Policy Management in a COA

Size: px
Start display at page:

Download "Policy Management in a COA"

Transcription

1 Policy Management in a O John rnold hief Security rchitect, UK apgemini The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 1

2 De-Perimeterised Organisations People Devices Movements between organisations are built-in Policies Organisation Information Risks ontracts & Processes The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 2

3 Security Policy - Terminology Human Readable Security Policy is a security policy that is intended to be interpreted by humans in making security decisions. E.g. a security procedure Machine Readable Security Policy is a security policy that is intended to be interpreted by computer programs in making security decisions. E.g. an L Governance Policy is a policy that describes how a human or machine readable policy is determined or agreed. E.g. Most ISO27001 security policies. In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 3

4 urrent security policy approaches and the problems with them Machine readable policies tend to be lists rather than rules Machine readable policies are designed to be enforced by infrastructure rather than applications Machine readable policies not linked to business requirements pplication security policies are embedded into application code Organisations assume their policies are their own Use of Ls per resource Difficult to change as business needs change. One size fits all approach; cannot relate policies to business benefit Policies do not implement requirements properly and it is not clear how to change them May not meet business requirements. Difficult to change as business needs change Untrue where organisations handle information on behalf of someone else, the original information owner is a stakeholder in the policy Enormous number of Ls to manage In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 4

5 Handling policies better a new policy enforcement architecture User gent redentials/ Identity ccess Request/ ccess Response Policy Enforcement Point Decision Request/ Decision Response uthentication Service ttributes ttribute & uthentication uthority ttributes Policy Decision Point Policies Policy dministration Point Policies Policy uthority In collaboration with lient or Partner logo DOUMENT TITLE opyright apgemini 2008 ll Rights Reserved 5 22 nd 5

6 Handling policies better rich policy language Replace Ls by a machine readable policy expressed in a rich policy language rich policy language expresses access decisions in terms of the relevant contract states, e.g. this asset can be accessed by a direct employee of grade 4 and above, or any employee of a joint venture of a particular type There is a standard for expressing security policies: XML benefit of using standard security policies a policy for an asset can be specified once, then actioned by many different organisations as they pass the asset around The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 6

7 Handling policies better more realistic governance patterns Security policy governance is the process whereby security policies are specified, tested and agreed. Some common patterns: reator control Subject ontrol N-man rule ontent based control ccountability orporate record Many information assets have more than one stakeholder and hence more than one policy stakeholder. The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 7

8 Handling security policies better - security policy as a service Most organisations arent capable, or motivated, to develop their own security policies It would be better for suitably qualified organisations to specialise in creating standard security policy services to cover areas such as ompliance Hardening Product-specific policies This requires standardisation of the policy decision and query language (e.g. XML) but also of the enforcement hooks to be put into applications. The ig Picture for usiness Technology apgemini 2009 ndy Mulholland 8

IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services.

IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services. TP: 443 HTTP: 80 SIP/TLS: 5061 SIP/TLS: 5061 HTTPS: 443 IM and Presence SIP traffic: signaling and IM XMPP traffic HTTPS traffic MSMQ traffic LS traffic HTTPS: 4443 Director proxies Web traffic to destination

More information

<Insert Picture Here> Understanding Identity as a Service

<Insert Picture Here> Understanding Identity as a Service nderstanding dentity as a ervice ishant Kaushik Principal rchitect, Oracle dentity anagement efining dentity elationships ser * Personal & orporate nformation dentity esources (credentials,

More information

Programme Specification and Curriculum Map for BA (Hons) Business Management

Programme Specification and Curriculum Map for BA (Hons) Business Management Programme Specification and urriculum Map for (Hons) usiness Management. Programme title usiness Management. warding institution Middlesex University. Teaching institution Middlesex University. Programme

More information

How To Improve Your Salary At The Finance Sector Union Of Ustralia

How To Improve Your Salary At The Finance Sector Union Of Ustralia Secure PY @ FSU Summary Proposed lassification and Pay Model: Improved Proposal During 2013/14 enterprise bargaining negotiations FSU members raised concerns with the broken pay model at. In the 2014 greement,

More information

Microsoft Dynamics NAV 2013 R2 Feature Comparison Tool

Microsoft Dynamics NAV 2013 R2 Feature Comparison Tool Microsoft Dynamics NAV 2013 R2 Feature Comparison Tool Microsoft Dynamics NAV Enhancements Times change. Technologies change. Business needs change. And organizations like yours need to change to keep

More information

CA SiteMinder. SDK Overview. r6.0 SP6/6.x QMR 6. Second Edition

CA SiteMinder. SDK Overview. r6.0 SP6/6.x QMR 6. Second Edition A SiteMinder SDK Overview r6.0 SP6/6.x QMR 6 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

UNIVERSITY OF LINCOLN JOB DESCRIPTION. Intelligence. REPORTS TO: Senior Business Intelligence Developer. GRADE: 6 POST NUMBER: FS6094 DATE: March 2013

UNIVERSITY OF LINCOLN JOB DESCRIPTION. Intelligence. REPORTS TO: Senior Business Intelligence Developer. GRADE: 6 POST NUMBER: FS6094 DATE: March 2013 UNVRSTY OF LNCOLN JOB SCRPTON JOB TTL: Business ntelligence eveloper PRTMNT: Planning & Business ntelligence LOCTON: Brayford RPORTS TO: Senior Business ntelligence eveloper GR: 6 POST NUMBR: FS6094 T:

More information

Embedded Linux Conference: OIC Security Model and Vision. Ned Smith Intel

Embedded Linux Conference: OIC Security Model and Vision. Ned Smith Intel Embedded Linux onference: Security Model and Vision Ned Smith ntel 1 Legal Disclaimer USE, REPRDUTN AND/R DSLSURE S SUBJET T THE RESTRTNS AS STATED N RSNDA #RS04780-A BETWEEN S AND NTEL FR PRPRETARY NFRMATN

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

AAdobe Systems Incorporated. Controlling Access to Adobe Creative Cloud Services INTRODUCTION SYNOPSIS

AAdobe Systems Incorporated. Controlling Access to Adobe Creative Cloud Services INTRODUCTION SYNOPSIS Controlling ccess to dobe Creative Cloud Services INTRODUCTION This document is written for dobe customers who for reasons of security or network access cost may wish to restrict access to Creative Cloud

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

STATEMENT OF WORK FOR HIPAA SECURITY RISK ANALYSIS

STATEMENT OF WORK FOR HIPAA SECURITY RISK ANALYSIS STTEMENT OF WOK FO HIP SECUITY ISK NLYSIS pril 14, 2004 Prepared by: Bob Matthews HIP Compliance Services Manager HIP cademy 4320 Winfield oad Warrenville, IL 60555 www.hipcademy.net Contact: 877.899.9974

More information

Work Breakdown Structure

Work Breakdown Structure Work Breakdown tructure projectethod he ltimate ethodology urrent tep: ext tep: rev tep: Define cope Develop chedule ssign roject anager Work Breakdown tructure se this template to create a Work Breakdown

More information

FM Administration Assistant Customer Services EHA1389-0715

FM Administration Assistant Customer Services EHA1389-0715 It is important to note that this job description is a guide to the work you will initially be required to undertake. It may be changed from time to time to meet changing circumstances. It does not form

More information

HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them?

HIPAA Security: Complying with the HIPAA Security Rule Implementation Specifications Are You Correctly Addressing Them? HIP Security: Complying with the HIP Security ule Implementation Specifications re You Correctly ddressing Them? The Seventh National HIP Summit Monday, September 15, 2003 Tom Walsh, CISSP 6108 West 121

More information

Chartered Institute of Management Accountants. Chartered Institute of Management Accountants. Syllabus overview

Chartered Institute of Management Accountants. Chartered Institute of Management Accountants. Syllabus overview The IM ertificate in Shared Services hartered Institute of Management ccountants hartered Institute of Management ccountants Syllabus overview Introduction Shared Services as an industry has grown enormously

More information

Executive County Administrators

Executive County Administrators omp Plan - lassification List Executive ounty Administrators lassification Annual A Annual Agricultural ommissioner/sealer $143,158 $146,7 Assistant Executive Officer-Finance and Administration A $211,126

More information

Qualification details

Qualification details Qualification details Title New Zealand Diploma in Systems Administration (Level 6) Version 1 Qualification type Diploma Level 6 Credits 120 NZSCED 020305 Information Technology > Information Systems >

More information

INFORMATION SYSTEMS EXAMINATIONS BOARD

INFORMATION SYSTEMS EXAMINATIONS BOARD Sample FITSM Paper 4v6a INFORMTION SYSTEMS EXMINTIONS OR Foundation ertificate in IT Service Management Sample Examination Paper 4v6 OPYING OF THIS PPER IS STRITLY FORIEN WITHOUT PRIOR WRITTEN ONSENT FROM

More information

Intermediate Technology Program 1 What to do with an Internet Lead

Intermediate Technology Program 1 What to do with an Internet Lead RE/MX Mid-States and Dixie Region Intermediate Technology Program 1 What to do with an Internet Lead gent Name: User Name: Password: Page 7/17/2008 Table of ontents MUST RED! efore you begin please make

More information

COMAH Competent Authority

COMAH Competent Authority OMH ompetent uthority Inspection of Electrical, ontrol and Instrumentation Systems at OMH Establishments (Operational elivery Guide) Page 1 of 23 Introduction 1 This elivery Guide (G) describes how the

More information

An Introduction to Book Industry Communication

An Introduction to Book Industry Communication An Introduction to Book Industry Communication Peter Kilborn ARLIS meeting, 20 May 2009 About BIC Set up in 1991 by the Publishers Association, Booksellers Association, British Library and CILIP Funded

More information

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform

Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.

More information

FEDERAL ACQUISITION REGULATION (FAR) AND DEPARTMENT OF DEFENSE FAR (DFAR) SUPPLEMENT ARE INCORPORATED BY REFERENCE HEREIN:

FEDERAL ACQUISITION REGULATION (FAR) AND DEPARTMENT OF DEFENSE FAR (DFAR) SUPPLEMENT ARE INCORPORATED BY REFERENCE HEREIN: FEDERL QUISITION REGULTION (FR) ND DEPRTMENT OF DEFENSE FR (DFR) SUPPLEMENT RE INORPORTED Y REFERENE HEREIN: Legend of Limited pplicability: pplies to all P.O.s pplies if P.O. is greater than $100,000

More information

Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)

Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:

More information

Hertfordshire Higher Education Consortium Construction Management

Hertfordshire Higher Education Consortium Construction Management Hertfordshire Higher Education Consortium Construction Management HNC Foundation Degree Sc C Foundation Degree Foundation Degree What is a Foundation Degree? Foundation Degrees are university level degree

More information

Standards in health informatics

Standards in health informatics Standards in health informatics EVELYN J.S. HOVENGA Standards are the key towards facilitating the sharing and exchange of information between departments, health agencies and health workers. They are

More information

service description ANPR in the Cloud - Project Management Specialist Cloud Services easy to adopt, easy to use, easy to leave

service description ANPR in the Cloud - Project Management Specialist Cloud Services easy to adopt, easy to use, easy to leave Solutions to improve roads, journeys and communities easy to adopt, easy to use, easy to leave service description ANPR in the Cloud - Project Management Specialist Cloud Services Introduction Vysionics

More information

Programme Specification and Curriculum Map for BA (Hons) Business Management (Human Resources)

Programme Specification and Curriculum Map for BA (Hons) Business Management (Human Resources) Programme Specification and urriculum Map for (Hons) usiness (Human Resources). Programme title usiness (Human Resources). warding institution Middlesex University. Teaching institution Middlesex University.

More information

Data Protection Audit Report - Southampton City Council

Data Protection Audit Report - Southampton City Council Southampton City Council Data protection audit report Executive summary March 2016 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection

More information

Qualification details

Qualification details Qualification details Title New Zealand Diploma in Business (with strands in Accounting, Administration and Technology, Leadership and Management, and Project Management) (Level 5) Version 1 Qualification

More information

An Introduction to Novell Distributed Print Services (NDPS)

An Introduction to Novell Distributed Print Services (NDPS) A P R I L 1 9 9 8 N O V E L L R E S E A R H An Introduction to Novell Distributed Print s (NDPS) MARK E. MKELL Editorial Intern Novell Developer Information RAIG WHITTLE Software Engineer Novell Products

More information

Electronic Health Information Exchange. Volume 9: Information Privacy and Security. British Columbia Professional and Software Conformance Standards

Electronic Health Information Exchange. Volume 9: Information Privacy and Security. British Columbia Professional and Software Conformance Standards British olumbia Professional and Software onformance Standards Electronic Health Information Exchange Version1.2 2015-05-29 Security lassification: Low Sensitivity opyright Notice opyright 2015 Province

More information

How a Cloud Service Provider Can Offer Adequate Security to its Customers

How a Cloud Service Provider Can Offer Adequate Security to its Customers royal holloway s, How a Cloud Service Provider Can Offer Adequate Security to its Customers What security assurances can cloud service providers give their customers? This article examines whether current

More information

Survey Results Consultation on Outsourcing of Financial Assessment and Benefits Advice, and Financial Adults Safeguarding, Services

Survey Results Consultation on Outsourcing of Financial Assessment and Benefits Advice, and Financial Adults Safeguarding, Services Appendix 1 Survey Results Consultation on Outsourcing of Financial Assessment and Benefits Advice, and Financial Adults Safeguarding, Services Introduction This report details the results of surveys conducted

More information

Job Description. Director of Operations, UK Payments Administration Ltd

Job Description. Director of Operations, UK Payments Administration Ltd Job Description Job Title: Head of HR ompany: UK Payments Administration Ltd Reporting To: Director of Operations, UK Payments Administration Ltd Salary and: Human Resources Unit The Human Resources (HR)

More information

A guide to Personal Budgets

A guide to Personal Budgets A guide to Personal Budgets Easy read format June 2013 Personal Budgets - more information These organisations can tell you more about self-directing your support and Personal Budgets: Cornwall Council

More information

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8 THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,

More information

Programme Specification and Curriculum Map for MA Marketing Management

Programme Specification and Curriculum Map for MA Marketing Management Programme Specification and urriculum Map for M Marketing Management 1. Programme title M Marketing Management 2. warding institution Middlesex University 3. Teaching institution Middlesex University 4.

More information

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data

More information

Using Your Personal Information

Using Your Personal Information Important Using Your Personal Information A guide to how your personal information may be used by the Virgin Money Group and other organisations such as Credit Reference and Fraud Prevention Agencies.

More information

Data Management Software

Data Management Software User Guide IM/T EN Issue 1 ata Management Software utohart The ompany We are an established world force in the design and manufacture of instrumentation for industrial process control, flow measurement,

More information

3.5 IPv6 Forum Certified Security Course, Engineer, Trainer & Certification (GOLD)

3.5 IPv6 Forum Certified Security Course, Engineer, Trainer & Certification (GOLD) 3.5 IPv6 Forum Certified Security Course, Engineer, Trainer & Certification (GOLD) The IPv6 Forum Certified Security Program (Security Course, Security Engineer, Security Trainer and Security Degree Exams

More information

PRINCE2 Passport Sample Papers

PRINCE2 Passport Sample Papers PRINE2 Passport Sample Papers Introduction This document is comprised of 4 separate examination papers. There are two sample Practitioner Papers and two sample Practitioner Re-Registration Papers which

More information

Series B Information on the Transposition of Directive 2006/24/EC

Series B Information on the Transposition of Directive 2006/24/EC DTRET/EXPGRP (2009) 5 FINL 03 12.2009 EXPERTS GROUP "THE PLTFORM FOR ELECTRONIC DT RETENTION FOR THE INVESTIGTION, DETECTION ND PROSECUTION OF SERIOUS CRIME" ESTLISHED Y COMMISSION DECISION 2008/324/EC

More information

White Paper. Improved Delivery and Management of Critical Information: Wills, Probate, Inheritance Planning

White Paper. Improved Delivery and Management of Critical Information: Wills, Probate, Inheritance Planning White Paper Improved Delivery and Management of Critical Information: Wills, Probate, Inheritance Planning Author Document Number Revision Issue Date Copyright : : : : : Ben Martin WHP-1009 V2.2 January

More information

INCOME DRAWDOWN DEATH BENEFITS

INCOME DRAWDOWN DEATH BENEFITS For professional advisers INCOME DRWDOWN DETH BENEFITS Pension Portfolio Technical Information It s now easier than ever for your clients to pass on any remaining money in their personal pension or income

More information

HIPAA and HITECH Act. Compliance Guide

HIPAA and HITECH Act. Compliance Guide HIP and HITECH ct Compliance Guide ugust 2012 What is HIP and the HITECH ct? Like most other industries, healthcare is moving away from paper processes to rely more heavily on the use of electronic information

More information

Enterprise Application Integration (EAI) Techniques

Enterprise Application Integration (EAI) Techniques Enterprise Application Integration (EAI) Techniques The development of technology over the years has led to most systems within an organisation existing in heterogeneous environments. That is to say, different

More information

Guidance on Risk Management, Internal Control and Related Financial and Business Reporting

Guidance on Risk Management, Internal Control and Related Financial and Business Reporting Guidance Corporate Governance Financial Reporting Council September 2014 Guidance on Risk Management, Internal Control and Related Financial and Business Reporting The FRC is responsible for promoting

More information

VERITAS File Server Edition Managing Consolidated File Servers for Performance and Availability

VERITAS File Server Edition Managing Consolidated File Servers for Performance and Availability VERITS File Server Edition Managing onsolidated File Servers for Performance and vailability Table of ontents Introduction...1 The VERITS File Server Edition...2 onsolidating File Servers...3 File Server

More information

Position Title: Application Support Team Leader Location: Sydney Department: Development Reports to (Title): Service Delivery Manager

Position Title: Application Support Team Leader Location: Sydney Department: Development Reports to (Title): Service Delivery Manager Position Title: Application Support Team Leader Location: Sydney Department: Development Reports to (Title): Service Delivery Manager General Purpose of the Position The Level 2 Applications Support team

More information

Chief Information Office 2009-10 Business Plan

Chief Information Office 2009-10 Business Plan hief Information Office 2009-10 Business Plan hief Information Office Business Plan 2009-10 Table of ontents 1. Message from the hief Information Officer 1 2. Vision 2 3. Mission 2 4. Mandate 2 5. Link

More information

Data ownership within governance: getting it right

Data ownership within governance: getting it right Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data

More information

Managing Complex Outsourced Projects

Managing Complex Outsourced Projects New Book Published by H Incorporated Managing omplex Outsourced Projects By: regory. arrett, PM, PMP Winner of PMI s Project Management xcellence ward Quick Results urvey Question #1 Which of the following

More information

Data analytics the changing use of data within Internal Audit

Data analytics the changing use of data within Internal Audit Data analytics the changing use of data within Internal Kiran Sudhakar Associate Director, Grant Thornton UK Overview Areas of discussion Introduction Common questions asked Evolution of data analytics

More information

NIR-Online Getting Started Guide

NIR-Online Getting Started Guide NIR-Online Getting Started Guide The purpose of this document is to provide new users with some basic information about NIR-Online and their clyx.net account. The following areas will be covered by this

More information

Office for Nuclear Regulation

Office for Nuclear Regulation ONR GUIDE LC17 Management Systems Document Type: ONR Nuclear Safety Technical Inspection Guide Unique Document ID and Revision No: NS-INSP-GD-017 Revision 2 Date Issued: November 2012 Review Date: November

More information

What happens when you sign up to the ZoneFox Service?

What happens when you sign up to the ZoneFox Service? What happens when you sign up to the ZoneFox Service? Overview According to the highly respected Verizon 2014 Data Breach Investigations Report 1, 2013 set a new record for the number of data breaches

More information

Abstract www.softmetaware.com/whitepapers.html

Abstract www.softmetaware.com/whitepapers.html Abstract We would like to understand the interests of our target audience. Please register at www.softmetaware.com/whitepapers.html to provide us with some information about yourself, and to obtain access

More information

Specialisation International Law

Specialisation International Law Specialisation International Law HAN-027 School of Law Specialisation International Law Introduction The structure of the program In a world of globalisation international legal dimensions get more important

More information

Data Integration and Exchange. L. Libkin 1 Data Integration and Exchange

Data Integration and Exchange. L. Libkin 1 Data Integration and Exchange Data Integration and Exchange L. Libkin 1 Data Integration and Exchange Traditional approach to databases A single large repository of data. Database administrator in charge of access to data. Users interact

More information

Reasoning Component Architecture

Reasoning Component Architecture Architecture of a Spam Filter Application By Avi Pfeffer A spam filter consists of two components. In this article, based on my book Practical Probabilistic Programming, first describe the architecture

More information

An Introduction to the ECSS Software Standards

An Introduction to the ECSS Software Standards An Introduction to the ECSS Software Standards Abstract This introduces the background, context, and rationale for the creation of the ECSS standards system presented in this course. Addresses the concept

More information

VMware AlwaysOn Desktop Design Guide

VMware AlwaysOn Desktop Design Guide VMware lwayson Desktop Design Guide Version 2.1 WHITE PPER Table of Contents bout Design Guides........................................................ 3 Introduction.... 3 udience... 3 usiness Case...

More information

NC DIGITAL MEDIA COMPUTING

NC DIGITAL MEDIA COMPUTING SCHOOL OF COMPUTING NC DIGITAL MEDIA COMPUTING NC COMPUTING: TECHNICAL SUPPORT (LEVEL 5&6) NC COMPUTER ARTS & ANIMATION NQ COMPUTING SOFTWARE DEVELOPMENT HND 3D COMPUTER ANIMATION HNC COMPUTING HND INFORMATION

More information

This policy applies to all policies and procedures and supporting documentation such as work instructions and templates at the Whyalla City Council.

This policy applies to all policies and procedures and supporting documentation such as work instructions and templates at the Whyalla City Council. Page 1 of 6 1. POLICY OBJECTIVE It is critical that the Corporation of the City of Whyalla develops and continues to review and amend in a consistent manner, a broad range of both Council approved (public)

More information

HIPAA compliance. Guide. and HIPAA compliance. gotomeeting.com

HIPAA compliance. Guide. and HIPAA compliance. gotomeeting.com and HIP compliance 2 The Health Insurance Portability and ccountability ct (HIP) calls for privacy and security standards that protect the confidentiality and integrity of patient health information. Specifically,

More information

Digital Rights Management - The Difference Between DPM and CM

Digital Rights Management - The Difference Between DPM and CM WHITEPAPER SERIES 2003 IPR SYSTEMS Level 12, 77 Castlereagh Street Sydney, NSW 2000, AUSTRALIA info@iprsystems.com http://www.iprsystems.com Driving Content Management With Digital Rights Management Dr

More information

Management of Physical Assets

Management of Physical Assets Management of Physical Assets - Concepts to Reality Presenter: Ernst Krauss, Director, Asset Management Council Slide 1 Managing Assets is about Managing technical complexity Building and maintaining relationships

More information

Understanding unit-linked funds

Understanding unit-linked funds Understanding unit-linked funds Contents 02 What types of unit linked funds are there? 03 How does Standard Life calculate the value of its funds? 05 How are the prices of the units calculated? 06 How

More information

STAR Deutschland GmbH

STAR Deutschland GmbH STAR Deutschland GmbH Your partner for customised technical solutions in translation and information management STAR Group Your single-source partner for corporate product communication STAR Deutschland

More information

MSc Sports Management

MSc Sports Management MSc Sports Management Programme Specification Primary Purpose ourse management, monitoring and quality assurance. Secondary Purpose etailed information for students, staff and employers. urrent students

More information

They re Chartered. A Clear Guide to Selling a Home

They re Chartered. A Clear Guide to Selling a Home SCSI A Guide to Selling Property A5 25/07/2014 11:04 Check. Page 1 They re Chartered. A Clear Guide to Selling a Home Contents Page Introduction 1 Decided to sell? 2 The process of selling 2 Using local

More information

Business Continuity Management Policy and Framework

Business Continuity Management Policy and Framework Management Policy and Framework Version: Produced by: Date Produced: Approved by: Updated: 7 University Manager with the assistance of the Operational Group 11 th March 2010 Steering Group (14 December

More information

IMS 11: Moving Your Business Forward

IMS 11: Moving Your Business Forward 11: Moving Your Business Forward Betty atterson IBM Distinguished Engineer IMS Development IBM Silicon Valley Laboratory November 18, 2008 Introducing IMS Version 11 IMS Version 11 Announced September

More information

Principal Lecturer in Mental Health Nursing. School of Health and Social Care, College of Social Science

Principal Lecturer in Mental Health Nursing. School of Health and Social Care, College of Social Science JOB SCRPTON JOB TTL: SCHOOL: POST NUMBR: LOCTON: RPORTS TO: Principal Lecturer in Mental Health Nursing School of Health and Social Care, College of Social Science HLSS2374 Brayford Campus eputy Head of

More information

Describing Electronic Health Records Using XML Schema

Describing Electronic Health Records Using XML Schema Describing Electronic Health Records Using XML Schema Bird LJ, Goodchild A and Sue H R for Enterprise Distributed Systems (DST Pty Ltd) Level 7, GP South, The University of Queensland, Qld, 4072, Australia.

More information

Institutional Repositories: Staff and Skills requirements

Institutional Repositories: Staff and Skills requirements SHERPA Document Institutional Repositories: Staff and Skills requirements 8th August 2007 Circulation PUBLIC Mary Robinson Introduction This document began in response to requests received by the core

More information

Programming Languages

Programming Languages Programming Languages Qing Yi Course web site: www.cs.utsa.edu/~qingyi/cs3723 cs3723 1 A little about myself Qing Yi Ph.D. Rice University, USA. Assistant Professor, Department of Computer Science Office:

More information

BARNET AND SOUTHGATE COLLEGE JOB DESCRIPTION

BARNET AND SOUTHGATE COLLEGE JOB DESCRIPTION BRNET ND SOUTHGTE COLLEGE JOB DESCRIPTION JOB TITLE: Marketing and Communications Team Leader SLRY GRDE: PO 2 HOURS: 36 hours per week PRIMRY LOCTION: PURPOSE OF POST: RESPONSIBLE TO: Grahame Park site,

More information

INFORMATION GOVERNANCE STRATEGY NO.CG02

INFORMATION GOVERNANCE STRATEGY NO.CG02 INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.

More information

IP HEALTHCHECK SERIES. NoN-DISCLoSuRE AgREEmENTS. Intellectual Property Office is an operating name of the Patent Office

IP HEALTHCHECK SERIES. NoN-DISCLoSuRE AgREEmENTS. Intellectual Property Office is an operating name of the Patent Office IP HEALTHCHECK SERIES NoN-DISCLoSuRE AgREEmENTS Intellectual Property Office is an operating name of the Patent Office This booklet forms part of our IP Healthcheck series, a suite of booklets and online

More information

Energy Efficient Systems

Energy Efficient Systems Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm

More information

AAMI GENERAL INSURANCE CUSTOMER PRIVACY STATEMENT

AAMI GENERAL INSURANCE CUSTOMER PRIVACY STATEMENT AAMI GENERAL INSURANCE CUSTOMER PRIVACY STATEMENT Privacy is Important especially when you consider the number of ways we communicate and interact these days. That s why we ve put together this statement.

More information

An Introduction to the PRINCE2 project methodology by Ruth Court from FTC Kaplan

An Introduction to the PRINCE2 project methodology by Ruth Court from FTC Kaplan An Introduction to the PRINCE2 project methodology by Ruth Court from FTC Kaplan Of interest to students of Paper P5 Integrated Management. Increasingly, there seems to be a greater recognition of the

More information

User Equipment and Enterprise Mobility Infrastructure

User Equipment and Enterprise Mobility Infrastructure Mobility apability Package 30 July 2012 The Mobility apability Package describes the Enterprise Mobility rchitecture, a layered security approach for using commercial devices and networks to securely connect

More information

Key Responsibility 2. Key Responsibility 3

Key Responsibility 2. Key Responsibility 3 UNVRSTY OF LNCOLN JOB SCRPTON JOB TTL: ccounts Receivable Supervisor PRTMNT: Finance LOCTON: Brayford Campus RPORTS TO: Finance Manager (Students and Student Systems) GR: 5 POST NUMBR: FS6048 T: November

More information

Social Care, Health and Housing Substance Misuse Team. How can we help? www.carmarthenshire.gov.uk/socialcare

Social Care, Health and Housing Substance Misuse Team. How can we help? www.carmarthenshire.gov.uk/socialcare Social Care, Health and Housing Substance Misuse Team How can we help? www.carmarthenshire.gov.uk/socialcare If you require this information in large print, Braille or on Audio please telephone 01267 228703

More information

A print infrastructure that guarantees efficiency, productivity and cost savings.

A print infrastructure that guarantees efficiency, productivity and cost savings. A print infrastructure that guarantees efficiency, productivity and cost savings. Managed Print Services you can A Canon Managed Print Service genuinely manages your print environment to deliver significant

More information

I. Personal data and its use in the business to business environment.

I. Personal data and its use in the business to business environment. RESPONSE FROM THE DIRECT MARKETING ASSOCIATION (UK) LTD. TO THE EUROPEAN COMMISSION'S CONSULTATION ON THE IMPLEMENTATION OF DIRECTIVE 95/46 EC ON THE PROTECTION OF INDIVIDUALS WITH REGARD TO THE PROCESSING

More information

Qualification details

Qualification details Qualification details PLEASE note that this strand to the proposed level 5 diploma will shortly be submitted for approval to develop further. What follows here is the Project Management strand with the

More information

Certa Qualification Unit Report

Certa Qualification Unit Report Certa Qualification Unit Report Certa, OCN House, Lower Warrengate, Wakefield, WF1 1S Telephone 01924 434 600 Qualification Title: QCF ID: Certa Entry Level ward in Work Preparation for usiness and dministration

More information

Prepublication Requirements

Prepublication Requirements Issued December 18, 2013 Prepublication Requirements The Joint ommission has approved the following revisions for prepublication. While revised requirements are published in the semiannual updates to the

More information

Kanban vs Scrum. Henrik Kniberg - Crisp AB Agile coach & Java guy. A practical guide. Deep Lean, Stockholm May 19, 2009

Kanban vs Scrum. Henrik Kniberg - Crisp AB Agile coach & Java guy. A practical guide. Deep Lean, Stockholm May 19, 2009 Henrik Kniberg - risp gile coach & Java guy Kanban vs Scrum practical guide eep Lean, Stockholm May 19, 009 ofounder / TO of Goyada (mobile services) 30 developers Lead architect at ce Interactive (gaming)

More information

ANSYS EKM Overview. What is EKM?

ANSYS EKM Overview. What is EKM? ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes

More information

Mapping and Geographic Information Systems Professional Services

Mapping and Geographic Information Systems Professional Services Mapping and Geographic Information Systems Professional Services G-Cloud Services RM 1557 Service Definition Esri UK GCloud 5 Lot 4 Specialist Services Government Procurement Service Acknowledgement Esri

More information

Certification of Electronic Health Record systems (EHR s)

Certification of Electronic Health Record systems (EHR s) Certification of Electronic Health Record systems (EHR s) The European Inventory of Quality Criteria Georges J.E. DE MOOR, M.D., Ph.D. EUROREC EuroRec The «European Institute for Health Records» A not-for-profit

More information