IT02 - Information Technology (IT) Security Policy

Size: px
Start display at page:

Download "IT02 - Information Technology (IT) Security Policy"

Transcription

1 IT02 - Informaton Technology (IT) Securty Polcy Introducton 1 Ths polcy apples to all IT serces admnstered by Southampton Solent Unersty. It contans: General prncples for nformaton securty, ts oerall objectes and scope and ts mportance as an enablng mechansm for nformaton sharng. A statement of management ntenton, supportng the goals. An explanaton of specfc securty polces, prncples, standards and complance requrements, ncludng: a b c d e Complance wth legslate and contractual requrements; Securty educaton requrements; Vrus preenton and detecton polcy; The general and specfc responsbltes for all aspects of nformaton securty; An explanaton of the process for reportng suspected securty ncdents. 2 Ths document s based on BS7799-1:1999. Securty Organsaton 3 Management Informaton and Technology Commttee (MITC) s responsble for reewng and recommendng the IT Securty Polcy. Informaton and Communcatons Technology (ICT) wll act as ts executor. From tme to tme, ICT wll present to MITC reports of major ntates to enhance nformaton securty and reports on threats and breaches. 4 ICT wll coordnate and prode support where approprate on ssues assocated wth nformaton securty. It s an ntegral part of the nducton programme for all users actng n a staff-capacty (hereafter referred to as staff). 5 Each School and Serce s responsble for settng authorsaton leels for ther own staff and where approprate for staff across the Unersty. Owners of nformaton systems are responsble for ts data and must clearly state the leel of access for each user. 6 To ensure that the nstallaton of new equpment wll not adersely affect the securty of the exstng nfrastructure, the followng process must be followed. 7 Each nstallaton of IT equpment must hae the approprate approal from ICT to ensure that t conforms to the releant securty polces and requrements before connecton to any Unersty IT serce. IT02 - Informaton Technology (IT) Securty Polcy Page 1 of 18

2 8 ICT offers specalst adce on ssues assocated wth nformaton securty threats. Ths coers possble unauthorsed access to data, as well as data corrupton due to ruses or other means. Thrd Partes 9 Ths secton concerns access by thrd partes, users other than the Unersty's staff or students, who requre non-publc access to the Unersty's nformaton and IT systems. All thrd partes who are gen access to the Unersty's nformaton and IT systems, whether supplers, customers or otherwse, must agree to follow the Unersty's IT polces. 10 All thrd partes who need to access the Unersty s nformaton and IT systems must hae a Unersty sponsor. The sponsor must be a member of staff who s responsble for mantanng the operatonal relatonshp between the Unersty and the thrd party. The sponsor must prode to ICT a clear statement of the busness requrements for access and must lase wth ICT to document and mantan a clearly defned access polcy statement that defnes the access rghts for each user or group of users. The polcy must take nto account the securty requrements of ther access and the polces for nformaton dssemnaton and enttlement. The sponsor must notfy ICT of any changes n relatonshps e.g. a need to wthdraw logn access. 11 All rsks nolng thrd party access to the Unersty's nformaton and IT systems must be dentfed and documented and sutable controls mplemented before access s granted. Access must be controlled such that the mnmum access necessary s proded. Unersty staff or students must not permt any nformaton securty safeguards to be bypassed or allow napproprate leels of access to the Unersty's nformaton and IT systems. Unersty staff or students must not dulge ther personal logn credentals to anyone else. 12 Confdentalty agreements must be sgned by the thrd partes where nformaton beng dsclosed or made accessble s of a confdental, senste or aluable nature. 13 Remote access by thrd partes to the Unersty's nformaton and IT systems must be controlled by secure access control protocols usng approprate leels of encrypton and authentcaton. 14 Unersty staff responsble for agreeng mantenance and support contracts wll ensure that the contracts beng sgned are n accord wth the content and sprt of Southampton Solent Unersty's nformaton securty polces. 15 Any facltes management, outsourcng or smlar company wth whch Southampton Solent Unersty may do busness must be able to demonstrate complance wth Southampton Solent Unersty's nformaton securty polces and enter nto bndng serce leel agreements that specfy the performance to be delered and the remedes aalable n case of non-complance. 16 All contracts wth external supplers for the supply of serces to Southampton Solent Unersty must be montored and reewed to ensure that nformaton securty requrements are beng satsfed. Contracts must nclude approprated prosons to ensure the contnued securty of nformaton and systems n the eent that a contract s termnated or transferred to another suppler. IT02 - Informaton Technology (IT) Securty Polcy Page 2 of 18

3 17 Arrangements nolng thrd party contracts must hae the followng securty tems ncluded n the contract: General polcy on nformaton securty; Permtted access methods; A descrpton of the serce to be made aalable; Tmes and dates when the serce s to be aalable; The respecte labltes of the partes to the agreement; Procedures regardng protecton of Unersty assets ncludng data; Responsbltes wth respect to legal matters e.g. data protecton legslaton; That the Unersty has the rght to montor and reoke thrd party actty; x x x x The responsbltes regardng hardware and software nstallaton and mantenance; The rght to audt contractual responsbltes; Any restrctons on copyng and dsclosng nformaton and ssues assocated wth ntellectual property rghts; Measures to ensure the return or destructon of nformaton at the end of the contract; x Any physcal protecton measures that are requred; x Any mechansms to ensure that securty measures are followed; x Measures to ensure protecton aganst the spread of computer ruses; x An authorsaton process for user access; x Arrangements for reportng and nestgatng securty ncdents; x Any arrangements for physcal access to on-ste equpment. Assets Classfcaton and Control 18 Inentores of assets help to ensure that effecte securty protecton s mantaned. An nentory should be drawn up for each major asset assocated wth each nformaton system. Each asset must be clearly dentfed and ts owner and ts securty classfcaton documented. 19 The assets assocated wth nformaton systems nclude the followng: The nformaton assets such as databases, documentaton, operatonal procedures etc.; Software assets such as applcaton software and systems software; IT02 - Informaton Technology (IT) Securty Polcy Page 3 of 18

4 Physcal assets such as computers, communcatons equpment and magnetc meda. 20 The physcal and software assets nentores are managed by ICT. The Unersty classfes ts nformaton to ndcate the needs and prortes for securty protecton. The responsblty for defnng the classfcaton of an tem of nformaton and keepng an nentory of nformaton assets rests wth the orgnator. Personnel Securty 21 All Unersty staff wll recee approprate tranng on securty procedures and the correct use of IT serces before access to IT serces s granted. 22 Reports must be wrtten for any securty ncdents whch cause system falures, loss of serce, errors resultng from ncomplete or naccurate data, or breaches of confdentalty, and sent to the Drector of ICT. Physcal and Enronmental Securty 23 The followng lsts the controls for secure areas: Seeral rooms hae been dentfed as beng hgh securty areas. Major tems of network equpment are housed n secure areas throughout the Unersty. The computer room has been dentfed as hang the hghest securty; Hgh securty areas can only be entered through access-controlled doors. All other doors are kept locked except where access s requred for purposes such as delery of equpment. Access rghts to the secure areas wll be reoked mmedately for staff who leae employment. Thrd party personnel supplyng or mantanng systems should be granted access to the secure areas only when requred and authorsed. Where approprate, ther access may be restrcted and ther acttes montored. When acated, secure areas must be physcally locked; Computer consumables, such as statonery, must not be stored wthn the computer room untl requred. Fallback equpment and back-up meda must be sted n a dfferent buldng to aod damage from a dsaster at the man ste; Smoke detectors and fre extngushng systems are nstalled n the man computer room; 24 The followng lsts the controls to preent compromse or theft of nformaton: Confdental or senste data stored on paper, dskettes, CDs or USB memory keys should be kept n a locked cabnet when not n use; Computers must be ether shut down and powered off, logged out of and left at the logon screen or password locked (where allowed) when not n use; IT Equpment, data or software, must not be taken off ste by Unersty users wthout documented authorsaton from the Drector of ICT (or a sutable deputy). IT02 - Informaton Technology (IT) Securty Polcy Page 4 of 18

5 25 The followng lsts the controls for equpment securty: IT equpment should be sted so as to reduce the rsk and opportuntes for unauthorsed access. Montor screens dsplayng senste data should be postoned to reduce the rsk of beng oerlooked. All equpment should be labelled and, f deemed necessary, marked wth INDSOL Tracer; Unnterruptble power supples should be proded for equpment supportng the crtcal busness operatons; Network cablng and network traffc should be protected from unauthorsed ntercepton or montorng by staff or students; Repars and sercng of the equpment must only be carred out by authorsed personnel. A record of all faults or suspected faults must be kept on the Helpdesk system; IT equpment, regardless of ownershp, used outsde the Unersty s premses to support the busness actty should be subject to Unersty management authorsaton and wth an equalent degree of securty protecton as that of on-ste IT equpment. The followng gudelnes should be used: a b c Personal computers should not be used at home for busness acttes unless up-to-date rus detecton software s nstalled; When traellng, equpment and meda must not be left unattended n publc places. Portable computers should be carred as hand luggage when traellng; Portable computers whch are ulnerable to theft, loss or unauthorsed access when traellng, must be proded wth an approprate form of access protecton e.g. passwords to preent unauthorsed access to ther content. All tems of equpment contanng storage meda or any remoal magnetc meda should be checked to ensure that any senste data or lcense software are remoed or oerwrtten pror to dsposal; Computers, Serers and Network Management Serers and Systems 26 Operatng procedures should exst to coer the followng areas: Serer start-up and shutdown procedures; Back-up procedures; Instructons for handlng errors and exceptonal condtons; System restart and recoery procedures for use n the eent of system falure. 27 Logs must be wrtten for any ncdents that cause system falures, loss of serce, or breaches of confdentalty. In seere eents, a report should be wrtten IT02 - Informaton Technology (IT) Securty Polcy Page 5 of 18

6 analysng and dentfyng the cause of the ncdent, and recommendng the mplementaton of remedes to preent recurrence. Edence of the securty breach should be part of the report along wth any audt tral. Actons taken to correct and recoer from a securty breach should be documented. The tems that may appear n the report nclude: Edence n relaton to a potental breach of the employment contract or student regulaton; Edence n the eent of proceedng under a breach of the law. 28 Segregaton of dutes mnmses the rsk of neglgent or delberate system msuse and consderaton should be gen by management for separatng the executon of certan dutes and areas of responsblty. Areas of hgh rsk nclude fnancal, personnel and student records. 29 Segregaton of deelopment and operatonal serces s desrable to reduce the rsk of accdental changes or unauthorsed access to operatonal software and data. The followng controls should be consdered and may be mplemented dependng on fnancal consderatons: Deelopment and operatonal software should where possble be run on dfferent serers or n dfferent domans or drectores; Dfferent usernames and passwords should be used on deelopment systems than on operatonal systems. 30 Acceptance crtera for new systems should be establshed and sutable tests carred out pror to acceptance. The requrements and crtera for acceptance of new computer systems should be clearly defned, agreed, documented and tested. The followng tems should be consdered: Performance and computer capacty requrements; Preparaton of error recoery and restart procedures, and computer contngency plans; Preparaton and testng of routne operatng procedures to defned standards; Edence that nstallaton of the new system wll not adersely affect exstng systems, partcularly at peak processng tmes; Tranng n the operaton or use of new systems. 31 For major new deelopments, the users should be consulted at all stages n the deelopment process to ensure the operatonal effcency of the proposed system desgn. Approprate tests should be carred out to confrm that all acceptance crtera are fully satsfed. Vrus Detecton 32 Vrus detecton and preenton measures must be mplemented on all computers and users should ensure that the ant-rus software s beng used. IT02 - Informaton Technology (IT) Securty Polcy Page 6 of 18

7 33 Actons aganst major rus nfecton occurrences wll be managed by ICT, who may shutdown the network nfrastructure and/or serces wthout notce, to lmt the damage beng caused. Patches, fxes and rus eradcaton software may be forced to run on workstatons wthout the user s knowledge or consent. 34 Vrus 'repar' software should be used wth cauton and only n cases where rus characterstcs are fully understood and the correct repar s certan. Data and Software Backup 35 Backup copes of essental busness data and software are taken regularly. 36 Backup arrangements for central systems are the responsblty of ICT and must meet the followng mnmum standards: A mnmum leel of backup nformaton, together wth logs of the backup copes, are stored n a remote locaton, at a suffcent dstance to escape any damage from a dsaster at the man ste. At least three generatons of backup data should be retaned for mportant busness applcatons; Backup data should be gen an approprate leel of physcal control. The controls appled to meda at the man ste should be extended to coer the backup ste; Backup data should be regularly tested, where practcable, to ensure that t can be reled upon for emergency use when necessary. Data owners should specfy the retenton perod for essental busness data and also any requrement for arche copes to be permanently retaned. 37 Backup arrangements for Personal Computers are the responsblty of the School or Serce but must meet the followng mnmum standards: A mnmum leel of back-up nformaton, together wth accurate and complete records of the backup copes, should be stored n a remote locaton, at a suffcent dstance to escape any damage from a dsaster at the man ste. At least three generatons of back-up data should be retaned for mportant busness applcatons; Backup data should be gen an approprate leel of physcal securty, consstent wth the standards appled at the man ste; Backup data should be tested, where practcable, to ensure that they can be reled upon for emergency use when necessary; Procedures for handlng senste data such as cheques, noces and payroll records should be establshed n order to protect such data from unauthorsed dsclosure or msuse. Fault Logs 38 IT staff should mantan a log of all operatons carred out. A separate fault log should be kept for central serers and network systems that lst faults reported and actons taken. The fault logs should be reewed regularly to ensure that problems hae been satsfactorly resoled. Correcte measures should be IT02 - Informaton Technology (IT) Securty Polcy Page 7 of 18

8 reewed to ensure that securty controls hae not been compromsed and that the acton taken s fully authorsed. Network Controls 39 A range of securty controls s requred for computer networks. Approprate controls must be establshed to ensure the securty of data n networks and the protecton of connected serces from unauthorsed access. In partcular, the followng tems should be addressed: Responsbltes and procedures for the management of remote access must be establshed; Specal controls should be establshed, f necessary, to safeguard the confdentalty and ntegrty of data passng oer publc networks; Staff and student data networks must be confgured to ensure that unauthorsed access through network lstenng s aoded; Protecton of the Unersty s nfrastructure and nformaton by the approprate use of frewall technology. Computer Meda and Documentaton 40 Procedures for the management of remoable computer meda such as CDs, USB storage and prnted reports should nclude the followng controls: Use a data storage system that aods the use of descrpte labels; Storage of meda n a safe secure enronment; All procedures and authorsaton leels to meda should be clearly documented. 41 Computer meda should be dsposed of securely and safely when and no longer requred. Clear procedures for the secure dsposal of meda should be establshed. The followng gudelnes should be ncluded: Meda contanng senste nformaton should be dsposed of securely and safely by ncneraton or shreddng or erasng the data from magnetc meda; Dsposal of some senste tems may requre loggng for future reference and to mantan an audt tral. 42 Procedures for handlng senste data such as cheques, noces, credt card detals and payroll records must be establshed n order to protect such data from unauthorsed dsclosure or msuse. The followng tems must be coered: Handlng and labellng of the meda; Where requred a mantenance of a formal record of the authorsed recpents of data; Reew of dstrbuton lsts and lsts of authorsed recpents. IT02 - Informaton Technology (IT) Securty Polcy Page 8 of 18

9 43 System documentaton may contan a range of senste nformaton e.g. descrptons of applcaton processes, procedures, data structures, authorsaton processes. The followng controls should be appled to protect system documentaton from unauthorsed access: System documentaton should be secure; The dstrbuton lst for system documentaton should be kept to a mnmum and access to such documentaton should be restrcted to authorsed personnel only; Computer generated documentaton should be stored separately from the applcaton system and assgned an approprate leel of access protecton. Data and Software Data Exchange 44 Formal agreements must be establshed for the exchange of data between the Unersty and external organsatons. The securty contents of such agreements must reflect the senstty of the nformaton noled. Agreements must nclude the followng: Management responsbltes for controllng and notfyng transmsson, despatch and recept; Procedures for notfyng transmsson, despatch and recept; Mnmum techncal standards for packagng and transmsson; The responsbltes and labltes n the eent of data loss; Data and software ownershp and responsbltes for data protecton and smlar consderatons; Any specal measures requred to protect ery senste tems. 45 Computer meda can be ulnerable to unauthorsed access, msuse or corrupton durng transportaton. The followng controls must be appled to safeguard computer meda when beng transported between stes: Relable transport or courers must be used; Packagng must be suffcent to protect the contents aganst any physcal damage lkely to rse durng transt; Specal measures must be adopted when necessarly to protect senste nformaton. Ths may nclude the use of locked contaners or delery by hand. 46 Controls should be appled, where necessary, to reduce the busness and securty rsks assocated wth electronc data nterchange, e-mal and onlne transactons. Issues that should be addressed nclude the followng: IT02 - Informaton Technology (IT) Securty Polcy Page 9 of 18

10 The ulnerablty of data or messages to unauthorsed access or modfcaton; The ulnerablty to error, e.g. ncorrect addressng or msdrecton, and the general relablty and aalablty of the serce; The securty and data protecton mplcatons of publshng drectory entres; Legal requrements assocated wth proof of orgn; The need for securty measures to control remote user access to computer accounts. 47 Controls for electronc commerce must nclude: Authentcaton customer and trader dentty; Authorsaton restrctng access to authorsed staff only; Contract confdentalty, proof of despatch and recept; Prcng confdentalty; Lablty and Settlement guardng aganst fraud and who carres the rsk. 48 The Unersty has a separate polcy regardng the status and use of emal especally wth regard to ts use for authorsaton purposes. 49 Care must be taken to protect the ntegrty of electroncally publshed nformaton to preent unauthorsed modfcaton whch could harm the reputaton of the Unersty. Informaton stored on Web serers accessble a the Internet needs to comply wth UK laws and Unersty rules. All electronc publshng systems ncludng the web-based ones should be carefully controlled so that: Informaton s obtaned and dsplayed n complance wth the data protecton legslaton; Informaton nput to, and process by the publshng system wll be complete, accurate and current; Senste nformaton wll be stored correctly. 50 Care should be taken to ensure that the exchange of nformaton through the use of oce, fax and deo communcaton serces are protected. Informaton could be compromsed due to: Phone-call beng oerheard; Message stored on an answerng machne beng oerheard, or beng played back by an authorsed person; Accdentally sendng faxes to the wrong telephone number. IT02 - Informaton Technology (IT) Securty Polcy Page 10 of 18

11 Software 51 Formal software agreements should be establshed for procured software between the Unersty and the software company. The securty contents of such an agreement must reflect the senstty of the busness nformaton noled. Agreements must nclude the followng: A software escrow agreement; Software ownershp and software copyrght complance; The responsbltes and labltes n the eent of data loss though software malfuncton; Access controls for remote connectons to the system and any specal measures requred to protect senste data tems. 52 Clear procedures and gudelnes are requred to control the busness and securty rsks assocated wth electronc offce systems and the use of electronc sgnatures. Requrements and ssues whch should be addressed nclude the followng: The possble need to exclude categores of senste busness nformaton; The need for a clear polcy and controls to manage data and nformaton sharng, e.g. shared data fles or the use of corporate electronc notce boards; The possble need to restrct access to dary nformaton relatng to selected ndduals; The sutablty, or otherwse, of the system to support busness applcatons, such as communcatng requests and authorsatons; The categores of staff and students that are allowed to use the system and the locatons from whch t may be accessed; The possble need to restrct selected serces to specfc categores of user; The polcy regardng retenton and back-up of nformaton held on the system; The requrements and arrangements for fall-back. User Access Management 53 There must be a formal user regstraton and deregstraton procedure for access to all mult-user IT serces managed by ICT. The user regstraton process must nclude the followng. Check that the user has authorsaton from the system owner for the use of the serce; Check that the leel of access granted s approprate for the purpose and s consstent wth organsatonal securty procedures; IT02 - Informaton Technology (IT) Securty Polcy Page 11 of 18

12 Requre users to sgn undertakngs to ndcate that they understand the condtons of access; Ensure serce proders do not prode access untl the authorsaton procedures hae been completed; Mantan records of all persons regstered to use the serce; Immedately dsable the access rghts of users who hae changed jobs or left the organsaton; Perodcally check for, and remoe, redundant usernames and accounts that are no longer requred; Ensure that redundant usernames are not re-ssued to another user. 54 The use of specal prleges must be restrcted and controlled. A formal authorsng process must nclude the followng. Identfy the prleges assocated wth each system product e.g. operatng system, database management system and the staff to whch they need to be allocated. Mantan an authorsaton process and record all prleges allocated. Users who are assgned hgh prleges for specal purposes should use a dfferent username for normal use. 55 Passwords are currently the prncpal means of aldatng a user s authorty to access a computer serce. The allocaton of passwords must be controlled by a formal management process, the requrements of whch are as follows: Requre users to undertake to keep personal passwords confdental and group passwords solely wthn the members of the group. Ensure, where users are requred to mantan ther own passwords that they are proded ntally wth a secure temporary password whch they are forced to change on frst use. Temporary passwords are also proded when users forget a password, always subject to poste dentfcaton of the user. Coney temporary passwords to users n a secure manner. Coneyance of passwords through thrd partes or through unprotected (clear text) emal should be aoded. Expry dates for passwords may be set for some accounts; the perod should be determned by the applcaton owner. Ths perod should not be too short as ths results n passwords been wrtten down rather than remembered. A perod of sx months s recommended. All passwords must hae a mnmum length set. At least sx alphanumercal characters s recommended. 56 To mantan effecte control oer access to data and formal process to reew users access rghts should be undertaken. Ths process should ensure that users IT02 - Informaton Technology (IT) Securty Polcy Page 12 of 18

13 access capabltes are reewed at regular nterals; a perod of 12 months s recommended. Access Control Network Access Control 57 Network serces that can be accessed by an nddual user must be consstent wth the access control polcy. 58 Connectons by remote users to Unersty systems requres secure authentcaton, unless t s to access Internet-facng web serers contanng publc nformaton only. In cases where content s more senste ths may be supplemented by the use of secure access to thn clent serers or the use of VPN software. 59 Computers or serers that hae remote access for use by thrd party mantenance engneers must be protected. The access must be dsabled untl requred and only enabled followng an arrangement between ICT staff and the mantenance engneers. Each request for access must be documented. 60 Serers must be protected from unauthorsed access and the network from packet lstenng. The Unersty network as a whole must be protected by a defned securty permeter wth a sngle frewall actng as a network gateway. 61 All equpment connectons to the Unersty network must be authorsed by ICT pror to use. Equpment must neer be connected to more than one network at a tme wthout authorsaton from networkng specalsts n ICT. 62 Network routng control, rtual LANS and network protocols are the responsblty of ICT. Computer Access Control 63 Access to serers must be a a secure logon process whch mnmses the opportunty for unauthorsed access. Where possble, the procedure must nclude the followng: Lmt the number of unsuccessful, consecute, logn attempts allowed. A lmt of three s recommended; On falure dsconnect and ge no assstance to the end user; Lmt the maxmum tme allowed for the logon procedure. If exceeded the system should termnate the logon; Where possble, after a successful logon the date and tme of preous successful logon and detals of any unsuccessful logon attempts snce the last successful logon should be dsplayed. 64 All users wll be allocated a unque account username for ther sole use whch should not be gen to another nddual. Usernames should not ge any ndcaton as to the user s prleged leel. In exceptonal crcumstances, where there s a clear beneft, shared usernames may be used. Approal by ICT management should be documented for such cases. IT02 - Informaton Technology (IT) Securty Polcy Page 13 of 18

14 Applcaton Access Control 65 Users of applcaton systems and systems utltes must be proded wth access to data n accordance wth a defned access polcy based upon the nddual requrements. 66 The access polcy must contan the followng controls: Access control to the applcaton system functon or system utlty; Controllng the access capablty of the end user to data tems. Ths ncludes read, wrte, update and delete. 67 Systems utltes that may oerrde system applcaton controls must be restrcted and tghtly controlled. 68 In order to mnmse the corrupton of computer programs, strct control must be mantaned oer access to source code. 69 On systems contanng senste data, audt trals recordng exceptons and other securty releant eents must be kept for an agreed perod to assst n future nestgatons nto any possble breaches. Such systems may be montored to ensure usage s correct. Any audt tral should nclude usernames, dates and tmes. 70 Specal care s requred when usng moble computng facltes such as laptops, notebooks, smartphones and tablets. Protecton must be n place to aod the unauthorsed access to or dsclosure of nformaton stored by these facltes. The equpment should hae nstalled on t up-to-date rus detecton software and, f connected to an ISP, a personal frewall. Care must also be taken to ensure that the equpment s protected aganst theft. Remote Access to End-user Computng Deces 71 ICT staff may, followng permsson beng granted by the end user, take full remote control of the computng dece for the purposes of dagnosng problems or the nstallaton of software. Such operatons must be carred out wth an audt log recordng all actons. Systems Deelopment and Mantenance 72 An analyss of securty requrements must be carred out at the requrements analyss stage of each deelopment project. The securty requrements must nclude how the system and the network wll safeguard the confdentalty, ntegrty and aalablty of nformaton for all serer enronments of that project, for example deelopment serers and producton serers. The analyss must nclude the followng: Access control to nformaton; Data ntegrty checks; Back-up and archng requrements; Protecton of the system from unauthorsed amendments. IT02 - Informaton Technology (IT) Securty Polcy Page 14 of 18

15 73 Wthn applcaton systems, data nput must be aldated whereer possble. Such controls must nclude:-out of range, nald characters, mssng or ncomplete data and nconsstent data. Where possble batch controls, balancng controls, aldaton processng and hash totals should be used to mnmse any data corrupton. 74 The need for cryptographc, encrypton or dgtal sgnature technques should be consdered to ensure confdentalty, authentcty and ntegrty of nformaton. 75 Strct control must be exercsed oer the mplementaton of software on operatonal systems. The followng controls must be exercsed: The updatng of operatonal programs must only be performed after authorsaton; If possble, source code should not be held on operatonal systems; Executable code must only be mplemented on operatonal systems after edence of successful testng and user acceptance s obtaned; An audt log must be mantaned for all updates; Preous ersons of software should be retaned as a contngency measure and le data must be backed up pror to mplementaton of a new erson of the program. 76 Testng usually requres substantal amounts of test data that s as close as possble to the le data. The use of test databases contanng real personal data must be aoded. If such data s used, t must be depersonalsed before use. 77 Formal change control procedures should be produced and should nclude the followng: Mantanng agreed authorsaton leels and obtanng approal before work commences; Reewng securty controls and ntegrty procedure to ensure that they wll not be compromsed by the changes; Identfyng all computer software, data fles, database enttes and hardware that requre amendments; Ensurng that the system documentaton s updated; Mantanng erson control and a log of all changes. 78 When the operatng system or the database management system s updated, the applcaton system should be reewed to ensure that there s no aderse mpact on securty or data ntegrty. 79 Modfcatons to endor suppled software packages should be dscouraged. In crcumstances where t s deemed essental to modfy the package or ts data, the followng ponts should be consdered: IT02 - Informaton Technology (IT) Securty Polcy Page 15 of 18

16 Whether any bult-n controls or ntegrty processes are compromsed by the modfcatons; Possble endor support problems; Possble problems assocated wth later ersons of the endor standard program; The Unersty becomng responsble for future mantenance of the software. 80 Programs should only be purchased or downloaded from a reputable source. Where software deelopment s outsourced, the followng must be consdered: Lcensng arrangements, ownershp and ntellectual property rghts; Contractual requrements for qualty, accuracy of work done. Busness Contnuty Management 81 There should be a managed process for mantanng a busness contnuty plan. The key elements should be: Understandng the rsks; Understandng the mpact of nterruptons; Consderng the acquston of a busness contnuty contract; Documentng plans; Regular testng and updatng of plans; Identfyng responsbltes. Complance wth Legal Requrements 82 The Unersty should draw to the attenton of all users the legal restrctons on the use of copyrght materal. Regular audts of software should be taken and software regsters mantaned. 83 Important Unersty records should be protected from loss or destructon. The followng steps should be taken: Gudelnes should be ssued on the retenton, storage, handlng and dsposal of records and nformaton; A retenton schedule should be drawn up by dentfyng record types and the perod of tme for whch they should be retaned. Legslaton 84 Personal nformaton (on lng ndduals who can be dentfed from the nformaton) that s stored or processed on a computer s subject to the Data IT02 - Informaton Technology (IT) Securty Polcy Page 16 of 18

17 Protecton Act 1998 and to all types of nformaton under the Freedom of Informaton Act Complance wth legslaton wll requre some form of management structure and control. An Offcer should prode gudance to managers, users and serce proders on ther nddual responsbltes and the specfc procedures that should be followed. It should be the responsblty of the owner of the data to nform the Offcer about any proposals to keep personal nformaton on a computer, and to ensure awareness wth the legslaton. 86 The use of Unersty IT serces s authorsed by ICT management. Any use of these serces for non-busness or unauthorsed purposes, wthout management approal wll be regarded as mproper use of the serces. If such actty s dentfed by usage montorng or by other means, t wll be brought to the attenton of the lne management concerned for approprate dscplnary acton. 87 Unersty users are adsed that no access s permtted except that whch s formally authorsed. Securty Reews of IT Systems 88 All areas wthn the Unersty should consder undertakng regular reews to ensure or complance wth a securty polces and standards. 89 IT serces should be regularly checked for complance wth securty mplementaton standards. Other Sources of Informaton 90 Other Unersty IT polces: IT01 IT Acceptable Use Polcy; IT03 Internet Usage Polcy; IT04 Emal and Instant Messagng Usage Polcy; IT05 Telephone and Moble Phone Usage Polcy; IT06 IT Hardware and Software Polcy; IT07 Dsposal of IT Equpment and Meda Polcy; IT08 Applcaton Systems Polcy; IT09 Identty Management Polcy 91 Other Unersty polces, ncludng but not lmted to, the followng: Data Protecton Polcy; IT02 - Informaton Technology (IT) Securty Polcy Page 17 of 18

18 Freedom of Informaton Polcy; Confdentalty Markers Polcy; Mantenance of Records Polcy; Dscplnary Procedure Polcy; Management of Informaton Polcy; Web Publshng Polcy Southampton Solent Unersty s Internet connectons are goerned by: JANET Connecton Polcy; JANET Securty Polcy; JANET Acceptable Use Polcy. Author(s): Keth Baker, ICT Securty and Standards Manager Ownng commttee: Management Informaton and Technology Commttee Approed by: Paul Colbran, Drector of ICT Date of approal: 9 July 2015 Verson: 3.0 Next reew date: August 2016 IT02 - Informaton Technology (IT) Securty Polcy Page 18 of 18

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

General Teaching Council for Northern Ireland. Promoting Teacher Professionalism. Annual Business Plan 2014/2015. Promoting Teacher Professionalism

General Teaching Council for Northern Ireland. Promoting Teacher Professionalism. Annual Business Plan 2014/2015. Promoting Teacher Professionalism General Teachng Councl for Northern Ireland Promotng Teacher Professonalsm Annual Busness Plan 2014/2015 Promotng Teacher Professonalsm 2 Annual Busness Plan 2014/2015 General Teachng Councl for Northern

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Local Business Starter Pack.

Local Business Starter Pack. Local Busness Starter Pack. Who should complete ths applcaton? If the busness s A company An assocaton (ncorporated or unncorporated) A partnershp A sole propretor or ndvdual A busness trust Ths form can

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

ELECTRADE POLICY PROPOSAL FORM

ELECTRADE POLICY PROPOSAL FORM ELECTRADE POLICY PROPOSAL FORM Please answer all questons, completng the form n nk usng block captals. The completon and sgnature of ths Proposal does not bnd the Proposer or Insurers to complete a contract

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

July 2014. Volume 1 of 4. Notice to Tenderers Tender Forms & Conditions of Tender

July 2014. Volume 1 of 4. Notice to Tenderers Tender Forms & Conditions of Tender Managng Contractor Desgn and Constructon Management Stage One wth opton for Stage Two (Negotated Guaranteed Constructon Sum) July 2014 Volume 1 of 4 Notce to Tenderers Tender Forms & Condtons of Tender

More information

Account Transfer and Direct Rollover

Account Transfer and Direct Rollover CED0105 Amerprse Fnancal Servces, Inc. 70100 Amerprse Fnancal Center Mnneapols, MN 55474 Account Transfer and Drect Rollover Important: Before fnal submsson to the Home Offce you wll need a Reference Number.

More information

Electronic Document Management

Electronic Document Management tem no 14- THE CTY OF EDNBURGH COUNCL Electronc Document Management Executve of the Councl 7th October 2003 y. 1 1. 2 2.1 2.2 2.3 2.4 2.5 Purpose of report To approve a preferred suppler and proposed way

More information

REQUIRED FOR YEAR END 31 MARCH 2015. Your business information

REQUIRED FOR YEAR END 31 MARCH 2015. Your business information REQUIRED FOR YEAR END 31 MARCH 2015 Your busness nformaton Your detals Busness detals Busness name Balance date IRD number Contact detals - to ensure our records are up to date, please complete the followng

More information

One Click.. Ȯne Location.. Ȯne Portal...

One Click.. Ȯne Location.. Ȯne Portal... New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s

More information

A Useful Guide to Setting up a Tax Practice

A Useful Guide to Setting up a Tax Practice A Useful Gude to Settng up a Tax Practce Copyrght @ Irsh Taxaton Insttute. Whle eery effort s made to ensure that the nformaton outlned n ths leaflet s accurate, the Irsh Taxaton Insttute can accept no

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Wiltshire Schools Finance Manual September 2008

Wiltshire Schools Finance Manual September 2008 SUMMARY OF CONTENTS 1. Regulaton and Control 1.1 General 1.2 Responsbltes of Chef Fnance Offcer 1.3 Responsbltes of Schools 1.4 Responsbltes of the Local Authorty 1.5 Ths Manual 2. Fnancal Management 2.1

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Quality Management System at Construction Project: A Questionnaire Survey

Quality Management System at Construction Project: A Questionnaire Survey ISSN : 2248-9622, Vol., Issue 3, ( Part -3) March 21, pp.126-13 RESEARCH ARTICLE OPEN ACCESS Qualty Management System at Constructon Project: A Questonnare Surey P.P.Mane*, J.R.Patl* *(Department of Cl

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

GENERAL BUSINESS TERMS

GENERAL BUSINESS TERMS SAXO CAPITAL MARKETS (AUSTRALIA) PTY LTD GENERAL BUSINESS TERMS SA XO LEGAL SINGAPORE Verson: 16th March 2015 General Busness Terms GENERAL BUSINESS TERMS 1. DEFINITIONS INTERPRETATION OF TERMS 1.1 In

More information

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7 DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or

More information

express why choose Interlink Express? invest in your future

express why choose Interlink Express? invest in your future I nt er l nke x pr es spa r c el sl m t ed sas ubs da r yofdpdgr oupukl m t ed express nvest n your future why choose Interlnk Express? If you re consderng becomng a franchse holder wth one of the UK s

More information

Multitone Electronics Plc. delivering certainty

Multitone Electronics Plc. delivering certainty Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com

More information

VOLUME 7 SECTION 3A REGISTRATION OF COMPANIES CUSTOMER GUIDELINES BASED ON COMPANIES ACT 2004

VOLUME 7 SECTION 3A REGISTRATION OF COMPANIES CUSTOMER GUIDELINES BASED ON COMPANIES ACT 2004 regstraton of companes.qxp 02/05/2007 09:55 AM Page 1 VOLUME 7 SECTION 3A REGISTRATION OF COMPANIES CUSTOMER GUIDELINES BASED ON COMPANIES ACT 2004 The Responsblty of The Companes Offce of Jamaca (formerly

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

E-learning Vendor Management Checklist

E-learning Vendor Management Checklist E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Privacy Impact Assessment (PIA) Name of Project: Access Control (Badging and Access) System Project's Unique 10: ID: B&A. I Project's Unique ID:!

Privacy Impact Assessment (PIA) Name of Project: Access Control (Badging and Access) System Project's Unique 10: ID: B&A. I Project's Unique ID:! Prvacy mpact Assessment (PA) Name of Project: Access Control (Badgng and Access) System Project's Unque 10: D: B&A Project's Unque D:! Legal 144 j U.s.C U.S.C 2104 Authorty(es): Purpose of ths System/Applcaton:

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Introduction CONTENT. - Whitepaper -

Introduction CONTENT. - Whitepaper - OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want

More information

ACKNOWLEDGEMENTS. Core Operational Guidelines for Telehealth Services Involving Provider-Patient Interactions

ACKNOWLEDGEMENTS. Core Operational Guidelines for Telehealth Services Involving Provider-Patient Interactions Cor eoper at onal Gu del nes f ort el eheal t hser v c esi nv ol v ng Pr ov der Pat enti nt er ac t ons May201 4 ACKNOWLEDGEMENTS The Amercan Telemedcne Assocaton (ATA) wshes to express sncere apprecaton

More information

Your Contract Works Policy

Your Contract Works Policy U r u p a r e k t e T o n g a Southern Response Earthquake Servces Ltd Your Contract Works Polcy (Lmted Rsks Cover) About your nsurance contract a. Ths polcy forms part of the nsurance contract between

More information

Dear AGWA Member, Sincerely, John G. Porter, Ph.D., CGW Executive Director

Dear AGWA Member, Sincerely, John G. Porter, Ph.D., CGW Executive Director PO Box 8481, Semnole FL 33775 Shppng Address: 12551 Indan Rocks Rd Sute 12, Largo FL 33774 Phone: 727-366-9334 Fax: 727-596-5192 Emal: CustomerServce@agwa.us Webste: www.agwa.us Dear AGWA Member, We are

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended

More information

Getting It Together Project & Implementation Management

Getting It Together Project & Implementation Management Gettng It Together Project & Implementaton Management CFE NETWORKING November 30, 2011 Fnancng NFA Fshng Best Practces Tranng & Mentorng Marketng & Brandng Governance Markets Fsh Legal Regulaton ? HR

More information

Guidance for Operational Risk Management in Government Debt Management 1 Tomas Magnusson, Abha Prasad and Ian Storkey

Guidance for Operational Risk Management in Government Debt Management 1 Tomas Magnusson, Abha Prasad and Ian Storkey Gu dancef oroper at onalr skmanagement n Gover nmentdebtmanagement TomasMagnusson,AbhaPr asad and Ian St or key Mar ch 2010 Thef nd ngs, nt er pr et at ons,andconcl us onsexpr essedher e nar et hoseoft

More information

Uncrystallised funds pension lump sum

Uncrystallised funds pension lump sum For customers Uncrystallsed funds penson lump sum Payment nstructon What does ths form do? Ths form nstructs us to pay the full penson fund, under your non-occupatonal penson scheme plan wth us, to you

More information

. TITLE 37 INSURANCE PART XI CHAPTER 27: EMERGENCY - RULE 17 or DIRECTIVE 187

. TITLE 37 INSURANCE PART XI CHAPTER 27: EMERGENCY - RULE 17 or DIRECTIVE 187 . TTLE 37 NSURANCE PART X CHAPTER 27: EMERGENCY - RULE 17 or DRECTVE 187 SUSPENSON OF CERTAN STATUTES AND REGULATONS REGARDNG HEALTH NSURANCE.. ANDRELATEDPROVSONSREGARDNG ANY AND ALL NSURANC:EMATTERS AFFECTNG

More information

8 ROLES AND RESPONSIBILITIES IN RELATION TO THE ADMISSION OF RESEARCH STUDENTS

8 ROLES AND RESPONSIBILITIES IN RELATION TO THE ADMISSION OF RESEARCH STUDENTS ADMISSIONS - RESEARCH STUDENTS SUMMARY OF PRINCIPAL CHANGES General changes None Secton 5.1 Refer to text 10.7 Refer to text 10.8 Refer to text 10.7 Refer to text (Amendments to verson 07.0, UPR SA02 are

More information

Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499

Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499 General Servces Admnstraton Federal Supply Servce Authorzed Federal Supply Schedule Prce Lst Msson Orented Busness Integraton Servces (MOBIS) FSC Group: 874 Class: R499 On-lne access to contract orderng

More information

YEAR 7-8 STUDENTS TIS

YEAR 7-8 STUDENTS TIS Cybersafety at Taradale Intermedate School SECTION A CYBERSAFETY AT Taradale Intermedate School CYBERSAFETY USE AGREEMENT YEAR 7-8 STUDENTS TIS The document s comprsed of ths cover page and two sectons:

More information

Effective 1 August 2013

Effective 1 August 2013 UNION MEDICAL BENEFITS SOCIETY LTD CONDITIONS OF MEMBERSHIP Effecte 1 August 2013 1 APPLICATION FORM To make an applcaton for coerage, applcants must complete a current UnMed health nsurance applcaton

More information

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.

Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add. chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended

More information

: da:j :!: b ;hich all its officers, regardless of

: da:j :!: b ;hich all its officers, regardless of TERRTORY OF GUAM OFFCE OF THE GOVERNOR AGANA, GUAM 96910 U.S.A. h EfECUTVE ORDER NO. 96-16 RELAT VE TO CREATON OF A PEACE OFF CER STANDARDS land TRANNG COMMSSON (POST), AND G A POST REVO LVNG FUND. ESTABLSDN

More information

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent.

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent. Bachel of Commerce Bachel of Commerce (Accountng) Bachel of Commerce (Cpate Fnance) Bachel of Commerce (Internatonal Busness) Bachel of Commerce (Management) Bachel of Commerce (Marketng) These Program

More information

The Funeral Fund Offer Document

The Funeral Fund Offer Document Contact Detals Regstered Offce Level 5, 130 Lttle Collns Street Melbourne VIC 3000 The Funeral Fund Offer Document Issued 1 September 2015 Issued by The Untng Church n Australa Property Trust (Vctora)

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting

www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...

More information

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng

More information

GENESYS BUSINESS MANAGER

GENESYS BUSINESS MANAGER GENESYS BUSINESS MANAGER e-manager Onlne Conference User Account Admnstraton User Gude Ths User Gude contans the followng sectons: Mnmum Requrements...3 Gettng Started...4 Sgnng On to Genesys Busness Manager...7

More information

Assessment of the legal framework

Assessment of the legal framework 46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton

More information

Traffic-light extended with stress test for insurance and expense risks in life insurance

Traffic-light extended with stress test for insurance and expense risks in life insurance PROMEMORIA Datum 0 July 007 FI Dnr 07-1171-30 Fnansnspetonen Författare Bengt von Bahr, Göran Ronge Traffc-lght extended wth stress test for nsurance and expense rss n lfe nsurance Summary Ths memorandum

More information

r~ P. k'js L O l - ' " UNITED, STATES DISTRICT DISTRICT OF CONNECTICUT STIPULATION AND ORDER

r~ P. k'js L O l - '  UNITED, STATES DISTRICT DISTRICT OF CONNECTICUT STIPULATION AND ORDER r~ P. Dstrct Com! Connectcut AT \R E W HAVEN k'js L O l - ' " UNITED, STATES DISTRICT DISTRICT OF CONNECTICUT Depot? Clexk CONNECTICUT TRAUMATIC BRAIN INJURY ASSOCIATION, ET AL. Plantffs V. MICHAEL HOGAN,

More information

Uncrystallised funds pension lump sum payment instruction

Uncrystallised funds pension lump sum payment instruction For customers Uncrystallsed funds penson lump sum payment nstructon Don t complete ths form f your wrapper s derved from a penson credt receved followng a dvorce where your ex spouse or cvl partner had

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

JPMorgan Commodity Target Volatility Index Series

JPMorgan Commodity Target Volatility Index Series JPMorgan Commodty Target Volatlty Index Seres Index Rules November 2010 All Rghts Reserved 1. Ths Part A: General Rules 1.1 Introducton PART A General Rules Ths Part A: General Rules sets out a general

More information

VIP X1600 M4S Encoder module. Installation and Operating Manual

VIP X1600 M4S Encoder module. Installation and Operating Manual VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event. Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

The new public health role of local authorities

The new public health role of local authorities Publc Health n Local Government Introducton The new publc health role of local authortes The Health and Socal Care Act 2012 receved Royal Assent on 27 March 2012. Ths s a crtcal step n the transton towards

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Lithium-ion Rechargeable Battery

Lithium-ion Rechargeable Battery L - o n L-on Secondary Battery Lthum-on Rechargeable Battery LITHIUM-ION RECHARGEABLE BATTERY Notes for Desgners Select the correct type of battery to match the operatng condtons such as load current,

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1 A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Revised and re-published by the Ministerial Advisory Committee: Students with Disabilities Level 4, 111 Gawler Place, Adelaide SA 5000 February 2006

Revised and re-published by the Ministerial Advisory Committee: Students with Disabilities Level 4, 111 Gawler Place, Adelaide SA 5000 February 2006 Ths resource s avalable on the Mnsteral Advsory Commttee: Students wth Dsabltes webste at . Informaton was accurate at the tme of publcaton, and wll be updated as requred.

More information

Laser Distancer LD 420. Operating instructions

Laser Distancer LD 420. Operating instructions Laser Dstancer LD 40 en Operatng nstructons Table of Contents Instrument Set-up - - - - - - - - - - - - - - - - - - - - - - - Introducton- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Overvew

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

VOLUME 5 SECTION 1 STANDARDS FOR EDUCATIONAL INSTITUTIONS

VOLUME 5 SECTION 1 STANDARDS FOR EDUCATIONAL INSTITUTIONS Standards for Educatonal Insttutons.qxp 01/05/2007 12:28 PM Page 1 VOLUME 5 SECTION 1 STANDARDS FOR EDUCATIONAL INSTITUTIONS The Responsblty of The Mnstry of Educaton and Youth 2 Natonal Heroes Crcle Kngston

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB

More information

CONTENTS Introduction... 3

CONTENTS Introduction... 3 Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Enterprise Content Management

Enterprise Content Management Enterprse Content Management for the Laboratory Jm Mller Drector of Informatcs and Software Aglent Technologes Branden Humphrey Global Data Archve Program Manager Pfzer Global Research The content exploson

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Structure of Public Health England

Structure of Public Health England Structure of Publc Health Engl Factsheet Publc Health Engl: Organsatonal desgn Structure of Publc Health Engl Introducton Publc Health Engl has been establshed to protect mprove the naton s health wellbeng,

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Ensuring Secure Info-Communication Networks Based on the Special Filtering Mode

Ensuring Secure Info-Communication Networks Based on the Special Filtering Mode Ensurng Secure Info-Communcaton Networks Based on the Specal Flterng Mode Abstract In ths artcle was developed a method for calculatng the nvarant characterstcs of traffcs for a specal flterng mode wth

More information

VOLUME 5 SECTION 5 APPROVAL PROCESS FOR FOOD, DRUGS COSMETICS, MEDICAL DEVICES, PRECURSOR CHEMICALS AND NARCOTICS

VOLUME 5 SECTION 5 APPROVAL PROCESS FOR FOOD, DRUGS COSMETICS, MEDICAL DEVICES, PRECURSOR CHEMICALS AND NARCOTICS moh standards & regulatons.qxp 01/05/2007 02:58 PM Page 1 VOLUME 5 SECTION 5 APPROVAL PROCESS FOR FOOD, DRUGS COSMETICS, MEDICAL DEVICES, PRECURSOR CHEMICALS AND NARCOTICS The Responsblty of the Mnstry

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

2 PROPOSED TERMS OF REFERENCES

2 PROPOSED TERMS OF REFERENCES 2 PROPOSED TERMS OF REFERENCES 1 Executve summary 2 Introducton. Detals of the EIA Consultant ncludng NABET accredtaton. Informaton about the project proponent Importance and benefts of the project 3 Project

More information

T3 Comfort connected to IP Office

T3 Comfort connected to IP Office elephony IP T Contact Centers Moblty Servces T3 Comfort connected to IP Offce Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Content Famlarse

More information

WHEREAS, the Board desires to award a franchise to Franchisee pursuant to the Ordinance; and

WHEREAS, the Board desires to award a franchise to Franchisee pursuant to the Ordinance; and 155 AN ORDNANCE TO AWARD A FRANCHSE TO TME WARNER ENTERTANMENT /ADVANCE NEWHOUSE TO CONSTRUCT, MANTAN, AND OPERATE A CABLE TELEVSON SYSTEM N UNON COUNTY WHEREAS, by ordnance enttled An Ordnance Grantng

More information