Practical Guide to Cloud Service Level Agreements Version 1.0

Size: px
Start display at page:

Download "Practical Guide to Cloud Service Level Agreements Version 1.0"

Transcription

1 Practical Guide t Clud Service Level Agreements Versin 1.0 April 10, 2012

2 Cntents Practical Guide t Clud Service Level Agreements Versin Acknwledgements... 4 Wrkgrup Leaders... 4 Extended Wrkgrup Members... 4 Additinal Reviewers... 4 Intrductin... 5 Current SLA Landscape... 5 Guide fr Evaluating Clud Service Level Agreements... 7 Step 1: Understand Rles & Respnsibilities... 7 Step 2: Evaluate Business Level Plicies... 9 Step 3: Understand Service and Deplyment Mdel Differences Step 4: Identify Critical Perfrmance Objectives Step 5: Evaluate Security and Privacy Requirements Step 6: Identify Service Management Requirements Step 7: Prepare fr Service Failure Management Step 8: Understand the Disaster Recvery Plan Step 9: Develp an Effective Management Prcess Step 10: Understand the Exit Prcess Summary f Keys t Success Wrks Cited Additinal References Cpyright 2011 Clud Standards Custmer Cuncil Page 2

3 2011 Clud Standards Custmer Cuncil. All rights reserved. Yu may dwnlad, stre, display n yur cmputer, view, print, and link t the Practical Guide t Clud Service Level Agreements at the Clud Standards Custmer Cuncil Web site subject t the fllwing: (a) the Guidance may be used slely fr yur persnal, infrmatinal, nncmmercial use; (b) the Guidance may nt be mdified r altered in any way; (c) the Guidance may nt be redistributed; and (d) the trademark, cpyright r ther ntices may nt be remved. Yu may qute prtins f the Guidance as permitted by the Fair Use prvisins f the United States Cpyright Act, prvided that yu attribute the prtins t the Clud Standards Custmer Cuncil Practical Guide t Clud Service Level Agreements Versin 1.0 (2012). Cpyright 2011 Clud Standards Custmer Cuncil Page 3

4 Acknwledgements The Practical Guide t Clud Service Level Agreements is a cllabrative effrt that brings tgether diverse custmer-fcused experiences and perspectives int a single guide fr IT and business leaders wh are cnsidering clud adptin. The fllwing participants have prvided their expertise and time t this effrt. Wrkgrup Leaders Jhn Meegan (IBM) Lead Technical Editr; Intrductin and Keys t Success Sectin Leader Gurpreet Singh (Ekartha) Current SLA Landscape and Disaster Recvery Sectin Leader Steven Wdward (Clud Perspectives) Rles & Respnsibilities; Perfrmance Objectives Leader Salvatre Venticinque (Secnd University f Naples) Service & Deplyment Mdel Sectin Leader Massimilian Rak (Secnd University f Naples) Service & Deplyment Mdel Sectin Leader David Harris (Being) Business Plicies Sectin Leader Gerry Murray (Frt Technlgies) Business Plicies Sectin Leader Beniamin Di Martin (Secnd University f Naples) Business Plicies Sectin Leader Yves Le Rux (CA Technlgies) Security and Privacy Sectin Leader Jhn McDnald (CludOne Crpratin) Service Management Sectin Leader Ryan Kean (The Krger C.) Service Failure Management Sectin Leader Marln Edwards (Hbken Cnsulting Grup, LLC) Disaster Recvery Sectin Leader Dave Russell (IBM) Management Prcess Sectin Leader Gerge Malekks (Pwersft Cmputer Slutins Ltd) Exit Prcess Sectin Leader Extended Wrkgrup Members The wrkgrup leaders wish t recgnize the fllwing individuals fr their utstanding effrts t prvide cntent, share their expertise and ensure cmpleteness f the Practical Guide t Service Level Agreements: Amy Whl (Whl Assciates), Asher Bnd (Elastic Prvisiner, Inc.), Claude Baudin (cebe IT & KM), Christpher Ferris (IBM), Melvin Greer (Lckheed Martin), Richard Miga (Synergistic Slutins), Thmas Smers (IBM). Additinal Reviewers The fllwing reviewers prvided feedback n the Practical Guide t Clud Service Level Agreements: Jenny Huang (AT&T), Karen Caraway (The MITRE Crpratin), Kenneth Dilbeck (TMFrum), Rpali Thapar (IBM), Tbias Kunze (Red Hat). Cpyright 2011 Clud Standards Custmer Cuncil Page 4

5 Intrductin This dcument is an extensin f the Practical Guide t Clud Cmputing white paper that was delivered by the Clud Standards Custmer Cuncil (CSCC) in Octber, The aim f this guide is t prvide a practical reference t help enterprise infrmatin technlgy (IT) and business decisin makers as they analyze and cnsider service level agreements (SLA) frm different clud service prviders. The paper will give guidance t decisin makers n what t expect and what t be aware f as they evaluate SLAs frm their clud cmputing prviders. A checklist f key criteria fr evaluating and cmparing SLAs frm different prviders will be included. Additinally, this paper will highlight the rle that standards play t imprve interperability and cmparability acrss different clud prviders, and identify areas where future standardizatin culd be effective. SLAs are imprtant t clearly set expectatins fr service between the clud cnsumer (buyer) and the clud prvider (seller). Each clud entity engaged by the enterprise shuld have a clud SLA defined, including: clud prvider, clud carrier, clud brker and even clud auditr. Cnsideratin must als be given t the different mdels f service delivery: Infrastructure as a Service (IaaS), Platfrm as a Service (PaaS) and Sftware as a Service (SaaS)) as each mdel brings different requirements. This paper fcuses primarily n the SLA details between the clud cnsumer and clud prvider, and fcuses n the requirements that are cmmn acrss the varius service mdels (emphasis is given t the IaaS service mdel since SLAs are mre advanced in this area). The Practical Guide t Clud Service Level Agreements cntains a set f guidelines and strategies t help decisin makers in all majr activities related t clud SLAs. The sectin entitled Current SLA Landscape explains the dynamics that currently exists between cnsumers and prviders in the SLA space and the impact that cmpany size has n the pwer t negtiate terms. This sectin als highlights the nuances f SLA develpment fr different service mdels. The sectin entitled Guide fr Evaluating Clud Service Levels Agreements is the heart f the guide. It prvides a prescriptive series f steps that clud cnsumers shuld take t evaluate clud SLAs with the gal f cmparing clud service prviders r negtiating terms with a prvider. It prvides guidance fr the business and service level bjectives f the SLA, highlighting what t be aware f and hw t cmpare service levels acrss different clud prviders. This sectin takes int accunt the realities f tday s clud cmputing ecsystem and pstulates hw it is likely evlve in the future, including the imprtant rle that standards will play t imprve interperability and cnsistency acrss prviders. Current SLA Landscape The Service Level Agreement (SLA) serves as a means f frmally dcumenting the service(s), perfrmance expectatins, respnsibilities and limits between clud service prviders and their users. A typical SLA describes levels f service using varius attributes such as: availability, serviceability, Cpyright 2011 Clud Standards Custmer Cuncil Page 5

6 perfrmance, peratins, billing, and penalties assciated with vilatins f such attributes. Welldesigned SLAs can significantly cntribute t reducing causes f ptential cnflict and can facilitate issue reslutin befre a dispute materializes. T guarantee an agreed service level, service prviders must be capable f measuring and mnitring relevant metrics. But ften there is a gap between crrelating the metrics cllected and mnitred by service prviders t higher-level functinal guarantees which are f interest t cnsumers. This prblem is quite challenging and develpment f SLAs by service prviders has t take this int accunt. This is typical fr all types f clud services and is acute fr SaaS prviders which ffer applicatins at higher levels f functinality. This is amng the many reasns why SLAs fr SaaS applicatins usually lack stringent service level guarantees. A vast majrity f SaaS and PaaS prviders simply ffer n SLAs, althugh they strive t develp internal peratins that cntribute t increased reliability. The situatin fr IaaS is better than SaaS and PaaS, but mst public clud infrastructure services are available nly thrugh nn-negtiable standard cntracts. They strictly limit the prvider s liability and the remedies d nt prvide significant benefit t cnsumers in case f service disruptins. Furthermre, mst IaaS prviders put the burden f SLA vilatin ntificatin and credit request n their custmers. Since a vast majrity f the users f IaaS public cluds are small and medium businesses (SMB), the pressure n clud prviders t ffer stringent SLAs is minimal. In tday s nascent clud services industry, SLAs prvided by clud vendrs are increasingly being viewed by cnsumers as unsatisfactry frms f prtectin that weigh heavily in the prvider s favr. Disputes ften arise ver the structure f the agreements, mnitring f perfrmance, and service unavailability. The reasns fr this are numerus and cver bth the challenges faced by clud prviders, and the lack f market pwer by cnsumers t ptentially seek mre stringent agreements. Recent cases f clud service utages highlight the dilemma fr clud cnsumers. In sme cases, the SLAs ffered by prviders were lse enugh t ensure that service prviders were nt vilating the terms f the SLA despite a serius utage in missin critical areas f the service. In such cases, clud cnsumers had n ptins t seek adequate penalties despite significant adverse effects. Clud prviders are taking accunt f such prblems and are beginning t ffer different service ptins that shield custmers frm such risks. In general, the larger the custmer deplyment, which translates t higher subscriptin and upfrnt fees, the mre pwer custmers exert in negtiating stringent SLAs. Even in the case f SaaS prviders, large custmers are successful in negtiating a strnger agreement, where nne may be ffered t SMB custmers. This des pint t the trend that as clud deplyments prliferate t larger enterprise custmers, the demand fr strnger SLAs will intensify. As cmpetitin increases at all levels, better SLAs will inevitably becme a cmpetitive factr. At that time, large enterprises and SMBs, alike, will be able t chse based n mre flexible and mre favrable SLA terms and, in general, these terms will imprve. Cpyright 2011 Clud Standards Custmer Cuncil Page 6

7 Guide fr Evaluating Clud Service Level Agreements Befre evaluating any clud SLA, cnsumers must first develp a strng business case and strategy fr their clud cmputing envirnment. This includes identifying specific services that will be deplyed in the clud alng with a clear understanding f the criticalness f these services t the business. A check n the exit clauses f current hsted services cntracts is als imprtant. Only after this strategic analysis has been cmpleted can the cnsumer effectively evaluate and cmpare SLAs frm different prviders. With the clud business case and strategy as a prerequisite, this sectin prvides a prescriptive series f steps that shuld be taken by clud cnsumers t evaluate clud SLAs with the gal f cmparing clud service prviders r negtiating terms with a prvider. The fllwing steps are discussed in detail: 1. Understand rles and respnsibilities 2. Evaluate business level plicies 3. Understand service and deplyment mdel differences 4. Identify critical perfrmance bjectives 5. Evaluate security and privacy requirements 6. Identify service management requirements 7. Prepare fr service failure management 8. Understand the disaster recvery plan 9. Define an effective management prcess 10. Understand the exit prcess Requirements and best practices are highlighted fr each step. In additin, each step takes int accunt the realities f tday s clud cmputing landscape and pstulates hw this space is likely t evlve in the future, including the imprtant rle that standards will play t imprve interperability and cmparability acrss prviders. Step 1: Understand Rles & Respnsibilities In rder fr cnsumers t understand specific rles and respnsibilities explicitly r implicitly stated in a clud SLA, it is imprtant that they are aware f the varius actrs that can ptentially participate in a clud cmputing envirnment. The Natinal Institute f Standards and Technlgy (NIST) Reference Architecture 1 identifies 5 unique clud actrs: Clud Cnsumer. The persn r rganizatin that maintains a business relatinship with, and uses service frm, clud prviders. Clud Prvider. The persn, rganizatin r entity respnsible fr making a service available t clud cnsumers. Clud Carrier. The intermediary that prvides cnnectivity and transprt f clud services frm clud prviders t clud cnsumers. Clud Brker. An rganizatin that manages the use, perfrmance and delivery f clud services, and negtiates relatinships between clud prviders and clud cnsumers. Clud Auditr. A party that can cnduct independent assessments f clud services, infrmatin system peratins, perfrmance and security f the clud implementatin. 1 Refer t fr mre infrmatin n the NIST Reference Architecture. Cpyright 2011 Clud Standards Custmer Cuncil Page 7

8 The use f the term brker varies significantly and shuld be clarified with the varius stakehlders, especially in cntext f a clud SLA. An entity may prvide brker services and functinality, but as a legal rganizatinal entity nt be recgnized as a clud brker. Fr example, an entity may perfrm research and negtiate n behalf f a cnsumer, but the actual SLA and cntract terms are between the clud cnsumer and clud prvider. The distinctin f acting brker like vs. being an actual brker will evlve as the clud cmputing industry matures and terminlgies becme mre cnsistent. Due t these cmplexities this paper des nt address all the SLA cnsideratins fr clud brkering. Cnsumers need t recgnize the activities and respnsibilities f each clud actr that is engaged in delivering their clud envirnment, and precisely define requirements and desired service levels fr each actr. This paper fcuses primarily n the clud cnsumer/clud prvider SLA, althugh ther SLAs may be addressed in a particular cntext. In sme cases, the cnsumer/prvider relatinship will indirectly include additinal actrs. Figure 1 belw illustrates an envirnment where a clud prvider has established a SLA with tw clud carriers t establish service levels fr cmmunicatin and transprt. In additin t clud prvider expectatins, the cnsumer/prvider SLA in this example may als include specific carrier and transprt expectatins. In this case, the clud prvider is als acting as a brker fr the ther tw clud carriers. Figure 1. Indirect Relatinships Each clud SLA will be unique based upn the cnsumers requirements and the clud ecsystem under cnsideratin. SLAs can cntain varius expectatins between the actrs and are nt limited t quantitative measures, but can include ther qualitative aspects such as alignment with standards and data prtectin. It is strngly recmmended that clud cnsumers gain a slid understanding f the Cpyright 2011 Clud Standards Custmer Cuncil Page 8

9 spectrum f SLAs that currently exist fr clud prviders (and ther actrs as apprpriate) in rder t cmpare prviders and assess tradeffs between cst and service levels. 2 The fllwing sectins, which cver the clud SLA evaluatin steps in detail, will each elabrate n the expected respnsibilities between cnsumer and prvider fr bth business level and service level bjectives. In rder t make sund business decisins, it is imprtant that cnsumers understand what t expect frm their clud prvider. This, in turn, will help them define their wn respnsibilities and help them assess the true cst f mving t the clud. Step 2: Evaluate Business Level Plicies Cnsumers must cnsider key plicy issues when reviewing a clud SLA since there are interdependencies between the plicies expressed in the SLA and the business strategy and plicies develped in ther aspects f the business. The data plicies f the clud prvider, as expressed in the SLA, are perhaps the mst critical business level plicies that shuld be carefully evaluated. The duty f care a clud prvider has t its clients and their data is partly gverned by the data prtectin legislatin applicable in the user s lcal jurisdictin and als in thse jurisdictins in which its data may reside r made available. Cnsumers shuld carefully cnsider these legal requirements and hw the SLA their prvider(s) ffers deals with issues such as mvement f data t ffer multisite redundancy acrss several jurisdictins. Table 1 highlights the critical data plicies that need t be cnsidered and included in the clud SLA. Table 1. SLA data plicies Data Plicy Descriptin / Guidance Data Preservatin Timely and efficient capturing and preservatin f data is critical t maintaining the rganizatinal memry f a business r the general user. It enables the data cntrller t address peratinal, strategic and litigius situatins frm an infrmed perspective. Clud users shuld ensure the service supprts their data preservatin strategy that includes surces, scheduling, backup, restre, integrity checks, etc. Data Redundancy Users shuld ensure they have an apprpriate data preservatin strategy that addresses redundancy within the system. This shuld be cmplemented by the SLA their clud prvider ffers and can be tested t demnstrate service availability. The cnsumer shuld be cncerned as t the prtectins ffered r mitted by the 2 Refer t the Queen Mary Schl f Law Legal Studies Research Paper titled Cntracts fr Cluds: Cmparisn and Analysis f the Terms and Cnditins f Clud Cmputing Services at fr a cmprehensive analysis f leading clud service prviders. Cpyright 2011 Clud Standards Custmer Cuncil Page 9

10 service prvider. Data Lcatin SLAs which cver single and multi-jurisdictin scenaris are challenging. Verificatin f new data lcatin Users shuld carefully cnsider as part f their data management strategy hw the SLA will cmplement where their data will reside, where it is prcessed, and hw this meets regulatry requirements. Fr example, can the prvider truly deliver a sund technical slutin when data spans several jurisdictins? Can the user trust that the data will be lcated where the prvider cmmits it will be? Clients shuld ensure that when a prvider elects t prvide its service frm anther lcatin it will be required t ntify its clients f the new lcatin and prvide a means fr the client t independently verify where the data will be relcated. Preferably the prvider shuld be required t btain the permissin f the client t relcate the data befre mving t a new lcatin. Data Seizure Legal pwers enable law enfrcement and ther gvernment agencies t seize data under certain circumstances. Cnsumers shuld als ensure there are arrangements in place t make a user s data available in the event that their SLA prvider ges ut f business and the data center prvider lcks access t its systems pending payment f the utstanding accunt. Data Privacy It is a requirement t cnduct business in cmpliance with applicable laws n data privacy prtectin and data security. The declared data privacy plicy frm the prvider shuld be included in the SLA. Examples f privacy terms that shuld be addressed in the SLA include the data sets gathered, data retentin plicies, hw the data is cmmunicated, hw persnal data is stred and used, etc. Refer t the Privacy sectin n page 24 fr mre infrmatin. In additin t data plicies, there are a number f ther business level plicies expressed in the clud SLA that require careful evaluatin. All f these plicies will impact and influence the cnsumer s clud strategy and business case. In many cases, these plicies, as defined in the clud SLA, are nn-negtiable and are similar acrss different clud prviders. Hwever, there will be instances where sme f these plicies can be negtiated and/r sme f these plicies differ sufficiently acrss different clud prviders t warrant careful cnsideratin frm cnsumers. Table 2 belw highlights the critical business level plicies that need t be cnsidered and addressed in the clud SLA. Cpyright 2011 Clud Standards Custmer Cuncil Page 10

11 Table 2. SLA business level plicies Plicy Descriptin / Guidance Guarantees SLA guarantees shuld be defined, bjective and measurable with an apprpriate scaled penalty matrix which cmplements the impact f nn-perfrmance by the prvider. 3 The SLA shuld clarify: What cnstitutes excused r excluded perfrmance Escalatin prcedures Hw service-level bnuses and penalties are administered Remedy circumstances and mechanisms Such guarantees shuld include an availability measurement expressed as a percentage, e.g %, which dentes the amunt f time the service is guaranteed t be wrking. Acceptable Use Plicy Given the dislcated relatinship that can exist between the prvider and the cnsumer (the prvider may nt knw the final end user f its service), the acceptable use plicy will clearly describe hw the cnsumer may use its service and the agreement generally will describe what actins the prvider may take in the event f a breach. List f Services Nt Cvered In tday s clud envirnment, this plicy is typically nn-negtiable and the terms generally favr the clud prvider. The SLA will state under what cnditins and with which described services the cnsumer is supprted. The SLA may als state what is excluded and what cnstitutes illegal use. Cnsumers shuld lk fr explicitly stated exceptins and understand why the prvider has excluded them. Excess Usage Prviders perate business mdels t drive revenue. Cnsumers may find that usage abve their cntracted threshlds may incur premium rates which can be punitive and disrupt their budgets. Cnsumers shuld crrectly size their usage requirements, reduce the pprtunity fr usage creep and cnsider and understand the what-ifs f breach f their usage threshlds. The clud is a great tl t vary the size f the resurce pl yur business buys but, as in any business mdel, buy nly what yu need and avid excess usage charges. 3 Guarantees including measurable metrics will be cvered in greater detail in the sectins that fllw. Cpyright 2011 Clud Standards Custmer Cuncil Page 11

12 Activatin Prviders will delineate a time at which the service becmes active and the SLA cmmences peratin. This time stamp can then be used t measure time and if an utage ccurs may be used t establish the start f a penalty incurring event. Payment and penalty mdels Gvernance / Versining Examples f activatin include the time at which the cnsumer checks the accept terms and cnditins bx r when the cnsumer acknwledges the secure URL prviding lgin credentials t their new clud service. Frm a SLA cmpliance perspective, it is imprtant fr cnsumers t understand the trigger pints under the SLA s they can independently measure event timing. It is als imprtant t understand when the agreement is in peratin as bth the prvider and the cnsumer have respnsibilities such as Fair Use and Legal Use. The SLA shuld clarify when/hw payment is t be made. Prvider payment mdels vary. Mnthly recurring r pay as yu use mdels are typical. Assciated with these payment mdels are credit terms which may require advanced payment r payment every 30 days. Just in time service prviders are sensitive t pr credit cntrl and are likely t be mre diligent in suspending service. Equally, the cnsumer needs t be diligent in btaining service credit payments fr utages. Prviders services evlve. New features may be added, thers will g ut f warranty, and sme may persist indefinitely. Where the assumptins r cnditins under which the SLA was initially accepted are changed, the cnsumer shuld review the impact n their specific situatin. A gd prvider will maintain a practive plicy f advising cnsumers f changes t their SLA and practice versin cntrl. Cnsumers shuld ensure that there is a mechanism in place t be infrmed f changes and, if nt, amend their cntract t put the nus n the prvider t cntact them at a designated cntact pint with updates within a reasnable timeframe. Renewals Renewals are an pprtunity t bargain fr better rates and relcate t anther prvider if necessary. Prviders may perate aut renewals which state, fr example, this cntract will aut renew n its anniversary if the cnsumer des nt give 90 days ntice f their intentin t cancel. Cnsumers shuld read the terms and cnditins fr the renewal arrangements, and cnsider the cnditins under which a prvider may vary the service terms at renewal. Prvider systems are rganic as are cnsumer requirements. Mre attractive service functinality may be available r mre cnsumer flexibility required. Cpyright 2011 Clud Standards Custmer Cuncil Page 12

13 Transferability Cnsumers shuld cnsider the ptential fr needing t transfer an agreement in the event their business is sld. In additin, the prvider s business may be sld t a cmpetitr and it may suit the cnsumer t relcate and discntinue the cmmercial agreement with the new wner. Cnsumers may perate several accunts with a prvider and want t ffset accunt credits between accunts. Is this supprted in the prvider s cntract terms? Supprt The cnsumer shuld ensure they fllw the reprting guidelines f the prvider t ensure the supprt terms specified in the SLA are activated. An example f a supprt and escalatin matrix is prvided belw. All three target times in the table are assciated with the cmmencement time stamp f the service r the ntificatin f a service affecting event. Pririty Descriptin Target Respnse Time Target Update Time Target Fix Time P1 P2 Prductin sftware unusable/prductin clud servers inaccessible Partial sftware functinality unusable/partial service unavailable 1 hur, Prvider s executive ntified f issue P3 Csmetic issue 1 wrking day P4 Infrmatin request 2 wrking days 1hr Immediate wrk cmmences and cntinues until issue reslved r wrkarund deplyed 4 hurs 1day 2 days, subject t available maintenance slt 1 wrking day 2 wrking days Next sftware release/service update n/a Planned Maintenance All systems require maintenance. Cmplex systems may be designed t include sufficient resurces such that maintenances can be carried ut withut affecting the service. The SLA may, hwever, describe uptime as an availability percentage (e.g %). This is the equivalent f 8.5 hurs dwntime per annum. SLAs may state that this des nt include planned maintenance. Thus, the prvider may have a service utage fr 8.5 hurs + maintenance time under the SLA and the cnsumer is nt entitled t cmpensatin. Subcntracted Services Prviders smetimes include in their SLAs indicatin that the SLA f an upstream (subcntracted) prvider will be passed t the cnsumer and the nly available penalties are thse f the upstream prvider even thugh these may be f a lesser quality than the cnsumer understands when reviewing the SLA f their immediate Cpyright 2011 Clud Standards Custmer Cuncil Page 13

14 prvider. Equally, the cnsumer shuld ensure that the immediate prvider SLA is unambiguus in stating that their SLA applies t the cmplete service and nt limited t the immediate prvider s cmpnent f the verall service. Licensed Sftware Clud services may include third party licensed sftware which is sld n a mnthly licensed basis under a service prvider license agreement. Such sftware is updated regularly by its manufacturer. Industry Specific Standards Additinal terms fr different gegraphic regin r cuntries Prviders may pt t pass the respnsibility fr patching the licensed sftware ver t the cnsumer nce they have started t use the service. This can be preferable t the prvider as later releases may negatively affect the cnsumer s service. The prvider may alternatively push the update in which case the cnsumer, as specified in the SLA, may require ntificatin f the update. Upn ntificatin, the cnsumer can issue an pt ut ptin. Regulated industries, like gvernment, financial services, and healthcare, will have specific and usually quite nerus and cstly standards which must be addressed in the clud SLA and implementatin. Cnsumers wh perate in these regulated industries shuld ensure that the full resurces f their legal team are brught t bear n the negtiatin f the SLA. Cnsumers shuld cnsider the prvider s rigins and primary market. Detailed refinements t the hme market SLA may be required t prperly cver cnsumers wh are lcated in remte markets. Data prtectin legislatin is ne aspect f this. Hwever, cnsumers shuld nt limit their examinatin f the agreement t this slely. Step 3: Understand Service and Deplyment Mdel Differences Services ffered by clud prviders typically fall int ne f the three majr grups f service mdels: Infrastructure as a Service (IaaS), Platfrm as a Service (PaaS), and Sftware as a Service (SaaS). Fr each categry, there are significant differences in the levels f clud resurce abstractin, service level bjectives, and key perfrmance indicatrs that will ptentially be included in a clud SLA. In additin, the level f clarity varies significantly fr each service mdel. In general, PaaS and SaaS bjectives are less precise than IaaS bjectives since the variety f slutins and applicatins ffered by prviders is much brader fr these service mdels. Table 3 highlights the different SLA cnsideratins fr each f the clud service mdels. Table 3. SLA cnsideratins fr Service Mdels Cpyright 2011 Clud Standards Custmer Cuncil Page 14

15 Service Mdel SLA Cnsideratins IaaS Clud IaaS SLAs are similar t SLAs fr netwrk services, hsting, and data center utsurcing. The main issues cncern the mapping f high level applicatin requirements n infrastructure services levels. Metrics are well understd acrss the IaaS abstractins (cmpute, netwrk, and strage). Cnsumers shuld expect t find the fllwing metrics in their clud SLA. Cmpute metrics: availability, utage length, server rebt time Netwrk metrics: availability, packet lss, bandwidth, latency, mean/max jitter Strage metrics: availability, input/utput per secnd, max restre time, prcessing time, latency with internal cmpute resurce Cmpute metrics usually exclude service levels fr cmpute perfrmance. Cnsumers are simply guaranteed t have the cmpute resurces fr which they paid with technical enfrcement at the hypervisr level. Netwrk metrics in a clud SLA generally cver the clud prvider's data center cnnectivity t the Internet as a whle, nt t any specific prvider r cnsumer. Denial-f-service (DS) attacks may be explicitly excluded frm the SLA even if the prvider ffers prtectin via firewalls and intrusin detectin systems. There are several standardizatin effrts within the IaaS space which help describe and manage the services ffered at this level. 4 Whenever pssible, cnsumers shuld ensure the clud SLA includes prvisins requiring their clud prviders t supprt pen standard interfaces, frmats and prtcls t increase interperability and prtability. PaaS Tw main appraches exist fr building PaaS slutins: integrated slutins and deplybased slutins. When reviewing the PaaS SLA, cnsumers shuld cnsider tradeffs in flexibility, cntrl, and ease f use t determine which apprach best meets their business needs. Integrated slutins, like Ggle App Engine (GAE) 5, are web accessible develpment envirnments which enable develpers t build an applicatin using the infrastructure and middleware services supprted by the clud prvider. Management f the applicatin and its executin is primarily cntrlled by the clud 4 IaaS standards include: DMTF CIMI (Clud Infrastructure Management Interface), DMTF OVF (Open Virtualizatin Frmat), SNIA CDMI (Clud Data Management Interface), The Open Grup s SOCCI (Service-Oriented Clud- Cmputing Infrastructure), OGF OCCI (Open Clud Cmputing Interface), the ISO Study Grup n Clud Cmputing (SGCC), and de-fact industry alignment n IaaS service level bjectives, warranties, guarantees, perfrmance metrics, etc. 5 Refer t fr infrmatin n Ggle App Engine. Cpyright 2011 Clud Standards Custmer Cuncil Page 15

16 prvider. Typically, service develpers nly have access t a prvider-defined set f APIs (Task API in GAE) which ffer limited cntrl n the crdinatin f cde executin. Deply-based slutins enable deplyment f middleware n tp f resurces acquired frm an IaaS clud prvider, ffering deplyment services t the cnsumers which autmate the prcess f installatin and cnfiguratin f the middleware. 6 These PaaS slutins ffer a rich set f management capability including the ability t autmatically change the number f machines assigned t an applicatin, and selfscaling accrding t the applicatin s usage. Cnsumers must distinguish between PaaS develpment envirnments and PaaS prductin envirnments when reviewing their clud PaaS SLA. PaaS prductin envirnments will typically require mre stringent service level bjectives than PaaS develpment envirnments. The state f PaaS metrics is currently immature with metrics varying significantly acrss prviders. Standards initiatives are just starting t emerge in this space. In the meantime, cnsumers are advised t identify the PaaS services that are critical t their business and ensure that their clud SLAs cntain clear and measurable metrics fr these services. Standards that help identify PaaS services ffered by clud prviders and standard interfaces fr cmmunicating with PaaS prviders t prvisin r manage PaaS envirnments are als lacking. The lack f standards results in pr prtability and interperability acrss prviders. Standards, like OASIS TOSCA 7, are emerging which will help address this issue. Cnsumers shuld ensure their clud SLA includes supprt fr pen standards, as they becme available, t reduce vendr lck in. SaaS Given the wide variatin f services prvided at the SaaS level, it is difficult t prvide a cmprehensive and representative list f SaaS service level bjectives fr cnsumers t lk ut fr in their clud SLAs. Cnsumers shuld expect general SaaS service level bjectives like mnthly cumulative applicatin dwntime, applicatin respnse time, persistence f cnsumer infrmatin, and autmatic scalability t be included in their SLA. Cnsumers shuld ensure that data maintained n the prvider s clud resurces be stred using standard frmats t ensure data prtability in the event that a mve t a different prvider is required. 6 Deply-based slutins are supprted by cmmercial prviders like IBM, Oracle and Micrsft as well gvernment spnsred prjects like OPTIMIS, CONTRAIL, Clud4SOA and mosaic in Eurpe. 7 Refer t fr details n TOSCA. Cpyright 2011 Clud Standards Custmer Cuncil Page 16

17 In additin t service mdels, service deplyment terms shuld be included in a clud SLA. These terms shuld clarify t bth parties signing the SLA the infrmatin required t verify the crrectness f deplyment actins. Specifically, these terms shuld identify: Deplyment mdel Deplyment technlgies adpted The deplyment mdel included in the SLA shuld clearly specify ne f the fllwing ptins: Private, Cmmunity, Public, r Hybrid. Cnsumers must be well educated n the characteristics and differences in each f these deplyment mdels since ptential value and risk varies significantly. 8 Table 4 highlights the different SLA cnsideratins acrss the deplyment mdels. 9 Table 4. SLA cnsideratins fr Deplyment Mdels Deplyment Mdel SLA Cnsideratins Private (On-site) SLA cnsideratins fr Private (On-site) are similar t thse f a traditinal enterprise IT SLA. Hwever, given that data center resurces may be shared by a larger number f internal users, cnsumers must ensure that critical service bjectives like availability and respnse time are met via nging measurement and tracking. Private (Outsurced) SLA cnsideratins fr Private (Outsurced) are similar t Private (On-site) except clud services are nw being prvided by an external clud prvider. The fact that IT resurces frm the prvider are dedicated t a single cnsumer mitigates ptential security and availability risks. Cnsumers shuld ensure the clud SLA specifies security techniques fr prtecting the prvider's perimeter and the cmmunicatins link with the prvider. Cnsumers shuld cnsider the criticalness f the service being deplyed t justify the added expense f this mdel ver the Public mdel. Public SLA cnsideratins fr the Public mdel are greater than the Private (Outsurced) mdel since the prvider s IT resurces are nw shared acrss multiple cnsumers. As a result, cnsumers shuld carefully review the clud SLA t understand hw the prvider addresses the added security, availability, reliability and perfrmance risks intrduced by multi-tenancy. The ability t measure and track specific service level bjectives becmes mre 8 Refer t the Practical Guide t Clud Cmputing fr cnsideratins n selecting a deplyment mdel. 9 The Cmmunity deplyment mdel is nt called ut explicitly in the table since it is very similar t the Public deplyment mdel. Cpyright 2011 Clud Standards Custmer Cuncil Page 17

18 imprtant in the Public deplyment mdel. Cnsumers shuld als ensure the clud SLA prvides adequate methds and prcesses fr nging measurement. Hybrid SLA cnsideratins fr the Hybrid mdel are similar t the Public mdel with the increased likelihd fr unique integratin requirements between clud and enterprise services. As a result, cnsumers shuld ensure the clud SLA adequately cvers their service and data integratin requirements. In additin t specifying the deplyment mdel, the SLA shuld clarify hw a service is made available t service users n a given clud prvider, fr example: A web applicatin is deplyed n an applicatin server as a WAR file 10 (the applicatin server enables WAR uplading). A grid applicatin is deplyed n a grid cntainer as a GAR (Grid Archive) file. A virtual machine is deplyed n an IaaS prvider as a virtual machine disk image that may be represented in ne f many different frmats. Adptin and supprt fr standards like the Distributed Management Task Frce (DMTF) Open Virtualizatin Frmat 11 (OVF) is recmmended. When SLAs are signed, a clear descriptin f the technlgies invlved in the deplyment f services may be specified (fr example, WAR, GAR, OVF, etc.). Nte that there is a clse relatinship between deplyment technlgies and the kind f services being ffered. Step 4: Identify Critical Perfrmance Objectives Perfrmance gals within the cntext f clud cmputing are directly related t efficiency and accuracy f service delivery. Perfrmance cnsideratins ften include: availability, respnse time, transactin rate, prcessing speed, but can include many ther perfrmance and system quality perspectives. 12 Cnsumers must decide which measures are mst critical t their specific clud envirnments and ensure these measures are included in their SLA. Perfrmance statements that are imprtant t the clud cnsumer shuld be measureable and auditable, and dcumented in the SLA prviding a cmfrt level t bth parties. Perfrmance cnsideratins are dependent n the supprted service mdel (IaaS, PaaS and SaaS) and the type f services prvided within that mdel, fr example, netwrk, strage and cmputing services fr IaaS. 10 Refer t fr mre infrmatin n the WAR (Web applicatin ARchive) file. 11 Refer t fr mre details. 12 System quality measures that culd be included in service perfrmance include accuracy, prtability, interperability, standards cmpliance, reliability, scalability, agility, fault tlerance, serviceability, usability, durability, etc. Cpyright 2011 Clud Standards Custmer Cuncil Page 18

19 Of curse, in rder fr perfrmance bjectives t be meaningful, measurement is a critical cnsideratin where clarity and cnsistency are very imprtant, if nt crucial, t gain trust in the clud. Measuring withut cntext is useless and perfrmance metrics are n different. It must be clear hw the metric will be used and what decisins will be made frm the metrics, cntinually evaluating and aligning with specific gals and bjectives. This sectin will fcus n tw perfrmance metrics: availability and respnse time. The intentin is t prvide a basic framewrk t help identify and define clud metrics that will be meaningful and cnsistent. This sectin is nt meant t be exhaustive - it des nt cntain all the ptential metrics and pssible definitins. Many f the measurement and metric definitins may already be supprted by yur clud prvider; therefre the specific interpretatin f the term in cntext f a specific slutin is critical. Sme calibratin may be required between existing captured measures and thse specifically requested as part f the SLA. Industry standard measures with applicable definitins shuld be used t imprve cnsistency, enabling meaningful cmparative and trend analysis. Fr instance, IEEE als has gd measurement definitins and categrizatins fr activities such as maintenance. 13 Other rganizatins and private benchmarks exist. The key is t always calibrate values t get an apple t apples cmparisn t an apprpriate level f accuracy. T be effective, a perfrmance metric must be clearly defined in the SLA and understd by bth parties. Here are the generally accepted definitins fr the tw metrics f interest: Availability. Percentage f uptime fr a service in a given bservatin perid. Respnse time. Elapsed time frm when a service is invked t when it is cmpleted including delays (typically measured in millisecnds). Table 5 describes three different example scenaris (netwrk availability, strage availability, and service respnse time) and the specific perfrmance infrmatin required fr each. Table 5. Availability and Respnse Time metrics examples Netwrk Availability (example) Strage Availability (example) Service Respnse Time (example) Metric Name in SLA Netwrk Percentage Available Critical Business Hurs Strage Percentage Available Service XXX Respnse Time in a Given Hur; Service YYY Respnse Time in a Given Hur. 13 Other standard measures include the Internatinal Sftware Measurement Assciatin Internatinal Functin Pint Users Grup that retains several sftware measurement guidelines (such as ISO/IEC 20926) that are used fr benchmarking and wrks clsely with the Internatinal Sftware Benchmarking Standards Grup. Cpyright 2011 Clud Standards Custmer Cuncil Page 19

20 Cnstraints Critical time is business hurs 12AM GMT t 12PM GMT Mnday thru Friday N cnstraints Respnse times will nly be evaluatd fr services XXX and YYY which are PaaS reuseable services that will be invlked by ur applicatins. Cllectin Methd Machine Machine Machine Cllectin Descriptin Using the DMTF, OGF 14, r ther standard t cnsistently cllect the measures. Using the DMTF, OGF, r ther standard t cnsistently cllect the measures. Using the DMTF, OGF, r ther standard t cnsistently cllect the measures. Frequency f Cllectin The netwrk is pinged every ne minute. Specific strage services (read and update) are randmly pinged every ne minute. Fr each XXX and YYY service invked, the respnse time will be cllected. Other Infrmatin Cnsidered 60 secnds f uptime fr each successful ping. Cnsidered 60 secnds f uptime fr each successful ping. Each service will be reprted separately. Hurly averages will be calculated. Clarificatin N reference t quality r availability f specific service. This is exclusively a measure f netwrk availability. N reference t quality r availability f specific service. This is exclusively a measure f strage availability. N idividual services reprting is needed (fr example, listing f all services that exceeded SLA agreed respnse time). Usage 1 in SLA Netwrk availability will be 99.5% between 12AM GMT t 12PM GMT Mnday thru Friday. Strage availability will be 99.9%. Respnse time fr XXX service must be less than 500 MS, YYY service less than 200 MS. Usage 2 in SLA Fr any day when netwrk availability is less than 99.5%, a 20% discunt will be applied fr the entire day netwrk charges. Fr any day when strage availability is less than 99.9%, a 50% discunt will be applied fr the entire day strage charges. If in any given hur the respnse times as stated are nt met, all services f that type during that hur will be prcessed at n charge. Clud resurces, bth hardware and facilities, shuld als be cnsidered when assessing critical perfrmance bjectives fr clud SLAs. Hardware includes: cmpute (CPU and memry), netwrks (ruters, firewalls, switches, netwrk links, and interfaces), strage cmpnents (hard disks), and any ther physical cmputing infrastructure elements. Facilities include: heating, ventilatin and air cnditining (HVAC), pwer, cmmunicatins, and ther aspects f the physical plant. Resurces need t be clearly stated in the SLA t clarify scpe, cnstraints and expectatins fr the clud cmputing services f interest. T be successful, higher level business bjectives and gals need t be understd such that critical resurce metrics can be identified that address facility and hardware 14 Refer t fr mre infrmatin n the Open Grid Frum. Cpyright 2011 Clud Standards Custmer Cuncil Page 20

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Practical Guide to Cloud Service Agreements Version 2.0

Practical Guide to Cloud Service Agreements Version 2.0 Practical Guide t Clud Service Agreements Versin 2.0 April, 2015 Cntents Acknwledgements... 3 Revisins... 3 Intrductin... 4 The Current CSA Landscape... 4 Guide fr Evaluating Clud Service Agreements...

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Practical Guide to Cloud Service Agreements Version 2.0

Practical Guide to Cloud Service Agreements Version 2.0 Practical Guide t Clud Service Agreements Versin 2.0 April 2015 Cntents Acknwledgements... 3 Revisins... 3 Intrductin... 4 The Current CSA Landscape... 4 Guide fr Evaluating Clud Service Agreements...

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Corporate Standards for data quality and the collation of data for external presentation

Corporate Standards for data quality and the collation of data for external presentation The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published

More information

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.

Vendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office. Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1 Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

Table of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

Table of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT Draft Regulatry Cmpliance Management Guideline Released by the Office f the Superintendent f Financial Institutins May 5, 2014 On April 30, 2014, the Office f the Superintendent

More information

HOW TO SELECT A LIFE INSURANCE COMPANY

HOW TO SELECT A LIFE INSURANCE COMPANY HOW TO SELECT A LIFE INSURANCE COMPANY There will prbably be hundreds f life insurance cmpanies t chse frm when yu decide t purchase a life insurance plicy. Hw d yu decide which ne? Mst cmpanies are quite

More information

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm

More information

Guidelines for Outsourcing, Offshoring, and Cloud Services

Guidelines for Outsourcing, Offshoring, and Cloud Services Preview Guidelines fr Outsurcing, Offshring, and Clud Services Frewrd Data security and data prtectin challenges arise in mst utsurcing and ffshring transactins, particularly where services are clud based.

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

Risk Management Policy AGL Energy Limited

Risk Management Policy AGL Energy Limited Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Revised Critical Infrastructure Prtectin Reliability Standards Dcket N. RM15-14-000 Statement f Thmas F. O Brien Vice President & Chief Infrmatin

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

How To Deal With A Data Breach In The European Law

How To Deal With A Data Breach In The European Law Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Support Services. v1.19 / 2015-07-02

Support Services. v1.19 / 2015-07-02 Supprt Services v1.19 / 2015-07-02 Intrductin - Table f Cntents 1 Intrductin... 3 2 Definitins... 4 3 Supprt Prgram Feature Overview... 5 4 SLA fr the Supprt Services... 6 4.1 Standard Supprt... 6 4.2

More information

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

Oracle Cloud Enterprise Hosting and Delivery Policies

Oracle Cloud Enterprise Hosting and Delivery Policies Oracle Clud Enterprise Hsting and Delivery Plicies Statement f Changes Versin 1.5, 6/01/2015 This dcument utlines changes made t the Oracle Clud Enterprise Hsting and Delivery Plicies dated December 1,

More information

The Importance of Market Research

The Importance of Market Research The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

Service Level Agreement Distributed Hosting and Distributed Database Hosting

Service Level Agreement Distributed Hosting and Distributed Database Hosting Office f Infrmatin Technlgy Services Service Level Agreement Distributed Hsting and Distributed Database Hsting Nvember 12, 2013 Service Descriptin Distributed Hsting and Distributed Database Hsting Service

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Maintain a balanced budget primarily the General & Park Funds

Maintain a balanced budget primarily the General & Park Funds EXHIBIT B City f Chic Budget Cntingency Plan P The purpse f the Budget Cntingency Plan is t establish a guideline and general apprach t respnd t adverse financial and ecnmic cnditins that culd negatively

More information

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Vulnerability Management:

Vulnerability Management: Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM Audit Manual Sectin J SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM Ref. Plicy and Practice Requirements IIA Standards and Other references J 1 Plicy: The Head f Internal Audit shall develp and maintain

More information

Business Continuity Management Systems Foundation Training Course

Business Continuity Management Systems Foundation Training Course Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information

IT CHANGE MANAGEMENT POLICY

IT CHANGE MANAGEMENT POLICY IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE

More information

SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER

SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER SYSTEM MONITORING PLUG-IN FOR MICROSOFT SQL SERVER Oracle Enterprise Manager is Oracle s integrated enterprise IT management prduct line, prviding the industry s first cmplete clud lifecycle management

More information

Connect Applications Service Annex to General Services Schedule Connect Acceleration

Connect Applications Service Annex to General Services Schedule Connect Acceleration 1 Definitins The fllwing definitins apply, in additin t thse in the General Terms and Cnditins and the General Service Schedule. Applicatin means a cmputer prgram r prgrams supprting a business task fr

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Captive outsourcing models

Captive outsourcing models Captive utsurcing mdels India TP hygiene wrkshp Presenter: Vishnu Bagri Octber 23, 2013 2013 Transfer Pricing Assciates Hlding B.V. BACKDROP + India has evlved as a premier utsurcing hub fr IT, ITES, engineering

More information

Internet Service Definition. SD012v1.1

Internet Service Definition. SD012v1.1 Internet Service Definitin SD012v1.1 Internet Service Definitin Service Overview InTechnlgy Internet Service is a permanent Internet cnnectivity slutin. The service cnnects custmers t the InTechnlgy natinal

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

HP ValuPack Consulting Description Red Hat Linux System Performance Monitoring & Tuning

HP ValuPack Consulting Description Red Hat Linux System Performance Monitoring & Tuning HP ValuPack Cnsulting Descriptin Red Hat Linux System Perfrmance Mnitring & Tuning HP ValuPacks are standardized cnsulting services, prvided by HP Slutin Center Service Prfessinals, with pre-defined custm

More information

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012 Army DCIPS Emplyee Self-Reprt f Accmplishments Overview Revised July 2012 Table f Cntents Self-Reprt f Accmplishments Overview... 3 Understanding the Emplyee Self-Reprt f Accmplishments... 3 Thinking Abut

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

ELECTRICITY FRC IN WA KEY MESSAGES

ELECTRICITY FRC IN WA KEY MESSAGES ELECTRICITY FRC IN WA KEY MESSAGES REMC has analysed the likely benefits, csts, and issues assciated with implementing electricity full retail cntestability ( FRC ) in WA. This analysis is intended t assist

More information

We will record and prepare documents based off the information presented

We will record and prepare documents based off the information presented Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information