Glossary of Terms (GLT)
|
|
- Dinah Brooks
- 8 years ago
- Views:
Transcription
1 OWNER: DG TAXUD ISSUE DATE: 28/03/2011 VERSION: 2.04 COMPUTERISATION PROJECT SYSTEM SPECIFICATIONS (ESS), COMMUNICATION AND INFORMATION PROGRAMME SUBJECT: Glossary of Terms (GLT) ECP1-ESS-GLT
2 [Blank for duplex printing]
3 TABLE OF CONTENTS Document History Edi. Rev. Date Description Action (*) Sections /08/2004 Creation. I All /08/2004 Updated after internal review. U All /08/2004 Updated after internal review. U /09/2004 Updated after feedback DG TAXUD. U 1, 2.1, 3.2, 4, 5 I /09/2004 Updated after SEVE quality review, SfR. U All /10/2004 Updated after review meeting at DG TAXUD. U /10/2004 Translated in FR and DE. U 1.2, 1.3, 4, /10/2004 Updated after SEVE quality review, SfA. U All /11/2004 Updated according to DG TAXUD comments, SfA (2) /05/2010 Updated according to latest reference documents and regulations. Submit for Internal QC U 3.2, 4, 5 U All D /06/2010 Implementing internal review comments. Submit for Review /07/2010 Updated according to DG TAXUD comments, SfA. R U All All /07/2010 Updated after verification by DG TAXUD, re-sfa. U 3.2, 4, /09/2010 Updated by DG TAXUD. U 4, 5 ECP1-ESS-GLT-2 04 Page iii of 70
4 TABLE OF CONTENTS /03/2011 Implementing DE and AT comments. Submit for Review /03/2011 Updated according to DG TAXUD comments, SfA. U 3.2, 4, 5 U 5 (*) Action: I = Insert, R = Replace, U = Update, D = Delete ECP1-ESS-GLT-2 04 Page iv of 70
5 TABLE OF CONTENTS Table of Contents 1. Management Summary English Deutsch Français Introduction Intended Readership Purpose of the Document Changes to this Document References Definition of Terms used in the Computerisation Project Typology of Contexts Definitions Administrative Reference Code (ARC) Acceptance Test Application Architecture Overview Asset Audit Trail Authentication Authorisation Authorised Warehousekeeper Availability Business Area Business Process Business Process Model Business Rule Central Help Desk (CHD) Central Project Team (CPT) Central Service Desk (CSD) Central Services/Management Information System (CS/MIS) Central Services/Reference Data (CS/RD) Centrally Developed Application (CDEA) Change of destination Committee on Excise Duty Combined Nomenclature Code (CN Code) 19 ECP1-ESS-GLT-2 04 Page v of 70
6 TABLE OF CONTENTS Common Communications Network/Common Systems Interface (CCN/CSI) Common Domain (CD) Confidentiality Conformance Testing (CT) Conformance Testing Organisation Document (CTOD) Conformance Testing Protocol (CTP) Customs Office List (COL) Design Document for National Excise Application (DDNEA) Direct Delivery Duty Suspension Arrangement Economic Operator (EcOp) EDI EDIFACT Electronic Administrative Document (e-ad) Electronic Credentials Elementary Business Process (EBP) Computerisation Project (ECP) Encryption End-User Escalation Excise Application Computerisation Working Party (ECWP) Excise Contact Group (ECG) Excise Duty Excise Liaison Office (ELO) Excise Movement and Control System () Exempted Consignee External Domain (ED) Fallback and Recovery Specifications (FRS) Follow-up Trail Functional Excise System Specification (FESS) Functional Message Structure Gateway Guarantor Integrity Integrity Check Journey Time Local Reference Number (LRN) Member State Administration (MSA) Member State of Destination Member State of Dispatch Movement Guarantee National Help Desk (NHD) National Domain (ND) National Excise Application (NEA) National Service Desk (NSD) 28 ECP1-ESS-GLT-2 04 Page vi of 70
7 TABLE OF CONTENTS Nationally Developed Application (NDEA) Network and Gateway Infrastructure Phase and Scope Specifications (PSS) Pre-Conformance Testing (Pre-CT) Process Flow Diagram Process Thread Quality Assurance Quality Control Reference Data Registered Consignee Registered Consignor Report of Receipt Security Excise System Specifications (SESS) Security Measures Security Policy Document (SEP) Security Requirements Security Risk Security Risk Assessment Service Level Agreement (SLA) Splitting State Transition Diagram (STD) Stress Test Tax Warehouse Technical Excise System Specifications (TESS) Temporary Registered Consignee Terms of Collaboration (TOC) Test Application Test Campaign Test Case Test Log Test Plan Test Scenario Test Scripts Test Specification Test Summary Report (TSR) Time Sequence Diagram (TSD) Threat Token Trans-European System (TES) Transporter Use Case Vulnerability 36 ECP1-ESS-GLT-2 04 Page vii of 70
8 TABLE OF CONTENTS 4. English - German - French Glossary of Terms English - German - French Glossary of Acronyms 54 ECP1-ESS-GLT-2 04 Page viii of 70
9 MANAGEMENT SUMMARY 1. Management Summary 1.1. English Goal This document provides a Glossary of Terms for the Computerisation Project aiming at: Ensuring a common understanding of project reports, which may use terms that might assume a different meaning in relation to the reading countries; Enabling new readers of project documentation to understand the terminology used; Defining the meanings of expressions that are used repeatedly, so that even knowledgeable readers can achieve a common understanding of the sense in which the terminology is used; Providing an aid to translators and interpreters; Not including terms and definitions of the Rollout Strategy. These terms are part of the PSS and Migration Plan. This document focuses on business and technical terminology. Document Summary The structure reflects the above objectives. Section 2... Is an introduction to the present document in terms of intended readership, purpose and change management; Section 3... Contains the definitions of some of the acronyms, abbreviations and technical terminology, which originate from both the user and IT environments; Section 4... Is an English / German / French glossary of terms, which is intended to ensure accurate and consistent translations; Section 5... Is an English / German / French glossary of all acronyms encountered in the project documentation; ECP1-ESS-GLT-2 04 Page 9 of 70
10 MANAGEMENT SUMMARY 1.2. Deutsch Zielsetzung Dieses Dokument enthält ein Terminologieglossar für das -DV-Projekt, mit dem folgende Zielsetzungen verfolgt werden: Es soll ein einheitliches Verständnis der Projektberichte gewährleisten, in denen möglicherweise Begriffe verwendet werden, die in den verschiedenen Ländern, in denen die Berichte gelesen werden, eine unterschiedliche Bedeutung haben können. Neue Leser der Projektdokumentation sollen in die Lage versetzt werden, die verwendete Terminologie zu verstehen. Die Bedeutung wiederholt verwendeter Ausdrücke soll definiert werden, damit auch sachkundige Leser ein einheitliches Verständnis des Sinnes, in dem die Terminologie verwendet wird, erreichen können. Das Glossar soll Übersetzern und Dolmetschern eine Hilfe sein. Enthält keine Begriffe und Definitionen des Rollout-Strategie. Diese Begriffe sind Teil der PSS und Migration Plan. Dieses Dokument konzentriert sich auf die geschäftliche und technische Terminologie. Zusammenfassung des Dokuments Die Struktur spiegelt die vorstehend aufgeführten Zielsetzungen wider. Abschnitt 2... Stellt eine Einführung in dieses Dokument dar, der die angestrebte Leserschaft, die Zielsetzung des Dokuments und die Verwaltung von Änderungen zu entnehmen sind. Abschnitt 3... Enthält die Definitionen einiger Akronyme, Abkürzungen und Fachausdrücke, die sowohl vom Anwender als auch von den IT-Umgebungen stammen. Abschnitt 4... Ist ein Englisch / Deutsches / Französisch Terminologieglossar, das genaue und einheitliche Übersetzungen gewährleisten soll. Abschnitt 5... Ist ein Englisch / Deutsches / Französisch Glossar aller Akronyme, die in der Projektdokumentation zu finden sind. ECP1-ESS-GLT-2 04 Page 10 of 70
11 MANAGEMENT SUMMARY 1.3. Français Objectif Ce document fournit un glossaire terminologique pour le projet d informatisation visant à : Assurer une compréhension commune des rapports du projet dans lesquels peuvent figurer des termes qui pourraient supposer une signification différente en fonction des pays qui lisent les rapports; Permettre aux nouveaux lecteurs de la documentation du projet de comprendre la terminologie utilisée; Définir la signification d expressions qui sont utilisées de manière répétitive, de sorte que même des lecteurs cultivés/avisés puisse acquérir une compréhension commune du sens dans lequel la terminologie est utilisée; Fournir une aide aux traducteurs et interprètes ; Pas comprendre les termes et définitions de la stratégie de déploiement. Ces termes font partie du PSS et de Plan de Migration. Ce document se concentre sur les entreprises et la terminologie technique. Résumé du document La structure du document reflète les objectifs cités plus haut. Section 2... Est une introduction au présent document dans laquelle sont spécifiés les lecteurs visés, l objectif du document et la gestion des changements Section 3... Contient les définitions de certains acronymes, abréviations et termes techniques qui proviennent de l utilisateur ainsi que des environnements IT Section 4... Est un glossaire terminologique anglais / allemand / français qui a pour but de garantir des traductions précises et cohérentes Section 5... Est un glossaire anglais / allemand / français de tous les acronymes rencontrés dans la documentation du projet. ECP1-ESS-GLT-2 04 Page 11 of 70
12 INTRODUCTION 2. Introduction 2.1. Intended Readership The intended readership for this document includes: Any person responsible for the functional and technical specification or implementation of the ; Any person responsible for the definition of tests for ; Any other authorized body concerned with the including: Committee on Excise Duties, Computerisation Working Party (ECWP), Computerisation Project (ECP) steering committee, external contractors, professional organisations of economic operators Purpose of the Document This document has been compiled for four main purposes: To ensure a common understanding of project reports, which may use terms that might assume a different meaning in relation to the reading countries; To enable new readers of project documentation to understand the terminology used; To define the meanings of expressions that are used repeatedly, so that even knowledgeable readers can achieve a common understanding of the sense in which the terminology is used; To provide an aid to translators and interpreters Changes to this Document According to the TEMPO methodology [R1], the elaboration of the Glossary of Terms is an on-going process during the project lifecycle resulting in frequent reviews. During this process, changes to the present document shall follow the Change Management Procedures described in [R2]. ECP1-ESS-GLT-2 04 Page 12 of 70
13 INTRODUCTION 2.4. References Ref. Identifier Title Version Issued/Ap proved by MSAs [R1] [R2] ITS-ITOC-001- Excise DG TAXUD TEMPO Quality Methodology Terms of Collaboration between the Central Project and the National Projects [R3] 2008/118/EC COUNCIL DIRECTIVE 2008/118/EC of 16 December 2008 on the general arrangements for products subject to excise duty and repealing Directive 92/12/EEC RELEASE MAR /07/ /01/ /01/ erv.do?uri=oj:l:2009:009:0012:00 30:EN:PDF [R4] 1152/2003/EC DECISION n 1152/2003/EC of the EUROPEAN PARLIAMENT and of the COUNCIL of 16 June 2003 of computerising the movement and surveillance of excisable products. erv.do?uri=oj:l:2003:162:0005:00 08:EN:PDF [R5] ECP1-ESS-FESS Computerisation Project - Functional Excise System Specifications (FESS) 16/06/ /08/2010 [R6] ECP1-ESS-PSS Phasing and Scope Specification /06/2010 [R7] EXC-IPLN-MAP- CED563rev4 Master plan /06/2010 [R9] ECP1-ESS-SEP Security Policy /12/2009 [R10] EXC-ISLA-COS-001 Excise System SLA between DG TAXUD and Member States Service Level Agreement [R11] ECP1-ESS-SESS Security Excise System Specifications [R12] ECP1-ESS-TESS Technical Excise System Specifications /01/ /12/ /01/2007 [R13] ECP2-DEV- Migration Plan for Phase /04/2007 ECP1-ESS-GLT-2 04 Page 13 of 70
14 INTRODUCTION Ref. Identifier Title Version Issued/Ap proved by MSAs [R14] [R15] [R16] [R17] [R19] [R20] [R21] [R20] [R21] SC01-MP ECP2-DEV- SC02-SD ECP2-FITSDEV2- DDNEA ECP2-FITSDEV2- SC03-CTP SED-IRPT-CTD-019- CTO ECP3-DEV- SC02-SD ECP3-FITSDEV2- SC03-DDNEA_P3 ECP3-DEV- SC03-CTP CSMIS_-UMN- User Manual 2009/684/EC Scope Document for Phase /04/2008 DDNEA for Phase /08/2009 Conformance Test Protocol for Phase 2 Phase 2 Conformance Test Organisation Document Scope Document for Phase /02/ /08/ /02/2009 DDNEA for Phase /08/2010 Conformance Test Protocol for Phase /01/2009 CS/MIS for User Manual /02/2010 COMMISSION REGULATION (EC) No 684/2009 of 24 July 2009 Implementing Council Directive 2008/118/EC as regards the computerised procedures for the movement of excise goods under suspension of excise duty iserv.do?uri=oj:l:2009:197:00 24:0064:EN:PDF Table 1: Reference Documents. 29/07/2009 ECP1-ESS-GLT-2 04 Page 14 of 70
15 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT 3. Definition of Terms used in the Computerisation Project 3.1. Typology of Contexts Figure 1 presents the typology of applicable contexts that is followed by the definitions listed in section 3.2. The background principle is that a definition applicable to a specific item is also applicable to its sub-items (if any). As an example, a definition applicable to the "General IT" context is also applicable to "IT Design", "IT Development", and "IT Support and Maintenance" contexts. Therefore, a definition applicable to the "General" context is applicable to all contexts of the proposed typology. Figure 1: Typology of Contexts. ECP1-ESS-GLT-2 04 Page 15 of 70
16 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT 3.2. Definitions Administrative Reference Code (ARC) Is the unique identifier of an electronic Administrative Document assigned by the competent authorities of the Member State of dispatch. The ARC of an electronic AAD (e-ad) always begins with the last two digits of the year of formal acceptance of the movement Acceptance Test A series of tests applied by the users of a new (or newly modified) computer application before the users accept that it meets their requirements. General IT Application Architecture Overview Application architecture overview is a high level description of the characteristics of the application systems that will be built to satisfy business requirements. General IT Asset An asset is a component or part of a total system to which the organisation directly assigns a value and therefore, requires protection. Assets encompass all of those items that contribute to the provision of information that an organisation requires in conducting its business. General Audit Trail A record of events, such as system access, network load, unsuccessful log-on attempts, and so on, that might have some relevance when investigating a security breach. Security Authentication Authentication defines the level of trust or trustworthiness of the parties involved in a transaction - it is the process of establishing the validity of a claimed identity. Security ECP1-ESS-GLT-2 04 Page 16 of 70
17 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT Authorisation In the security context, authorisation focuses on the actions permitted for an identity after authentication has taken place. Decisions concerning authorisation are and should remain the purview of the business process owner. Security Authorised Warehousekeeper A natural or legal person authorised by the competent authorities of a Member State, in the course of his business, to produce, process, hold, receive or dispatch excise goods under a duty suspension arrangement in a tax warehouse Availability Ability of a component or service to perform its required function at a stated instant or over a stated period of time. It is usually expressed as the availability ratio (%), i.e. the proportion of time that the service is actually available for use by the Customers within the agreed service hours Business Area A business area represents a subset of the business singled out for development or change activity. It is defined in terms of processes (group of activities), IT functions and organisations. Excise business is decomposed into several business areas including: Core business; Management of SEED and reference data; Follow-up and collaboration; System administration Business Process At its most generic, any set of activities performed by a business that is initiated by an event, transforms information, materials or business commitments, and produces an output. Value chains and large-scale business processes produce outputs that are valued by end-users (e.g. Economic Operator, MSA officers). Some other processes generate outputs that are valued by other processes. General IT Security General IT Business Process Model The business process model provides a breakdown (process decomposition) of all levels of business processes within the scope of General IT ECP1-ESS-GLT-2 04 Page 17 of 70
18 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT a business area. It also shows process dynamics, lower-level process interrelationships, etc. In summary it includes all diagrams related to a process definition that allows for understanding what the business process is doing (and not how it is doing it) Business Rule A Business Rule is a condition under which data items are created, related, and maintained Central Help Desk (CHD) The Central Help Desk (CHD) is a function of the Central Service Desk. The CHD provides a single point of contact for every National Help Desk (NHD). Issues are documented and resolved by CHD staff, referring to other project parties if necessary. General IT Central Project Team (CPT) The team, led by DG TAXUD, working together on the realisation of the central project, and taking overall responsibility for the Computerisation Project Central Service Desk (CSD) The Central Service Desk provides a single point of contact for NSDs. Incidents, Problems or Requests are documented, resolved or dispatched by CSD staff, referring to the level of support (first/second/third level support) needed Central Services/Management Information System (CS/MIS) A central web-based application operated by the Central Service Desk, which aims at collecting and processing statistics files (produced by the CCN/CSI Technical Centre (CCN/TC)) related to exchange of messages over the CCN/CSI network. Also referred to as Central Services/Management Information System for (CS/MISE) Central Services/Reference Data (CS/RD) A central operations office in the Common Domain where all shared information, such as the Excise Office List, are produced or consolidated and that is responsible for the consistent distribution of ECP1-ESS-GLT-2 04 Page 18 of 70
19 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT that information. Member State Administrations are responsible for ensuring that the Excise Office List in the CS/RD database is regularly updated with current data Centrally Developed Application (CDEA) A set of applications developed in common under the control of DG TAXUD and covering: Test applications for the validation of the Nationally Developed Applications (NDEA); and The applications developed for the Central Services Change of destination An action where the contents of the Destination fields of an e-ad are updated following a change of place of delivery (Art. 21(8) of Directive 2008/118/EC). Change of destination may change the journey time Committee on Excise Duty The Commission shall be assisted by a committee referred to as the Committee on Excise Duty. The Committee on Excise Duty shall, examine the matters raised by its chairman, either on his own initiative or at the request of the representative of a Member State, concerning the application of Community provisions on excise duty. (Ref art. 43 of the Directive 2008/118/EC [R3]) Combined Nomenclature Code (CN Code) The Combined Nomenclature Code is a unique reference value that is put into correspondence with the Excise Code, when an excise movement is also bound to a customs movement (import, export, or placement under any other customs procedure) Common Communications Network/Common Systems Interface (CCN/CSI) The CCN (Common Communications Network) is a private, Pan- European telecommunications network procured by DG TAXUD. It interconnects the national Taxation and Customs administrations through General COM ECP1-ESS-GLT-2 04 Page 19 of 70
20 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT the means of communication platforms (called CCN Gateways) installed in the national administrations and offering both synchronous (request/response) and asynchronous (message queuing) services. The CSI (Common System Interface) is a set of Application Programme Interfaces (APIs) and protocols allowing access to the CCN; it takes care of the inter-operability between the national platforms running European applications (e.g. AFIS, NCTS) and the CCN Gateway. The two sets of components have been bundled together to form the CCN/CSI network Common Domain (CD) The part of the, which consists of the CCN/CSI common components and services (including the physical gateways, the software linking them to the private Pan-European IP network) and every component that is under the responsibility of DG TAXUD (e.g. CS/RD, CS/MIS, etc.) Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. General COM General IT Security Conformance Testing (CT) A series of centrally run tests using a test application, which must be undergone by every National Excise Application before beginning operation (initial or live) in the Conformance Testing Organisation Document (CTOD) The procedural and the organisational manual that is used for Conformance Testing Conformance Testing Protocol (CTP) The documented procedures for performing CT, which comprises the Conformance Test Organisation Document and the database of test cases Customs Office List (COL) A list containing details of all the customs offices within the customs ECP1-ESS-GLT-2 04 Page 20 of 70
21 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT territory covered by the Common Transit Convention, which are authorised to deal with transit movements. (A distributed database containing these details is a key component of the NCTS). The COL also mentions the customs offices authorised to deal with importation and exportation Design Document for National Excise Application (DDNEA) This document specifies the design requirements to which any Nationally Developed Application (NDEA) and Centrally Developed Application (CDEA) needs to conform. The purpose of this document is two-fold: To state unambiguously what needs to be developed. This will be achieved by specifying the sequences of Information Exchanges to be supported as a number of message exchange protocols and the detailed structure and building rules of these Information Exchanges. To define how the Information Exchanges need to be performed. Basically, every Information Exchange needs to be formatted (or represented) in XML representation and this formatted message needs to be transported between Excise Applications Direct Delivery The Member State of Destination may, under the conditions which it lays down, allow excise goods to be moved under a duty suspension arrangement to a place of direct delivery situated on its territory, where that place has been designated by the authorised warehousekeeper in the Member State of Destination or by the registered consignee (Art. 17(2) of Directive 2008/118/EC). That Authorised Warehousekeeper or that Registered Consignee shall remain responsible for submitting the Report of Receipt Duty Suspension Arrangement A tax arrangement applied to the production, processing, holding or movement of excise goods not covered by a customs suspensive procedure or arrangement, excise duty being suspended (Art. 4(7) of Directive 2008/118/EC) Economic Operator (EcOp) Economic Operator (EcOp) is a generic term that includes all stakeholders of the external domain, i.e.: Authorised Warehousekeeper; ECP1-ESS-GLT-2 04 Page 21 of 70
22 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT Reference Data; Registered Consignee; Registered Consginor Temporary Registered Consignee; Trans-European System (TES); Transporter; Guarantor; Exempted Consignee EDI EDI (Electronic Data Interchange) means, the transmission of data structured according to agreed message standards, between one computer system and another, by electronic means. The term standard message means a predefined structure recognised for the electronic transmission of data EDIFACT EDIFACT (EDI for Administration, Commerce and Transport) is an international standard developed under the auspices of the United Nations, which defines syntax rules and standard messages for the operation of EDI in the Administration, Commerce and Transport areas Electronic Administrative Document (e-ad) The administrative document is defined in Article 21(2) of Directive 2008/118/EC and in Article 3(1) of Regulation (EC) 684/2009. In the context of, the AAD is embodied by the electronic AD (e-ad). General IT General IT Electronic Credentials Electronic Credentials bind an identity (and perhaps other attributes) to a token. Electronic credentials may be general-purpose credentials or targeted to a particular verifier. Some common types of credentials are: X.509 public key identity certificates bind an identity to a public key; X.509 attribute certificates that bind an identity or a public key with some attribute; Kerberos tickets that are encrypted messages binding the holder with some attribute or privilege; Trusted directory entries. Applicable Contexts Security ECP1-ESS-GLT-2 04 Page 22 of 70
23 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT Elementary Business Process (EBP) An elementary business process (EBP) represents the lowest level of process decomposition from a business perspective. An EBP may be manual, automated, or some combination of the two. An EBP is performed by one person or one process, at one location and one time. General IT Computerisation Project (ECP) The overall project launched to realise the Excise Movement Control System (). It consists of a Central Project co-ordinated closely with National Projects in all the MSA Encryption Encryption is the conversion of data into a form, called a ciphertext, which cannot be easily understood by unauthorized people. Security End-User A person who makes direct use of the application, e.g. Economic Operator or Excise Officer Escalation In a project, decisions are taken at the appropriate authorisation level. However, when a decision cannot be taken at a certain level (because the individuals at that level cannot reach a decision or do not have the mandate to take such decision), the task of taking this decision is brought (escalated) to the next / higher level Excise Application The totality of the applications, procedures etc. required for a Member State to implement (possibly in several steps) the functionality defined by the Functional Excise System Specifications. May include subsystems to manage excise movements, Guarantees, Excise Office List, etc Computerisation Working Party (ECWP) Working party set up by the Committee on Excise Duty to fulfil its duties in creating, setting up and running of. ECP1-ESS-GLT-2 04 Page 23 of 70
24 DEFINITION OF TERMS USED IN THE COMPUTERISATION PROJECT The ECWP is chaired by both R4 and C2 units of DG TAXUD and composed of the national IT representatives and national Excise experts of the Member States. It consists of a forum for discussion on the detailed business, IT and operational aspects of the ECP ( Computerisation Project) Excise Contact Group (ECG) Contact point with the European Federations of Economic Operators in the excise duties area. It consists in a working party as well as an information meeting Excise Duty Excise duty represents taxes on products, which are subject to the Community legislation in the field of excise (i.e. alcoholic products, energy products, and tobacco products). General Excise Liaison Office (ELO) The central liaison office designated by each MSA for contacts with other MSA in the field of administrative cooperation, management and surveillance of the procedures and systems for the movement of excisable products provided for Community legislation, etc Excise Movement and Control System () The decision n 1152/2003/EC of the European Parliament and of the Council of 16 June 2003 of computerising the movement and surveillance of excisable products [R4] provides the legal basis for the implementation of an Excise Movement and Control System (). The objectives of this system are both to eliminate the weaknesses of the current paperbased system (in the scope of the reduction of fraud) and to provide all partners with complementary services, in particular to bring real-time information during the excise movement to all actors of the project community Exempted Consignee A consignee that is authorised to receive excise goods under duty suspension arrangement and may enjoy exemption from payment of excise duties; it may be: ECP1-ESS-GLT-2 04 Page 24 of 70
SECTION II: EMCS COMMON DOMAIN ARCHITECTURE
SECTION II: EMCS COMMON DOMAIN ARCHITECTURE ECP1-ESS-TESS-02-SECTION-II-EMCS-COMMON-DOMAIN-ARCHITECTURE-v3.00.doc Page 1 of 91 TABLE OF CONTENTS Table of Contents 1 Introduction... 9 1.1 Scope... 9 1.2
More informationSUBJECT: APPENDIX A2: MESSAGES PER BUSINESS DOMAIN DDNEA FOR EMCS PHASE 3 (ECP3-FITSDEV3-SC01-DDNEA_P3_APP_A2)
OWNER: DG TAXUD ISSUE DATE: 06/03/2015 VERSION: 1.76-EN TAXATION AND CUSTOMS UNION DG EMCS COMPUTERISATION PROJECT PHASE 3 SUBJECT: APPENDIX A2: MESSAGES PER BUSINESS DOMAIN () FRAMEWORK CONTRACT TAXUD/2013/CC/121
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
More informationCode of Practice on Electronic Invoicing in the EU
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
More informationIT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
More informationMessage exchange with. Finnish Customs
Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 3.6.2015 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish
More informationANNEX II. Inventory of existing electronic systems/documents and initiatives on electronic exchange of information, under DG TAXUD s competence
17-11-05 ANNEX II Inventory of existing electronic systems/documents and initiatives on electronic exchange of information, under DG TAXUD s competence Further information: Working Document TAXUD/472/2004/Rev.
More informationDirective 2001/16 - Interoperability of the trans- European conventional rail system
01/16-ST02 part 2 version EN07 TSI-TAF origin EN Status NA Directive 2001/16 - Interoperability of the trans- European conventional rail system Draft Technical Specification for Interoperability "Telematic
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationOffice 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
More informationThis interpretation of the revised Annex
Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation
More informationPolish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
More informationEDI Agreement EDI AGREEMENT. Article 1: Object and scope. Article 2: Definitions
EDI AGREEMENT This Electronic Data Interchange (EDI) Agreement is concluded by and between: And hereinafter referred to as 'the parties', Article 1: Object and scope 1.1. The 'EDI Agreement', hereinafter
More informationREGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
More informationCP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems
Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: pcn@bindt.org CP14 ISSUE 5 DATED 1 st OCTOBER
More informationSMDG-Interchange EDI - Understanding
1 SMDG-Interchange EDI - Understanding This draft is the result of work carried out by a SMDG-Subgroup. It was set up mainly on TEDIS drafts (May 1991/January 1994) but ideas and comments of EDI Council
More informationThe IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations
Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic
More informationHaving regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,
28.8.2014 Official Journal of the European Union L 257/73 REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic
More informationFOR THE ICS/NCTS/ECS/AEO/EORI APPLICATIONS TO BE APPLIED AS FROM 1 JULY 2009
EUROPEAN COMMISSION DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy Customs policy and Electronic customs Brussels, 13 May 2009 TAXUD/1609/2008 EN - FINAL Working Document ELECTRONIC CUSTOMS
More informationSecurity Audit VIS Central System. Summary Report
Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among
More informationSTATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012.
THE EAST AFRICAN COMMUNITY STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. to the East African Community Gazette No. 7 of 11th May, 2012. Printed by the Uganda Printing and Publishing Corporation,
More informationOVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
More informationHead of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
More informationBusiness Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
More informationRegulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
More informationBUDGET HEADING 04.03.03.03 INFORMATION, CONSULTATION AND PARTICIPATION OF REPRESENTATIVES OF UNDERTAKINGS CALL FOR PROPOSALS
EUROPEAN COMMISSION Employment, Social Affairs and Inclusion DG Employment and Social Legislation, Social Dialogue Labour Law BUDGET HEADING 04.03.03.03 INFORMATION, CONSULTATION AND PARTICIPATION OF REPRESENTATIVES
More informationExplanatory notes VAT invoicing rules
Explanatory notes VAT invoicing rules (Council Directive 2010/45/EU) Why explanatory notes? Explanatory notes aim at providing a better understanding of legislation adopted at EU level and in this case
More informationBasic Rules of Issuing Invoices and Receipts 2014
Basic Rules of Issuing Invoices and Receipts 2014 Most requirements pertaining to invoicing are contained in Act CXXVII of 2007 on Value Added Tax (hereinafter: VAT Act) and the decrees issued on the basis
More informationSECTION III: EMCS CENTRAL SERVICES ARCHITECTURE
SECTION III: EMCS CENTRAL SERVICES ARCHITECTURE ECP1-ESS-TESS-03-SECTION-III-EMCS-CENTRAL-SERVICES-ARCHITECTURE-v3.00.doc Page 1 of 33 TABLE OF CONTENTS Table of Contents 1 Introduction... 4 1.1 Scope...
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
More informationAdministrer les solutions Citrix XenApp et XenDesktop 7.6 CXD-203
Administrer les solutions Citrix XenApp XenDesktop 7.6 CXD-203 MIEL Centre Agréé : N 11 91 03 54 591 Pour contacter le service formation : 01 60 19 16 27 Pour consulter le planning des formations : www.miel.fr/formation
More informationTENDER SPECIFICATIONS
EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR EDUCATION AND CULTURE Youth and sport; Erasmus+ Traineeships Office INTERINSTITUTIONAL CALL FOR TENDERS OPEN PROCEDURE N EAC/05/2014 COLLECTIVE HEALTH INSURANCE
More informationPractical Overview on responsibilities of Data Protection Officers. Security measures
Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency mvl@agpd.es Security measures Agenda: The rol of DPO on security measures
More informationRS Official Gazette, No 23/2013 and 113/2013
RS Official Gazette, No 23/2013 and 113/2013 Pursuant to Article 15, paragraph 1 and Article 63, paragraph 2 of the Law on the National Bank of Serbia (RS Official Gazette, Nos 72/2003, 55/2004, 85/2005
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationElectronic Documents Law
Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or
More informationETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
More informationCertification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
More informationSECTION III: EMCS CENTRAL SERVICES ARCHITECTURE
SECTION III: EMCS CENTRAL SERVICES ARCHITECTURE ECP1-ESS-TESS-03-SECTION-III-EMCS-CENTRAL-SERVICES-ARCHITECTURE-v3.02.doc Page 1 of 32 TABLE OF CONTENTS Table of Contents 1 Introduction... 3 1.1 Scope...
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationMICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
More informationSummary Project Fiche
Summary Project Fiche 1. Basic Information 1.1. Désirée Number: BG 0203.13 1.2. Title: Development and Implementation of VIES requirements and EU interoperability standards in the field of VAT within the
More informationCertification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
More informationPROJECT AUDIT METHODOLOGY
PROJECT AUDIT METHODOLOGY 1 "Your career as a project manager begins here!" Content Introduction... 3 1. Definition of the project audit... 3 2. Objectives of the project audit... 3 3. Benefit of the audit
More informationChange Management Procedures Re: The Peoplesoft Application at Mona
Change Management Procedures Re: The Peoplesoft Application at Mona (The original Peoplesoft document was modified to relate more closely to UWI Mona) See also.. MITS Project Management Methodology & MITS
More informationDRAFT. Guidance for Member States and Programme Authorities Designation Procedure
23/05/2014 EUROPEAN COMMISSION EGESIF_14-0013 DRAFT European Structural and Investment Funds Guidance for Member States and Programme Authorities Designation Procedure (under Articles 123 and 124 of Regulation
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationCryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationGCP INSPECTORS WORKING GROUP <DRAFT> REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
European Medicines Agency London, 17 October 2007 Doc. Ref. EMEA/505620/2007 GCP INSPECTORS WORKING GROUP REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
More informationMusic Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
More informationELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of
More informationAn Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
More informationCloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
More informationFederal law on certification services in the area of the electronic signature
Law on the electronic signature 94.0 Notice This English translation has no official character. The only authentic texts are the German, French and Italian versions published in the Official Compendium
More informationThird Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
More informationAdopt the following: Section A
Grand-Ducal Regulation of 9 July 2013 determining the requirements for the professional qualification of Réviseur d Entreprises pursuant to the Law of 18 December 2009 on the audit profession We Henri,
More informationPursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;
Decision No. 2011-316 dated 6 October 2011 adopting a standard for delivering privacy seals in audit procedures covering the protection of persons with regard to the processing of personal data The French
More informationThis Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
More informationCOMMISSION DECISION of 16 August 2006 C( 2006 ) 3602. concerning the security of information systems used by the European Commission
COMMISSION DECISION of 16 August 2006 C( 2006 ) 3602 concerning the security of information systems used by the European Commission THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 14662 First edition Information Technologies - Open-edi reference model Technologie de l'information - Modèle de référence EDI-ouvert Reference number Page 2 Contents Foreword...
More informationExtremeWorks Remote Monitoring Service
SERVICE DESCRIPTION DOCUMENT (SDD) ExtremeWorks Remote Monitoring Service Service: ExtremeWorks Managed Service Remote Monitoring Service Version: 1.0 Date: November 2015 Availability: Global Order Code:
More informationINFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
More information1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.
Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security
More informationInformation Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
More informationEU CUSTOMS BUSINESS PROCESS MODELLING POLICY
EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3
More informationMusina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
More informationFord Motor Company CA Certification Practice Statement
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationRegulation on the implementation of the European Economic Area (EEA) Financial Mechanism 2009-2014
the European Economic Area (EEA) Financial Mechanism 2009-2014 adopted by the EEA Financial Mechanism Committee pursuant to Article 8.8 of Protocol 38b to the EEA Agreement on 13 January 2011 and confirmed
More informationCOMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
More informationNATO GUIDANCE ON THE USE OF THE AQAP 2000 SERIES
NATO GUIDANCE ON THE USE OF THE AQAP 2000 SERIES (June 2003) I ORIGINAL Page blank II ORIGINAL NORTH ATLANTIC TREATY ORGANIZATION NATO STANDARDISATION AGENCY (NSA) NATO LETTER OF PROMULGATION June 2003
More informationC015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
More informationUsing Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
More informationDevelopment, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
More informationRegulation on the implementation of the Norwegian Financial Mechanism 2009-2014
Regulation on the implementation of the Norwegian Financial Mechanism 2009-2014 adopted by the Norwegian Ministry of Foreign Affairs pursuant to Article 8.8 of the Agreement between the Kingdom of Norway
More informationSystem Requirements Specification (SRS) (Subsystem and Version #)
of the (Subsystem and Version #) () (Document Revision Number) Contract (No.) Task (No.) GSA Contract (No.) Prepared for: The United States Department of Agriculture Food & Nutrition Service (FNS)/ Information
More informationElectronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
More informationSoftware Test Plan (STP) Template
(STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This
More informationCOMMISSION REGULATION. of 5.5.2011
EN EN EN EUROPEAN COMMISSION Brussels, 5.5.2011 C(2011) 2962 final COMMISSION REGULATION of 5.5.2011 on the technical specification for interoperability relating to the subsystem 'telematics applications
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 23 June 2010 (OR. en) 10858/10 Interinstitutional File: 2009/0009 (CNS) FISC 60
COUNCIL OF THE EUROPEAN UNION Brussels, 23 June 2010 (OR. en) 10858/10 Interinstitutional File: 2009/0009 (CNS) FISC 60 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: COUNCIL DIRECTIVE amending Directive
More informationOfficial Journal of the European Union
L 132/32 COMMISSION IMPLEMTING REGULATION (EU) No 447/2014 of 2 May 2014 on the specific rules for implementing Regulation (EU) No 231/2014 of the European Parliament and of the Council establishing an
More informationDraft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
More informationVergleich der Versionen von Kapitel 1 des EU-GMP-Leitfaden (Oktober 2012) 01 July 2008 18 November 2009 31 Januar 2013 Kommentar Maas & Peither
Chapter 1 Quality Management Chapter 1 Quality Management System Chapter 1 Pharmaceutical Quality System Principle The holder of a Manufacturing Authorisation must manufacture medicinal products so as
More informationTECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
More informationJoint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
More informationCOMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX D... [ ](2012) XXX draft COMMISSION REGULATION (EU) No /.. of XXX establishing a Union Registry pursuant to Directive 2003/87/EC of the European Parliament and of the
More informationCertification Practice Statement (ANZ PKI)
Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationInformation Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
More informationAn organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:
p. 1 System Management Standards Proposed on October 8, 2004 Preface Today, the information system of an organization works as an important infrastructure of the organization to implement its management
More informationDraft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
More informationSERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More informationCourtesy Translation
Direction centrale de la sécurité des systèmes d information Protection Profile Electronic Signature Creation Application Date : July 17th, 2008 Reference : Version : 1.6 Courtesy Translation Courtesy
More informationData Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
More informationAUDIT CERTIFICATE GUIDANCE NOTES 6 TH FRAMEWORK PROGRAMME
AUDIT CERTIFICATE GUIDANCE NOTES 6 TH FRAMEWORK PROGRAMME GUIDANCE NOTES FOR CONTRACTORS AND CERTIFYING ENTITIES MATERIALS PREPARED BY INTERDEPARTMENTAL AUDIT CERTIFICATE WORKING GROUP VERSION 1 APPROVED
More information