7.1 MANAGED FIREWALL SERVICES (MFS) (L ; C )

Size: px
Start display at page:

Download "7.1 MANAGED FIREWALL SERVICES (MFS) (L.34.1.6; C.2.10.1)"

Transcription

1 7.1 MANAGED FIREWALL SERVICES (MFS) (L ; C ) The offeror shall describe the means by which the requirements for Security Services specified in Section C.2 Technical Requirements will be satisfied. The mandatory Security Services are listed Table L Technical Approach (L ) Approach to Service Delivery (L (a)) Analyze the service requirements specified in this solicitation and describe the approaches to service delivery for each service. Figure Sprint Managed Firewall Service X XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Page 857 March 5, 2007

2 Our technical and quality monitoring approach for Managed Firewall Service (Figure ) ensures reliable service delivery. Sprint will work with the Agency to provide a Firewall security design which is a technical blueprint of the required network to meet an Agency s established security policy. This design is developed to minimize risks associated with threats and vulnerabilities. To this end, Sprint Engineers provide a consultative approach and work with the Government to determine a firewall solution customized to an Agency s connectivity and security requirements. The resulting solution will mitigate risks, allow access to essential applications, and will help reduce network disruptions caused by hostile activity. The Sprint MFS solution is fully compliant with Sprint s comprehensive Managed Firewall Service the Networx RFP requirements. provides safeguards that A Security Engineering Design Document protect Agency Internal networks from (SEDD) is produced for each device and the compromise and tampering. network as a whole, and is a requirement for approving a security service order. An implementation plan will then be created for every security device implementation. We will install the appropriate equipment, conduct performance testing, and ensure the Firewalls can be effectively accessed, managed, and monitored by the Agency and by Sprint. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXX XXX X XXXX X XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Page 858 March 5, 2007

3 Service Requirements XXXXXXXXXXXX XXXXXX XXXXXXXXXXX XXXXXXXXX XXXXXXXX XXXXXXXXX XXXXXXXX XXXXXXXXX XXXXXXXXXXX Table Sprint Managed Firewall Capabilities Technical Capabilities XXXXXXXXX, XXXXXXXXX XXXXXXXXXXXXXX XXXXXX XXXXXXXXXXXXXX XXXXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXX XXXXXX Benefits XXXXXXXXXXXX XXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXX XXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXX XXXXXXXX XXXXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXX XXXXXXXXXXXXXXX XXXXXX XXXXXXXXXXXXX XXXXXX XXXXXXXXXXXXX XXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXX Sprint is the single point of accountability for all firewall security operations, hardware/software maintenance, and administration. XX X XXXXXXXXXXXXXXXXXXXX Page 859 March 5, 2007

4 Figure Managed Firewall Service On-line Customer Tools XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXX Expected Benefits of Service Approach (L (b)) Describe the expected benefits of the offeror s technical approach, to include how the services offered will facilitate Federal Architecture objectives (see Sprint provides overall management of an Agency s firewall infrastructure and is the Agency s single point of accountability for all firewall security operations, maintenance, and administration activities which enables an Agency to focus on key mission objectives. The Agency can rely on Sprint, rather than having to be concerned with the acquisition of management tools Page 860 March 5, 2007

5 and IT staffing expenses (i.e., hiring, training, and retaining) to manage the security solution effectively. Sprint helps the Government identify costeffective opportunities for Firewall security solutions by applying industry best practices for security management and using best-in-class Firewall devices. As a technological leader in innovation, Sprint provides a consultative approach for streamlining security solutions, eliminating redundancy, and maximizing Agency IT investment. By using federal guidelines coupled with open-based standards, Sprint provides defense-in-depth firewall security management to protect any IP network from compromise. In addition, we leverage real-time proactive firewall monitoring for rapid troubleshooting and service restoration. Our Managed Firewall Service provides total security solutions for networks of varying complexity in terms of size, bandwidth, and functionality. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Table Features and Benefits of Sprint Managed Firewall Service Feature XXXXXXXXXXXXXXXXXX XXXXXXXXX XXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXX Benefit XXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXX Potential Problems and Solutions (L (c)) Describe the problems that could be encountered in meeting individual service requirements, and propose solutions to any foreseen problems. X XXXXX Page 861 March 5, 2007

6 XXXXX XXXXXXXXXXXXXXXXXXXXXXXXXX Satisfying Performance Requirements (L ) Performance Metrics (L (a)) Describe the quality of the services with respect to the performance metrics specified in Section C.2 Technical Requirements for each service. Sprint provides the staff, infrastructure, and plans necessary to deliver, manage and maintain Managed Firewall Service. Sprint demonstrates the ability to provide quality services through the use of our compelling set of web-based tools. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX X X XXXX XX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX When the Federal Managed Network Services Center (FMNSC) identifies a problem or event, the Government will be notified according to the methods and service levels (KPIs and AQLs) which are identified in RFP Section C Communication methods include electronic mail, telephone, fax, and pager. Only the Government s designated points-of-contact (defined in the SEDD) will be notified by Sprint FMNSC personnel (see Figure ). Page 862 March 5, 2007

7 If we are unable to reach the points-of-contact for any reason, a voic followed by electronic mail will serve as default notification. Sprint strives to provide quality managed firewall services to Agencies that need to satisfy individual operational requirements. Sprint will meet the performance metrics specified above by applying best practice program management processes for all managed Agency networks. Sprint will follow the formula described in RFP Section C for Availability and we will track and total all outages as defined in the RFP. Figure Federal Managed Network Service Center Communications XXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Page 863 March 5, 2007

8 X XXXXXXXX Monitoring and Measuring Key Performance Indicators (L (b)) Describe the approach for monitoring and measuring the Key Performance Indicators (KPIs) and Acceptable Quality Levels (AQLs) that will ensure the services delivered are meeting the performance requirements. X XXXX XX XXXXXXXXXXXXXXXXXXXXXXX XX XX X XXX X XXXXXXXXXXXXXXXXX Page 864 March 5, 2007

9 Figure Managed Firewall Service Event Summary XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXX. XXXXXXXXXXXXXXXXXXXXXXXXX Sprint strives to provide quality network management services to Agencies that must satisfy individual operational requirements. Sprint will meet the KPIs and AQLs by applying best practice program management processes for managed firewall services. Sprint will follow the formula described in RFP Section C for availability and we will track and total all outages during the month as defined in the RFP. Page 865 March 5, 2007

10 Figure Managed Firewall Service Solutions XXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXX Page 866 March 5, 2007

11 X XXXXXXX XX X XXXX XXXXXXXXXXXXXXXXXXX XXXX XXX XXXXXXXXXXXXXXXXXXXXXXXX XXX X XXXXX X X XXXX XXX XXX Page 867 March 5, 2007

12 XX (XXXXXXXXXXXXX Figure MFS Trouble Resolution Process XXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXX. XXX XXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Page 868 March 5, 2007

13 Testing and Verifying Services (L (c)) Describe the offeror s approach to perform verification of individual services delivered under the contract, in particular the testing procedures to verify acceptable performance and Key Performance Indicator (KPI)/Acceptable Quality Level (AQL) compliance. An implementation plan will be created for every security device implementation as the first step in our approach to perform verification of managed firewall service. We will install the appropriate equipment, conduct performance testing, and ensure the device(s) can be effectively accessed, managed, and monitored by the Agency and by Sprint. XXXXXXXXX XXX X X X XXXXXXXXXXXXXXXXXX Exceeding Acceptable Quality Levels (L (d)) If the offeror proposes to exceed the Acceptable Quality Levels (AQLs) in the Key Performance Indicators (KPIs) required by the RFP, describe the performance improvements. XXX XXX XXXXXXXXXXXXXXXXXX Additional Performance Metrics (L (e)) Describe the benefits of, and measurement approach for any additional performance metrics proposed. As a leader in technology innovation, Sprint will continuously look for ways to improve performance measures over the life of the Networx contract. Page 869 March 5, 2007

14 XXXX XXXXXXXXXXXXXXXXXXXXXXXXXX Satisfying Service Specifications (L ) Technical Description (L (a)) Provide a technical description of how the service requirements (e.g., capabilities, features, interfaces) are satisfied. The Sprint Managed Firewall Service will allow the Government to completely outsource this mission-critical activity. XXXXXXXXX XX XXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX In accordance with requirements specified in the Networx RFP section C.3.3.2, Security Management, Sprint will work to support the Government to comply with applicable Federal Information Security Management Act requirements. The Sprint information security program is based on industry and Government guidance and standards and will ensure the management, technical and operational security controls implemented to protect Networx services and OSS (Operational Support Systems) are defined, architected, implemented, and maintained in a manner consistent with National Institute of Standards and Technology guidance. Consistent with FIPS 199, Sprint will perform Business Impact Assessments of Networx information systems to ensure a cost-effective security program that protects the confidentiality, integrity, and availability of the Networx program. Sprint management, technical and operational security controls will meet the controls outlined in NIST Special Publication , Annex 1 as supplemented by all existing Page 870 March 5, 2007

15 information security controls implemented by Sprint for the FTS2001 Program Capabilities (L (a)) Sprint implements firewall solutions of varying complexity to detect suspicious network activity and Agency policy violations. XXXXXXXXX XXXX XX XXX Our Premise-based and Network-based Firewall solutions are available in three sizes: Tier I protects up to 100 IP addresses and supports up to 10Mbps Tier II protects up to 1,000 IP addresses and supports up to 100 Mbps Tier IIl protects an unlimited number of IP addresses and supports up to 1Gbps. Premise-based Firewalls XXXXXXXXXXXXXXXXXXXXXXXXX Network-based Firewalls X XXX Page 871 March 5, 2007

16 XXXXX XXXXXXX Application/Proxy-based Firewalls XX XX XXX XXXXXXXXXXXX Firewall Software Maintenance XX XXXXXXXXXXXXXXXXXX Firewall Hardware Maintenance Sprint will comply with the RFP requirements for TTR and dispatch an engineer to the Government site when hardware fails. The Agency s POC will be notified immediately of any hardware failures. In the event that a failure occurs during non-business hours, the Government POC will determine when the engineer will gain access to the firewall. Out-of-Band Firewall Access All Sprint managed firewalls will require an encrypting modem attached to the firewall at the Government s premise. XXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXX Page 872 March 5, 2007

17 Event Notification Sprint will work with the Agency and determine critical and non-critical events in order to protect and ensure continued system functionality. The Government will be responsible for ensuring that the Sprint FMNSC has upto-date information on all points-of-contact. XXXXXXXXXXXXXXXXXXX XXX XXXXX XXX XXXXXXXXX Non-critical (Low) events include the following scenarios: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXX Critical (Medium and High) include the following scenarios: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXX Page 873 March 5, 2007

18 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXX Change Management Communication will be facilitated through the use of stringent change management procedures and Sprint s timely notification of firewall activity as X XXXXXXXXXXXXXXXXXX Page 874 March 5, 2007

19 Figure Firewall Configuration and Policy Changes Tool XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Firewall Reporting Sprint will provide monthly performance, utilization, and configuration change reports to the Government. XXXXXXXXXXXXXXXXXXXXXXX X XX XXXXXXXXXXXXXXXXX Page 875 March 5, 2007

20 Figure Managed Firewall Service Reporting XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXX. XXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX X XXX Page 876 March 5, 2007

21 XXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Features (L (a)) XXXXXXXXXXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXX XXXXXXX XXXXXXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXXX XXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXX XXXXXXXXX Interfaces (L (a)) Our MFS offerings are available for any IP network running on various transport services (e.g. FRS, ATMS, IPS, PBIP-VPNs, and NBIP-VPNs) Exceeding Specified Service Requirements (L (b)) XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXX Capabilities (L (b)) XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Page 877 March 5, 2007

22 Features (L (b)) XX XXX XXXXXXXXXXXXXXXXXXXXXXX Interfaces (L (b)) XXXXXXXXXXXXXXXXXXXXXXXX Network Modifications for Delivery of Service (L (c)) Describe any modifications required to the network for delivery of the services. Assess the risk implications of these modifications. XX XXXXXXXXXXXXXXXXXXXXXX Experience Delivering Services (L (d)) Describe the offeror s experience (including major subcontractors) with delivering the Security Services listed in Table L and described in Section C.2 Technical Requirements. XXXX XXX XX XXX Page 878 March 5, 2007

23 XXXXXXXXXXXXXXXXXXXXXXXXXXX In summary, Sprint provides overall management of an Agency s firewall infrastructure and is the Agency s single point of accountability for all firewall security operations, maintenance, and administration activities which enables an Agency to focus on key mission objectives. Our engineers provide a consultative approach and work with the Government to determine a firewall solution customized to an Agency s connectivity and security requirements. The resulting solution will mitigate risks, allow access to essential applications, and will help reduce network disruptions caused by hostile activity. XX XX X XXXXX XXXXXXXXX Page 879 March 5, 2007

7.6 VULNERABILITY SCANNING SERVICE (VSS) (L.34.1.6.4; C.2.10.3) 7.6.1 Satisfying the Service Requirements (L.34.1.6.4 (c))

7.6 VULNERABILITY SCANNING SERVICE (VSS) (L.34.1.6.4; C.2.10.3) 7.6.1 Satisfying the Service Requirements (L.34.1.6.4 (c)) 7.6 VULNERABILITY SCANNING SERVICE (VSS) (L.34.1.6.4; C.2.10.3) The offeror shall describe each of the optional Security Services offered. Table L.34.1-8 shows the Security Services that shall be optional

More information

5.2.2 Voice Over Internet Protocol Transport Services (VOIPTS) (L.34.1.4; C.2.7.8)

5.2.2 Voice Over Internet Protocol Transport Services (VOIPTS) (L.34.1.4; C.2.7.8) 5.2.2 Voice Over Internet Protocol Transport Services (VOIPTS) (L.34.1.4; C.2.7.8) The offeror shall describe the means by which the requirements for Transport/IP/Optical Services specified in Section

More information

7.5.1 Satisfying the Service Requirements (L.34.1.6.4 (c))

7.5.1 Satisfying the Service Requirements (L.34.1.6.4 (c)) 7.5 MANAGED E-AUTHENTICATION SERVICE (MEAS) (L.34.1.6.4; C.2.10.6) The offeror shall describe each of the optional Security Services offered. Table L.34.1-8 shows the Security Services that shall be optional

More information

FTS NETWORX Enterprise TQC-JTB-05-0002

FTS NETWORX Enterprise TQC-JTB-05-0002 7 DISASTER RECOVERY The Sprint promise to our customers is to deliver the broadest choice and flexibility of communication products and services so they can do what they want and better. Sprint understands,

More information

6.3 VIDEO TELECONFERENCING SERVICES (VTS) (L.34.1.5.4; C.2.8.1) 6.3.1 Satisfying the Service Requirements (L.34.1.5.4 (c))

6.3 VIDEO TELECONFERENCING SERVICES (VTS) (L.34.1.5.4; C.2.8.1) 6.3.1 Satisfying the Service Requirements (L.34.1.5.4 (c)) 6.3 VIDEO TELECONFERENCING SERVICES (VTS) (L.34.1.5.4; C.2.8.1) The offeror shall describe each of the optional Management and Applications Services offered. Table L.34.1-6 shows the Management and Applications

More information

RESTRICTED POLICY. 1. SoS From: Martin Bellamy Pensions IS Director. Use of the Customer Information System as a shared, cross-government asset

RESTRICTED POLICY. 1. SoS From: Martin Bellamy Pensions IS Director. Use of the Customer Information System as a shared, cross-government asset 1. SoS From: Martin Bellamy Pensions IS Director Date: 16 February 2007 Copy:Janet Grossman Acting Chief Executive Permanent Secretary Ministers Special Advisors ET PSMT See attached list Use of the Customer

More information

SUBJECT: Audit Report Disaster Recovery Capabilities of the Enterprise Payment Switch (Report Number IS-AR-09-009)

SUBJECT: Audit Report Disaster Recovery Capabilities of the Enterprise Payment Switch (Report Number IS-AR-09-009) July 30, 2009 ROSS PHILO VICE PRESIDENT, CHIEF INFORMATION OFFICER ROBERT J. PEDERSEN TREASURER SUBJECT: Audit Report Disaster Recovery Capabilities of the (Report Number ) This report presents the results

More information

9 TROUBLE AND COMPLAINT HANDLING

9 TROUBLE AND COMPLAINT HANDLING 9 TROUBLE AND COMPLAINT HANDLING The offeror shall describe its organization, resources, strategies, practices, policies, processes, procedures, tools, systems, reports and any other relevant capabilities

More information

3.2 Program Management (L.30.2.3.2; C.7; G.1.3)

3.2 Program Management (L.30.2.3.2; C.7; G.1.3) 3.2 Program Management (L.30.2.3.2; C.7; G.1.3) Verizon, as a full-service telecommunications integrator, is the logical choice to continue serving and expanding the growing WITS customer base due to its

More information

HALLOWEEN SPOOKTACULAR STUDENT WORKSHEET MASTERS AND ANSWER KEYS

HALLOWEEN SPOOKTACULAR STUDENT WORKSHEET MASTERS AND ANSWER KEYS HALLOWEEN SPOOKTACULAR STUDENT WORKSHEET MASTERS AND ANSWER KEYS Dear Assembly Coordinator and Teachers, The following pages contain student worksheet masters and answer keys. They are to be used in conjunction

More information

Pension Taxation Issues. 2. This paper deals with a number of topical issues in the general area of pension taxation.

Pension Taxation Issues. 2. This paper deals with a number of topical issues in the general area of pension taxation. TSG 10/23 Pension Taxation Issues Introduction 1. Over half of people in employment are covered by supplementary or private pension arrangements, including close to 850,000 private and public sector employees

More information

ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER

ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER March 24, 2010 ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER CHARLES L. MCGANN MANAGER, CORPORATE INFORMATION SECURITY SUBJECT: Audit Report Windows Access Controls at the Information

More information

PAUL VOGEL MANAGING DIRECTOR, GLOBAL BUSINESS AND SENIOR VICE PRESIDENT

PAUL VOGEL MANAGING DIRECTOR, GLOBAL BUSINESS AND SENIOR VICE PRESIDENT February 12, 2008 GEORGE W. WRIGHT ACTING VICE PRESIDENT, CHIEF TECHNOLOGY OFFICER SUSAN M. PLONKEY VICE PRESIDENT, CUSTOMER SERVICE PAUL VOGEL MANAGING DIRECTOR, GLOBAL BUSINESS AND SENIOR VICE PRESIDENT

More information

Off-Site Contingency Plan REDACTED VERSION

Off-Site Contingency Plan REDACTED VERSION Hunterston B Nuclear Power Station and Hunterston A Decommissioning Site Off-Site Contingency Plan Prepared by Ayrshire Civil Contingencies Team on behalf of North Ayrshire Council For the West of Scotland

More information

UnitedHealthcare India Claims Document Submission-Self Service Tool

UnitedHealthcare India Claims Document Submission-Self Service Tool UnitedHealthcare India Claims Document Submission-Self Service Tool Any use, copying or distribution without written permission from UnitedHealth Group is prohibited. 1 Overview (Please click on the link

More information

NEXT. Tools of the Participant Portal: Scientific Reports & Deliverables

NEXT. Tools of the Participant Portal: Scientific Reports & Deliverables NEXT Tools of the Participant Portal: Scientific Reports & Deliverables Scientific Reporting and Deliverables: Terminology Scientific Reporting: Standardised format & always due at the end of Reporting

More information

communication and action-planning toolkit using surveys to achieve change in organisations

communication and action-planning toolkit using surveys to achieve change in organisations communication and action-planning toolkit using surveys to achieve change in organisations www.voiceproject.com.au Voice Project Pty Ltd, ABN 90 089 506 801 Sydney Melbourne P: +61 2 8875 2800, E: sydney@voiceproject.com.au

More information

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance

More information

January 20, 2009 GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION TECHNOLOGY OPERATIONS

January 20, 2009 GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION TECHNOLOGY OPERATIONS January 20, 2009 GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION TECHNOLOGY OPERATIONS SUBJECT: Audit Report Service Continuity at the Information Technology and (Report Number ) This report presents the

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

5.1.1 Voice Services (VS) (L.34.1.4.6; C.2.2.1)

5.1.1 Voice Services (VS) (L.34.1.4.6; C.2.2.1) 5.1.1 Voice Services (VS) (L.34.1.4.6; C.2.2.1) The offeror shall describe each of the optional services offered. Table L.34.1-4 shows the Transport/IP/Optical Services that shall be optional to offer.

More information

IVA Funds New IRA Account Application

IVA Funds New IRA Account Application PLEASE PRINT ALL ITEMS CLEARLY IVA Funds New IRA Account Application This form may be used to open a new Traditional IRA, Rollover IRA, Roth IRA, or SEP IRA in accordance with the Custodial Account Adoption

More information

Guide For Using The Good MPF Employer Award Logo

Guide For Using The Good MPF Employer Award Logo Guide For Using The Good MPF Employer Award Logo Contents 1. Preface 2. General Guidelines P.2 P.3 3. Logo Usage a. Minimum Size and Clear Space b. Full Colour Logo c. Black, Reversed, Single Colour and

More information

Disaster Recovery Planning Procedures and Guidelines

Disaster Recovery Planning Procedures and Guidelines Disaster Recovery Planning Procedures and Guidelines A Mandatory Reference for ADS Chapter 545 New Reference: 06/01/2006 Responsible Office: M/DCIO File Name: 545mal_060106_cd44 Information System Security

More information

Capital Investment in Health Report of the Department of Health. Overview and Priorities

Capital Investment in Health Report of the Department of Health. Overview and Priorities Capital Investment in Health Report of the Department of Health Overview and Priorities Introduction The attached report, which can be read in conjunction with the HSE Capital Plan 2011-2015 1, seeks to

More information

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS)

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS) VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS) 4.5 WEB CONFERENCING SERVICE (WCS) [C.2.8.3] This section of our proposal addresses Level 3 s offering to provide Web Conferencing Services (WCS)

More information

THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES

THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES March 31, 2009 THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION

More information

RIAS. Scottish Conditions of Appointment of an Architect Small Project Version ASP/2005 (November 2011 revision)

RIAS. Scottish Conditions of Appointment of an Architect Small Project Version ASP/2005 (November 2011 revision) Scottish Conditions of Appointment of an Architect Small Project Version ASP/2005 (November 2011 revision) RIAS The Royal Incorporation of Architects in Scotland Thank you for choosing to use this form

More information

Enterprise SM VOLUME 1, SECTION 4.2: CUSTOMER-SPECIFIC DESIGN AND ENGINEERING SERVICES

Enterprise SM VOLUME 1, SECTION 4.2: CUSTOMER-SPECIFIC DESIGN AND ENGINEERING SERVICES VOLUME 1, SECTION 4.2: CUSTOMER-SPECIFIC DESIGN AND ENGINEERING SERVICES 4.2 CUSTOMER-SPECIFIC DESIGN AND ENGINEERING SERVICES (CSDES) [C.2.11.9, M.2.1.4] This section of our proposal addresses the Level

More information

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day 70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include

More information

The following individuals were called to testify on behalf of the CHSD :

The following individuals were called to testify on behalf of the CHSD : BEFORE THE SPECIAL EDUCATION DUE PROCESS HEARING PANEL DUE PROCESS HEARING FOR THE CAPE HENLOPEN SCHOOL DISTRICT IN RE THE MATTER OF: : : DP DE (06-04) XXXXXXXXXXXXXXXXXXX V. : : CAPE HENLOPEN SCHOOL DISTRICT

More information

PCF8578. 1. General description. 2. Features. LCD row/column driver for dot matrix graphic displays

PCF8578. 1. General description. 2. Features. LCD row/column driver for dot matrix graphic displays Rev. 06 5 May 2009 Product data sheet 1. General description 2. Features The is a low power CMOS 1 LCD row and column driver, designed to drive dot matrix graphic displays at multiplex rates of 1:8, 1:16,

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE FOR CIVIL RIGHTS THE WANAMAKER BUILDING, SUITE 515 100 PENN SQUARE EAST PHILADELPHIA, PA 19107-3323

UNITED STATES DEPARTMENT OF EDUCATION OFFICE FOR CIVIL RIGHTS THE WANAMAKER BUILDING, SUITE 515 100 PENN SQUARE EAST PHILADELPHIA, PA 19107-3323 UNITED STATES DEPARTMENT OF EDUCATION OFFICE FOR CIVIL RIGHTS THE WANAMAKER BUILDING, SUITE 515 100 PENN SQUARE EAST PHILADELPHIA, PA 19107-3323 REGION III DELAWARE KENTUCKY MARYLAND PENNSYLVANIA WEST

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

1.0 VOLUME 2, SECTION 2.13

1.0 VOLUME 2, SECTION 2.13 1.0 VOLUME 2, SECTION 2.13 (CONTINUED): Networx Operational Support Systems 1.1 2.13.1.4.5 Respond to technical support. The (3)Enterprise portal will provide a link to respond to technical support questions

More information

UM10155. Discrete Class D High Power Audio Amplifier. Document information

UM10155. Discrete Class D High Power Audio Amplifier. Document information Rev. 02 5 September 2006 User manual Document information Info Keywords Abstract Content Class D Audio Amplifier, Universal Class D, UcD, PWM Audio Amplifier, High Power Audio. This user manual describes

More information

NASHVILLE STATE TECHNICAL COMMUNITY COLLEGE 120 WHITE BRIDGE ROAD NASHVILLE, TENNESSEE 37209

NASHVILLE STATE TECHNICAL COMMUNITY COLLEGE 120 WHITE BRIDGE ROAD NASHVILLE, TENNESSEE 37209 NASHVILLE STATE TECHNICAL COMMUNITY COLLEGE 120 WHITE BRIDGE ROAD NASHVILLE, TENNESSEE 37209 NATIONAL SCIENCE FOUNDATION AWARD NUMBERS DUE-9850307, DUE-0202249, DUE-0202397 FINANCIAL AUDIT OF FINANCIAL

More information

General Services Administration (GSA) Networx Service Level Agreement (SLA) Management Guide Version 2.0

General Services Administration (GSA) Networx Service Level Agreement (SLA) Management Guide Version 2.0 General Services Administration (GSA) Networx Service Level Agreement (SLA) Management Guide Version 2.0 April 30, 2009 This document is hereby authorized for limited release by the General Services Administration.

More information

How to find your R&S Reports

How to find your R&S Reports How to find your R&S Reports 1) Go to www.tmhp.com and click providers in the header. 2) Click Go to TexMedConnect in the upper right corner. 3) Enter your User name and Password. Click OK. Version 2012

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

Hedge Funds & the Cloud: The Pros, Cons and Considerations

Hedge Funds & the Cloud: The Pros, Cons and Considerations Hedge Funds & the Cloud: The Pros, Cons and Considerations By Mary Beth Hamilton, Director of Marketing, Eze Castle Integration The increased use of cloud-based services is undeniable. Analyst firm Forrester

More information

Displaying a CAODC Service Rig Electronic Tour Sheet

Displaying a CAODC Service Rig Electronic Tour Sheet Displaying a CAODC Service Rig Electronic Tour Sheet V1.4.0 A displayed or printed Service Rig Electronic Tour Sheet is divided into the individual sections as defined below. Each section can have independent

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results. MANAGED SERVICES PROVIDER Dynamic Solutions. Superior Results. REVOLUTIONIZE YOUR INSTITUTION BY FULLY LEVERAGING THE BENEFITS OF TECHNOLOGY MAXIMIZE YOUR TECHNOLOGY INVESTMENTS ENHANCE SECURITY OF YOUR

More information

N-Wave Networking Services Service Catalog

N-Wave Networking Services Service Catalog N-Wave Networking Services Service Catalog Introduction Key Service: N-Wave Network Management Office 1. Key Technical Service: N-Wave Science Network 2. Key Technical Service: Network Operations Center

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

An example of a CPD submission by an independent statistical consultant

An example of a CPD submission by an independent statistical consultant An example of a CPD submission by an independent statistical consultant Commentary The attached submission was made by a CSci registrant who was selected for audit as part of the CSci revalidation process

More information

Mobile Worker - A Digital Workplace Review

Mobile Worker - A Digital Workplace Review #Name: #Name: David xxxxxxxxxxxxxxxxxxxxxxxx Steppe #Function: #Function: Division xxxxxxxxxxxxxxxxxxx Manager Engaged Workplace Cluster. #Email: xxxxxxxxx xxxxxxxx #Twitter: xxxxxxxxxxxxxxxxxxxxxxxxxxx

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

RDSI Configuraciones en Enrutadores. Configuración. Usuarios. Interfaz BRI. Preparado por. Ing. Oscar Molina Loría. Interfaz BRI

RDSI Configuraciones en Enrutadores. Configuración. Usuarios. Interfaz BRI. Preparado por. Ing. Oscar Molina Loría. Interfaz BRI RDSI Configuraciones en Enrutadores Preparado por Ing. Oscar Molina Loría Interfaz BRI Ususarios para autenticación. Tipo de switch de ISDN Interfaz. Listas de acceso Rutas estaticas Verificación del estatus

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

WITS 3 Solicitation No. WTOC06RCN0001

WITS 3 Solicitation No. WTOC06RCN0001 3.2 Voice Services (C.2.2) Verizon offers an unmatched portfolio of voice services in the NCR ranging from traditional Centrex to the most advanced VoIP services. Verizon s voice customers can be assured

More information

Community Anchor Institution Service Level Agreement

Community Anchor Institution Service Level Agreement Community Anchor Institution Service Level Agreement Date: 3/13/2014 Version: 2.0 Prepared by: DC-Net Table of Contents 1 Service Level Agreement... 3 2 Definitions... 3 3 Service Delivery... 5 3.1 Network

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

REVIEW OF HARWOOD MUSEUM OF THE UNIVERSITY OF NEW MEXICO

REVIEW OF HARWOOD MUSEUM OF THE UNIVERSITY OF NEW MEXICO REVIEW OF HARWOOD MUSEUM OF THE UNIVERSITY OF NEW MEXICO THE UNIVERSITY OF NEW MEXICO May 29, 2015 Audit and Compliance Committee Members Lt. General Bradley Hosmer, Chair Jack Fortner, Vice Chair James

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Version 2.0. August 2015. Office of the Deputy Assistant Secretary of Defense for Systems Engineering. Washington, D.C.

Version 2.0. August 2015. Office of the Deputy Assistant Secretary of Defense for Systems Engineering. Washington, D.C. Guidance to Stakeholders for Implementing Defense Federal Acquisition Regulation Supplement Clause 252.204-7012 (Safeguarding Unclassified Controlled Technical Information) Version 2.0 August 2015 Office

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Deutsche Bank Paper Invoice Submission and Compliance Requirements Manual (PO and Non PO) India Region

Deutsche Bank Paper Invoice Submission and Compliance Requirements Manual (PO and Non PO) India Region November - 2015 Deutsche Bank Paper Invoice Submission and Compliance (PO and Non PO) India Region Contents: 1.Introduction 2.Invoice Submission 3.Invoice Contact Compliance 4.Policy Compliance 5.Other

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper ARRA HITECH Stimulus HIPAA Security Compliance Reporter White Paper ARRA HITECH AND ACR2 HIPAA SECURITY The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems,

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Review of VAT on Property Summary

Review of VAT on Property Summary Review of VAT on Property Summary TSG 06/18 1. This paper deals with the current system of applying VAT to property transactions and the various proposals for change arising from a Revenue review of VAT

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

TSM Backup Service. Standard Service Level Agreement

TSM Backup Service. Standard Service Level Agreement TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and

More information

Information on the Renewable Energy Tax Credit (Iowa Code Section 476C) Iowa Utilities Board

Information on the Renewable Energy Tax Credit (Iowa Code Section 476C) Iowa Utilities Board Information on the Renewable Energy Tax Credit (Iowa Code Section 476C) Iowa Utilities Board Description: The Renewable Energy Tax Credit is available for a producer or purchaser of energy from an eligible

More information

SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX

SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX The following terms and conditions in this Sprint SIP Trunking Service Product Annex ( Annex ), together with the applicable Sprint service agreement ( Agreement

More information

Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide

Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide Table of Contents 1. TWCBC IP VPN & Managed IP VPN Service Overview... 4 2. How to Order New Services... 5 2.1 Mobile IP VPN Client Licenses...

More information

The Technology Behind Liebert Monitoring Services. Services For Business-Critical Continuity TM

The Technology Behind Liebert Monitoring Services. Services For Business-Critical Continuity TM The Technology Behind Monitoring Services Services For Business-Critical Continuity TM Ntegrated Monitoring TM solves problems before they begin The Technology Behind Ntegrated Monitoring With advanced

More information

Information Technology Security Requirements Summary

Information Technology Security Requirements Summary Information Technology Security Requirements Summary 1. Background Investigation Contractor employees who will have access to federal information technology (IT) systems are subject to background investigations

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

TAFE TEACHERS AND RELATED EMPLOYEES ENTERPRISE AGREEMENT 2013. Statements of duties for proposed new roles

TAFE TEACHERS AND RELATED EMPLOYEES ENTERPRISE AGREEMENT 2013. Statements of duties for proposed new roles TAFE TEACHERS AND RELATED EMPLOYEES ENTERPRISE AGREEMENT 2013 Statements of duties for proposed new roles Education Support Officer Assessor Head Teacher Band 3 POSITION INFORMATION Education Support Officer

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

SUBJECT: Audit Report Postal Service s Employee Benefit Programs (Report Number HM AR 07 003)

SUBJECT: Audit Report Postal Service s Employee Benefit Programs (Report Number HM AR 07 003) September 24, 2007 ANTHONY J. VEGLIANTE EXECUTIVE VICE PRESIDENT AND CHIEF HUMAN RESOURCES OFFICER SUBJECT: Audit Report Postal Service s Employee Benefit Programs (Report Number ) This report presents

More information

Spyders Managed Security Services

Spyders Managed Security Services Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built

More information

SPRINT PCS DATA LINK - WIRELESS WAN PRODUCT ANNEX

SPRINT PCS DATA LINK - WIRELESS WAN PRODUCT ANNEX SPRINT PCS DATA LINK - WIRELESS WAN PRODUCT ANNEX The following terms and conditions in this Sprint PCS Data Link Wireless WAN Product Annex ( Annex ), together with the Sprint Standard Terms and Conditions

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Security in Space: Intelsat Information Assurance

Security in Space: Intelsat Information Assurance Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,

More information

Ongoing Help Desk Management Plan

Ongoing Help Desk Management Plan Ongoing Help Desk Management Plan HELP DESK IMPLEMENTATION /MANAGEMENT The Vendor shall provide in its Response to DIR a Help Desk Implementation Plan which shall include, but not be limited to: a. Customer

More information

INSTRUCTIONS FOR FILING FERC FORM NO. 73 OIL PIPELINE SERVICE LIFE DATA

INSTRUCTIONS FOR FILING FERC FORM NO. 73 OIL PIPELINE SERVICE LIFE DATA Form Approved OMB No. 1902-0019 (Expires 05/31/2017) INSTRUCTIONS FOR FILING FERC FORM NO. 73 OIL PIPELINE SERVICE LIFE DATA Title 18, U.S.C. 1001 makes it a crime for any person knowingly and willingly

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Navigate Your Way to NERC Compliance

Navigate Your Way to NERC Compliance Navigate Your Way to NERC Compliance NERC, the North American Electric Reliability Corporation, is tasked with ensuring the reliability and safety of the bulk power system in North America. As of 2010,

More information

EFT Electronic Funds Transfer Client Manual

EFT Electronic Funds Transfer Client Manual Electronic Funds Transfer Client Manual Use of DirectLine for Business is subject to applicable agreements. DirectLine is a registered trade-mark of Bank of Montreal. Other brands and names used herein

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan December 13, 2006 Revision XXQwest Government Services, Inc. 4250 North Fairfax DriveArlington, VA 22203(Delete this page)revision history Revision Number Revision Date

More information

security in the cloud White Paper Series

security in the cloud White Paper Series security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),

More information