Remote Access Policy

Size: px
Start display at page:

Download "Remote Access Policy"

Transcription

1 Document Title: Version: ISP6.0 Approval Dates: This policy was originally approved on: [02 Apr 2009] This version was approved on: [27 January 2016] This version takes effect from: [27 January 2016] This policy will be reviewed by: [15 Mar 2017] Approved By: Prepared By: Nicola Wittman Alan Mose Contact: IT Support Desk (ext.412) Service Delivery Manager (ext 520)

2 Contents Document Control 3 Document Amendment History 3 1 Purpose 4 2 Scope 4 3 Governance factors 4 4 Remote Access Methods 4 5 Use of Remote Access methods 5 6 Usage Restrictions 5 7 Methods of compliance with the controls 6 8 PSN Code of Connection 6 Page 2 of 6

3 Document Control Organisation Title Creator Review date Uttlesford District Council Nicola Wittman Document Amendment History Revision Originator of Date of Change Description No. change change 1 Nicola Wittman 15/4/09 Updates 2 Nicola Wittman 22/3/10 Updates 3 Nicola Wittman 6/9/11 Updates 4 Nicola Wittman 5/11/12 Updates 5 Nicola Wittman 30/11/13 Updates 6 Nicola Wittman 10/3/15 Updates 7 Nicola Wittman 13/1/2016 Updates Page 3 of 6

4 1 Purpose Remote access is connecting to the corporate computer system by Council owned equipment. The provision of Remote Access must be controlled in order to protect Council systems. The controls determine who can access Council systems, how they can access and what can be accessed. 2 Scope Council systems can be accessed remotely by various people: Councillors and Staff whilst out of the office. Staff to provide support for systems Suppliers to provide Remote Administration on systems Third Parties requiring access to Council systems 3 Governance factors Controls on remote connections to the corporate network arise from the rules predefined in the Codes of Connections required to allow Councils to use secure networks. Examples of secure networks include, but are not limited to: Public Sector Network (PSN) Payment Card Industry Data Security Standard (PCI DSS) Remote connections must not be allowed to compromise compliance with a secure network Code of Connection. It is therefore a council requirement that remote access to secure networks such as Government Connect and PCI meet the following: Only officially owned council equipment is used. Only Uttlesford ICT approved software will be installed. Whilst connected access to the internet is restricted to Citrix only and not through the remote users broadband. Commercial anti-virus software will be installed on the council equipment with the virus database updated at least daily. The operating systems (Windows) will be kept patched in accordance with the council s patch management policy. Removable media, such as CD/DVD drives and USB ports will be disabled. 4 Remote Access Methods The following methods provide remote access Virtual private Network (VPN) o This uses an approved client installed on a computer which provides direct encrypted connectivity into the corporate network. Page 4 of 6

5 Aventail o Aventail provides secure remote access and uses Citrix Zenapps to present the applications. Third party remote support tools from the internet (logmein123). 5 Use of Remote Access methods The methods of remote access are only to be used in the following circumstances. VPN o The connections between Great Dunmow, Newport and Saffron Walden offices. Aventail o Staff to provide support for systems. o Access to and files whilst out of the office. o Suppliers to provide remote administration on systems. o Approved third parties requiring access to Council systems. Remote Access web tools o Essential support for systems that cannot be provided by other means. 6 Usage Restrictions VPN o On Council computers, VPN must only be enabled using approved software installed by ICT. o On Suppliers computers, used to provide remote administration on systems, VPN must only be enabled using approved software and must only give access to the system being supported. Remote Access web support o Access to Remote Web support websites must be individually approved. o Remote access sessions initiated by the supplier must have the support session start logged. o Access must only be allowed when all applications apart from the supported application have been closed. o All files transferred to the corporate network in order to facilitate the connection must be removed when the session is finished. o The supplier must inform ICT when the session has finished. Aventail o Each approved user will be given a SMS passcode via a text to their mobile phone. Page 5 of 6

6 o Passcodes are not to be shared. o Once the requirement for Aventail access has finished, the ICT section must be notified. 7 Methods of compliance with the controls Councillors or Staff must initiate a security incident report if there is any actual or attempted remote access to the Council corporate system that has not been approved, or may compromise a code of connection to a secure network. 8 PSN Code of Connection This policy has been prepared in accordance with the new PSN Code of Connection. Page 6 of 6

U09 Remote Access Policy

U09 Remote Access Policy Plymouth City Council U09 Remote Access Policy December 2008 This document is copyright to Plymouth City Council and should not be used or adapted for any purpose without the agreement of the Council.

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Blacklisting Procedure

Blacklisting Procedure Blacklisting Procedure Related Policy ICT Services and Facilities Use Policy Responsible Approved by Approved and commenced August, 2014 Review by August, 2017 Responsible Organisational Unit Information

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

RemoteApp Reference Guide. Outline

RemoteApp Reference Guide. Outline Outline System Requirements... 1 About RemoteApp... 1 Use of RemoteApp... 2 Launching a program with RemoteApp... 2 Using Multiple RemoteApp Programs... 3 RemoteApp and CDs, DVDs, USB Drives, Portable

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

REMOTE ACCESS POLICY & PROCEDURE

REMOTE ACCESS POLICY & PROCEDURE REMOTE ACCESS POLICY & PROCEDURE JULY 2013 Author: Steve Williams Date: September 2011 Agreed: EIS Management Unison Purpose The purpose of this policy is to define standards and restrictions for connecting

More information

Bucks PSN. Updata Self-Service Portal User Guide. Version 1.0

Bucks PSN. Updata Self-Service Portal User Guide. Version 1.0 Bucks PSN Updata Self-Service Portal User Guide Version 1.0 Updata Infrastructure Ltd Page 2 of 4 The Updata Self-Service Portal The Updata Self-service Portal is a web based online portal which enables

More information

VERIFONE ENHANCED ZONE ROUTER

VERIFONE ENHANCED ZONE ROUTER VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Data Network Security Policy

Data Network Security Policy Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

DSS Data Exchange Task Card 1 How to access the DSS Data Exchange

DSS Data Exchange Task Card 1 How to access the DSS Data Exchange For technical support, contact the DSS Data Exchange helpdesk by email [email protected] or on 1800 020 283 DSS Data Exchange Task Card 1 How to access the DSS Data Exchange This task

More information

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05

More information

Publish Date: 19/06/14 Version: 1.2. Internet Connectivity Service Level Agreement. Page: 1. Internet Connectivity Service Level

Publish Date: 19/06/14 Version: 1.2. Internet Connectivity Service Level Agreement. Page: 1. Internet Connectivity Service Level Publish Date: 19/06/14 Version: 1.2 Page: 1 Contents 1. Scope 3 2. Service Definitions 3 3. Service Provision 3 4. Supported Coverage Window 4 5. Incident and Service Request Targets 5 6. Manufacturer

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

What does it mean to be secure?

What does it mean to be secure? OmegaSecure.com What does it mean to be secure? Shekar Swamy, President Omega ATC What is Data Security? Data security is the means of ensuring that data is kept safe from corruption and access to it is

More information

Remote Access Service (RAS)

Remote Access Service (RAS) Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Four Top Emagined Security Services

Four Top Emagined Security Services Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS: Effective Date: August 2008 Approval: December 17, 2015 PCI General Policy Maintenance of Policy: Office of Student Accounts PURPOSE: To protect against the exposure and possible theft of account and personal

More information

Information Security Incident Management Policy

Information Security Incident Management Policy Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation

More information

Merthyr Tydfil County Borough Council. Information Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of

More information

Connecting to a Massey Computer using XP s Remote Desktop via VPN

Connecting to a Massey Computer using XP s Remote Desktop via VPN Connecting to a Massey Computer using XP s Remote Desktop via VPN NP 24092009 Contents Introduction... 3 Prerequisites... 3 Minimum Connection Requirements... 3 Related Documents... 3 Help... 3 Step 1

More information

Customer Hosted Service Description and Service Level

Customer Hosted Service Description and Service Level Customer Hosted Service Description and Service Level Customer Hosted service description and service level Copyright Egton Medical Information Systems Limited 2014 Controlled Document Version 8: 1 November

More information

Securing the NetSupport Client

Securing the NetSupport Client Securing the NetSupport Client Environments, Considerations & Requirements. Overview This document is designed to provide an overview of the security features available within NetSupport Manager and NetSupport

More information

Presented By: Daniel Chetty [email protected] 01628 771 811

Presented By: Daniel Chetty d.chetty@ninesharp.co.uk 01628 771 811 Candidate Name: Raymond - 145175 Job Applied For: Availability: Key Skills: 1 st /2 nd Line Support Interview: Immediate Start: immediate An experienced IT professional with a proven track record of supporting

More information

Critical Data Guide. A guide to handling critical information at Indiana University

Critical Data Guide. A guide to handling critical information at Indiana University Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.

More information

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2 Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: [email protected] http://www.smartimpact.co.uk/

More information

JOB DESCRIPTION. Assistant Director of Technology and Telecommunications

JOB DESCRIPTION. Assistant Director of Technology and Telecommunications JOB DESCRIPTION Title of Post: ICT Service Desk Officer Grade of Post: Band 3 Reports to: Accountable to: Location ICT Service Desk Manager Assistant Director of Technology and Telecommunications The South

More information

E-mail Policy Of Government of India

E-mail Policy Of Government of India E-mail Policy Of Government of India October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government of India New Delhi -

More information

Connecting to the Remote Desktop Service

Connecting to the Remote Desktop Service Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Network Password Management Policy & Procedures

Network Password Management Policy & Procedures Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

CWSI Service Definition for Server Monitoring

CWSI Service Definition for Server Monitoring CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.

More information

NHS FORTH VALLEY Information Governance Remote Working Guidance

NHS FORTH VALLEY Information Governance Remote Working Guidance NHS FORTH VALLEY Information Governance Remote Working Guidance Date of First Issue 09 / 12 / 2011 Approved 12 / 09 / 2013 Current Issue Date 12 / 09 / 2013 Review Date 01 / 12 / 2015 Version V 3.2 EQIA

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

NETWORK SECURITY GUIDELINES

NETWORK SECURITY GUIDELINES NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus

More information

View condition history for assets.

View condition history for assets. Comprehensive Asset Management fmxpert allows you to maintain detailed information for each and every asset at any one of facilities, including: asset location serial number, model and expected life in

More information

Using a VPN Connection

Using a VPN Connection Bullis School Using a VPN Connection Access Files and Resources While Off Campus Mark Smith Table of Contents What is a VPN?... 2 Can I set up my home computer to use a VPN connection?... 2 So how do I

More information

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise Foregenix Incident Response Handbook A comprehensive guide of what to do in the unfortunate event of a compromise Breadth of Expertise - You re in safe hands Foregenix is a global Information Security

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

G-Cloud Service Definition. for. Xicon Cloud SCS - SQL Server Managed Services

G-Cloud Service Definition. for. Xicon Cloud SCS - SQL Server Managed Services G-Cloud Service Definition for Xicon Cloud SCS - SQL Server Managed Services XICON-CLOUD-SCS-SQL, 1.0 dated 15/12/2014 Page 1 of 5 CONTENTS 1 XICON CLOUD SCS - SQL SERVER MANAGED SERVICES 3 1.1 SERVICE

More information

V ISA SECURITY ALERT 13 November 2015

V ISA SECURITY ALERT 13 November 2015 V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,

More information

Downloading the UHVPN Client and setting up Cisco VPN on Windows 7

Downloading the UHVPN Client and setting up Cisco VPN on Windows 7 Downloading the UHVPN Client and setting up Cisco VPN on Windows 7 Part 1: Downloading UHVPN 1. Go to the Software Downloads website: http://www.uh.edu/infotech/downloads/ 2. Select appropriate choice.

More information

JOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER

JOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER JOB DESCRIPTION POST TITLE: POST NUMBER: WEB DEVELOPER IT14 GRADE: 9 RESPONSIBLE TO: RESPONSIBLE FOR: LIAISON WITH: BUSINESS DEVELOPMENT & PROJECT MANAGER N/A ICT Team, all users (customers) of MDDC ICT

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

encription IT Security and Forensic Services

encription IT Security and Forensic Services PRODUCT DETAILS CONTENTS THE PROBLEM 2 THE Solution 2 THE PRODUCT AND SERVICE 3 THE BENEFITS 4 OPTIONS 5 THE PROBLEM External IT security breaches caused by malicious hackers, and others, can occur at

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

ICT Password Protection Policy

ICT Password Protection Policy SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

UCSD Credit Card Processing Policy & Procedure

UCSD Credit Card Processing Policy & Procedure UCSD Credit Card Processing Policy & Procedure The Payment Process UCSD accepts Visa, MasterCard, American Express and Discover credit cards. We perform credit transactions only, no debit sales with cash

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information