CPIT Aoraki ICT Asset and Media Security Standard

Size: px
Start display at page:

Download "CPIT Aoraki ICT Asset and Media Security Standard"

Transcription

1 CPIT Araki Crprate Services Divisin: ICT This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic. Knwn as CPIT Araki the new rganisatin will trade under this name until rebranded during CPIT Araki ICT Asset and Media Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument 121d Principles Infrmatin Cmmunicatin Technlgy Divisin Security Plicy Security Standard, aligned with Security Standards Guidelines and Prcedures AS/NZS ISO/IEC 27001: 2006 fr Infrmatin Security Management

2 CPIT Araki Crprate Services Divisin: ICT Cntents 1 INTRODUCTION COLLECTING AND RECORDING ICT ASSET INFORMATION ICT HARDWARE ICT Hardware Standards ICT MEDIA STANDARDS Strage and Transprting Restricted Media Dispsal and Media Sanitisatin Standards ICT Asset and Media Security Standard Page 2 f 13

3 CPIT Araki Crprate Services Divisin: ICT ICT Asset and Media Security Standard Purpse This standard defines the recmmended security practices fr Asset and Media Management. It includes prcesses fr mnitring security n ICT assets, recrding f ICT asset infrmatin and mnitring f assets. In additin it cntains recmmended security measures fr all ICT equipment and media. This standard applies t all ICT assets and services prvided acrss CPIT sites. Authrised By: Dcument Owner ICT Directr Service Desk and Prcurement Manager Date f Issue: 15 March 2012 Review date: Nvember 2014 Versin: 2.2 References: This dcument shuld be read in cnjunctin with the ICT Security Plicy. In additin it shuld be read in cnjunctin with the fllwing ICT Security Standards: 1. Physical and Envirnmental Security Standard 2. Human Resurces ICT Security Standard 3. Cmmunicatins and Operatins Management Standard 4. Access Cntrl Security Standard 5. Infrmatin Systems Acquisitin, Develpment and Maintenance Security Standard ICT Asset and Media Security Standard Page 3 f 13

4 CPIT Araki Crprate Services Divisin: ICT 1 INTRODUCTION ICT equipment supprts the business prcesses and prvides business functinality at the Institutin. It is essential that the ICT equipment that prvides these services is well managed and prtected thrugh the apprpriate security standards and prcesses that fllw recmmended ICT best practices. The bjective f this security standard is t define the recmmended prcess fr the ICT asset lifecycle management. The standard includes references t ICT best practices including the IT Infrastructure Library (ITIL). ITIL is a series f prcess and practices fr IT, t aid the implementatin f an IT Service Management framewrk. The fllwing tpics are cvered: Asset Management ICT Equipment ICT Media ICT Dispsal Standards t cntrl access t ICT services and particularly manage access t ICT secure facilities. Standards fr ICT equipment prcurement and cnfiguratin t maintain the integrity and availability f ICT services. Standards fr the strage and transprtatin f ICT media t prtect the integrity f infrmatin held n data strage within the Institutin. Standards fr dispsal, t ensure apprpriate prcesses are fllwed fr sensitive infrmatin cntained n ICT media. ICT Asset and Media Security Standard Page 4 f 13

5 CPIT Araki Crprate Services Divisin: ICT 2 COLLECTING AND RECORDING ICT ASSET INFORMATION ICT Asset Lifecycle Management refers t the cradle t grave prcess f infrmatin n ICT hardware, sftware and assciated peripherals, prcured, managed and dispsed f. Asset infrmatin is an imprtant inventry t maintain. Asset inventries can be used fr audits n ICT assets, recrd details fr legal r regulatry returns and t supprt asset replacement prcesses. As part f the wider service management prgramme it is imprtant t identify and recrd ICT assets which can be referenced during r fllwing a security incident. Fr example: theft f an ICT asset r t determine the risk acrss assets when a security weakness has been identified. This standard recmmends fllwing the ITIL best practice guidelines fr asset infrmatin cllectin and recrding. ICT assets include but are nt limited t: cmputers, sftware, tablet devices, telephny devices, cmmunicatins equipment (ruters, switches), assciated ICT hardware (including racks, wiring frames, UPS) and specialist ICT equipment (like GPS units, pltters, CAD equipment) nrmally purchased thrugh the ICT prcurement prcess. Excluded are CPIT telephny devices and lw cst peripheral devices where nt practicable. The fllwing standards are recmmended: All ICT assets are t be recrded within ICT Asset Registers. These registers will be the authritative recrd f ICT assets and asset infrmatin. All ICT assets issued by CPIT are t remain the prperty f CPIT with an asset wner defined within the Asset Register. The Asset Register shuld cntain: Asset details including a unique asset number which has been allcated. Ideally a nnremvable asset label will be attached t each asset recrding the asset number. Hardware asset details including: type f hardware, serial numbers, characteristics f hardware (drives, cnfiguratin, etc) and s n. Why have an asset register? As infrmatin systems equipment becme increasingly distributed it becmes mre imprtant t have the details recrded centrally. The asset register recrds specific details f individual cmpnents and this is useful when equipment has t be returned fr repair under warranty, when leases expire and fr accunting purpses. The annual inventry verifies that the infrmatin in the asset register is crrect. Maintaining an asset register is the nly flprf way f managing a diverse and extensive ICT envirnment. Sftware asset details including: versin number, purchase details, type f license (retail/educatinal/shareware), supprt details, serial number, deplyment infrmatin and purpse f sftware. Details f the lcatin f the asset, asset wner and cntact details f the asset wner r nminated asset wner. It is imprtant that financial infrmatin is recrded in the register. This includes when the asset was purchased and the value f the asset. Retirement date fr replacing the asset r the date fr upgrading the asset (if knwn). Classificatin f the ICT asset fllwing the classificatin standards defined within the data gvernance standards. The Assets Register must be prtected with apprpriate access cntrl, t prevent asset details being altered r remved. Details f any changes made t the Asset register are t be recrded with the details f what changes have been made. ICT Asset and Media Security Standard Page 5 f 13

6 CPIT Araki Crprate Services Divisin: ICT It is recmmended that the fllwing Assets Management Reprts are available t be prduced as requested: Ref Asset Reprts 1 Management r Faculty Asset Reprt Reprt t indicate what ICT assets have been allcated t bth the individuals in that divisin r faculty. Management will need t validate the assets recrded within the reprt. 2 Sftware Asset Reprt Reprt t indicate what sftware licenses are used acrss CPIT. 3 Security Investigatin Reprt Reprt t prvide details f an asset including the details within the Asset Register 4 Cessatin Reprt. Reprt t list what assets have been recrded against an individual Asset Registers are t be reviewed regularly. The recmmended review perid is 12 mnths. Peridic reviews are recmmended f the sftware installed acrss the CPIT netwrk t identify sftware assets and indicate the number f licenses in use and the installatin f unauthrised sftware. Autmated tls, like SCCM, may be used t streamline the cllectin prcess. ICT Asset and Media Security Standard Page 6 f 13

7 CPIT Araki Crprate Services Divisin: ICT 3 ICT HARDWARE ICT hardware used at the Institutin needs t be installed and maintained t an agreed security standard t safeguard the integrity f CPIT s infrmatin retained n the hardware and the supprting infrastructure. T safeguard CPIT infrmatin and services a defence in depth apprach will be fllwed. This requires security cntrls t be applied acrss ICT systems that cnnect t Internet, systems n the netwrk and systems that access the netwrk. This sectin defines the security standards t prtect ICT equipment at CPIT and recmmends the security cntrls t be implemented t fllw the principles f defence in depth. Defence in Depth A defence in depth principle supprts multiple f layers f security cntrls t prtect infrmatin and services acrss CPIT. If ne f the layers is cmprmised ther layers in defence still apply t safeguard infrmatin. The last layer in the defence f depth principle is the physical cmputers, hand held devices and assciated peripherals. These devices als need t be prtected and security cntrls applied. 3.1 ICT Hardware Standards Defining standards n ICT equipment, including the prcurement and prtectin f these devices, is an imprtant prcess fr maintaining the integrity and availability f ICT services. A prly cnfigured ICT system may result in ICT services being cmprmised r a service being adversely impacted due t a failing device. The bjective f adpting these standards is t ensure that ICT equipment perates as intended is available when required and integrates within the current envirnment, reducing the ptential fr a service being cmprmised. Standards t be fllwed include: Warranty and Maintenance ICT hardware shuld be cvered by a warranty r maintenance agreement t maintain the physical equipment. ICT Staff shuld have access t warranty r maintenance agreement infrmatin pertaining t the ICT asset and the prcedure t cntact third parties in the event f a fault. All cmputers returned frm repair, r transferred t a new user, will be reimaged t the latest build standards befre they are redeplyed r returned t custmers. All hardware sent away fr repair shuld be cleansed f institutin-sensitive infrmatin befre being dispatched where pssible. There are circumstances where the lcal cmputer administratr credentials are prvided t the repair agents t aid with replicating the prblem within the envirnment (image n the cmputer). In such situatins, an arrangement and agreement must be made that nne f this infrmatin is disclsed ther than fr the purpse f replicating the fault and repairing the faulty equipment. Build Standards ICT hardware is t be cnfigured t the technical cnfiguratin that ICT sets. This includes the ICT perating system, apprved applicatin sftware and cmmunicatins sftware. It is recgnised that apprved staff at CPIT may install sftware fr the benefits f academic research and persnal develpment. Sftware installed by staff needs t be apprpriately licensed and nt cmprmise the security f infrmatin r ICT services at CPIT. The ICT Security Plicy stipulates: ICT Asset and Media Security Standard Page 7 f 13

8 CPIT Araki Crprate Services Divisin: ICT ICT staff can remve unauthrised sftware and return ICT hardware t its riginal build status. ICT staff, are als authrised t install and cnfigure sftware and hardware and make changes t ICT services prvided at CPIT. Only apprved sftware is t be installed in the prductin envirnment. ICT Hardware Prtectin All ICT hardware will be installed with an enterprise managed malware prtectin tls t prtect against malicius sftware (this includes cmputer viruses, wrms, Trjan hrses, spyware, adware, malicius mbile cde and the like). Only servers and apprved repsitries fr infrmatin strage will be backed up fllwing the standards defined within the Cmmunicatins and Operatins Standard. Only apprved web brwsers are t be installed. IT Service Desk can advise n the apprved internet brwsers and if a nn-apprved web brwser is deemed t be interfering with the apprved brwser it may be remved by ICT staff. Prtected BIOS passwrds as a standard n all cmputers t prevent changes in bt-up pririty. CPIT cmputers are als cnfigured such that the remval f the exterir case will prmpt the entry f the BIOS passwrd n next start-up. The cmputer will nt prceed until a valid BIOS passwrd is entered. ICT will implement restrictins n cmputers t prevent users frm re-setting r changing security cntrls, this is typically cntrlled thrugh grup plicies acrss netwrk cnnected ICT equipment. Disabled r restricted access f the fllwing services t prtect netwrk cnnected ICT Hardware: Cmmunicatin services that are inherently susceptible t abuse r nt deemed suitable business services. Including peer t peer cmmunicatins sftware and VPN cnnects that directly cnnects cmputers and bypasses security cntrls. Cmmunicatin prtcls that are inherently susceptible t abuse. Including FTP sftware frm within the netwrk. Disabling prts that are nt required fr CPIT business activities. Administratin utilities like windws registry r cntrl panel. Run cmmands r cmmand prcessrs. Disabling accunts such as guest accunt r equivalent in ther perating systems. The recmmended settings abve will be reviewed regularly t ensure that security cntrls prvide sufficient prtectin against current vulnerabilities. ICT will install remte mnitring sftware t integrate cmputers and gather infrmatin fr audits r cmplete assistance t users at CPIT. Keep yur imprtant data away frm the internet ICT Asset and Media Security Standard Page 8 f 13

9 CPIT Araki Crprate Services Divisin: ICT Internet facing r Web Server Build Standards Increased security risks are assciated with servers that directly cnnect t the internet. External internet facing web servers shuld meet the fllwing standards: Segregated frm the internal netwrk and untrusted netwrks within a secure envirnment (r cmmnly referred t as DMZ - Demilitarised Zne). Imprtant infrmatin (particularly if it is the nly cpy) must be kept away frm an internet facing web server where it culd be mdified r deleted by unauthrised parties. Infrmatin shuld be stred n internal machines that are prtected by firewalls r ther security barriers. The mre sensitive the infrmatin the mre layers f defence need t be built t prtect the infrmatin. Operate n a dedicated cmputer ideally (i.e. the server des nt prvide ther services like prcessing, databases, FTP r ther business applicatins) t minimise the security risk by islating the web server and minimise any impact if the web server is cmprmised. Supprt the peratin f web applicatins with minimal privilege, i.e. run as a standard user and nt as administratr. This is critical as high privileged accunts shuld never be used n internet facing web servers. Prevented frm making direct Internet cnnectins (thrugh the server being lcked-dwn, r firewall rules preventing access t the Internet t minimise the risk f inapprpriate sftware being installed nt the web server by accident r intentinally). Cnfigured t cllect lg files and retained fr the recmmend standard. Ensure the web servers' files and directries are nt able t be indexed and that the nly results frm a search engine are the user cntent. Back-ffice systems (applicatin and database servers) are islated thrugh the use f a firewall r private netwrk t minimise the risk f internal access. Supprt mutual authenticatin, tw cmputers verifying each ther s identity befre exchanging data. Netwrk Segregatin T cntrl access acrss the CPIT netwrk and t safeguard internal ICT systems frm external threats, netwrk segregatin will be used at CPIT. The netwrk perimeter is t be secured thrugh the segregatin f the internal netwrk frm the external internet. ICT will use a firewall t achieve this segregatin between the tw netwrks. Firewalls n laptp cmputers are t be cnfigured t prtect laptps when they are away frm the ffice. The firewall service will: Be managed by ICT and all changes t the firewall will fllw the change management prcess and require apprval befre changes are made. Firewall will perate n a separate dedicated cmputer and nt be used fr prviding any ther ICT service. Firewall alerts are t be sent t the ICT Service Desk (r cnslidated within Micrsft System Centre) and technical staff within the Infrastructure team. Details f third parties managing the firewall service are t be available t ICT Service Desk and cntact details t cntact in the event f a security incident. Netwrk segregatin is als recmmended fr cmputers perating sensitive infrmatin (like financial r student persnal infrmatin), sftware develpment cmputers and system administratin cmputers. Decisin t use netwrk segmentatin is t be agreed n a case by case basis. ICT Asset and Media Security Standard Page 9 f 13

10 CPIT Araki Crprate Services Divisin: ICT Encryptin T prtect the cnfidentiality f data stred n ICT hardware the recmmended security cntrl is t use encryptin. Encryptin must be used t encrypt data where the risk f lss thrugh theft r interceptin is high, where there is the ptential fr a majr security breach shuld that data get int the hands f unauthrised persns and where the lss f the data wuld have a majr impact n CPIT. Care and Lss Staff at CPIT that have been issued with ICT hardware are expected t act with due care and diligence in prtecting it frm theft r damage. ICT Service Desk can prvide advice and guidance n precautins t take when travelling with prtable ICT hardware. If ICT hardware is lst, stlen, r damaged then staff members are t cntact the ICT Service Desk immediately. ICT Asset and Media Security Standard Page 10 f 13

11 CPIT Araki Crprate Services Divisin: ICT 4 ICT MEDIA STANDARDS ICT media refers t: magnetic tape, USB keys, prtable drives and disks in use at CPIT. T safeguard media against crruptin, lss r disclsure the security cntrls defined within this standard are t be fllwed. 4.1 Strage and Transprting Restricted Media ICT media that cntains restricted infrmatin is t be stred in a physically secure lcatin like a lcked filing cabinet, lcked rm r a fireprf safe. ICT media that is classified as restricted is t be labelled t indicate its sensitivity and the infrmatin classificatin (restricted access, cnfidential etc). ICT media that is sensitive is t be encrypted befre being transmitted r transprted. ICT hardware that has been used t stre restricted media needs t have the strage media remved befre being sent t a third party. Alternatively, a service engineer shuld attend CPIT, this is preferable t sending equipment ff-site that may cntain restricted infrmatin. Restricted Data? With reference t the CPIT data gvernance standards, Restricted data is data cntaining sensitive r cnfidential infrmatin that if cmprmised culd have a material adverse effect n CPIT interests, the peratins f the Institutin and the privacy t which individuals are entitled. The ther data classificatin standards are: Prtected data t be used by individuals wh require it fr their jbs; Institutinal internal use infrmatin and nt fr external distributin and, finally, Public available t the general public. We need a new sub-sectin arund strage f crprate data in the clud, and the sharing f it? File cllabratin amng staff/students can be a challenge fr CPIT. Cumbersme legacy enterprise cntent management slutins ften dn t cut it, and file cllabratin by presents a myriad f challenges, such as lack f versining and inapprpriate use f expensive media ptimised fr perfrmance rather than strage/archival purpses. Staff are demanding file sharing slutins that are as easy t use as cnsumer-riented prducts like Drpbx. ICT has n cntrl ver what staff stre n their persnal CPIT clud strage, s ICT/LTU needs t prvides staff with a clear understanding f hw they are t stre CPIT wrk files in the clud, in that a cpy must always be stred n a CPIT netwrked drive fr backup. Preference is given t OneDrive and Bx ver ther clud strage prviders as ICT s recmmended prviders have terms and cnditins that are aligned with that f CPIT s standards and plicies. With and intrductin f Office365 and Adbe Creative Clud fr staff, there needs t be a clearer Institutinal plicy and guiding dcument t supprt and steer apprpriate use f such services by CPIT Staff. 4.2 Dispsal and Media Sanitisatin Standards Infrmatin may be accessed by unauthrised individuals thrugh careless dispsal f cmputer media r by nt cleaning media that is re-issued t anther staff member. Infrmatin Leak? Infrmatin leak refers t infrmatin ICT Asset and Media Security Standard Page 11 f 13

12 CPIT Araki Crprate Services Divisin: ICT As the use f sphisticated encryptin prevents access t infrmatin attackers are lking fr alternative ways t access infrmatin. One avenue f attack is the recvery f deleted data frm ICT media. This is increasingly becming a significant risk as infrmatin can be stred n a variety f prtable devices, like smart phnes and tablet devices, which all need t be sanitised when nt lnger needed r transferred t anther user. Sanitisatin refers t remving data frm the strage device t a pint whereby anyne accessing the strage device cannt retrieve r recnstruct the data. being disclsed t a third party. Whether this is hard cpies f infrmatin fund by dumpster diving r electrnic infrmatin fund n an ld cmpute t a smart phne discarded imprperly. A disclsure culd lead t an embarrassing disclsure f infrmatin r t a majr security incident. The dispsal r re-use f ICT media is further cmplicated by the high number f devices and strage mediums than can stre infrmatin. Equally there is a risk that sensitive infrmatin may als be expsed thrugh dcuments being dispsed f inapprpriately. T reduce the risk f an infrmatin leak the fllwing standards apply fr bth sft and hard ICT media: Hard Cpy ICT Media Fr example: restricted dcuments r cnfidential reprts. All hard ICT media that cntains restricted infrmatin is t be dispsed f after crss-cut shredding r placed in secure bins fr prcessing by an apprved dcument destructin service. Sft Cpy ICT Media Fr example: electrnic media are the bits and bytes cntained in hard drives, randm access memry (RAM), read nly memry (ROM), disks, memry devices, phnes, mbile cmputing devices, netwrking equipment. Fr sft media that is a standalne device (like a DVD r USB key) r integrated within ICT hardware (hard disk r smart phne) the fllwing standards apply: Data Classificatin f data stred n Sft Media Erase and Dispsal Standard PUBLIC Device t be re-used: re-frmat the disk using standard perating sftware prcesses r fllw device specific erasure prcesses. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: dispse thrugh standard prcesses at CPIT, n additinal steps necessary. PROTECTED, INSTITUTIONAL Device t be re-used: use a sanitisatin sftware prduct t re-frmat the media including any free spaces n the disk drives r fllw the manufactures specific guidance n wiping the data. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: physically destry (fr ICT Asset and Media Security Standard Page 12 f 13

13 CPIT Araki Crprate Services Divisin: ICT Data Classificatin f data stred n Sft Media Erase and Dispsal Standard example breaking a DVD) and dispse lcally. RESTRICTED Device t be re-used: use a sanitisatin sftware prduct t re-frmat the media including any free spaces n the disk drives r fllw the manufactures specific guidance n wiping the data. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: destry by crushing the item r placing in a furnace t physically make the device unreadable. Nte: changes in media technlgy have changed the sanitisatin best practices; riginally multiple verwriting was necessary t sanitise sftware media. This has changed and a single pass is adequate t prtect the media frm being expsed. It is imprtant hwever that the entire disk is verwritten nt just the used space. Devices that d nt fall with the abve classificatins must be physically destryed. ICT will perfrm the erasure prcess and recrd that the prcess has been fllwed. Details will be maintained with the Assets Register (refer t Sectin 2) including the erasure standard used. This is the end f the ICT Asset and Media Security Standard. This standard is ne f six standards that prvide advice and guidance n the best practices t fllw when using and accessing ICT services. The ther standards are available n the CPIT ICT intranet. ICT Asset and Media Security Standard Page 13 f 13

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015 ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

CPIT Aoraki Communications and Operations Management

CPIT Aoraki Communications and Operations Management This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic. Knwn as CPIT Araki the new rganisatin

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Unified Communications

Unified Communications Office f Infrmatin Technlgy Services Service Level Agreement Unified Cmmunicatins Nvember 7, 2013 v2.2 Service Descriptin Unified Cmmunicatins Service Descriptin ITS Unified Cmmunicatins ffers a number

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY 2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.

More information

IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT

IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT Chairpersn and Subcmmittee Members AUDIT AND RISK SUBCOMMITTEE 6 AUGUST 2015 Meeting Status: Public Purpse f Reprt: Fr Infrmatin IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT PURPOSE OF

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Service Level Agreement Distributed Hosting and Distributed Database Hosting

Service Level Agreement Distributed Hosting and Distributed Database Hosting Office f Infrmatin Technlgy Services Service Level Agreement Distributed Hsting and Distributed Database Hsting Nvember 12, 2013 Service Descriptin Distributed Hsting and Distributed Database Hsting Service

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained

More information

NETWRIX CHANGE NOTIFIER

NETWRIX CHANGE NOTIFIER NETWRIX CHANGE NOTIFIER FOR ACTIVE DIRECTORY, EXCHANGE AND GROUP POLICY QUICK-START GUIDE Prduct versin: 7.5.873 February 2014 February 2014. Legal Ntice The infrmatin in this publicatin is furnished fr

More information

DISASTER RECOVERY PLAN TEMPLATE

DISASTER RECOVERY PLAN TEMPLATE www.disasterrecveryplantemplate.rg The bjective f a disaster recvery plan is t ensure that yu can respnd t a disaster r ther emergency that affects infrmatin systems and minimize the effect n the peratin

More information

Information Security Policy

Information Security Policy Infrmatin Security Plicy Last updated: 09 March 2010 Plicy Assigned t: Chief Infrmatin Officer, ICT Table f Cntents 1. Overview... 2 2. Backgrund... 2 3. Cverage... 2 4. Definitins... 3 5. Risk Assessment

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information