How Remote Data Backups, Inc. Helps CPAs, Financial Advisors, and Publicly-Held Companies become Sarbanes-Oxley Compliant

Size: px
Start display at page:

Download "How Remote Data Backups, Inc. Helps CPAs, Financial Advisors, and Publicly-Held Companies become Sarbanes-Oxley Compliant"

Transcription

1 WHITE PAPER REPORT: Hw Remte Data Backups, Inc. Helps CPAs, Financial Advisrs, and Publicly-Held Cmpanies becme Sarbanes-Oxley Cmpliant Use ur secure, autmatic, ffsite backup service t cmply with Sarbanes Oxley s Data Privacy and Security Rules. Remte Data Backups, Inc. A Decade f Data Prtectin Frt Cllins, CO USA BACKUP ( )

2 Sarbanes-Oxley Regulatry Cmpliance: Data Security The Sarbanes-Oxley Act f 2002 (als referenced as Sarbx r SOX) regulates the strage and management f crprate financial data fr all Registered Public Accunting Firms and many publicly-held cmpanies. Cmpanies wh fail t adhere t these regulatins can face fines and penalties including prisn time, s make sure yu are prtected in case f an audit. S which Sarbx regulatins effect data backup? Hw des RDB help yu cmply? 1. Sectin 103: Auditing, Quality Cntrl, And Independence Standards And Rules Explanatin: The Bard shall: (1) register public accunting firms; (2) establish, r adpt, by rule, "auditing, quality cntrl, ethics, independence, and ther standards relating t the preparatin f audit reprts fr issuers;" "The Bard requires registered public accunting firms t "prepare, and maintain fr a perid f nt less than seven years, audit wrk papers, and ther infrmatin related t any audit reprt, in sufficient detail t supprt the cnclusins reached in such reprt." Hw RDB helps yu cmply: Remte Data Backups helps yu prepare dcuments fr inspectin and audit. It encrypts, transmits and stres yur data at tw remte server using gvernment-level 128-bit encryptin. Our system allws access nly using the crrect accunt ID and encryptin key that nly yu have access t. Files can be restred either via the RDB client r by securely thrugh Remte File Access using a Web brwser. 2. Sectin 104: Inspectins f Registered Public Accunting Firms Explanatin: Quality inspectins must be cnducted annually fr firms auditing mre than 100 issues per year, r every 3 years fr all ther firms. The SEC r the Bard may rder imprmptu inspectins f any firm at any time. Hw RDB helps yu cmply: Remte Data Backups gives users ndemand access t their data. An authrized inspectr may immediatley access any stred file up t the last 10 versins ver the past 90 days fr cmparisn. 3. Sectin 105(d): Investigatins And Disciplinary Prceedings; Reprting f Sanctins Explanatin: All dcuments prepared r received by the Bard are regarded "cnfidential and privileged as an evidentiary matter (and shall nt be subject t civil discvery r ther legal prcess) in any prceeding in any Federal r State curt r administrative agency,...unless and until presented in cnnectin with a public prceeding r [therwise] released" in cnnectin with a disciplinary actin. Hw RDB helps yu cmply: Remte Data Backups uses the industry's best encryptin and data prtectin tls available t maintain cmplete cnfidentiality. Yur data is encrypted using 128-bit AES encryptin, the U.S. gvernment standard n yur cmputer befre being transmitted using Secure Scket Layer (SSL), and remain stred in encrypted frmat at ur tw mirrred data centers. Sarbanes-Oxley Cmpliance Page 2 f 10

3 4. Title VIII: Crprate and Criminal Fraud Accuntability Act f 2002 Explanatin: "Knwingly" destrying r creating dcuments t "impede, bstruct r influence" any federal investigatin, whether it exists r is cntemplated, is a felny. Hw RDB helps yu cmply: We emply the latest technlgy available t prevent unauthrized access t yur data. Our state-f-the-art mirrred data centers emply tplevel physical and technical security: Gegraphically separated (1,000 miles) Redundant pwer supply with backup generatrs Redundant Bandwidth with multiple prviders Tp-f-the-line EMC Strage Machines High-End HP Servers and CISCO Firewall Security Finger scanners, mtin detectrs and camera tracking Restricted access t ur 24/7 expert technical respnse administratrs nly 5. Sectin 802: Dcument Alteratin r Destructin Sectin 1102: Tampering With a Recrd r Otherwise Impeding an Official Prceeding Explanatin: Criminalizes knwingly altering, destrying, mutilating, r cncealing any dcument with the intent t impair the bject's integrity r availability fr use in an fficial prceeding r t therwise bstruct, influence r impede any fficial prceeding. Hw RDB helps yu cmply: Remte Data Backups prtects yur business by string histrical versins f dcuments that culd ptentially be the target f malicius destructin. Any file deleted ff the backup view n a lcal PC r server remains at ur data centers fr 30 days and can be restred in minutes. We effectively mitigate yur risk f prsecutin by prtecting data integrity and availability fr fficial prceedings. Sarbanes-Oxley Cmpliance Page 3 f 10

4 Backup Data Security Overview We've layered state-f-the-art technlgy t deliver industry-leading security and perfrmance. Yur data is bank-level AES encrypted befre it leaves yur cmputer, then transmitted and stred encrypted at ur tw wrld-class, undergrund, mirrred Data Centers. N ne can access yur data withut yur Persnal Encryptin Key. Redundant fiber ptic bandwidth via multiple prviders ensures extremely fast and reliable data transfers. Superir Backup Data Center Technlgy & Service Our mirrred data centers emply the industry's leading enterprise technlgies t prvide ur clients with the best security, reliability and perfrmance n the market. Enterprise HP Servers Deplying servers frm Hewlett Packard, the wrld's largest cnsumer and SMB IT cmpany, helps ur data centers maintain ver 99.99% histrical uptime. Cisc Hardware Firewalls Sphisticated hardware firewalls frm Cisc, the leader in Netwrk security, securely prtect yur backup files frm hackers, viruses, spybts, etc. Redundant Bandwidth We use multiple enterprise bandwidth prviders n multiple fiber ptic backbnes t ensure cnsistently fast and reliable file transmissin. Physical Security, Pwer Backup & Supprt Bth data centers are hardened facilities with finger scanners, mtin detectrs and camera tracking, redundant pwer generatrs and 24/7 Expert Respnse. Sarbanes-Oxley Cmpliance Page 4 f 10

5 Tw Mirrred Data Centers We stre yur data at tw wrld-class, gegraphically separate, mirrred undergrund backup centers with redundant bandwidth, redundant pwer and an unparalleled level f data security and perfrmance. Level 4 Data Center Security Our tw undergrund data centers are the wrld's mst secure cmmercial data strage facilities. Features include: a. Separated by 1,100 miles, in ultra-secure private limestne mines lcated feet belw grund b. All data received by either hardened Data Center is immediately replicated t its mirrr cnnected by pint-t-pint, high-speed WAN links c. Traffic is lad-balanced between the tw sites, eliminating degraded system perfrmance d. Redundant bandwidth with multiple fiber ptic telecm prviders t ensure cnsistently fast and reliable transfers e. Each server platfrm has fail ver and redundancy, cntinuus server mnitring and perfrmance tuning, assuring that strage capacity is never exceeded. Enterprise Netwrk Infrastructure a. Redundant pwer supply using backup generatrs, full pwer fr 7 days b. High perfrmance HP Servers & Cisc / Nkia firewall security c. Redundant cmpletely independent electrical systems, pwer train, cmmercial pwer feeds, cling system, UPS systems, dedicated A/C units, generatr systems and fuel system d. Envirnment and climate cntrlled facilities, resistant t seismic activity and ther natural disasters, with Class A vaults with OSHA certified fire suppressin and EPA certified water treatment plants and clean air fire extinguishing systems (CAFES) e. Best practices netwrking and best-f-breed ruters, switches, firewalls, servers, facilities infrastructure, pwer grids and telecmmunicatins circuits are all deplyed with backup cmpnents t maximize fail ver and redundancy f. Failed accunt access attempts are lgged and reviewed t prevent unauthrized access Impenetrable Physical Security a. Level 4 (highest) security rating, 24/7 armed security, maintenance & service peratin b. Finger scanners fr physical access, mtin detectrs, CCTV mnitring & camera tracking c. C-lcatin equipment is lcked in cage with sensrs and alarm system d. Visitrs require pre-authrizatin and phtgraphic identificatin e. All access t cmputer equipment is lgged Data received by either Data Center is immediately replicated t the ther, s an unlikely utage r disaster at ne lcatin will nt affect yur data availability r service perfrmance. This is a cmfrting fact in light f the frequency f recent natural disasters (hurricanes, flds, earthquakes, trnads, etc.) that can easily destry a single, less frtified data center. Sarbanes-Oxley Cmpliance Page 5 f 10

6 128-Bit AES Encryptin Yur files are securely transmitted, stred and retrieved using gvernment-level AES encryptin. If smene were t smehw intercept yur data during a backup r restre, r gain access t ur servers (which, f curse, has never happened), it still take multiple supercmputers decades t decipher any f yur data. We DO NOT have access t yur persnalized encryptin key, nly yu d. Mst backup cmpanies keep their clients' keys n file, and thus have access t all yur cnfidential files. Advantages f encrypted backups It wuld be far easier fr smene t steal yur lcal backups (tape, CD-DVD, Zip/Jaz) than t intercept and decrypt yur encrypted ffsite data. Lcal backups cntaining yur sensitive data are rarely encrypted r even prtected by a simple passwrd. Disgruntled emplyees, cmpetitrs, hackers, thieves, curius peple wh find lst tapes, etc. all jepardize the safety f unencrypted backups. Backup tapes are pcket-size, s yu might nt even ntice they are gne. Hw Secure is 128 Bit AES Encryptin? If a super-cmputer culd break the DES cde in ne secnd, it wuld take the same supercmputer 149 trillin years t decde a 128-bit AES key - lnger than the existence f ur universe. It is safe t say n supercmputer in the freseeable future will be able t brute-frce AES 128 bit. As lng as n ne finds yur encryptin phrase, yur encrypted data can never be deciphered. Secure Scket Layer (SSL) NIST (Natinal Institute f Standards and Technlgy) determined that 128-bit AES is secure enugh t prtect U.S. Gvernment classified infrmatin up t the TOP SECRET level. AES is the gvernment and cmmercial standard fr encrypting sensitive digital infrmatin, including financial and telecmmunicatins data. Digital certificates encrypt yur backup data in transit using Secure Scket Layer (SSL) technlgy, the industry-standard fr prtecting Internet cmmunicatins frm hackers. SSL negates packet sniffing SSL encrypts each packet f data using cmplex digital keys by bth yur Internet Cnnectin and ur data centers. Any data a hacker culd pssibly access appears as randm, nnsensical characters, nly decipherable by ur servers which pssess the digital key t decrypt, r unscramble, the data. Withut SSL, hackers can easily view yur data transmitted thrugh the Internet essentially as plain text. Any sensitive infrmatin such as credit card numbers, cntacts, etc., culd easily be stlen r cmprmised. Sarbanes-Oxley Cmpliance Page 6 f 10

7 The Risks and Penalties f Sensitive Data Lss Prevent data lss, data breach and unauthrized access by thieves, hackers, cntractrs, vendrs, remte, mbile & frmer emplyees, etc. Avid serius csts f sensitive data lss negative publicity, legal liability, regulatry penalties, lst custmers and business. Prtect Sensitive Data Hw damaging wuld it be if yur sensitive data fell int the wrng hands? Identity theft data, i.e. scial security numbers, credit card numbers, passwrds, PIN numbers, etc. Financial data including bank accunts, tax id numbers, transactins, etc. Valuable intellectual prperty and prprietary infrmatin Cnfidential client medical data, private emplyment recrds, etc. Data Lss Risks D yu have reliable safeguards in place t prtect yur data frm being cmprmised by all these cmmn threats? Lst & stlen laptps & PCs Frmer & disgruntled emplyees Mbile and remte emplyees Cntractrs, utsurcing help Vendrs, custmers, cmpetitrs Sphisticated cmputer criminals and hackers, remte access Trjans (RATs), pharming & phishing scams, spyware, adware, viruses, etc. The Cst f Data Lss The ptential damage caused by a single data security breach cannt be understated: Regulatry penalties Increasing federal and state laws include stiff fines and penalties fr cmprmising sensitive client data; Cnsumer ntificatin Mst regulatins require yu t ntify all affected cnsumers f the breach by mail, , phne, website psting, r majr media utlet; Legal liability Litigatin can cst yu significant time, mney and resurces; Negative publicity If the media catches yur data breach, yu might quickly lse public cnfidence in yur rganizatin; Lst custmers and business Inevitable and ften irreversible cnsequences, even with effective and cstly public relatins campaigns. Brand Name Damage If yu suffer a well-publicized data breach, the public will always assciate it with yur cmpany's name. Sarbanes-Oxley Cmpliance Page 7 f 10

8 SysTrust Certified Backup Our nline backup system has been examined and SysTrust Certified by the independent accunting firm PriceWaterhuseCpers. SysTrust is an assurance service develped by the American Institute f Certified Public Accuntants (AICPA) and the Canadian Institute f Chartered Accuntants (CICA). SysTrust Certificatin is critical assurance fr any CPA, bank, lender r financial institutin subject t an audit f their data security system. Failure t meet industry standards, r lss f data due t imprper security data prcedures, can result in penalties and fines f up t $1000 per infractin (custmer). A SysTrust Certificatin is designed t ffer assurance t a brad audience management, bards f directrs, custmers, and business partners abut the infrmatin systems that supprt a business r ne f its segments. In a SysTrust engagement, a CPA perfrms an examinatin r audit t evaluate the system s reliability. A psitive SysTrust reprt attests t the system s reliability and ability t perate withut material errr, flaw, r failure during a stated perid f time in a specified envirnment. SysTrust tests system reliability accrding t fur essential principles: 1. Security The system is prtected against unauthrized physical and lgical access. Restricted data center access, bank-level encryptin, private key. 2. Availability The system is available fr peratin and use at times set frth in service-level agreements. Our data centers have ver 99.99% availability fr the past 8 years. 3. Prcessing Integrity System prcessing is cmplete, accurate, timely, and authrized. Data is encrypted befre it leaves the hst, then transferred and stred in encrypted frmat. 4. Maintainability The system can be updated when required in a manner that cntinues t prvide fr system availability, security, and integrity. Sftware and data center updates dn't interfere with client backups and restres. Certificatin prcess encmpasses ur general IT infrastructure, including: Prductin data center and netwrk peratins Server cnfiguratin and database administratin Strage management systems Disaster recvery prcesses System mnitring tls and prcesses System security (bth lgical and physical) Change management and cmmn supprt prcesses. Clients wuld be interested in a systems assurance examinatin fr sme f the fllwing reasns: Internal and external users can lse access t essential services because f system failures and crashes. Systems can be vulnerable t viruses and hackers because f unauthrized system access. System failure can result in lss f access t system services r lss f data cnfidentiality r integrity. Negative publicity in the wake f high-prfile system failures can undermine custmer and investr cnfidence. Sarbanes-Oxley Cmpliance Page 8 f 10

9 Accunting / Financial Backup Clients Thusands f accunting, financial and insurance prfessinals trust Remte Data Backups t prtect their critical Sarbanes-Oxley sensitive data. Here are just a few with print-friendly lgs. Sarbanes-Oxley Cmpliance Page 9 f 10

10 Sarbanes-Oxley Cmpliance Page 10 f 10

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Remote Data Backups Systrust Certified Data Security Solution

Remote Data Backups Systrust Certified Data Security Solution WHITE PAPER REPORT: Remote Data Backups Systrust Certified Data Security Solution Our secure, automatic, offsite backup service is certified by the Accounting / CPA authorities. Remote Data Backups, Inc.

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

How Remote Data Backups, Inc. Helps Health Care Providers become HIPAA Compliant

How Remote Data Backups, Inc. Helps Health Care Providers become HIPAA Compliant WHITE PAPER REPORT: How Remote Data Backups, Inc. Helps Health Care Providers become HIPAA Compliant Use our secure, automatic, offsite backup service to comply with HIPAA s Privacy and Security Rules.

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

POLICY INTERNET - ACCEPTABLE USE

POLICY INTERNET - ACCEPTABLE USE POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Guidelines for Custodians

Guidelines for Custodians Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Description of Colocation Centre, Scope of Services

Description of Colocation Centre, Scope of Services audimex Hsting Descriptin f Clcatin Centre, Scpe f Services Status: 26.10.2012 Chairman f the Supervisry Bard: Alexander Schmitz-Elsen, Managing Directrs: Dr. Stefan Berchtld, Markus Hövermann, audimex

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

The Cost Benefits of the Cloud are More About Real Estate Than IT

The Cost Benefits of the Cloud are More About Real Estate Than IT y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Carbonite Recovery Services Cover Sheet

Carbonite Recovery Services Cover Sheet Carbnite Recvery Services Cver Sheet Frm: Name f Requestr Cmpany Name (if applicable) Ticket Number (frm cnfirmatin email): Fax T: Carbnite Recvery Services Team 617-536- 0686 This FAX shuld include the

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Mobilizing Healthcare Staff with Cloud Services

Mobilizing Healthcare Staff with Cloud Services Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,

More information

Internet Banking Agreement & Disclosure

Internet Banking Agreement & Disclosure Internet Banking Agreement & Disclsure Please read this agreement carefully befre cntinuing. Intrductin This Internet Banking Agreement and Disclsure gverns yur use f Internet Banking. Thrughut this web

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

HIPAA 5010 Implementation FAQs for Health Care Professionals

HIPAA 5010 Implementation FAQs for Health Care Professionals HIPAA 5010 Implementatin FAQs fr Health Care Prfessinals Updated September 27, 2012 Key Messages In January 2009, the Department f Health and Human Services published the final rule cntaining the requirements

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

DISASTER RECOVERY PLAN TEMPLATE

DISASTER RECOVERY PLAN TEMPLATE www.disasterrecveryplantemplate.rg The bjective f a disaster recvery plan is t ensure that yu can respnd t a disaster r ther emergency that affects infrmatin systems and minimize the effect n the peratin

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment

More information

To Receive CPE Credit

To Receive CPE Credit Trends in ACH Fraud & Risk Management Jhn A. Mills, AAP Supervising Cnsultant jmills@bkd.cm 314.231.5544 March 28, 2013 T Receive CPE Credit Participate in entire webinar Answer plls when they are prvided

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

ESSS Vendor Evaluation Form WhiteCanyon Software

ESSS Vendor Evaluation Form WhiteCanyon Software WhiteCanyn Sftware U.S. Department f Veterans Affairs Office f Infrmatin and Technlgy Infrmatin Prtectin and Risk Management Field Security Operatins Enterprise Security Slutin Service Date f Meeting:

More information

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE

INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

QBT - Making business travel simple

QBT - Making business travel simple QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need

More information

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information