Questionnaire for Intermediaries Providing Trading Services through Electronic Means
|
|
|
- Jody Byrd
- 9 years ago
- Views:
Transcription
1 Questionnaire for Intermediaries Providing Trading Services through Electronic Means For completion by intermediaries intending to provide trading services through electronic means other than the provision of Automated Trading Services. Please provide additional information if any of your reply below is no. Name of Corporation Section 1: Basic Information 1.1 Describe the nature of your system. Order routing system Electronic communication network Internet portal Trading platform 1.2 Describe the types of services you intend to provide. Routing of orders on securities/futures/leveraged foreign exchange trading* Matching of orders on securities/futures/leveraged foreign exchange trading* Providing investment advice on securities/futures/leveraged foreign exchange trading* Publishing research or analysis on securities/futures/leveraged foreign exchange trading* Providing platform to facilitate trading activities Providing facilities for electronic clearing and settlement Bulletin board/chat room service* Electronic subscription service (e.g. eipo) Portfolio tracking Market price quotation Placing orders for fund subscription, switching and redemption 1.3 Please provide the location of your host server and backup server. Host server Backup server 1
2 1.4 Please provide your website address. 1.5 Describe the intended users of your systems/facilities. Retail clients High net worth clients Licensed brokers/fund houses/advisers* Authorized financial institutions/registered institutions* Trustees or custodians Other institutional clients 1.6 Describe your source of remuneration. Fixed fees from users Basis of computation of fee: Variable fees from users Basis of computation of fee: Advertisement fees Rebate or commission from intermediaries * Delete where not applicable Section 2: Responsible Parties 2.1 Please provide names of the following persons/entities: Responsible officer supervising the electronic trading service If the following functions are not carried out in-house, entities responsible for the functions: System developer or application service provider System administration System maintenance Data centre Database administration 2
3 Section 3: System Integrity 3.1 System security (a) Information security Use of alpha-numeric passwords with not less than 8 digits? Yes. No. Remark Use of latest encryption technology to secure communication over the Internet? Yes. No. Remark Are clients required to change passwords at regular intervals? Yes. No. Remark Do clients have an option to change passwords at any time? Yes. No. Remark Is there an automatic time-out feature for site access? Yes. No. Remark Will clients be restricted from more than one log-on at any time? Yes. No. Remark Will repeated failures in log in attempts trigger resetting of password? Yes. No. Remark (b) Network security Is the transaction database logically separated from web servers? Yes. No. Remark Are web servers residing in the Demilitarized Zone? Yes. No. Remark Are there firewalls to shield servers and internal network from unauthorized access? Yes. No. Remark Do the firewalls have appropriate rules? Yes. No. Remark 3
4 (c) Host security Are there intrusion detection devices to monitor any unauthorized access? Yes. No. Remark Is the intrusion detection log regularly reviewed by a senior officer? Yes. No. Remark Are control and operation of important devices (such as firewalls and routers) divided into two parts using separate passwords? Yes. No. Remark Are there router access controls to provide an additional layer of protection? Yes. No. Remark (d) Physical security Are the host and server systems placed in a locked room accessible by authorized persons only? Yes. No. Remark 3.2 System capacity and reliability (a) Are there adequate margins above current capacity? Yes. No. Remark (b) Is the system scalable? Yes. No. Remark (c) Will stress test be conducted periodically? Yes. No. Remark 3.3 Contingency (a) Are there emergency back-up server and power in place? Yes. No. Remark (b) Are there alternative means of communication in the event of system failure? Yes. No. Remark (c) Is there any written contingency plan? Yes. No. Remark (d) Do you conduct periodic rehearsal of the contingency plan? Yes. No. Remark 4
5 Section 4: Sufficiency of Information and Risk Disclosure for Clients 4.1 Specify the information/services that you will provide to your clients (please tick ). Details of services to be provided via the system Market risks relating to different types of services and products Default reading of relevant risk statement at appropriate juncture Account opening procedures Fees and charges for different types of services Pre-deal preview and confirmation of order Electronic confirmation of execution Circumstances and procedures for cancellation of transactions Electronic contract notes and statement Level of security and capacity of system Contingency arrangement Alternative means of communication with the firm in case of system failure Alerts on changes 4.2 Will the above information be disclosed on your website and client agreement? Yes. No. Remark Section 5: Order Handling and Execution 5.1 Do you have a procedure manual describing the process flow from receiving through execution of a client order? Yes. No. Remark 5.2 Have your written policies and procedure manuals been distributed and explained to all relevant staff to ensure that they understand the policies and procedures? Yes. No. Remark 5.3 Do you have exception reports and management reports for detecting and monitoring irregularities (for example, detecting attempts to mark up or down the closing price)? Yes. No. Remark 5.4 Will the exception reports and management reports be reviewed by senior management? Yes. No. Remark 5
6 Section 6: Content of the Website 6.1 Have you disclosed your name, licence/registration status, central entity number, and exchange trading participantship (if any) on your website? Yes. No. Remark 6.2 Does your website have any hyperlinks to overseas websites which target the Hong Kong investors (please provide additional information if your reply is yes )? Yes. No. Remark 6.3 Does your website have any hyperlinks to other entities which facilitate clients to open accounts with these entities (please provide additional information if your reply is yes )? Yes. No. Remark 6.4 Does your website contain relevant disclaimers (e.g. in respect of hyperlinks)? Yes. No. Remark Section 7: Declaration and Undertaking 7.1 We declare that in respect of our electronic trading system, we have: Adequate qualified and experienced personnel to conduct and supervise operations. Adequate system, network, host, and physical security. Fully tested and resolved operational integrity, security, reliability, capacity and contingency issues. Established a periodic review programme to comprehensively plan, test and monitor the system s integrity, security, reliability and capacity. Maintained written system documentation detailing functional and technical specifications of our systems. Maintained audit trails of all system changes and maintenance. Procedures to establish the true identity of any new client. Procedures to ascertain new client s financial situation, investment objectives, risk appetite and experience prior to providing service to them. Procedures to ensure that client orders are handled in a fair and timely manner, on best available terms and are properly recorded. These include: - having an accurate time-sequenced record of orders and transactions (with audit trail); - handling orders promptly and in the order received; - allocating executed trades fairly, promptly confirming executed trades to clients; 6
7 - agreeing with clients on accepting orders and confirmation of trades via an electronic trading system; - performing regular reconciliation of accounts to ensure account information is update; and - taking reasonable steps to safeguard confidential information transmitted electronically. Written procedures, including procedures to handle contingency situations to deal with communications and transactions. Procedures to provide clients with adequate information about our system. Included in client agreements appropriate and prominent risk disclosures highlighting the risks associated with electronic trading transactions, such as time lag in data transmission, that orders may not necessarily be executed at the price indicated on the electronic trading system, and that communications may be subject to interruption, blackout or delay. Communicated to clients the authentication technologies used and kept such records. Checked to ensure that the system does not contain inappropriate or misleading content. 7.2 We undertake that we will immediately notify the Commission of: Any significant change in the electronic trading system, in particular, the following: - nature of the system (question 1.1); - types of services we intended to provide (question 1.2); - system security (question 3.1); and - hyperlinks to other parties (questions 6.2 & 6.3). Significant system failure such as undue delay in confirming or executing client s orders and service outage. Repeated hacking or attempted hacking activities. For and on behalf of: Name of firm Name of director/responsible officer/ executive officer/chief executive/ person authorized by the board of directors* Signature Date * Delete where not applicable. 7
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
Information Systems Security Assessment
Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Electronic Trading Information Template
Electronic Trading Information Template Preface This Electronic Trading Information Template (the "Template") has been created through the collaborative efforts of the professional associations listed
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
SFC ELECTRONIC TRADING REGIME
SFC ELECTRONIC TRADING REGIME CompliancePlus 2013 Year End Training 18 December 2013 Limited 801, Two Exchange Square, 8 Connaught Place, Central, Hong Kong Tel: (852) 3487 6903 www.complianceplus.hk Disclaimer
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Settlement Agent Frequently Asked Questions
Q. 1 What is a Settlement Agent (SA)? What is the difference between Settlement Agent and Third Party Clearing (TPC)? A Settlement Agent is a service provider appointed by a CCASS Participant except Investor
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Relocation of CCMS Data Centre to Tseung Kwan O Data Centre (Phase Two) Market Rehearsal (MR) Information Package. for. HKCC & SEOCH Participants
Relocation of CCMS Data Centre to Tseung Kwan O Data Centre (Phase Two) Market Rehearsal (MR) Information Package for HKCC & SEOCH Participants (15 December 2013) Issue Date: 26 November 2013 Table of
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
CorporateGuard Comprehensive Crime Insurance
AIG Australia Limited Comprehensive Crime Insurance 1 of 13 Page Page 1 of 13 An Important Notice Your Duty of Disclosure Before you enter into an insurance contract, you have a duty to tell us anything
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Record Keeping. Guide to the Standard for Professional Practice. 2013 College of Physiotherapists of Ontario
Record Keeping Guide to the Standard for Professional Practice 2013 College of Physiotherapists of Ontario March 7, 2013 Record Keeping Records tell a patient s story. The record should document for the
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Consensus Policy Resource Community. Lab Security Policy
Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
Internet Trading Regulations Of the Karachi Stock Exchange (Guarantee) Limited
Internet Trading Regulations Of the Karachi Stock Exchange (Guarantee) Limited [Sent for Gazette Notification on July 02, 2012] PREAMBLE: WHEREAS the Karachi Stock Exchange (Guarantee) Limited has decided
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
ipatch System Manager - HIPAA Compliance
SYSTIMAX Solutions ipatch System Manager - HIPAA Compliance White Paper July 2008 www.commscope.com Overview Health plans, healthcare clearinghouses, healthcare providers including Medicare/ Medicaid agencies
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
Secure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
www.cathaybank.com Cathay Business Online Banking Quick Guide
www.cathaybank.com Cathay Business Online Banking Quick Guide Effective 06/2016 Disclaimer: The information and materials in these pages, including text, graphics, links, or other items are provided as
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Cathay Business Online Banking
Cathay Business Online Banking A QUICK GUIDE TO CATHAY BUSINESS ONLINE BANKING R6119 CATHAY 8_5x11 Cover V2.indd 1 6/11/13 5:50 PM Welcome Welcome to Cathay Business Online Banking (formerly known as Cathay
IT Security Procedure
IT Security Procedure 1. Purpose This Procedure outlines the process for appropriate security measures throughout the West Coast District Health Board (WCDHB) Information Systems. 2. Application This Procedure
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Payment Systems and Funds Transfer Internal Control Questionnaire
Payment Systems and Funds Transfer Internal Control Questionnaire Completed by: Date Completed: I. ORGANIZATION 1. Has a written wire transfer policy been approved by the board of directors? 2. Has a current
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
ONLINE BANKING AGREEMENT
ONLINE BANKING AGREEMENT This Online Banking Agreement is made by Bank Mutual ( us, we, and our ) and each person with an account accessible through Online Banking ( you and your ). 1. Definitions. The
Commodity Futures Trading Commission Privacy Impact Assessment
Commodity Futures Trading Commission Privacy Impact Assessment System Name: CFTC Portal OPERA (Updated April 16, 2015) 1. Overview The Commodity Futures Trading Commission s ( Commission or CFTC ) Portal
REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM
REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM INTRODUCTION In accordance with the 2009 work plan, this report summarizes the results of the Audit & Review Division s annual review of
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Connectivity Test for Upgrade of Securities and Derivatives Network (SDNet/2) for the Derivatives Market. Information Package for
Connectivity Test for Upgrade of Securities and Derivatives Network (SDNet/2) for the Derivatives Market to be held on 26 January 2013 Information Package for Clearing Participants Issue Date: January
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
IOM Data Privacy and Accuracy Policy
IOM Data Privacy and Accuracy Policy 1 Overview 2 Collection of information 2.1 Anonymous browsing 2.2 Candidate profile and application to vacancies 2.3 Accuracy of information 3 Use of information collected
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
GUIDELINES ON COMPLIANCE FUNCTION FOR FUND MANAGEMENT COMPANIES
GUIDELINES ON COMPLIANCE FUNCTION FOR FUND MANAGEMENT COMPANIES Issued: 15 March 2005 Revised: 25 April 2014 1 P a g e List of Revision Revision Effective Date 1 st Revision 23 May 2011 2 nd Revision 16
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
ICE SDR SERVICE DISCLOSURE DOCUMENT
ICE SDR SERVICE DISCLOSURE DOCUMENT ICE Trade Vault, LLC ( ICE Trade Vault ) offers a swap data repository service for the collection, storage and regulatory reporting of a comprehensive range of trade
CMS Operational Policy for Infrastructure Router Security
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Infrastructure Router Security September 2005 Document Number: CMS-CIO-POL-INF05-01
Last updated: 30 May 2016. Credit Suisse Privacy Policy
Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using
Security Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Regulated activities. Topic. 1.1 Regulated activities are defined under Schedule 5 to the SFO. They include:-
Topic 1 Regulated activities What are the types of regulated activities? 1.1 Regulated activities are defined under Schedule 5 to the SFO. They include:- Posted on 01.06.2011 Type 1 : dealing in securities,
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
