TSCP Glossary. Document Version: 2.04

Size: px
Start display at page:

Download "TSCP Glossary. Document Version: 2.04"

Transcription

1 TSCP Glossary Document Version: 2.04 Publish Date: 10 August 2012

2 Copyright 2013 Transglobal Secure Collaboration Participation, Inc. All rights reserved. Terms and Conditions Transglobal Secure Collaboration Participation, Inc. (TSCP) is a consortium comprising a number of commercial and government members (as further specified at (each a TSCP Member ). This specification was developed and is being released under this open source license by TSCP. Use of this specification is subject to the disclaimers and limitations described below. By using this specification you (the user) agree to and accept the following terms and conditions: 1. This specification may not be modified in any way. In particular, no rights are granted to alter, transform, create derivative works from, or otherwise modify this specification. Redistribution and use of this specification, without modification, is permitted provided that the following conditions are met: Redistributions of this specification must retain the above copyright notice, this list of conditions, and all terms and conditions contained herein. Redistributions in conjunction with any product or service must reproduce the above copyright notice, this list of conditions, and all terms and conditions contained herein in the documentation and/or other materials provided with the distribution of the product or service. TSCP s name may not be used to endorse or promote products or services derived from this specification without specific prior written permission. 2. The use of technology described in or implemented in accordance with this specification may be subject to regulatory controls under the laws and regulations of various jurisdictions. The user bears sole responsibility for the compliance of its products and/or services with any such laws and regulations and for obtaining any and all required authorizations, permits, or licenses for its products and/or services as a result of such laws or regulations. 3. THIS SPECIFICATION IS PROVIDED AS IS AND WITHOUT WARRANTY OF ANY KIND. TSCP AND EACH TSCP MEMBER DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF TITLE, NONINFRINGEMENT, MERCHANTABILITY, QUIET ENJOYMENT, ACCURACY, AND FITNESS FOR A PARTICULAR PURPOSE. NEITHER TSCP NOR ANY TSCP MEMBER WARRANTS (A) THAT THIS SPECIFICATION IS COMPLETE OR WITHOUT ERRORS, (B) THE SUITABILITY FOR USE IN ANY JURISDICTION OF ANY PRODUCT OR SERVICE WHOSE DESIGN IS BASED IN WHOLE OR IN PART ON THIS SPECIFICATION, OR (C) THE SUITABILITY OF ANY PRODUCT OR A SERVICE FOR CERTIFICATION UNDER ANY CERTIFICATION PROGRAM OF TSCP OR ANY THIRD PARTY. 4. IN NO EVENT SHALL TSCP OR ANY TSCP MEMBER BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY CLAIM ARISING FROM OR RELATING TO THE USE OF THIS SPECIFICATION, INCLUDING, WITHOUT LIMITATION, A CLAIM THAT SUCH USE INFRINGES A THIRD PARTY S INTELLECTUAL PROPERTY RIGHTS OR THAT IT FAILS TO COMPLY WITH APPLICABLE LAWS OR REGULATIONS. BY USE OF THIS SPECIFICATION, THE USER WAIVES ANY SUCH CLAIM AGAINST TSCP OR ANY TSCP MEMBER RELATING TO THE USE OF THIS SPECIFICATION. IN NO EVENT SHALL TSCP OR ANY TSCP MEMBER BE LIABLE FOR ANY DIRECT OR INDIRECT DAMAGES OF ANY KIND, INCLUDING CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE, OR OTHER DAMAGES WHATSOEVER ARISING OUT OF OR RELATED TO ANY USER OF THIS SPECIFICATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 5. TSCP reserves the right to modify or amend this specification at any time, with or without notice to the user, and in its sole discretion. The user is solely responsible for determining whether this specification has been superseded by a later version or a different specification. 6. These terms and conditions will be interpreted and governed by the laws of the State of Delaware without regard to its conflict of laws and rules. Any party asserting any claims related to this specification irrevocably consents to the personal jurisdiction of the U.S. District Court for the District of Delaware and to any state court located in such district of the State of Delaware and waives any objections to the venue of such court. TSCP Inc. Glossary Page i

3 TABLE OF CONTENTS PURPOSE... 1 GLOSSARY... 2 Access Control... 2 Access Control List... 2 Access Policy... 2 Accreditation... 2 Active Directory... 2 Aerospace and Defense... 2 Assertion... 2 Assurance Level... 2 Attribute... 2 Attribute Based Access Control... 2 Audit... 2 Authentication... 2 Authorization... 2 Business Authorization Framework... 3 Business Authorization Identification and Labeling Scheme... 3 Business Authorization... 3 Certificate... 3 Certificate Lookup Proxy... 3 Certificate Policy... 3 Certificate Revocation List... 3 Common Operating Rules... 3 Department of Defense... 3 Digital Labeling of Documents and Access Policy Enforcement... 3 Diffie-Hellman Algorithm... 3 Digital Rights Management... 3 Do it Yourself... 3 Document Sharing Based on Identity Federation Version Client Domain Gateway Gateway TLS Certificate... 4 End-User Encryption Certificate... 4 End-User Encryption Certificate Repository Service... 4 End-User Signing Certificate... 4 Enterprise Certificate Lookup Proxy... 4 Ephemeral Diffie-Hellman... 4 Federation Participant... 4 General Services Administration... 4 Identity Federation... 4 Identity Proofing... 4 TSCP Inc. Glossary Page ii

4 Identity Proofing and Vetting... 4 Identity Provider... 4 Identity Vetting... 4 Inbound Border Proxy... 4 Inbound Gateway... 4 Intellectual Property Protection... 5 Intellectual Property Rights... 5 In-Source Enterprise... 5 Just in Time Provisioning... 5 Liberty Alliance... 5 Mail Relay... 5 Mail Transfer Agent... 5 Ministry of Defence... 5 National Institute of Standards and Technology... 5 Organization... 5 Organization-to-Organization Secure Outbound Border Proxy... 5 Outbound Gateway... 5 Out-Source Enterprise... 5 Provisioning... 5 Public Key Infrastructure... 5 Role Based Access Control... 5 RSA (Rivest, Shamir, Adleman)... 5 Secure Version Security Assertion Markup Language... 6 Shadow Account... 6 Secure Hash Algorithm... 6 SMB Certificate Lookup Proxy... 6 SMB Service Provider... 6 Technical Profile... 6 Transport Layer Security... 6 Transglobal Secure Collaboration Program... 6 Trusted Framework Provider... 6 Trusted Framework Provider Adoption Process... 6 Web Services Federation... 6 Out of Band Provisioning... 6 Trust Topology... 7 User-to-User Secure REFERENCES TSCP Inc. Glossary Page iii

5 1. Purpose The TSCP Glossary is a comprehensive list of words, terms and acronyms that are used by TSCP project teams and programs and within TSCP documents and specifications. This document includes the preferred terminology used by the TSCP community and the standard definitions of those terms. The TSCP Glossary aggregates several earlier works, including project-specific glossaries that have been published separately or within other TSCP resources. A single glossary ensures that TSCP terms and their meanings and uses remain consistent across the community. TSCP Inc. Glossary Page 1 of 8

6 2. Glossary Term Acronym Definition The processes by which the decision is made to permit or deny the Access Control discovery and access of resources and enforce that decision. Access control limits the use of a resource to only those people, programs or devices specifically permitted to use the resource. A mechanism that implements access control for a system resource by Access Control enumerating the system entities that are permitted to access the resource List ACL and stating, either implicitly or explicitly, the access modes granted to each entity. Defines the rules for controlling access to resources that are subject to the Access Policy scope of a particular access policy. An access policy scope is a specification of a type of information to be protected. Access policies are typically aligned with organizations responsible for particular functions, such as export control. Accreditation An administrative action by which a designated authority declares that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards. Active Directory AD An implementation of LDAP directory services by Microsoft for use primarily Aerospace and Defense Assertion Assurance Level Attribute Attribute Based Access Control Audit Authentication Authorization A&D ABAC in Windows environments. A term referring to the industry which researches, designs, manufactures, operates and maintains vehicles moving through air and space. A statement from an Identity Provider to a Service Provider that contains identity information about a subscriber. Assertions may also contain verified attributes, may be digitally signed objects or they may be obtained from a trusted source by a secure protocol. A measure of trust or confidence in an authentication mechanism, represented in four levels: Level 1: LITTLE or NO confidence, Level 2: SOME confidence, Level 3: HIGH confidence and Level 4: VERY HIGH confidence. A claim of a named quality or characteristic inherent in or ascribed to someone or something. A policy model that allows for access control policy applicability and the associated rules that govern access, to be formulated based on an extensible notion of subject, resource, and other attributes. Independent review and examination of records and activities to assess the adequacy of system controls and ensure compliance with established policies and operational procedures. The process of establishing confidence in user identities. The process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource. Usually, authorization is in the context of authentication. Once a subject is authenticated, it may be authorized to perform different types of access. TSCP Inc. Glossary Page 2 of 8

7 Term Acronym Definition Business Authorization Framework Business Authorization Identification and Labeling Scheme Business Authorization Certificate Certificate Lookup Proxy Certificate Policy Certificate Revocation List Common Operating Rules Department of Defense Digital Labeling of Documents and Access Policy Enforcement Diffie-Hellman Algorithm Digital Rights Management BAF BAILS CLP CP CRL COR DoD DLDAPE DRM A specification that provides a data and a process model for the capture of information protection policies in a consistent form that can subsequently be used to support the procedural and systemic enforcement of these policies. The BAF includes a set of interchanged formats allowing organizations to exchange digital policies in an interoperable manner. A specification that allows organizations to apply security labels on information objects to indicate to human users and systems all the information protection policies that need to be enforced. As part of this specification ILH v1 delivers bindings of logical labels to physical document formats such as office documents. Subsequent versions will add more bindings, such as PDF and CAD/CAM formats. Generically designates the contractual terms that collaboration partners must follow in order to comply with a particular policy. For example, particular instances of a Technical Assistance Agreement (TAA) or a Proprietary Information Exchange Agreement (PIEA) are examples of Business Authorizations. DLDAPE v1 defines a generic data model that can be used to precisely capture such business authorizations. A data object containing a subject identifier, a public key and other information that is digitally signed by a Certification Authority. Certificates convey trust in the relationship of the subject identifier to the public key. An LDAP proxy that routes lookup requests for End-User Encryption Certificates from sending relying parties to recipients End-User Certificate Repository Services. A named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. A list of revoked public key certificates created and digitally signed by a Certification Authority. Identifies the operational rules and policies for identity federation participants. The rules leverage both existing standards and commercial best practices to ensure identity federation participants support a baseline set requirements. U.S. federal department charged with coordinating and supervising all agencies and functions of the government relating directly to national security and the United States Armed Forces. A program within TSCP tasked with facilitating the adoption of the digital labeling of documents and associating access control policies based on these labels. A key agreement algorithm attributed to W. Diffie and M. Hellman (1976). The Diffie-Hellman algorithm is used by two parties in Transport Layer Security (TLS) and other protocols to arrive at a common session key and generate the actual symmetric encryption key or keys from it. Access control technologies used to limit usage and access of digital media or devices. Do it Yourself DIY Step by step directions for setting up a lab environment. Document Sharing Based on Identity Federation v.1 DSIF V1 A program within TSCP tasked with facilitating the adoption of identity federation and collaboration via shared electronic documents. TSCP Inc. Glossary Page 3 of 8

8 Term Acronym Definition Client A computer program used to read and send messages. Also known as a mail user agent (MUA). Domain A DNS domain whose name may be used after the at sign in addresses. Each member may register one or more Domains. Gateway See Inbound Gateway or Outbound Gateway. Gateway TLS Certificate End-User Encryption Certificate End-User Encryption Certificate Repository Service End-User Signing Certificate Enterprise Certificate Lookup Proxy Ephemeral Diffie- Hellman Federation Participant General Services Administration Identity Federation Identity Proofing Identity Proofing and Vetting Identity Provider Identity Vetting Inbound Border Proxy Inbound EUCRS ECLP GSA IdF IPV IdP An X.509v3 certificate used by Gateways to authenticate themselves in TLS-based secure communications. (Note that these certificates may be used in other protocols, for example, to establish security associations in IPSec VPNs.) An X.509v3 certificate belonging to an recipient used by senders to encrypt messages sent to him or her. An LDAP-accessible repository of End-User Encryption Certificates. May be implemented as a directory or as a filtering proxy forwarding requests to an actual directory. An X.509v3 certificate used by a sending user to digitally sign his or her messages to other users. An LDAP proxy running within a Member s enterprise. This proxy is responsible for mediation between Clients, on the one hand, and another Member s End-User Certificate Repository Service. An implementation of the Diffie-Hellman key agreement algorithm in which the common parameters are generated on the fly rather than read from a certificate. Any organization in the role of a Service Provider or IDP operating under, or leveraging the common operating rules. An independent agency of the United States government that helps manage and support the basic functioning of federal agencies. GSA policies promote management best practices and efficient government operations. Allows members of one organization to use their credentials to access documentation maintained in a separate security domain by a partnering organization. Validates the claimed identity by an individual; it is at the heart of any secure and authoritative process for the issuance and use of identity credentials. The process consists of collecting identity information from authoritative data sources (e.g., personal biographical data, biometrics) and determining the validity and association of the individual and their information. Identifies the level of scrutiny used to issue a credential to the principal. The identity source that authenticates a subject and provides an SP with an assertion vouching for that authentication. A process to determine whether past behavior is a matter of concern for future reliability. Rigorous background investigations, establishing a history of identity and periodically reconfirming identity and reliability mitigates the risk of an adversary obtaining a valid credential. An LDAP proxy hosted by a Member s enterprise that forwards End- User Encryption Certificate lookup requests to the actual directory containing those certificates. A component in the flow responsible for receiving messages from the senders enterprise, either directly or via a relay. TSCP Inc. Glossary Page 4 of 8

9 Term Acronym Definition Gateway Intellectual Property Protection Intellectual Property Rights In-Source Enterprise Just in Time Provisioning Liberty Alliance Mail Relay Mail Transfer Agent Ministry of Defence National Institute of Standards and Technology Organization Organization-to- Organization Secure Outbound Border Proxy Outbound Gateway Out-Source Enterprise Provisioning Public Key Infrastructure Role Based Access Control RSA (Rivest, Shamir, Adleman) IPP IPR MoD NIST PKI RBAC RSA Laws that establish and maintain ownership rights to intellectual property. The principal forms of IP protection are patents, trademarks and copyrights. The right to control and derive the benefits from writings (copyright), inventions (patents), processes (trade secrets) and identifiers (trademarks). An enterprise (usually large) that maintains and manages its own IT infrastructure relevant to the Secure capability (directories, certificate authorities, proxies, etc.). See Out-Source Enterprise. The process of creating a shadow account at the SP corresponding to a user s IDP credential in real time. As the user authenticates to an SP for the first time, a shadow account is created for the user. Collaborative community that establishes open standards, guidelines and best practices for federated identity management. An proxy that mediates between two or more Mail Transfer Agents. A computer program that transfers electronic mail messages from one computer or enterprise to another. Government department responsible for implementation of government defense policy. A standards laboratory which is a non-regulatory agency of the United States Department of Commerce. A legally established entity that can enter into a contractual relationship. Organizations have contractual relationships with one another and with individuals. All messages sent by and to users (or end-point devices). The term organization-to-organization secure describes clear-text messages that need protection when transmitted between organizations over the Internet. An LDAP proxy deployed by an out-source enterprise Member within its enterprise to mediate between Clients, on the one hand, and an SMB Certificate Lookup Proxy, on the other. A component in the flow responsible for sending messages to the recipients enterprises, either directly or via relays. An enterprise outsourcing some or all elements of its IT infrastructure relevant to the Secure capability (directories, certificate authorities, proxies, etc.). See In-Source Enterprise. The procedural preparation, system preparation, and distribution of the associated data that is required as a precursor to a service and/or associated device being accessed by a user. An arrangement that binds public keys with respective user identities by means of a certificate authority. A model for controlling access to resources where permitted actions on resources are identified with roles rather than with individual subject identities. A public key algorithm attributed to R. Rivest, A. Shamir and L. Adleman (1977). It derives its strength from difficulty of factoring large numbers. Secure SE v.1 A TSCP program tasked with facilitating the adoption of Secure TSCP Inc. Glossary Page 5 of 8

10 Term Acronym Definition Version 1 based on the S/MIME standard. Security Assertion Markup Language Shadow Account Secure Hash Algorithm SMB Certificate Lookup Proxy SMB Service Provider Technical Profile Transport Layer Security Transglobal Secure Collaboration Program Trusted Framework Provider Trusted Framework Provider Adoption Process Web Services Federation Out of Band Provisioning SAML SHA TLS TSCP TFP TFPAP WS-Fed An XML-based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product of the OASIS Security Services Technical Committee. An account required by a Service Provider application and mapped to one or more federated identities. A shadow account may be an LDAP/Active Directory account, contained in database tables or application specific user stores. A shadow account is not used for end user initial authentication. A Secure Hash Algorithm, also called SHA-1, given a text generates a 160-bit hash with a low probability of collisions. The algorithm is standardized by the FIPS PUB 180. A Certificate Lookup Proxy servicing several out-source enterprises. An entity responsible for day-to-day operation, maintenance and management of an SMB Certificate Lookup Proxy. There may be multiple SMB Service Providers servicing different groups of outsource Enterprises. A set of rules and procedures an enterprise must follow to be eligible for participation in the International Aerospace and Defense Industry Secure Capability. Cryptographic protocols that provide security for communications over networks such as the Internet. The Transport Layer Security protocol is defined in RFC 2246 [RFC2246], and supersedes version 3.0 of the Secure Socket Layer (SSL) protocol. Within TSCP documentation, TLS 1.0 implies support for SSL 3.0. A cooperative forum in which leading A&D companies and key government agencies work together to establish and maintain an open standards-based framework that can be used to enable secure collaboration and assured information sharing between parties, irrespective of the tools they choose to use. Represents the organization(s) which deliver(s) day-to-day operation, maintenance and management of an Identity Federation. The Trusted Framework Provider support(s) an industry-wide registry of members, federation trust enablers, technical interoperability services and oversight for federation operating rules and governance. A process whereby the U.S. Federal government can assess the efficacy of the Trust Frameworks for federal purposes so that an Agency online application or service can trust an electronic identity credential provided to it at a known level of assurance comparable to one of the four OMB Levels of Assurance. An XML-based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). The process of creating a shadow account at the Service Provider, corresponding to a user s Identity Provider credential in which the shadow account creation is separated from the user s first authentication. The Service Provider creates the shadow accounts, prior to the user authenticating with the Service Provider for the first time. The Identity Provider must provide a list of users to the Service Provider to support this function. TSCP Inc. Glossary Page 6 of 8

11 Term Acronym Definition Trust Topology The worldwide PKI is a directed graph with key pairs as vertices and X.509 certificates as edges. A trust topology is a sub-graph of the worldwide PKI graph containing only those vertices and edges that are acceptable to a Member of this Capability. Hence, a trust topology is always a Member s view of the PKI. User-to-User Reflects that an message is encrypted at one end (by the sender) Secure and decrypted on the other (by the recipient); describes the transmission of encrypted messages over insecure channels. TSCP Inc. Glossary Page 7 of 8

12 3. References ICAM Lexicon Version 1.0, 09JUN2010 Secure Capability Technical Specification 0.2, 07JUL2010 TSCP Inc. Lexicon Page 8 of 8

Transglobal Secure Collaboration Program Secure E-mail v.1 Requirements to Community Service Providers

Transglobal Secure Collaboration Program Secure E-mail v.1 Requirements to Community Service Providers Transglobal Secure Collaboration Program Secure E-mail v.1 Requirements to Community Service Providers Prepared by: TSCP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 TSCP Secure E-mail

More information

Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles

Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure

More information

Transglobal Secure Collaboration Program Secure E-Mail v.1 Enterprise E-Mail Environment High Level Design

Transglobal Secure Collaboration Program Secure E-Mail v.1 Enterprise E-Mail Environment High Level Design Transglobal Secure Collaboration Program Secure E-Mail v.1 Enterprise E-Mail Environment High Level Design Prepared by: TSCP Secure E-Mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 TSCP Secure

More information

Amazon Trust Services Certificate Subscriber Agreement

Amazon Trust Services Certificate Subscriber Agreement Amazon Trust Services Certificate Subscriber Agreement This Certificate Subscriber Agreement (this Agreement ) is an agreement between Amazon Trust Services, LLC ( ATS, we, us, or our ) and the entity

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Symantec Managed PKI Service for Windows Service Description

Symantec Managed PKI Service for Windows Service Description Introduction Symantec Managed PKI Service for Windows Service Description Symantec Managed PKI Service for Windows provides a flexible PKI platform to manage complete lifecycle of certificates, which includes:

More information

Global Telehealth Conference 2012

Global Telehealth Conference 2012 A Best Practice Guide to Encryption for Telehealth Liam Caffery PhD Centre for Online Health The University of Queensland Recommendations on best practice Slide 1 of 33 Slide 2 of 33 Introduction Security

More information

"Certification Authority" means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates.

Certification Authority means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates. QUICKSSL PREMIUM(tm) SUBSCRIBER AGREEMENT Please read the following agreement carefully. By submitting an application to obtain a QuickSSL Premium(tm) Certificate and accepting and using such certificate,

More information

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Terms and Conditions

Terms and Conditions Terms and Conditions Website Use www.sweetpbakeshop.com Topco Associates, LLC, a Delaware limited liability company, headquartered at 150 Northwest Point Blvd., Elk Grove, IL 60007 ( Company, we or us

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple. ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,

More information

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is. Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED

More information

RockWare Click-Wrap Software License Agreement ( License )

RockWare Click-Wrap Software License Agreement ( License ) RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY

More information

HTTP State Management

HTTP State Management HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright

More information

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE TERMS OF USE FOR TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information and other information contained

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4

More information

What is a Symantec ECAPS and How Does it Work?

What is a Symantec ECAPS and How Does it Work? SYMANTEC ECA SUBSCRIBER AGREEMENT External Certification Authority Subscriber Agreement YOU MUST READ THIS EXTERNAL CERTIFICATION AUTHORITY SUBSCRIBER AGREEMENT ( SUBSCRIBER AGREEMENT ) BEFORE APPLYING

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

MTConnect Institute Public Comment and Evaluation License Agreement

MTConnect Institute Public Comment and Evaluation License Agreement MTConnect Institute Public Comment and Evaluation License Agreement Effective 6/10/2015 The Association for Manufacturing Technology, a non-profit organization ( AMT ), and the MTConnect Institute jointly

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

IPInfoDB Web Service Agreement

IPInfoDB Web Service Agreement IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE

More information

Boundary Encryption.cloud Deployment Process Overview

Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc.

AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. The Global Clinical Research Management, Inc. Web Site is comprised of various Web pages operated by Global Clinical Research Management,

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Terms of Service. Your Information and Privacy

Terms of Service. Your Information and Privacy These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F

More information

Certification Report

Certification Report Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

This is a legal agreement ("Agreement") between the undersigned (either an individual or an entity)

This is a legal agreement (Agreement) between the undersigned (either an individual or an entity) Royalty Free Web Services Security Specification License Agreement This is a legal agreement ("Agreement") between the undersigned (either an individual or an entity) ( Company ), and Microsoft Corporation

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y

More information

Terms & Conditions Template

Terms & Conditions Template Terms & Conditions Template AGREEMENT BETWEEN USER AND [INSERT NAME] [INSERT NAME] Web Site is comprised of various Web pages operated by [INSERT NAME]. The [INSERT NAME] Web Site is offered to you conditioned

More information

Capitalized terms not defined below shall have the meaning given to them in the applicable CP/CPS, unless the context requires otherwise.

Capitalized terms not defined below shall have the meaning given to them in the applicable CP/CPS, unless the context requires otherwise. HydrantID SSL Certificate Services Agreement HYDRANTID SSL CERTIFICATE SERVICES AGREEMENT THIS HYDRANTID CERTIFICATE SERVICES AGREEMENT ( AGREEMENT ) IS ENTERED INTO BETWEEN HYDRANTID AND THE ENTITY YOU

More information

NOTICE SOFTWARE END USER LICENSE AGREEMENT

NOTICE SOFTWARE END USER LICENSE AGREEMENT NOTICE SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT ( THIS AGREEMENT ) IS A LEGAL AND BINDING AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR ENTITY) AND TP VISION NETHERLANDS

More information

Privacy Policy and Terms of Use

Privacy Policy and Terms of Use Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION Prior to the verification of the electronic certificate, or to access or use the certificate status information and other

More information

LOGIX Fax to Email Service

LOGIX Fax to Email Service LOGIX Fax to Email Service ACCEPTANCE OF TERMS AND CONDITIONS This agreement is between LOGIX Communications, L.P. dba LOGIX Communications ("LOGIX") and Customer ("you" or "Customer"), as an authorized

More information

The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC.

The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC. TERMS OF USE AGREEMENT BETWEEN USER AND Credit Control, LLC The Credit Control, LLC Web Site is comprised of various Web pages operated by Credit Control, LLC. The Credit Control, LLC Web Site is offered

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that

More information

Security Guide. BES12 Cloud

Security Guide. BES12 Cloud Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud

More information

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Agreement. Whereas, ThinkGeek is interested in creating products based on the Idea.

Agreement. Whereas, ThinkGeek is interested in creating products based on the Idea. Agreement This Agreement is entered into as of ( Effective Date ) by and between ( Inventor ), [ADDRESS] and ThinkGeek, Inc., a Delaware corporation with an office at 11216 Waples Mill Rd., Suite 100,

More information

Service Agreement: January 2008

Service Agreement: January 2008 International Consultants in Medicine Service Agreement: January 2008 Prior to enrolling in the service as a Member of any degree, you must agree to the following terms and conditions. You may accept these

More information

TERMS and CONDITIONS OF USE - NextSTEPS TM

TERMS and CONDITIONS OF USE - NextSTEPS TM TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/

More information

InnoCaption TM Service Terms of Use

InnoCaption TM Service Terms of Use PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

Quartz Legal Terms and Conditions

Quartz Legal Terms and Conditions Quartz Legal Terms and Conditions 1. USE OF THIS WEBSITE: This website is owned and operated by Domaine Pinnacle Inc. (collectively hereafter "Site Owner"). Your use of this website is subject to the following

More information

Internet Protocol Support Profile

Internet Protocol Support Profile Bluetooth Specification Date 2014-Dec-16 Revision Group Prepared By Internet WG Feedback Email int-main@bluetooth.org Abstract: This Profile Specification proposes the support of exchanging IPv6 packets

More information

RELYING PARTY AGREEMENT AND LIMITED WARRANTY

RELYING PARTY AGREEMENT AND LIMITED WARRANTY RELYING PARTY AGREEMENT AND LIMITED WARRANTY YOU ARE REQUIRED TO READ THIS AGREEMENT CAREFULLY BEFORE RELYING ON A DIGICERT CLICKID SITE SEAL, SSL CERTIFICATE, OR OTHER SITE AUTHENTICATION PRODUCT OR SERVICE.

More information

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE

CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE CENTURY 21 CANADA LIMITED PARTNERSHIP WEBSITE TERMS OF USE THESE TERMS OF USE CONTAIN LEGAL OBLIGATIONS. PLEASE READ THESE TERMS OF USE BEFORE USING THIS WEBSITE. Acceptance of these Terms of Use and any

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS)

GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU

More information

COMODO CERTIFICATE SUBSCRIBER AGREEMENT

COMODO CERTIFICATE SUBSCRIBER AGREEMENT COMODO CERTIFICATE SUBSCRIBER AGREEMENT IMPORTANT PLEASE READ THIS CERTIFICATE SUBSCRIBER AGREEMENT CAREFULLY BEFORE APPLYING FOR, ACCEPTING, OR USING A COMODO CERTIFICATE. BY USING, APPLYING FOR, OR ACCEPTING

More information

AcroTime Workforce Management Time & Labor Human Resources Payroll Service Terms and Conditions

AcroTime Workforce Management Time & Labor Human Resources Payroll Service Terms and Conditions Terms of Agreement Acroprint Time Recorder Company (referred as Acroprint ) grants you access to use its web hosted time and attendance solution AcroTime (referred as Service ), subject to your agreement

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

If a Client and a Freelancer enter an independent contractor relationship, then this Freelancer Agreement ( Freelancer Agreement ) will apply.

If a Client and a Freelancer enter an independent contractor relationship, then this Freelancer Agreement ( Freelancer Agreement ) will apply. Freelancer Agreement If a Client and a Freelancer enter an independent contractor relationship, then this Freelancer Agreement ( Freelancer Agreement ) will apply. This Agreement is effective as of March

More information

PERFORCE End User License Agreement for Open Source Software Development

PERFORCE End User License Agreement for Open Source Software Development Perforce Open Source End User License Agreement Page 1 1. Introduction PERFORCE End User License Agreement for Open Source Software Development This is a License Agreement ( Agreement ) between Perforce

More information

4. Representation. Subscriber represents that it has read, understands, and agrees to schedule 1.

4. Representation. Subscriber represents that it has read, understands, and agrees to schedule 1. COMODO EV CERTIFICATE SUBSCRIBER AGREEMENT FOR INCOMMON PARTICIPANTS This certificate subscriber agreement, dated, is between COMODO CA LIMITED ( Comodo ), a United Kingdom corporation, and ( Subscriber

More information

IBM Lotus Protector for Mail Encryption. User's Guide

IBM Lotus Protector for Mail Encryption. User's Guide IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This

More information

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.

All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us. LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated

More information

Therm-App Software Development Kit License Agreement

Therm-App Software Development Kit License Agreement Therm-App Software Development Kit License Agreement 1. Introduction 1.1 Opgal is providing you with the Therm-App Software Development Kit intended for Android application developers (referred to in this

More information

APP SOFTWARE LICENSE AGREEMENT

APP SOFTWARE LICENSE AGREEMENT APP SOFTWARE LICENSE AGREEMENT This App Software License Agreement (the Agreement ) is made by and between AvePoint, Inc., a Delaware company, with offices at Harborside Financial Center, Plaza 10, 3 Second

More information

AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses

AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses The International Network of Spinal Cord Injury Nurses Web Site is comprised of various Web pages operated by International

More information

Terms of Use for the REDCap Non Profit End User License Agreement

Terms of Use for the REDCap Non Profit End User License Agreement Close print view Please note that displayed below is *not* the license agreement but only the terms of use for the agreement. Terms of Use for the REDCap Non Profit End User License Agreement This non

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

RSA Two Factor Authentication. Feature Description

RSA Two Factor Authentication. Feature Description RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

BLUEWAVE COMMUNICATIONS INTERNET SERVICE AGREEMENT Read This Internet Service Agreement Carefully Before Using Our Internet Services.

BLUEWAVE COMMUNICATIONS INTERNET SERVICE AGREEMENT Read This Internet Service Agreement Carefully Before Using Our Internet Services. BLUEWAVE COMMUNICATIONS INTERNET SERVICE AGREEMENT Read This Internet Service Agreement Carefully Before Using Our Internet Services. 1. INTRODUCTION. BLUEWAVE COMMUNICATIONS provides its Internet services,

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information

ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) 2.0 - ADOPTERS AGREEMENT

ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) 2.0 - ADOPTERS AGREEMENT ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) 2.0 - ADOPTERS AGREEMENT This Enhanced Host Controller Interface Specification for Universal Serial Bus (USB) 2.0 - Adopters

More information