INFORMATIVE REPORT Riga /2012

Size: px
Start display at page:

Download "INFORMATIVE REPORT Riga 07.10.2013. 5.1-2-42/2012"

Transcription

1 INFORMATIVE REPORT Riga /2012 Software management assessment in local governments and local government educational institutions Legal Justification of the Audit 1. According to the Section 2 of the State Audit Office Law and Audit Assignment No /2012 of December 3, 2012 of the Audit and Methodology Department, a legality audit Software management assessment in local governments and local government educational institutions was conducted. At the stage of audit planning, the understanding of information technology environment was obtained in 28 local governments in local governments of the cities of Riga, Ventspils, Jelgava and Jekabpils (Jēkabpils), Ogre region, Bauska region, Kekava (Ķekava) region, Ozolnieki region, Ikskile (Ikšķile) region, Saulkrasti region, Vecumnieki region, Iecava region, Plavinas (Pļaviņas) region, Vecpiebalga region, Jaunpiebalga region, Jaunpils region, Aluksne (Alūksne) region, Livani (Līvāni) region, Aloja region, Jekabpils region, Koknese region, Krustpils region, Cesvaine region, Rauna region, Rundale (Rundāle) region, Seja (Sēja) region, Skriveri (Skrīveri) region and Alsunga region. Of them, after the initial risk assessment audit inspections were continued in 14 local governments in local governments of the cities of Riga and Ventspils, Aluksne (Alūksne) region, Livani (Līvāni) region, Aloja region, Jekabpils region, Koknese region, Krustpils region, Cesvaine region, Rauna region, Rundale (Rundāle) region, Seja (Sēja) region, Skriveri (Skrīveri) region and Alsunga region. 2. The audit was conducted by Valdis Kalupnieks (Valdis Kaļupnieks), Information System Auditor, Liga Nagle (Līga Nagle), Information System Auditor, Anzelika Nikitina (Anželika Ņikitina), State Auditor-Lawyer and Janis Silinieks (Jānis Silinieks), Assistant. Objective of the Audit 3. The objective of the audit was to verify compliance of software recording and management with regulatory enactments, as well as to assess the effectiveness of software management in local governments and local government educational institutions. Accountability of the Auditors of the State Audit Office 4. The auditors of the State Audit Office are responsible for the audit report based on appropriate, reasonable and credible audit evidence obtained during the audit. Accountability of Local Governments 5. Local governments are responsible for compliance with the laws and regulations and truthfulness of information submitted to auditors.

2 Scope of the Audit 6. The audit was conducted in accordance with international auditing standards recognised in the Republic of Latvia. The audit was planned and conducted so to gain sufficient assurance regarding compliance of software recording and management with regulatory enactments, as well as the effectiveness of software management in local governments and local government educational institutions. 7. The audit was conducted for the period from January 1, 2011 to December 31, 2012.The audit procedures, after the software programs installed on the computer hardware were established, were conducted in local governments within the period from April to June The following was verified in the audit: 8.1. software management, establishing the software programs installed on the computer hardware and assessing the right to use them according to the license terms for software use or source documents regarding the purchase; 8.2. compliance of the organization of the management of information technology security with the requirements of the Law on Security of Information Technologies 1 ; 8.3. effectiveness of the management of information technologies, assessing whether the information technology environment is homogeneous, using small number of software programs for the fulfilment of one function, as well as assessing whether the software purchased by local governments is being used; 8.4. organization of accounting and control over the recording of expenditures related to information technologies, assessing the completeness of the register of computer hardware and software recording and the recording of expenditures related to information technologies according to the aim of performance of expenditures within the period from January 1, 2011 to December 31, In order to obtain audit evidence, the verification, assessment and analysis of documents and inspections of computer hardware were conducted in 14 local government administrations, five parish administrations, 16 libraries and 24 schools (in total in 59 institutions) (Annex 1), as well as responsible employees of local governments were interviewed. 10. Within the period from April to June 2013, 717 units of computer hardware were randomly inspected, recording the list of software installed on each unit of computer hardware. The number of the inspected units of computer hardware was determined randomly, without encompassing all of the computer hardware available in the local government, wherewith the obtained results are to be referred only to the number of inspected units of computer hardware, yet are sufficient to assess the organization of software management in the local government. 8,328 software programs were were found on the inspected computer hardware; of them 5,519 software programs were randomly inspected, of which 4,048 are free software programs and 1,471 are paid software programs. 11. As a result of the audit, 14 audit reports were prepared for the local governments and an informative report was prepared on the compliance of software recording and management with regulatory enactments, as well as the effectiveness of software management in local governments and local government educational institutions. 1 Section 1 and Section 8 of the Law on the Security of Information Technologies.

3 12. The informative report contains the main facts established and conclusions made in the course of the audit. Brief Description of the Audited Area 13. The head of an institution shall manage the administrative work of the institution by ensuring the continuity, effectiveness and the lawfulness thereof, as well as manage the financial, personnel and other resources of the institution and establish an internal control system of the institution, supervise and improve it Local governments and local government institutions shall administer the financial resources and property rationally actions shall be such as to achieve objectives with the minimum use of financial resources and property Local governments have the duty to manage the local government movable and immovable property rationally and efficiently and in conformity with the approved local government budget, use the local government financial resources rationally and efficiently 4. Protection of intellectual property 16. A computer program is a protected copyright object, which is prohibited from being used, unless the permission of the rightholder is received 5. To obtain the right to use, the user of the computer program, for each type of use of the computer program and each time it is to be used, has to receive the permission of the rightholder in the form of a licensing agreement or a license prior the use of the computer program The rights of the user of the computer program or the terms of use of the computer program are determined by the software license. A licence constitutes permission to use a particular work in such a way and in accordance with such provisions as are indicated in the license 7. Organization of the management of information technology security 18. In order to improve the security of information technologies, the Law on the Security of Information Technologies has been developed, specifying the most important requirements for the organization of information technology security of state and local government institutions The management of the security of information technologies of local government institutions shall be ensured by the head of each relevant institution The Information Technologies Security Incidents Response Institution promotes the security of information technologies in the Republic of Latvia, and state and local government institutions have a duty to co-operate with the Information Technologies 2 Section 17, Part one and Part two, Paragraph 1 and 6, Section 30, Part two of the State Administration Structure Law. 3 Section 3, Paragraph 1 of the Law on Prevention of Squandering of the Financial Resources and Property of the Public Entity (title of the law in edition of ). 4 Section 14, Part two, Paragraph 3 and 6 of the Law on Local Governments. 5 Section 40, Part one of the Copyright Law. 6 Section 40, Part one, two and three, Section 41, Part one and Section 42, Part one of the Copyright Law. 7 Section 42, Part one of the Copyright Law. 8 Section 1, Part one and Section 8 of the Law on Security of Information Technologies. 9 Section 8, Part one of the Law on the Security of Information Technologies.

4 Security Incidents Response Institution, providing it with the necessary information and implementing its lawful requests In accordance with the information published by the Information Technologies Security Incidents Response Institution 11 : in 2012, 4,798 high-priority security incidents related to the use of computer viruses and malicious software programs were registered in Latvia; outdated and unsafe software programs are often installed on computer hardware; in 2011, 110 different vulnerabilities of Microsoft software programs were registered. Software management 22. Regulatory enactments do not determine any principles of management of information technologies at an institution, therefore in order to assess the organization of the management of information technologies, the standards of good practice in management of information technologies, which are recommended to be used by the Information Technologies Security Incidents Response Institution, were used during the audit 12 : to assess the management of information technologies COBIT standard was used 13 ; to assess the processes of information technologies ITIL standard 14, on how to perform planning and management of information technology services, reducing the costs of information technologies. 23. On April 8, 2014 maintenance and technical support of operation system Window XP and office software Office 2003 will be discontinued 15 : development of software security patches will not be ensured; both paid and free technical support will not be available; online solution of technical problems will not be ensured; compatibility of software programs developed by third parties with these products will not be ensured, for instance, development of device drivers. Organization of accounting 24. The accounting shall clearly reflect all economic transactions of the local government. Accounting shall be conducted so that a third person qualified in the area of accounting may obtain a true and clear representation of the financial position of the local government at the date of the balance sheet, the results of the activities thereof, as well as be able to determine the beginning of each economic transaction and trace its course Section 4, Part one and four of the Law on the Security of Information Technologies. 11 CERT.LV publication Chain of Spreading of Computer Viruses (Internet page: CERT.LV statistics data (Internet page: (resource viewed on: )). 12 Information Technologies Security Incidents Response Institution (CERT>LV), IT security standards (Internet page: (resource viewed on )). 13 COBIT description (Internet page: (resource viewed on )). 14 ITIL description (Internet page: (resource viewed on )). 15 Microsoft Internet page (Internet page: (resource viewed on )). 16 Section 2 of the Law On Accounting.

5 25. The accounting information provided shall be truthful, comparable, timely, significant, understandable and complete. If codes, abbreviations, single letters or symbols are used in the accounting records, explanations shall be provided thereof Budget institutions shall record all long-term investments, current assets and liabilities existing in and falling under the ownership, possession and holding thereof. Long-term investments shall be recognized, if it is credible that the budget institution uses them to ensure fulfilment of functions, the period of useful utilisation thereof exceeds 12 months following their acceptance into operation (exploitation), as well as the expenditures thereof can be credibly assessed Long-term investments (fixed assets and intangible investments) and stocks used by the budget institution in accordance with lending contracts shall be recorded on the belowline account Leased assets 19. According to the regulatory enactment 20, a lending contract (a loan for use) is a contract by which property is transferred without compensation, but for a specific use, with the condition that the same property is returned. The subject-matter of a lending contract may be either movable or immovable property. 28. The classification of budget expenditures by economic categories, which are applied in planning of budgets set by the regulatory enactments in the field of budget and finance management, is determined in recording (according to the principle of cash flow and accumulation) and preparation of reports by the regulatory enactment 21. On organization of information technology environment in local governments 29. The function of information technology support, which comprises maintenance of computer hardware diagnostics of computer hardware and replacement of damaged parts, and administration thereof preparation of a workstation for operation, installation of software, installation of the newest versions and management of user rights, shall be ensured in local governments and local government educational institutions the following way: centralized way maintenance of information technologies in the local government and all local government institutions is ensured by one provider of information technologies by local government workers or an outsourcing provider contracted by the local government; decentralized way maintenance of information technologies in the local government administration is ensured by local government workers, whereas in educational institutions by the worker of the educational institution in cooperation with the worker of the local government administration. 30. Local governments participated in the public library development project Trešais tēva dēls 22, within the framework of which local government public libraries of Latvia were supplied with computer hardware and software. Administration of the computer hardware 17 Section 2 and 6 of the Law On Accounting. 18 Paragraph 2 and 10 of the Regulations of the Cabinet of Ministers No.1486 of Procedures According to which Budget Institutions Maintain Accounting Records. 19 Annex 1, Paragraph 299 of the Regulations of the Cabinet of Ministers No.1486 of Procedures According to which Budget Institutions Maintain Accounting Records. 20 Civil Law, Part Four: Obligations Law, Section 1947 and Paragraph 1 and Annex of the Regulations of the Cabinet of Ministers No.1031 of Regarding Classification of Budget Expenditures by Economic Categories. 22 Public library development project Trešais tēva dēls (Internet page: (resource viewed on )).

6 supplied within the framework of the project Trešais tēva dēls is carried out by the state agency Culture Information Systems, whereas the local government ensures its maintenance in working order. 31. At the stage of audit evidence, 14 local governments were visited: as of December 31, ,329 workers were employed and 13,068 units of computer hardware were installed (Annex 1); in 11 local governments, the computer hardware was not linked together into a shared centralized computer network, but rather into separate local computer networks, and the users thereof used the accounts of local computer users for authentication in computer hardware In the local government administrations of the cities of Riga and Ventspils, as well as Livani region, the computer hardware was linked together into a shared centralized computer network, whereas, the computer hardware in the institutions of these local governments was linked together into separate local computer networks. 32. On the computers of the local government and local government educational institutions, depending on the computer hardware performance and financial resources of the local government allocated for provision of information technologies, both free and paid software programs are used. In most of the cases, paid software licenses were purchased as OEM licenses along with the new computer hardware. 33. In local governments, the expenditures related to information technologies are mostly planned only within the framework of the current budget year, including expenses for the most crucial services of the maintenance of information technologies that pass from year to year, as well as providing for minimum replacement of computer hardware (three to five years) in case of damages or functional inability of the computer hardware. Summary of the Audit units of computer hardware, on which 8,328 software programs were installed, were randomly inspected in local governments and local government educational institutions. Of them, 5,519 software programs were randomly inspected, of which 4,048 are free software programs and 1,471 are paid software programs. In the audit, the right to use the software installed, management of information technology security, effectiveness of software management and accounting of expenditures related to information technologies was assessed. The right to use software 35. Since 73% of randomly selected software programs used in local governments are available free of charge, the terms of software developers for free software use were assessed in the audit. In the audit, it was established that in 15% of cases the local governments use software, the use of which in a local government or local government educational institution is prohibited in accordance with the software licensing terms or the free trial period of software, after which in order to continue using the software, the local government has had to purchase the right to use, has expired (Annex 2). 36. Most of the cases (58%) of free software use contrary to the licensing terms was established in local government educational institutions, in comparison in local government administrations 35%. According to the auditor s calculation, the cost of

7 free software programs, the use of which in local governments is not provided for by the license terms, would be Ls 9, Having assessed source documents for 1,471 paid software programs, which were installed on computer hardware inspected in local governments, it was established that in 24% of cases the software with the value of Ls 35,571, whose right to use in the local government cannot be proved by the source documents, is used. Problems in presentation of source documents were mostly (56% of cases) established in local government administrations and parish administrations, whereas in educational institutions in 37% of cases. 38. When explaining non-availability of source documents, the local governments drew attention to the problems of adoption of accounting documents during the administrative territorial reform in 2009, as well as drew attention to that the time period for storage of accounting source documents is five years 23. Wherewith, local governments have not assessed the need for further storage of source documents, if the use of a particular software program or computer hardware, which includes software, is continued. 39. In total, 975 software programs or in 18% of cases of the software programs included in the audit selection, the software is used without complying with the requirements set in the software licensing terms or on the purchase of which no source documents are available. 40. The problems were established in all visited local governments (see Picture 1). According to the auditor s calculation, the software with the value of Ls 45,076 is used violating the norms in protection of intellectual property rights 24, harming the image of the local government, as well as putting the local government under the risks, which occur when computer programs are used without the certification of the right to use or without complying with the licensing terms 25. % Figure 1. The proportion of software lacking a permit to use in local governments (in percentage form). 41. While assessing the circumstances that promote unlimited installation of software on the users computer hardware, several crucial control deficiencies are to be mentioned: computer hardware users are granted unlimited rights or administrator rights to work with the computer hardware, which allow users to perform installation of software independently. With exception of the city of Riga, city of Ventspils, local 23 Section 10 of the Law On Accounting. 24 Copyright Law. 25 Methodical Aid of BSA TheSoftwareAlliance and State Revenue Service of the Republic of Latvia Recommendations for the Use of Licensed Computer Programs" (with amendments of ). Methodical aid is published on the Internet page: (resource retrieved on ).

8 government administrations of Livani region and Koknese region, in the administrations of the remaining ten local government administrations it was established that in 80% to up to 100% of cases the users use unlimited access rights for everyday work; on average, every third user in local government administrations uses the same user name, for instance, administrator, lietotajs, user, which hinders controlled approach to different information technology resources and information of the institution. In the local government administrations of the city of Riga, city of Ventspils and Livani region the control is ensured, as well as unique user names have been assigned to the computer hardware for the access of the users; the access to every third computer in local government administrations and every second computer in educational institution or library is not restricted by the need of a password. Password control is ensured in local government administrations of the city of Riga, city of Ventspils, Livani region and Aloja region; in nine local governments, in the computer hardware the file exchange software 26, with the help of which users can download movies, music, software, as well as other copyright objects available in the Internet environment, thus increasing the risk of using non-licensed software, was established. 42. In general, in local governments and local government educational institutions antivirus solutions are used to protect the computer system from viruses and security threats, however, in 10% of cases no antivirus software was installed on the computer hardware, or the license period of the antivirus software has expired, or the latest update of the antivirus database has not been received for over a month. In five cases, malicious software or malware 27, which can be used for prohibited purposes, for instance, infecting computer hardware with viruses, was installed on the computer hardware, the software might have trapdoors for illegal remote administration of the computer hardware, builtin keyboard readers or for software password reading. Management of information technology security 43. In local governments, deficiencies were also established in management of information technology security, since the basic requirements set in the regulatory enactment 28 are not complied with in this field: in seven local governments, the workers responsible for management of information technology security were not appointed; in nine local governments, regulations on the security of information technologies were not developed; in nine local governments, briefing of the workers on the issues of information technology security was not carried out; in ten local governments, inspections of information technology security were not carried out; in five local governments, training organized by the Security Incidents Response Institution on the issues of information technology security was not visited. 26 Software programs DC++, Bittorrent, μtorrent. 27 Publication by the developer of antivirus software Kaspersky Security ABC (Internet page: (resource retrieved on )). 28 Section 1, Part one, Section 2, Part one and Section 8, Part one, Part two, Part three, Clause 2, 3 and 4, Part four of the Law on the Security of Information Technologies.

9 44. Deficiencies in management of information technology security cause a risk that the threats to the security of information technologies are not timely forecasted and eliminated, and threats are caused to the operation of information systems of the local government and local government institutions, duly and to the data protection. Effectiveness of software management 45. Coordinated management of information technologies and fulfilment of processes is more effective, if a software accounting register, which comprises the full range of software programs used in the local government, is used in maintenance of information technologies and planning of costs, as well as if minimum number of user programs is used for fulfilment of one function on the computer hardware In most of the local governments, with exception of local governments of the cities of Riga and Ventspils, Aluksne region, Rundale region and Seja region, the only register that contains information on the software purchased in the local government is the inventory listslist of intangible investments. It was established that the stock list of intangible investments used in local governments is incomplete and cannot be used for software management, since it does not include the whole software used in the local government and its installation on particular computers, does not contain information on the software purchased together with the computer hardware and included in its composition; thus, the accounting information cannot be used as a software register. It was established that in 33% of cases, the stock lists of intangible investments included technologically outdated software, which is not used in local governments. 47. Even though the maintenance, administration of homogeneous software environment and incident elimination requires smaller investment of resources, in the local governments it was established that on average two or three different software programs or the versions thereof are used for fulfilment of one and the same function. For instance, at the institution it was established that in order to protect the computer hardware from computer viruses even 11 different antivirus software programs or the versions thereof are used. Wherewith software management in local governments is not effective enough. 48. In the audit, it was established that 38% of the computer hardware inspected in the audit use Microsoft software, for which, in accordance with the information provided by the software manufacturer 30, the maintenance and provision of technical support will be discontinued on April 8, 2014, which means that the software will have no available security patches, in order to eliminate software vulnerabilities, as well as compatibility with the software programs developed by other software manufacturers will not be ensured. Accounting of expenditures related to information technologies 49. Organization, control of accounting and exchange of information in assessment of expenditures related to information technologies is incomplete, as a result of which in the accounting: expenditures related to information technologies in the amount of Ls were incorrectly recognized long-term investments with the total accounting value of Ls 467,413 were recorded, which are impossible to be identified by a qualified third person without 29 ITIL Standard, Chapter Service Design, Sub-chapter 5.3 Application management; ITIL Standard, Chapter Service Operation, Sub-chapter 6.5 Application management. 30 Microsoft Internet page (Internet page: (resource viewed on )).

10 consideration of source documentations, the composition of which is impossible to be determined or for the fulfilment of which functions they are required; in six local governments, the computer hardware received for unlimited use was not recorded on the below-line account of the local government accounting In 10 local governments, long-term investments were not recognized 31, without recording the home page of the local government in the accounting recommendations were provided to local governments during the audit; as a result of implementation of these recommendations: the use of software in compliance with licensing terms will be ensured, eliminating violations of intellectual property rights and risks 32, which occur when computer programs are used without permission management of information technology security will be improved, complying with the basic requirements for management of information technology security set in the regulatory enactment 33 and reducing the threat to the operation of information systems of the institution, data protection and security; improvement of the effectiveness of information technologies will be improved in long-term perspective; organization of accounting will be improved in performance of recording of computer hardware and software, ensuring clear and true representation of longterm investments of information technologies owned and used by the local government. 31 Paragraph 10 of the Regulations of the Cabinet of Ministers No.1486 of Procedures According to which Budget Institutions Maintain Accounting Records. 32 Methodical Aid of BSA TheSoftwareAlliance and State Revenue Service of the Republic of Latvia Recommendations for the Use of Licensed Computer Programs" (with amendments of ). Methodical aid is published on the Internet page: (resource viewed on ). Section 8 of the Law on the Security of Information Technologies.

AUDIT REPORT Riga. 3 December 2010 No. 5.1-2-23/2009

AUDIT REPORT Riga. 3 December 2010 No. 5.1-2-23/2009 AUDIT REPORT Riga 3 December 2010 No. 5.1-2-23/2009 Evaluation of the effectiveness of implementation and compliance with regulatory enactments and the legal framework of the project E-government Portfolio

More information

Law On State Funded Pensions

Law On State Funded Pensions Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

Estonian Health Insurance Fund Act

Estonian Health Insurance Fund Act Issuer: Riigikogu Type: act In force from: 23.03.2014 In force until: 31.12.2016 Translation published: 02.04.2014 Amended by the following acts Passed 14.06.2000 RT I 2000, 57, 374 Entry into force 01.01.2001,

More information

Electronic Documents Law

Electronic Documents Law Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

(Unofficial translation by the Financial and Capital Market Commission)

(Unofficial translation by the Financial and Capital Market Commission) (Unofficial translation by the Financial and Capital Market Commission) Text consolidated with amending laws of 12 December 2008; 01 December 2009; 10 December 2009. If a whole or part of a section has

More information

2) applied methods and means of authorisation and procedures connected with their management and use;

2) applied methods and means of authorisation and procedures connected with their management and use; Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.

More information

Regulations on Information Systems Security. I. General Provisions

Regulations on Information Systems Security. I. General Provisions Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

Advertising Law. Chapter I General Provisions

Advertising Law. Chapter I General Provisions Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Azerbaijan Law on Mortgage (adopted on 3 July, 1998; entered into force on 19 August 1998)

Azerbaijan Law on Mortgage (adopted on 3 July, 1998; entered into force on 19 August 1998) Azerbaijan Law on Mortgage (adopted on 3 July, 1998; entered into force on 19 August 1998) This English Translation has been generously provided by VneshExpertService. VneshExpertService Important Disclaimer

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

GENERAL TERMS OF MONEY TRANSFER SERVICE Swipe.lv

GENERAL TERMS OF MONEY TRANSFER SERVICE Swipe.lv GENERAL TERMS OF MONEY TRANSFER SERVICE Swipe.lv Approved at the meeting of the Board of the JSC Rietumu Banka, 10.07.2015, Minutes No. 41 1. BASIC TERMS 1.1. Bank the joint stock company Rietumu Banka,

More information

Public Finance and Expenditure Management Law

Public Finance and Expenditure Management Law Public Finance and Expenditure Management Law Chapter one General provisions Article one. The basis This law has been enacted in consideration of Article 75, paragraph 4 of the Constitution of Afghanistan

More information

Terms and conditions of the Distribution TVN Service. General Provisions

Terms and conditions of the Distribution TVN Service. General Provisions Terms and conditions of the Distribution TVN Service 1 General Provisions 1. The following Terms and conditions of Distribution TVN (hereinafter referred to as the "Terms of Distribution") shall constitute

More information

AUDIT REPORT Riga. Legal justification of Audit

AUDIT REPORT Riga. Legal justification of Audit AUDIT REPORT Riga March 28 2007 5.1-2-65R/2005 Legality audit Expenditure compliance of funds from the State budget shifted into ambulatory health care services with the requirements of normative documentation

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

RS Official Gazette, No 23/2013 and 113/2013

RS Official Gazette, No 23/2013 and 113/2013 RS Official Gazette, No 23/2013 and 113/2013 Pursuant to Article 15, paragraph 1 and Article 63, paragraph 2 of the Law on the National Bank of Serbia (RS Official Gazette, Nos 72/2003, 55/2004, 85/2005

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

72.0 19.2 11.1 34.5 10.2 21.3 136.5 127.6 114.7 94.4 77.3 67.1 61.2. Revenue History (million LVL) 71.6 45.7 30.9. Capital expenditure (million LVL)

72.0 19.2 11.1 34.5 10.2 21.3 136.5 127.6 114.7 94.4 77.3 67.1 61.2. Revenue History (million LVL) 71.6 45.7 30.9. Capital expenditure (million LVL) I N T E R I M R E P O R T 2 1 J a n u a r y J u n e 2 1 O P E R A T I O N A L R E V I E W Lattelekom Group is the leading telecommunications operator in Latvia. The company provides a large variety of

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Our Customer Relationship Agreement VIRTUAL PRIVATE SERVER SERVICE DESCRIPTION

Our Customer Relationship Agreement VIRTUAL PRIVATE SERVER SERVICE DESCRIPTION Our Customer Relationship Agreement VIRTUAL PRIVATE SERVER SERVICE Internode Pty Ltd ABN 82 052 008 581 Phone: 13 66 33 1/502 Hay Street, Subiaco WA 6008 15 October 2013 Rules of interpretation and capitalised

More information

On the Insolvency of Undertakings and Companies

On the Insolvency of Undertakings and Companies Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

ISO 27001: Information Security and the Road to Certification

ISO 27001: Information Security and the Road to Certification ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT 1. LICENSE 2. TERMINATION Subject to the terms and conditions of this HSS Software License Agreement (the Agreement ), HSS hereby grants to Client (herein

More information

Regulation on the implementation of the European Economic Area (EEA) Financial Mechanism 2009-2014

Regulation on the implementation of the European Economic Area (EEA) Financial Mechanism 2009-2014 the European Economic Area (EEA) Financial Mechanism 2009-2014 adopted by the EEA Financial Mechanism Committee pursuant to Article 8.8 of Protocol 38b to the EEA Agreement on 13 January 2011 and confirmed

More information

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0 1 Module 3 Licensed Software Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. LICENCE TERMS... 3 3. SUPPLY OF... 8 4. UPDATES AND NEW RELEASES... 9 5. OPEN SOURCE SOFTWARE... 10

More information

REPUBLIC OF SOUTH AFRICA CREDIT RATING SERVICES BILL. Draft for public comment As approved by Cabinet on 26 July 2011

REPUBLIC OF SOUTH AFRICA CREDIT RATING SERVICES BILL. Draft for public comment As approved by Cabinet on 26 July 2011 REPUBLIC OF SOUTH AFRICA CREDIT RATING SERVICES BILL Draft for public comment As approved by Cabinet on 26 July 2011 -------------------------------- (As introduced in the National Assembly (proposed section

More information

The National Council of the Slovak Republic has adopted the following Act: Article I. 1 Scope of the act

The National Council of the Slovak Republic has adopted the following Act: Article I. 1 Scope of the act Slovak Investment and Trade Development Agency Address: Trnavská cesta 100, 821 01 Bratislava, Slovak Republic Tel.: +421 2 58 260 100, Fax: +421 2 58 260 109, E-mail: invest@sario.sk, www.sario.sk Act

More information

AGREEMENT No. ON THE DATA BACKUP SERVICE

AGREEMENT No. ON THE DATA BACKUP SERVICE ,. 201_ AGREEMENT No. ON THE DATA BACKUP SERVICE LLC TELIA LATVIJA, represented by its Chairman of the Board Mikus Ozols, acting on the basis of the Articles of Association (hereinafter referred to as

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

Regulation on the implementation of the Norwegian Financial Mechanism 2009-2014

Regulation on the implementation of the Norwegian Financial Mechanism 2009-2014 Regulation on the implementation of the Norwegian Financial Mechanism 2009-2014 adopted by the Norwegian Ministry of Foreign Affairs pursuant to Article 8.8 of the Agreement between the Kingdom of Norway

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Law of the Republic of Azerbaijan on Non-Banking Credit Institutions

Law of the Republic of Azerbaijan on Non-Banking Credit Institutions Law of the Republic of Azerbaijan on Non-Banking Credit Institutions This Law regulates establishment, management and activities of non-bank credit institutions with purpose of more thoroughly meeting

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS

BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION RS BR IBBS-2.1-2007 MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS GUIDELINES FOR SELF-ASSESSMENT OF CONFORMITY OF INFORMATION

More information

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting

More information

CROATIAN PARLIAMENT 242

CROATIAN PARLIAMENT 242 Important Disclaimer The English language text below has been provided by the Translation Centre of the Ministry for European Integration for information only; it confers no rights and imposes no obligations

More information

Electronic Signature Law of the People s Republic of China

Electronic Signature Law of the People s Republic of China Electronic Signature Law of the People s Republic of China Full text Contents Chapter I General Provisions Chapter II Data Message Chapter III Electronic Signature and Certification Chapter IV Legal Responsibility

More information

CDM Hardware Asset Management (HWAM) Capability

CDM Hardware Asset Management (HWAM) Capability CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT

More information

TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING

TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING 1. TERMS AND DEFINITIONS 1.1. Authorisation is a query to check Card validity and availability of corresponding funds on the Card s account. 1.2. Card means

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Fundamentals Level Skills Module, F8 (IRL)

Fundamentals Level Skills Module, F8 (IRL) Answers Fundamentals Level Skills Module, F8 (IRL) Audit and Assurance (Irish) June 2008 Answers 1 (a) Prior year internal control questionnaires Obtain the audit file from last year s audit. Ensure that

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

(UNOFFICIAL TRANSLATION)

(UNOFFICIAL TRANSLATION) (UNOFFICIAL TRANSLATION) Readers should be aware that only the original Thai text has legal force and that this English translation is strictly for reference. The SEC, Thailand cannot undertake any responsibility

More information

Reporting on Control Procedures at Outsourcing Entities

Reporting on Control Procedures at Outsourcing Entities Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

The Auditor General's Act

The Auditor General's Act The Auditor General's Act Consolidation of Consolidating Act No. 3 of 7 January 1997 as amended by Act No. 590 of 13 June 2006 Audit of State Accounts etc (Consolidation) Act 1.- (1) The audit according

More information

TG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES

TG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES Approved By: Senior Manager: Mpho Phaloane Created By: Field Manager: John Ndalamo Date of Approval:

More information

Guidelines for Companies (Special Licence)

Guidelines for Companies (Special Licence) Guidelines for Companies (Special Licence) FINANCIAL SERVICES AUTHORITY P.O. Box 991 Seychelles International Trade Zone Roche Caiman Mahé Seychelles Tel: +248 4380800 Fax: +248 4380888 Website: www.fsaseychelles.sc

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR.

THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR. Novell ZENworks Suite 11 (SP4) Novell ZENworks Configuration Management 11 Novell ZENworks Asset Management 11 Novell ZENworks Full Disk Encryption 11 Novell ZENworks Patch Management 11 Novell Endpoint

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Isle of Man Financial Supervision Commission. Business Plan Guidance for Licence Applicants

Isle of Man Financial Supervision Commission. Business Plan Guidance for Licence Applicants Isle of Man Financial Supervision Commission Business Plan Guidance for Licence Applicants February 2014 1. Introduction An applicant for a Financial Services Licence is required to submit a business plan

More information

OF THE REPUBLIC OF ARMENIA ON LIMITED LIABILITY COMPANIES

OF THE REPUBLIC OF ARMENIA ON LIMITED LIABILITY COMPANIES LAW OF THE REPUBLIC OF ARMENIA Adopted on October 24, 2001 CHAPTER 1. GENERAL PROVISIONS Article 1. Scope of the Law This law regulates the legal relationships arising from establishment, activity, reorganization

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

INFORMATION SYSTEMS. Revised: August 2013

INFORMATION SYSTEMS. Revised: August 2013 Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology

More information

and the President has proclaimed the following Law:

and the President has proclaimed the following Law: Unofficial translation The Saeima 1 has adopted and the President has proclaimed the following Law: THE INSURANCE CONTRACT LAW Chapter I GENERAL PROVISIONS Article 1. Definitions 1) sum insured - the amount

More information

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

TECHNICAL VULNERABILITY & PATCH MANAGEMENT INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st

More information

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011 APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS

More information

Credit Institution Law

Credit Institution Law Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

Financial Advisers (Amendment) Bill

Financial Advisers (Amendment) Bill Financial Advisers (Amendment) Bill Bill No. 15/2015. Read the first time on 11 May 2015. A BILL intituled An Act to amend the Financial Advisers Act (Chapter 110 of the 2007 Revised Edition). Be it enacted

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF DATA SECURITY USING MOBILE DEVICES DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET January 2015 Doug A. Ringler, CPA, CIA AUDITOR

More information

The Law of the Republic of Azerbaijan on Non-Bank Credit Institutions

The Law of the Republic of Azerbaijan on Non-Bank Credit Institutions The Law of the Republic of Azerbaijan on Non-Bank Credit Institutions This Law shall define the rules on establishment, management and regulation of non-bank credit institutions with an aim to better meet

More information

Inspection of Encrypted HTTPS Traffic

Inspection of Encrypted HTTPS Traffic Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents

More information

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)

Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors) HKSA 600 Issued September 2009; revised July 2010, May 2013, June 2014*, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

ISLAMIC AFFAIRS & CHARTABLE ACTIVITIES DEPARTMENT GOVERNMENT OF DUBAI

ISLAMIC AFFAIRS & CHARTABLE ACTIVITIES DEPARTMENT GOVERNMENT OF DUBAI ISLAMIC AFFAIRS & CHARTABLE ACTIVITIES DEPARTMENT GOVERNMENT OF DUBAI Rules for Licenses of Religious and Charitable Societies and Organization Of their Activities in the Emirate of Dubai IN THE NAME OF

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

BANK LINK USE AGREEMENT NO. Representative:

BANK LINK USE AGREEMENT NO. Representative: BANK LINK USE AGREEMENT NO. Bank Merchant Swedbank AS Registration No.: 40003074764 Registration No.: Registered office: Balasta dambis 1a, Riga, LV-1048 Address: E-mail address: ebizness@swedbank.lv E-mail

More information

License Installation Manual AdRem Network Inventory

License Installation Manual AdRem Network Inventory License Installation Manual AdRem Network Inventory 2010 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as

More information

HKSAE 3000 (Revised), Assurance Engagements Other than Audits or Reviews of Historical Financial Information

HKSAE 3000 (Revised), Assurance Engagements Other than Audits or Reviews of Historical Financial Information HKSAE 3000 Issued March 2014; revised February 2015 Hong Kong Standard on Assurance Engagements HKSAE 3000 (Revised), Assurance Engagements Other than Audits or Reviews of Historical Financial Information

More information

CORPORATE LEGAL FRAMEWORK IN JORDAN. Legal reference: The Companies Law No. 27 of 2002 and its amendments

CORPORATE LEGAL FRAMEWORK IN JORDAN. Legal reference: The Companies Law No. 27 of 2002 and its amendments CORPORATE LEGAL FRAMEWORK IN JORDAN Legal reference: The Companies Law No. 27 of 2002 and its amendments Under the Jordanian different types of companies offer different advantages and have different requirements

More information

Business Mobile Deposit Capture Terms & Conditions

Business Mobile Deposit Capture Terms & Conditions Business Mobile Deposit Capture Terms & Conditions DESCRIPTION The mobile deposit capture services ("Mobile Deposit" or "Services") are designed to allow you to make deposits to your checking, money market

More information

The Law of the City of Moscow. No. 30 dated the 30 th of June 2010. On the Chamber of Control and Accounts of Moscow

The Law of the City of Moscow. No. 30 dated the 30 th of June 2010. On the Chamber of Control and Accounts of Moscow The Law of the City of Moscow No. 30 dated the 30 th of June 2010 On the Chamber of Control and Accounts of Moscow In accordance with the federal legislation and the Moscow City Charter, this Law shall

More information

ACT ON LIABILITY FOR NUCLEAR DAMAGE

ACT ON LIABILITY FOR NUCLEAR DAMAGE ACT ON LIABILITY FOR NUCLEAR DAMAGE Published in the Official Gazette of the Republic of Slovenia - International Treaties, No. 77/2010 UNOFFICIAL TRANSLATION I. GENERAL PROVISIONS Article 1 (Contents)

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Merchants and Trade - Act No 28/2001 on electronic signatures

Merchants and Trade - Act No 28/2001 on electronic signatures This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and

More information

International Financial Reporting Standards (IFRS)

International Financial Reporting Standards (IFRS) FACT SHEET September 2011 IAS 27 Consolidated and separate financial statements (This fact sheet is based on the standard as at 1 January 2011.) Important note: This fact sheet is based on the requirements

More information

Valid as of January 29, 2013

Valid as of January 29, 2013 1 (10) Contractual terms of RAY Valid as of January 29, 2013 These contractual terms replace the contractual terms of RAY that entered into force on August 28, 2012. These terms shall also be applied to

More information

REGULATION (EEC) No 2309/93

REGULATION (EEC) No 2309/93 REGULATION (EEC) No 2309/93 Council Regulation (EEC) No 2309/93 of 22 July 1993 laying down Community procedures for the authorization and supervision of medicinal products for human and veterinary use

More information

Service Schedule for BT Business Broadband

Service Schedule for BT Business Broadband 1. SERVICE DESCRIPTION Service Overview 1.1 The Service BT will provide to the Customer in the United Kingdom is a broadband access line that will provide internet connectivity to the Site. The Service

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Requirements made under the Intermediaries Byelaw

Requirements made under the Intermediaries Byelaw Chapter 2 Requirements made under the Intermediaries Byelaw Section 1 Delegated Underwriting Registers of coverholders and registered binding authorities Part B of the Intermediaries Byelaw Format and

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information