Connectivity to MAGNET (Malta Government Network) Policy

Size: px
Start display at page:

Download "Connectivity to MAGNET (Malta Government Network) Policy"

Transcription

1 Office of the Prime Minister Policy document CIMU P 0011:2002 Version: 1.0 Effective date: Connectivity to MAGNET (Malta Government Network) Policy 1. Policy statement i) General The MAGNET is a mission critical component, acting as an ICT Backbone, connecting together the different Information Systems across the whole of the Government of Malta (the Government). To this effect, the Government intends to utilise the MAGNET, as its ICT Backbone for networking and consequently: (i) obligates Public Sector entities to connect to the MAGNET and (ii) gives confidence and encourages Maltese registered - non Public Sector entities located in Malta, to make mandatory use of the MAGNET as the Maltese Information Highway, through which any such entity shall interconnect. Connectivity to the MAGNET shall be granted primarily in instances were an entity requires to conduct business in electronic form with the Government, primarily for the purposes of the e-government initiatives. The (CIMU) is the sole Government regulatory body empowered to issue, certify and revise e-government connectivity requests, standards and compliance mechanisms. It is Policy that any entity seeking to connect to the MAGNET and thereby utilise resources already connected to the MAGNET, must seek explicit authorisation from the business owners of such resource prior to seeking a connection with the MAGNET. At all times, the Government will retain governance on any connection in operation. Thus, (i) any connection either established or in the process of being established, must conform and operate with the Laws of Malta and any regulations and/or standards issued by relevant statutory organisations; (ii) every entity is responsible to secure it s own network and conform to security policies, standards and directives issued by the Government that are applicable to any connection and information being transmitted through such connection. Page 1

2 ii) Implementation The prime target population are all entities in the Public Sector. Any Maltese entity located in Malta can apply for connectivity to MAGNET on a G2B basis 1. In order to maintain governance upon connections established, every such connection must be registered with the CIMU. The following are the key principles underpinning connectivity to the MAGNET: (i) to define service levels, (ii) to secure and protect, (iii) to operate within a defined Architecture, with access anytime and anywhere, (iv) to operate in conformity with the Laws of Malta and regulations by statutory bodies. Elements of (ii) and (iii) above are subject to the respective entity s connectivity needs. iii) Policy violations Connections not operated according to this Policy shall be suspended from operation and than terminated depending on the outcome of audits. 2. Purpose This Policy primarily provides direction and subsequently defines the characteristics that will govern connectivity to the MAGNET by any entity in connection with the e- Government programme. The primary objectives of this Policy are to ensure that Connectivity to the MAGNET is provided in a secure and cost effective manner. This Policy, and supporting documents, are based on the directives of circular; OPM/463/99 Exploiting the e-government Initiative, dated 7 August Who should know this Policy Knowledge of this Policy should extend up and down the organisations concerned and be wide spread within them. CIMU Head CIMU Communications Officer Ministry for Justice and Local Government Head of Agent Head of Public Sector entity Directors (Office of Review) 1 For the purpose of this Policy, all entities connected to the MAGNET will be referred to under one common name; Public Sector entities. Page 2

3 4. Scope of applicability This Policy applies to all new connection requests by Public Sector entities as from the date this Policy comes into force. Current connections in operation will be required to comply with the provisions of this Policy within 1 year as from the date this Policy comes into force. The Policy and supporting documents issued prior to this release, governing Connections to the MAGNET by Public Sector Public Sector entities alone are now superseded by this Policy and supporting documents. 5. Definitions Agent the entity that has a mandate to provide a service to the Government of Malta. Connectivity - the provision of data communication technologies and systems to satisfy the transmission of data between two networks. Entity - any Maltese registered - non Public Service - organisation, formally established to achieve a mission. G2B - (Government to Business) is defined as one form of relationship within the e- Government context. Head of Public Sector entity - the person responsible with the headship of the department or entity in scope of the connection to the MAGNET. Internet - a global network connecting millions of computers. MAGNET - the Government of Malta network connecting all computers and networking systems together for the conduct of the Government of Malta business operations. Network - a group of two or more computer systems linked together. Service Level Agreement (SLA) - is a contractual obligation between CIMU and Agent, which stipulates and commits the Agent to a required level of service. An SLA should contain a numerically quantified level of service, support options, enforcement or penalty provisions for services not provided, a guaranteed level of system performance as relates to downtime or uptime, what software or hardware will be provided and for what fee, if applicable. Page 3

4 6. Roles and responsibilities For the purpose of this Policy, the following roles and succinct responsibilities have been identified. 1. CIMU 1. to promote the MAGNET as an Information Highway, 2. to maintain this Policy, 3. to accept and subsequent vet connection requests, 4. to define service level agreements, numerically quantified and publicly available, 5. to audit for compliance. 2. CIMU Communications Officer 6. to publish this Policy 3. Head of Agent 7. to instigate documented internal procedures that fully implement this Policy, 8. to establish authorised connections and subsequently operate them according to this Policy. 4. Head of Public Sector entity 1. to accept and subsequently consider requests for access to resources under direct responsibility. 2. to comply with the provisions found in this document. 7. Supporting Documents In support to this Policy, the following Standard and Directive will be issued: 1. Connectivity to MAGNET Standard. 2. Connectivity to MAGNET Directive. 8. References 1. Acts and Regulation a. Telecommunications Act b. Communications Authority Act c. Code of Practice for Internet Service Providers Page 4

5 9. Modification history Version Date Changes Initial Release 10. Maintenance and review timetable Maintenance of this Policy is set for six months after the initial release as indicated in the effective date. Subsequent maintenance to this Policy will be based on a twelve month cycle. <Signature and stamp> Joseph R Grima Permanent Secretary, Office of the Prime Minister Page 5

Third party Web hosting services security Policy

Third party Web hosting services security Policy Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: 09.04.2003 Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta

More information

Network Resource Management Directive

Network Resource Management Directive Office of the Prime Minister Central Information Management Unit Directive document CIMU D 0036:2003 Network Resource Management Directive Version: 1.0 Effective date: 10.12.2003 Table of Contents 1. Purpose...3

More information

Network Resource Management Policy

Network Resource Management Policy Office of the Prime Minister Policy document CIMU P0036:2003 Version: 1.0 Effective date: 10.12.2003 Network Resource Management Policy 1. Policy statement i) General Information and Communications Technology

More information

Information Security Policy

Information Security Policy Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall

More information

Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)

Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

IAF Mandatory Document for the Transfer of Accredited Certification of Management Systems

IAF Mandatory Document for the Transfer of Accredited Certification of Management Systems IAF MD 2:2007. International Accreditation Forum, Inc. IAF Mandatory Document IAF Mandatory Document for the Transfer of Accredited Certification of Management Systems (IAF MD 2:2007) IAF MD2:2007 International

More information

ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1

ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1 ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

Information Governance Strategy :

Information Governance Strategy : Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

The Electronic Transactions Law Chapter I Title and Definition

The Electronic Transactions Law Chapter I Title and Definition The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)

More information

Information Governance Strategy. Version No 2.1

Information Governance Strategy. Version No 2.1 Livewell Southwest Information Governance Strategy Version No 2.1 Notice to staff using a paper copy of this guidance. The policies and procedures page of LSW Intranet holds the most recent version of

More information

Chair Cabinet Committee on State Sector Reform and Expenditure Control

Chair Cabinet Committee on State Sector Reform and Expenditure Control Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

ehealth Architecture Principles

ehealth Architecture Principles ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:

More information

Remote Access Policy

Remote Access Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Recommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching

Recommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching Recommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching Contacts: Angela Single, Chair, Industry Working Group: angela.single@3millionlives.co.uk

More information

INSPIRE Spatial Data Infrastructure Solution Architecture Basic Solution Profile

INSPIRE Spatial Data Infrastructure Solution Architecture Basic Solution Profile INSPIRE Spatial Data Infrastructure Solution Architecture Basic Solution Profile Gate 1 Date: 06/09/2013 Version: 2.0 Security Classification: Malta Infor mation Technology Agency 01. Submission Details

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)

More information

MEMORANDUM OF UNDERSTANDING THE INDEPENDENT ELECTRICITY SYSTEM OPERATOR THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION

MEMORANDUM OF UNDERSTANDING THE INDEPENDENT ELECTRICITY SYSTEM OPERATOR THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION MEMORANDUM OF UNDERSTANDING BETWEEN THE INDEPENDENT ELECTRICITY SYSTEM OPERATOR AND THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION AND THE NORTHEAST POWER COORDINATING COUNCIL, CROSS-BORDER REGIONAL

More information

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister

More information

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to

More information

How To Respect The Agreement On Trade In Cyberspace

How To Respect The Agreement On Trade In Cyberspace CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET

UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)

More information

LICENSING OF INTERNET SERVICE PROVIDERS

LICENSING OF INTERNET SERVICE PROVIDERS LICENSING OF INTERNET SERVICE PROVIDERS CONDITIONS OF LICENCES FOR THE PROVISION OF INTERNET SERVICES TO THE PUBLIC PREAMBLE 4.1 Whereas, in terms of the Lesotho Telecommunications Authority Act 2000,

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

CONTENT OF THE AUDIT LAW

CONTENT OF THE AUDIT LAW CONTENT OF THE AUDIT LAW I. GENERAL PROVISIONS Article 1 This Law shall regulate the conditions for conducting an audit of legal entities which perform activities, seated in the Republic of Macedonia.

More information

ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Act No. 102 of May 31 of 2000

ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Act No. 102 of May 31 of 2000 This English translation of the ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Effective April 1, 2001 has been prepared in compliance with the Standard Bilingual Dictionary March 2006 edition.

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Date Approved. Modification History. Related Enterprise Architecture. Related Forms

Date Approved. Modification History. Related Enterprise Architecture. Related Forms ANU Policy Template Policy Title Procedures: Enterprise (ES) General Information File Number This currently sits as part of the Enterprise Architecture Policy Purpose To set out procedures to define and

More information

Challenges and Role of Standards in Building Interoperable e-governance Solutions

Challenges and Role of Standards in Building Interoperable e-governance Solutions 24 Compendium of e-governance Initiatives CHAPTER in India 3 Challenges and Role of Standards in Building Interoperable e-governance Solutions Renu Budhiraja Director e-governance Group, Department of

More information

A Summary of the National NGO Policy July 2012

A Summary of the National NGO Policy July 2012 A 9 Point Guide to Understanding the National NGO Policy and Supporting its Implementation A Summary of the National NGO Policy July 2012 1 The National Non Governmental Organisations POLICY PREFACE AND

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Compliance Management of Company Law Compliances Approach and Technology Perspective

Compliance Management of Company Law Compliances Approach and Technology Perspective Compliance Management of Company Law Compliances Approach and Technology Perspective Shujath Bin Ali*, Manager (Corporate Affairs, Legal & Tax), Deloitte Consulting India Private Limited, Hyderabad. Compliance

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that

More information

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version) Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature

More information

Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA)

Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) In the name of the people, The President of the Republic: The People Assembly has decreed

More information

Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA)

Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) Law No. 15/2004 on E-signature and Establishment of the Information Technology Industry Development Authority (ITIDA) In the name of the people, The President of the Republic: The People Assembly has decreed

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

IT Governance Charter

IT Governance Charter Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za info@itgovernance.co.za 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms

More information

DELHI ELECTRICITY REGULATORY COMMISSION

DELHI ELECTRICITY REGULATORY COMMISSION DELHI ELECTRICITY REGULATORY COMMISSION DELHI ELECTRICITY REGULATORY COMMISSION (RENEWABLE PURCHASE OBLIGATION AND RENEWABLE ENERGY CERTIFICATE FRAMEWORK IMPLEMENTATION) REGULATIONS, 2011 No. Dated:. NOTIFICATION

More information

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer RISK MANAGEMENT FRAMEWORK 1 SUMMARY The Risk Management Framework consists of the following: Risk Management policy Risk Management strategy Risk Management accountability Risk Management framework structure.

More information

E-signature in the Austrian cadastral process

E-signature in the Austrian cadastral process E-signature in the Austrian cadastral process Content Facts and figures Processes in Cadastre and Land Registry New Processes and procedures Legal framework Process of application Registration of changes

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

CASE 8: Procurement of public key infrastructure

CASE 8: Procurement of public key infrastructure CASE 8: Procurement of public key infrastructure Uni. Athens / CERES Country / region Netherlands Short description This is the case of an integrated central e-government infrastructure for issuing and

More information

European best practice regarding to the licensing in the energy sector

European best practice regarding to the licensing in the energy sector 99333 EU- INOGATE programme, project Support to Energy Market Integration and Sustainable Energy in the NIS (SEMISE) European best practice regarding to the licensing in the energy sector The content of

More information

An article on PCI Compliance for the Not-For-Profit Sector

An article on PCI Compliance for the Not-For-Profit Sector Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector

More information

How to set up a company in South Africa

How to set up a company in South Africa How to set up a company in South Africa Business entities and registration procedures The most common business entities in South Africa are: 1. Companies 2. Close corporations 3. Partnerships and sole

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Frequently Asked Questions (FAQs) for Recycling Fund Applicants

Frequently Asked Questions (FAQs) for Recycling Fund Applicants Frequently Asked Questions (FAQs) for Recycling Fund Applicants Industry Support Programme (ISP) 1. Eligibility 1.1 What is the Primary Objective of the Recycling Fund? The primary objective of establishing

More information

NSW Data & Information Custodianship Policy. June 2013 v1.0

NSW Data & Information Custodianship Policy. June 2013 v1.0 NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015 Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating

More information

Electronic Documents Law

Electronic Documents Law Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner

Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Federal Data Protection and Information Commissioner FDPIC Data protection and e-commerce: implementation aids and realisation proposals by the Federal Data Protection Commissioner Electronic business

More information

10 Steps for Managing Sub-Grants

10 Steps for Managing Sub-Grants New Partners Initiative 10 Steps for Managing Sub-Grants DRAFT Table of Contents ACRONYMS AED PEPFAR NPI USG Introduction T he Academy for Educational Development (AED) provides technical support for grantees

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

LAW ON ELECTRONIC TRANSACTIONS

LAW ON ELECTRONIC TRANSACTIONS Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING

More information

TOTAL QUALITY MANAGEMENT II QUALITY AUDIT

TOTAL QUALITY MANAGEMENT II QUALITY AUDIT TOTAL QUALITY MANAGEMENT II Chapter 13: QUALITY AUDIT Dr. Shyamal Gomes Introduction: The term audit was defined in the 16th Century as the official examination of the accounts with verification by reference

More information

Office of the President Annual Plan 2012/2013

Office of the President Annual Plan 2012/2013 Office of the President Annual Plan 2012/2013 1 2 Office of the President Annual Plan 2012/2013 Table of Contents ABBREVIATIONS...4 1. INTRODUCTION...5 2. HIGH LEVEL STATEMENTS...6 2.1 Mandate...6 2.2

More information

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or

More information

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration International Accreditation Forum, Inc. An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration A Discussion Paper The International Accreditation Forum, Inc. (IAF) operates a program

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Information governance in the Department of Health and the NHS

Information governance in the Department of Health and the NHS Information governance in the Department of Health and the NHS Harry Cayton, National Director for Patients and the Public, Chair, Care Record Development Board. Introduction I was asked by the Programme

More information

F. No. 1(3)/2014 EG II. Ministry of Communication & Information Technology. Department of Electronics & Information Technology POLICY

F. No. 1(3)/2014 EG II. Ministry of Communication & Information Technology. Department of Electronics & Information Technology POLICY POLICY Title of Policy: Policy on Adoption of Open Source Software for Government of India Preamble Government of India (GoI) is implementing the Digital India programme as an umbrella programme to prepare

More information

Casablanca Stock Exchange Reforms : Achievements and Challenges Content

Casablanca Stock Exchange Reforms : Achievements and Challenges Content Casablanca Stock Exchange Reforms : Achievements and Challenges Content Content... 1 I. MOROCCAN FRAMEWORK... 2 II. CASABLANCA STOCK EXCHANGE CORPORATE GOVERNANCE FRAMEWORK... 3 1. ROLE... 3 2. ORGANISATION...

More information

ISO 9001:2015 Overview of the Revised International Standard

ISO 9001:2015 Overview of the Revised International Standard ISO 9001:2015 Overview of the Revised International Standard Introduction This document provides: a summary of the new ISO 9001:2015 structure. an overview of the new and revised ISO 9001:2015 requirements

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,

More information

Version: 3.0. Effective From: 19/06/2014

Version: 3.0. Effective From: 19/06/2014 Policy No: RM66 Version: 3.0 Name of Policy: Business Continuity Planning Policy Effective From: 19/06/2014 Date Ratified 05/06/2014 Ratified Business Service Development Committee Review Date 01/06/2016

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide

More information

A Framework of Quality Assurance for Responsible Officers and Revalidation

A Framework of Quality Assurance for Responsible Officers and Revalidation A Framework of Quality Assurance for Responsible Officers and Revalidation Supporting responsible officers and designated bodies in providing assurance that they are discharging their statutory responsibilities.

More information

Release: 1. ICT40510 Certificate IV in Telecommunications Network Planning

Release: 1. ICT40510 Certificate IV in Telecommunications Network Planning Release: 1 ICT40510 Certificate IV in Telecommunications Network Planning ICT40510 Certificate IV in Telecommunications Network Planning Modification History Not Applicable Description Descriptor This

More information

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Information Governance Strategy. Version No 2.0

Information Governance Strategy. Version No 2.0 Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

THE REPUBLIC OF UGANDA DPP

THE REPUBLIC OF UGANDA DPP THE REPUBLIC OF UGANDA DPP Staff Training and Development Policy 2014 TABLE OF CONTENTS 1.0 INTRODUCTION 3 1.1 Policy and Legal Framework 4 1.2 Principles/Guidelines of the Training and Staff Development

More information

Law Concerning Electronic Signatures and Certification Services (Unofficial Translation)

Law Concerning Electronic Signatures and Certification Services (Unofficial Translation) Law Concerning Electronic Signatures and Certification Services (Unofficial Translation) Contents Chapter 1: General provisions (Article 1 and Article 2) Chapter 2: Presumption of the authenticity of an

More information

Standard conditions of the Electricity Distribution Licence

Standard conditions of the Electricity Distribution Licence Gas and Electricity Markets Authority ELECTRICITY ACT 1989 Standard conditions of the Electricity Distribution Licence Statutory Consultation: 29 April 2008 SECTION A: STANDARD CONDITIONS FOR ALL ELECTRICITY

More information

The Executive Regulations Governing the Online Trading System on the Tehran Stock Exchange and on the Iran Fara Bourse

The Executive Regulations Governing the Online Trading System on the Tehran Stock Exchange and on the Iran Fara Bourse The Executive Regulations Governing the Online Trading System on the Tehran Stock Exchange and on the Iran Fara Bourse The present regulations comprising 19 articles, 9 notes and an appendix were approved

More information

TG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES

TG 47-01. TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES TRANSITIONAL GUIDELINES FOR ISO/IEC 17021-1:2015, ISO 9001:2015 and ISO 14001:2015 CERTIFICATION BODIES Approved By: Senior Manager: Mpho Phaloane Created By: Field Manager: John Ndalamo Date of Approval:

More information

Heads of Schools: Appointment Process and Job Description

Heads of Schools: Appointment Process and Job Description Heads of Schools: Appointment Process and Job Description I. Procedure for the Appointment of Heads of Schools The appointment, rather than the nomination, of Heads of Colleges was a sine qua non of the

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

GUIDE FOR APPLICANTS GRANTS PROGRAMME 2016/2017 TRAINING IN CONFERENCE INTERPRETING

GUIDE FOR APPLICANTS GRANTS PROGRAMME 2016/2017 TRAINING IN CONFERENCE INTERPRETING GUIDE FOR APPLICANTS GRANTS PROGRAMME 2016/2017 TRAINING IN CONFERENCE INTERPRETING The aim of this guide is to give a summary of the main points of the administrative and financial processes governing

More information

Please read through these Terms and Conditions carefully, these Terms and Conditions apply to all services with us, unless otherwise stated.

Please read through these Terms and Conditions carefully, these Terms and Conditions apply to all services with us, unless otherwise stated. Terms and Conditions Last Updated 01/07/2014 Please read through these Terms and Conditions carefully, these Terms and Conditions apply to all services with us, unless otherwise stated. is a registered

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Release: 1. ICTNWK607 Design and implement wireless network security

Release: 1. ICTNWK607 Design and implement wireless network security Release: 1 ICTNWK607 Design and implement wireless network security ICTNWK607 Design and implement wireless network security Modification History Release Release 1 Comments This version first released

More information

CHAPTER E12 - ENVIRONMENTAL IMPACT ASSESSMENT ACT

CHAPTER E12 - ENVIRONMENTAL IMPACT ASSESSMENT ACT CHAPTER E12 - ENVIRONMENTAL IMPACT ASSESSMENT ACT ARRANGEMENT OF SECTIONS PART I General principles of environmental impact assessment SECTION 1.Goals and objectives of environmental impact assessment.

More information

Web Content Management System, Migration and Maintenance Services for ECDC Web Portal

Web Content Management System, Migration and Maintenance Services for ECDC Web Portal Web Content Management System, Migration and Maintenance Services for ECDC Web Portal ICT General Governance Reference G March 2015 Page 1 Table of Contents 1 Introduction... 3 2 Design of the ICT General

More information