Connectivity to MAGNET (Malta Government Network) Policy
|
|
- Milton Barrett
- 7 years ago
- Views:
Transcription
1 Office of the Prime Minister Policy document CIMU P 0011:2002 Version: 1.0 Effective date: Connectivity to MAGNET (Malta Government Network) Policy 1. Policy statement i) General The MAGNET is a mission critical component, acting as an ICT Backbone, connecting together the different Information Systems across the whole of the Government of Malta (the Government). To this effect, the Government intends to utilise the MAGNET, as its ICT Backbone for networking and consequently: (i) obligates Public Sector entities to connect to the MAGNET and (ii) gives confidence and encourages Maltese registered - non Public Sector entities located in Malta, to make mandatory use of the MAGNET as the Maltese Information Highway, through which any such entity shall interconnect. Connectivity to the MAGNET shall be granted primarily in instances were an entity requires to conduct business in electronic form with the Government, primarily for the purposes of the e-government initiatives. The (CIMU) is the sole Government regulatory body empowered to issue, certify and revise e-government connectivity requests, standards and compliance mechanisms. It is Policy that any entity seeking to connect to the MAGNET and thereby utilise resources already connected to the MAGNET, must seek explicit authorisation from the business owners of such resource prior to seeking a connection with the MAGNET. At all times, the Government will retain governance on any connection in operation. Thus, (i) any connection either established or in the process of being established, must conform and operate with the Laws of Malta and any regulations and/or standards issued by relevant statutory organisations; (ii) every entity is responsible to secure it s own network and conform to security policies, standards and directives issued by the Government that are applicable to any connection and information being transmitted through such connection. Page 1
2 ii) Implementation The prime target population are all entities in the Public Sector. Any Maltese entity located in Malta can apply for connectivity to MAGNET on a G2B basis 1. In order to maintain governance upon connections established, every such connection must be registered with the CIMU. The following are the key principles underpinning connectivity to the MAGNET: (i) to define service levels, (ii) to secure and protect, (iii) to operate within a defined Architecture, with access anytime and anywhere, (iv) to operate in conformity with the Laws of Malta and regulations by statutory bodies. Elements of (ii) and (iii) above are subject to the respective entity s connectivity needs. iii) Policy violations Connections not operated according to this Policy shall be suspended from operation and than terminated depending on the outcome of audits. 2. Purpose This Policy primarily provides direction and subsequently defines the characteristics that will govern connectivity to the MAGNET by any entity in connection with the e- Government programme. The primary objectives of this Policy are to ensure that Connectivity to the MAGNET is provided in a secure and cost effective manner. This Policy, and supporting documents, are based on the directives of circular; OPM/463/99 Exploiting the e-government Initiative, dated 7 August Who should know this Policy Knowledge of this Policy should extend up and down the organisations concerned and be wide spread within them. CIMU Head CIMU Communications Officer Ministry for Justice and Local Government Head of Agent Head of Public Sector entity Directors (Office of Review) 1 For the purpose of this Policy, all entities connected to the MAGNET will be referred to under one common name; Public Sector entities. Page 2
3 4. Scope of applicability This Policy applies to all new connection requests by Public Sector entities as from the date this Policy comes into force. Current connections in operation will be required to comply with the provisions of this Policy within 1 year as from the date this Policy comes into force. The Policy and supporting documents issued prior to this release, governing Connections to the MAGNET by Public Sector Public Sector entities alone are now superseded by this Policy and supporting documents. 5. Definitions Agent the entity that has a mandate to provide a service to the Government of Malta. Connectivity - the provision of data communication technologies and systems to satisfy the transmission of data between two networks. Entity - any Maltese registered - non Public Service - organisation, formally established to achieve a mission. G2B - (Government to Business) is defined as one form of relationship within the e- Government context. Head of Public Sector entity - the person responsible with the headship of the department or entity in scope of the connection to the MAGNET. Internet - a global network connecting millions of computers. MAGNET - the Government of Malta network connecting all computers and networking systems together for the conduct of the Government of Malta business operations. Network - a group of two or more computer systems linked together. Service Level Agreement (SLA) - is a contractual obligation between CIMU and Agent, which stipulates and commits the Agent to a required level of service. An SLA should contain a numerically quantified level of service, support options, enforcement or penalty provisions for services not provided, a guaranteed level of system performance as relates to downtime or uptime, what software or hardware will be provided and for what fee, if applicable. Page 3
4 6. Roles and responsibilities For the purpose of this Policy, the following roles and succinct responsibilities have been identified. 1. CIMU 1. to promote the MAGNET as an Information Highway, 2. to maintain this Policy, 3. to accept and subsequent vet connection requests, 4. to define service level agreements, numerically quantified and publicly available, 5. to audit for compliance. 2. CIMU Communications Officer 6. to publish this Policy 3. Head of Agent 7. to instigate documented internal procedures that fully implement this Policy, 8. to establish authorised connections and subsequently operate them according to this Policy. 4. Head of Public Sector entity 1. to accept and subsequently consider requests for access to resources under direct responsibility. 2. to comply with the provisions found in this document. 7. Supporting Documents In support to this Policy, the following Standard and Directive will be issued: 1. Connectivity to MAGNET Standard. 2. Connectivity to MAGNET Directive. 8. References 1. Acts and Regulation a. Telecommunications Act b. Communications Authority Act c. Code of Practice for Internet Service Providers Page 4
5 9. Modification history Version Date Changes Initial Release 10. Maintenance and review timetable Maintenance of this Policy is set for six months after the initial release as indicated in the effective date. Subsequent maintenance to this Policy will be based on a twelve month cycle. <Signature and stamp> Joseph R Grima Permanent Secretary, Office of the Prime Minister Page 5
Third party Web hosting services security Policy
Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: 09.04.2003 Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta
More informationNetwork Resource Management Directive
Office of the Prime Minister Central Information Management Unit Directive document CIMU D 0036:2003 Network Resource Management Directive Version: 1.0 Effective date: 10.12.2003 Table of Contents 1. Purpose...3
More informationNetwork Resource Management Policy
Office of the Prime Minister Policy document CIMU P0036:2003 Version: 1.0 Effective date: 10.12.2003 Network Resource Management Policy 1. Policy statement i) General Information and Communications Technology
More informationInformation Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
More informationGovernment of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationIAF Mandatory Document for the Transfer of Accredited Certification of Management Systems
IAF MD 2:2007. International Accreditation Forum, Inc. IAF Mandatory Document IAF Mandatory Document for the Transfer of Accredited Certification of Management Systems (IAF MD 2:2007) IAF MD2:2007 International
More informationClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
More informationIssue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
More informationInformation Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationThe Electronic Transactions Law Chapter I Title and Definition
The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)
More informationInformation Governance Strategy. Version No 2.1
Livewell Southwest Information Governance Strategy Version No 2.1 Notice to staff using a paper copy of this guidance. The policies and procedures page of LSW Intranet holds the most recent version of
More informationChair Cabinet Committee on State Sector Reform and Expenditure Control
Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
More informationehealth Architecture Principles
ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:
More informationRemote Access Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationTHE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA
Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable
More informationRecommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching
Recommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching Contacts: Angela Single, Chair, Industry Working Group: angela.single@3millionlives.co.uk
More informationINSPIRE Spatial Data Infrastructure Solution Architecture Basic Solution Profile
INSPIRE Spatial Data Infrastructure Solution Architecture Basic Solution Profile Gate 1 Date: 06/09/2013 Version: 2.0 Security Classification: Malta Infor mation Technology Agency 01. Submission Details
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
More informationSECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
More informationMEMORANDUM OF UNDERSTANDING THE INDEPENDENT ELECTRICITY SYSTEM OPERATOR THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
MEMORANDUM OF UNDERSTANDING BETWEEN THE INDEPENDENT ELECTRICITY SYSTEM OPERATOR AND THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION AND THE NORTHEAST POWER COORDINATING COUNCIL, CROSS-BORDER REGIONAL
More informationGuidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
More information5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
More informationHow To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationInformation Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
More informationUNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)
More informationLICENSING OF INTERNET SERVICE PROVIDERS
LICENSING OF INTERNET SERVICE PROVIDERS CONDITIONS OF LICENCES FOR THE PROVISION OF INTERNET SERVICES TO THE PUBLIC PREAMBLE 4.1 Whereas, in terms of the Lesotho Telecommunications Authority Act 2000,
More informationPreparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
More informationCONTENT OF THE AUDIT LAW
CONTENT OF THE AUDIT LAW I. GENERAL PROVISIONS Article 1 This Law shall regulate the conditions for conducting an audit of legal entities which perform activities, seated in the Republic of Macedonia.
More informationACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Act No. 102 of May 31 of 2000
This English translation of the ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Effective April 1, 2001 has been prepared in compliance with the Standard Bilingual Dictionary March 2006 edition.
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationDate Approved. Modification History. Related Enterprise Architecture. Related Forms
ANU Policy Template Policy Title Procedures: Enterprise (ES) General Information File Number This currently sits as part of the Enterprise Architecture Policy Purpose To set out procedures to define and
More informationChallenges and Role of Standards in Building Interoperable e-governance Solutions
24 Compendium of e-governance Initiatives CHAPTER in India 3 Challenges and Role of Standards in Building Interoperable e-governance Solutions Renu Budhiraja Director e-governance Group, Department of
More informationA Summary of the National NGO Policy July 2012
A 9 Point Guide to Understanding the National NGO Policy and Supporting its Implementation A Summary of the National NGO Policy July 2012 1 The National Non Governmental Organisations POLICY PREFACE AND
More informationSecuring Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.
Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.
More information/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
More informationCompliance Management of Company Law Compliances Approach and Technology Perspective
Compliance Management of Company Law Compliances Approach and Technology Perspective Shujath Bin Ali*, Manager (Corporate Affairs, Legal & Tax), Deloitte Consulting India Private Limited, Hyderabad. Compliance
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationSmart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)
Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature
More informationLaw No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA)
Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) In the name of the people, The President of the Republic: The People Assembly has decreed
More informationLaw No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA)
Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) In the name of the people, The President of the Republic: The People Assembly has decreed
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationIT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za info@itgovernance.co.za 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
More informationDELHI ELECTRICITY REGULATORY COMMISSION
DELHI ELECTRICITY REGULATORY COMMISSION DELHI ELECTRICITY REGULATORY COMMISSION (RENEWABLE PURCHASE OBLIGATION AND RENEWABLE ENERGY CERTIFICATE FRAMEWORK IMPLEMENTATION) REGULATIONS, 2011 No. Dated:. NOTIFICATION
More informationRISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer
RISK MANAGEMENT FRAMEWORK 1 SUMMARY The Risk Management Framework consists of the following: Risk Management policy Risk Management strategy Risk Management accountability Risk Management framework structure.
More informationE-signature in the Austrian cadastral process
E-signature in the Austrian cadastral process Content Facts and figures Processes in Cadastre and Land Registry New Processes and procedures Legal framework Process of application Registration of changes
More informationHP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
More informationCASE 8: Procurement of public key infrastructure
CASE 8: Procurement of public key infrastructure Uni. Athens / CERES Country / region Netherlands Short description This is the case of an integrated central e-government infrastructure for issuing and
More informationEuropean best practice regarding to the licensing in the energy sector
99333 EU- INOGATE programme, project Support to Energy Market Integration and Sustainable Energy in the NIS (SEMISE) European best practice regarding to the licensing in the energy sector The content of
More informationAn article on PCI Compliance for the Not-For-Profit Sector
Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector
More informationHow to set up a company in South Africa
How to set up a company in South Africa Business entities and registration procedures The most common business entities in South Africa are: 1. Companies 2. Close corporations 3. Partnerships and sole
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationFrequently Asked Questions (FAQs) for Recycling Fund Applicants
Frequently Asked Questions (FAQs) for Recycling Fund Applicants Industry Support Programme (ISP) 1. Eligibility 1.1 What is the Primary Objective of the Recycling Fund? The primary objective of establishing
More informationNSW Data & Information Custodianship Policy. June 2013 v1.0
NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationSummary of Information Technology General Control Environment Findings for the year ended 30 June 2015
Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating
More informationElectronic Documents Law
Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or
More informationData protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner
Federal Data Protection and Information Commissioner FDPIC Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Electronic business
More information10 Steps for Managing Sub-Grants
New Partners Initiative 10 Steps for Managing Sub-Grants DRAFT Table of Contents ACRONYMS AED PEPFAR NPI USG Introduction T he Academy for Educational Development (AED) provides technical support for grantees
More informationDATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
More informationLAW ON ELECTRONIC TRANSACTIONS
Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING
More informationTOTAL QUALITY MANAGEMENT II QUALITY AUDIT
TOTAL QUALITY MANAGEMENT II Chapter 13: QUALITY AUDIT Dr. Shyamal Gomes Introduction: The term audit was defined in the 16th Century as the official examination of the accounts with verification by reference
More informationOffice of the President Annual Plan 2012/2013
Office of the President Annual Plan 2012/2013 1 2 Office of the President Annual Plan 2012/2013 Table of Contents ABBREVIATIONS...4 1. INTRODUCTION...5 2. HIGH LEVEL STATEMENTS...6 2.1 Mandate...6 2.2
More informationDigital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
More informationAn Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration
International Accreditation Forum, Inc. An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration A Discussion Paper The International Accreditation Forum, Inc. (IAF) operates a program
More informationInformation & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
More informationInformation governance in the Department of Health and the NHS
Information governance in the Department of Health and the NHS Harry Cayton, National Director for Patients and the Public, Chair, Care Record Development Board. Introduction I was asked by the Programme
More informationF. No. 1(3)/2014 EG II. Ministry of Communication & Information Technology. Department of Electronics & Information Technology POLICY
POLICY Title of Policy: Policy on Adoption of Open Source Software for Government of India Preamble Government of India (GoI) is implementing the Digital India programme as an umbrella programme to prepare
More informationCasablanca Stock Exchange Reforms : Achievements and Challenges Content
Casablanca Stock Exchange Reforms : Achievements and Challenges Content Content... 1 I. MOROCCAN FRAMEWORK... 2 II. CASABLANCA STOCK EXCHANGE CORPORATE GOVERNANCE FRAMEWORK... 3 1. ROLE... 3 2. ORGANISATION...
More informationISO 9001:2015 Overview of the Revised International Standard
ISO 9001:2015 Overview of the Revised International Standard Introduction This document provides: a summary of the new ISO 9001:2015 structure. an overview of the new and revised ISO 9001:2015 requirements
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
More informationVersion: 3.0. Effective From: 19/06/2014
Policy No: RM66 Version: 3.0 Name of Policy: Business Continuity Planning Policy Effective From: 19/06/2014 Date Ratified 05/06/2014 Ratified Business Service Development Committee Review Date 01/06/2016
More informationFSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
More informationCOUNCIL POLICY R180 RECORDS MANAGEMENT
1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.
More informationTERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
More informationA Framework of Quality Assurance for Responsible Officers and Revalidation
A Framework of Quality Assurance for Responsible Officers and Revalidation Supporting responsible officers and designated bodies in providing assurance that they are discharging their statutory responsibilities.
More informationRelease: 1. ICT40510 Certificate IV in Telecommunications Network Planning
Release: 1 ICT40510 Certificate IV in Telecommunications Network Planning ICT40510 Certificate IV in Telecommunications Network Planning Modification History Not Applicable Description Descriptor This
More informationELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of
More informationEstate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
More informationInformation Governance Strategy. Version No 2.0
Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent
More informationTABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
More informationTHE REPUBLIC OF UGANDA DPP
THE REPUBLIC OF UGANDA DPP Staff Training and Development Policy 2014 TABLE OF CONTENTS 1.0 INTRODUCTION 3 1.1 Policy and Legal Framework 4 1.2 Principles/Guidelines of the Training and Staff Development
More informationLaw Concerning Electronic Signatures and Certification Services (Unofficial Translation)
Law Concerning Electronic Signatures and Certification Services (Unofficial Translation) Contents Chapter 1: General provisions (Article 1 and Article 2) Chapter 2: Presumption of the authenticity of an
More informationStandard conditions of the Electricity Distribution Licence
Gas and Electricity Markets Authority ELECTRICITY ACT 1989 Standard conditions of the Electricity Distribution Licence Statutory Consultation: 29 April 2008 SECTION A: STANDARD CONDITIONS FOR ALL ELECTRICITY
More informationThe Executive Regulations Governing the Online Trading System on the Tehran Stock Exchange and on the Iran Fara Bourse
The Executive Regulations Governing the Online Trading System on the Tehran Stock Exchange and on the Iran Fara Bourse The present regulations comprising 19 articles, 9 notes and an appendix were approved
More informationTG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES
TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES Approved By: Senior Manager: Mpho Phaloane Created By: Field Manager: John Ndalamo Date of Approval:
More informationHeads of Schools: Appointment Process and Job Description
Heads of Schools: Appointment Process and Job Description I. Procedure for the Appointment of Heads of Schools The appointment, rather than the nomination, of Heads of Colleges was a sine qua non of the
More informationGOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
More informationGUIDE FOR APPLICANTS GRANTS PROGRAMME 2016/2017 TRAINING IN CONFERENCE INTERPRETING
GUIDE FOR APPLICANTS GRANTS PROGRAMME 2016/2017 TRAINING IN CONFERENCE INTERPRETING The aim of this guide is to give a summary of the main points of the administrative and financial processes governing
More informationPlease read through these Terms and Conditions carefully, these Terms and Conditions apply to all services with us, unless otherwise stated.
Terms and Conditions Last Updated 01/07/2014 Please read through these Terms and Conditions carefully, these Terms and Conditions apply to all services with us, unless otherwise stated. is a registered
More informationHead of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
More informationRelease: 1. ICTNWK607 Design and implement wireless network security
Release: 1 ICTNWK607 Design and implement wireless network security ICTNWK607 Design and implement wireless network security Modification History Release Release 1 Comments This version first released
More informationCHAPTER E12 - ENVIRONMENTAL IMPACT ASSESSMENT ACT
CHAPTER E12 - ENVIRONMENTAL IMPACT ASSESSMENT ACT ARRANGEMENT OF SECTIONS PART I General principles of environmental impact assessment SECTION 1.Goals and objectives of environmental impact assessment.
More informationWeb Content Management System, Migration and Maintenance Services for ECDC Web Portal
Web Content Management System, Migration and Maintenance Services for ECDC Web Portal ICT General Governance Reference G March 2015 Page 1 Table of Contents 1 Introduction... 3 2 Design of the ICT General
More information