Enabled Software End User License Agreement

CBCDashboard Management, LLC Website and Web-Enabled Software End User License Agreement CBCDashboard Management, LLC Website and Web-Enabled Software End User License Agreement CBCDashboard Management, LLC ( CBC Dashboard )website and web-enabled software that you are accessing is licensed

More information

AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses

AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses The International Network of Spinal Cord Injury Nurses Web Site is comprised of various Web pages operated by International

More information

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS IMPORTANT: PLEASE READ BEFORE DOWNLOADING, INSTALLING OR USING THE XANGATI, INC. ("LICENSOR") SOFTWARE YOU HAVE LICENSED ("SOFTWARE"). BY EXECUTING

More information

Software Hosting and End-User License Subscription Agreement

Software Hosting and End-User License Subscription Agreement Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated

More information

AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT

AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT AON HEWITT DEFINED CONTRIBUTION NEXUS PARTICIPATION AGREEMENT Participation Agreement (this Agreement ) made as of the day of, 20, by and among Hewitt Financial Services LLC ( HFS ) and ( Fund Manager

More information

AGREEMENT AND TERMS OF USE

AGREEMENT AND TERMS OF USE AGREEMENT AND TERMS OF USE The website located at www.100womeninhedgefunds.org and the services of 100 Women in Hedge Funds ( 100WHF ) available thereon (collectively, the Site ), together with the networking

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

MTConnect Institute Public Comment and Evaluation License Agreement

MTConnect Institute Public Comment and Evaluation License Agreement MTConnect Institute Public Comment and Evaluation License Agreement Effective 6/10/2015 The Association for Manufacturing Technology, a non-profit organization ( AMT ), and the MTConnect Institute jointly

More information

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

FILEMAKER PRO ADVANCED SOFTWARE LICENSE FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

More information

TERMS & CONDITIONS: LIMITED LICENSE:

TERMS & CONDITIONS: LIMITED LICENSE: TERMS & CONDITIONS: The use of any product, service or feature (the "Materials") available through the internet websites accessible at 4tellus.com, ("Website") by any user of the Website ("You" or "Your"

More information

Real-Time Security for Active Directory

Real-Time Security for Active Directory Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The

More information

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...

More information

DISCLAIMER, TERMS & CONDITIONS OF USE

DISCLAIMER, TERMS & CONDITIONS OF USE DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following

More information

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED SOLARWINDS, INC ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED IMPORTANT -- READ CAREFULLY BEFORE USING THIS SOFTWARE: THIS IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL

More information

Strategic Network Consulting

Strategic Network Consulting Strategic Network Consulting Service Description Document November 2009 Contents 1. Introduction... 2 2. Eligibility and Prerequisites... 2 3. Service Features and Deliverables... 2 4. Customer Responsibilities...

More information

FME SOFTWARE LICENSE AGREEMENT

FME SOFTWARE LICENSE AGREEMENT FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software

More information

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT THE VERTEXFX TRADER API (THE SOFTWARE ) AND THE ACCOMPANYING DOCUMENTATION (THE RELATED MATERIALS ) (COLLECTIVELY, THE PRODUCT ) ARE PROTECTED BY

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

3.4 Ownership. No title to, or ownership of, the Software is transferred to Customer under this Agreement or under the Program.

3.4 Ownership. No title to, or ownership of, the Software is transferred to Customer under this Agreement or under the Program. COREL Higher Education Site License AGREEMENT (Terms and Conditions) 1. Statement of Purpose. The Agreement describes the terms and conditions under which Customer may participate in the COREL Higher Education

More information

IBM Cognos Controller Version 10.2.0. New Features Guide

IBM Cognos Controller Version 10.2.0. New Features Guide IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies

More information

ecopy Business Automation Services Software License Agreement

ecopy Business Automation Services Software License Agreement This ecopy Business Automation Services (this License ) is a legal agreement between you (either an individual or an entity) and Nuance Communications, Inc. It applies to ecopy Business Automation Services

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is entered into as of the installation date of the software by and between Nanotron Technologies GmbH, a German corporation

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002)

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) Whenever LICENSEE licenses software products ( Program(s) as further defined herein), a License Form shall be executed which shall refer to this

More information

Kaiser Permanente Affiliate Link Provider Web Site Application

Kaiser Permanente Affiliate Link Provider Web Site Application Kaiser Foundation Health Plan of Colorado Kaiser Permanente Affiliate Link Provider Web Site Application FOR PROVIDERS CONTRACTED WITH KAISER IN THE COLORADO REGION ONLY Page 1 of 7 Kaiser Permanente Affiliate

More information

ENROLLMENT AGREEMENT FOR QUALIANCE

ENROLLMENT AGREEMENT FOR QUALIANCE ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE THESE TERMS OF USE CONTAIN LEGAL OBLIGATIONS. PLEASE READ THESE TERMS OF USE BEFORE USING THIS WEBSITE. Acceptance of these Terms of Use and any

More information

VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT

VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT Florida Keys Multiple Listing Service, Inc. VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT Florida Keys MLS, Inc. 92410 Overseas Hwy, Ste. 11 Tavernier FL 33070 305-852-92940 305-852-0716 (fax) www.flexmls.com

More information

Please read these Terms and Conditions carefully. They Govern your access and use of our Website and services on it.

Please read these Terms and Conditions carefully. They Govern your access and use of our Website and services on it. Website T&Cs Link Credit Union Ltd Please read these Terms and Conditions carefully. They Govern your access and use of our Website and services on it. ABOUT US Link Credit Union Ltd owns and operates

More information