Supplement to Gaming Machine Technical Standards Consultation

Size: px
Start display at page:

Download "Supplement to Gaming Machine Technical Standards Consultation"

Transcription

1 Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to Gaming Machine Technical Standards, issued in June In that paper, we consulted on the general requirements that will apply to all gaming machines (categories A to D). It was stated in the paper that the requirements for server based, downloadable and wireless gaming machines, and for cashless payment systems would be released for consultation at a later date. 2. This document sets out our proposals for these remaining technical issues relating to gaming machines and invites comments. It should be read in conjunction with the general requirements for gaming machines set out in Gaming Machine Technical Standards, issued in June You can access that document via the press release on our website at: Information about how to respond is available at paragraph The standards proposed here will in future be incorporated into the overall machine technical standards for each category of gaming machine. We have therefore continued the numbering from our earlier document this document consults on Sections 10 and 11 from the overall technical standards for gaming machines. Section 10. Server Networked and Downloadable Game Requirements Section 11. Wireless Network Systems Please note that these proposed standards apply only to gaming machines, and not to other machines or systems that use remote communication. Section 12. Cashless payment systems 4. We have included a short explanation of the aims of each of sections and the approach we have taken. However, it will be particularly important for manufacturers and suppliers to consider the draft requirements themselves, rather than rely on our short explanation. Victoria Square House Victoria Square Birmingham B2 4BP T F

2 Background and context 5. The Gambling Act 2005 gives the Commission, as part of its statutory role, the responsibility to license operators that manufacture, supply, install, adapt, maintain or repair gaming machines. The Commission has the power to set standards for gaming machines and provide for their enforcement by way of licence conditions. The Act enables the Commission to require licensees and applicants for licences to submit to machine testing, including testing by external bodies. 6. The current gaming machine guidelines agreed with BACTA (British Amusement Catering Trade Association) do not include guidelines for server based, downloadable or wireless systems. BACTA s own technical standards, which are adopted by its members, do not currently cover this issue. However in Britain, there are systems in use (and more are being developed) to take advantage of the flexibility and efficiency of such technologies. The Commission welcomes these developments provided that there are adequate safeguards to protect the interests of the player, ensure transparency and game fairness. 7. The current machine guidelines cover cashless payment systems. However, many of the issues covered in those sections of the guidelines are likely to be addressed by regulations under Section 240 of the Act, on which the Department for Culture, Media and Sport intend to consult separately. Therefore, these issues will not be covered in our technical standards. 8. Internationally there are moves towards regulating wireless, downloadable and server based gaming systems. We have taken note of the standards produced by GLI and BMM, and our proposed standards aim to be appropriate for the machines which are and will be based in Britain. Overall aims 9. In drafting these sections of the standards, our overall aim was to ensure the integrity of communications, and that the systems maintain fairness for players. As indicated in our consultation on Licence Conditions and Codes of Practice (issued in March 2006), we also propose some measures that would enable a customer to track and control their spend when using cashless payment systems. We believe that our proposed requirements are reasonable to implement, especially since cashless systems also bring with them increased marketing opportunities. Section 10: Server Network and Downloadable Game Requirements 10. Section 10 of the proposed standards is designed to capture systems (becoming more common in Britain) that utilise a network or other means - such as a hand held portable device - to modify the game content or configuration setting on a gaming machine, such as the percentage return to player. 11. A general definition is given in section Section 10.2 and 10.3 are intended to ensure that the means of communication between the terminal and any external device is secure and that there are sufficient safeguards to verify that any modifications or additions to the 2

3 control software has been carried out without tampering or data corruption. The Commission does not intend to specify the manner in which this should be achieved, leaving flexibility for the industry to update their systems as technology in this field evolves and improves. 12. Section 10.4 requires an audit of the type of activity carried out during any remote access to the gaming terminal, so that alterations can be tracked and investigated where necessary. Section 10.5 requires additional auditing and controls where the player s likely percentage return or other game configurations can be modified remotely. 13. Where a gaming system utilises a component external to the player terminal such as a RNG (Random Number Generator) it must comply with the requirements of section 10.6, which requires secure data transmission and audit of significant events. This is primarily to ensure game fairness it provides a means to help resolve player disputes, and to investigate any issues of non-compliance. Again the Commission has left flexibility in the manner in which this achieved. TECHNICAL STANDARD PROVISION All categories of gaming machine 10.0 Server networked and downloadable game requirements 10.1 Section 10 applies where any of the following systems are in place: Any element of the gaming process that may determine the game outcome is executed on a device external to the player s terminal and requires a communication link (networked) in order for the system to operate. The control software can be modified, removed or added to the player terminal via a network or; The control software can be modified, removed or added to the player terminal using a portable device requiring a temporary communication link or other means. Examples of such systems are where the terminal control program, randomly generated game determinants or other game content is generated by a central server and downloaded to the player terminal for the operation of the game Communication requirements All communication protocols must have proper error detection and/or recovery mechanisms which are designed to prevent unauthorised access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with secure seeds or algorithms Software verification Where any control software is modified or downloaded onto the player s terminal the following requirements shall be met: The system responsible for the software upload must be capable of verifying that all control programs installed are true and exact replications of those communicated to the device in order to ensure game integrity. Where any error is detected an appropriate action must be taken to either remedy the fault or disable the game. There are sufficient security measures to ensure that any control software residing on 3

4 the player s terminal remain true and exact replications of those communicated to the device Remote access and audit requirements Where the player terminal has the facility for remote access for the purpose of control software modifications, deletions, additions or product support, the following shall be met: There shall be sufficient security measures to prohibit non-authorised access. An audit log of the following should be retained for a minimum of twelve months a) Log on name; b) Time and date the connection was made; c) Game program ID numbers added, changed, or deleted; d) Duration of connection; e) The player terminal(s) which the game program was downloaded to and the program it replaced or amended (if applicable); f) Packet size(s) of data uploaded and downloaded; g) List of game directories and/or operational parameters modified; and h) Any non authorised access attempted (or successful). The upload facilitator or operator should also keep records for a minimum of 12 months detailing specific areas accessed and changes that were made and the reason for doing so. The audit log(s) and any applicable records should be available for inspection Pay table/denomination configuration changes Player terminal control programs that offer multiple pay tables and/or denominations that can be configured via an external communication must comply with the following: a) Information relating to the player s likely return (%RTP) must be transparent to the player for the pay table in operation and in particular where any changes occur at times when the system is available for play. b) The game is in an idle state when any update occurs; and c) Any change to the pay table will not cause inaccurate crediting or payment External random number generator Where a random value or other element used to determine the game outcome is uploaded to the player terminal from a device external to its cabinet by means of communication then it shall comply with the following: a) The method of transmission shall be secure, employing Data Encryption Standards (DES) or equivalent; b) There shall be a means of authentication which would alert the operator to any external tampering, modification or interception and replacement of the transmitted random variable that may be used to determine a game outcome; c) Where an error occurs the terminal must display an error message with the appropriate audio and visual indicator, and record the details, including time and date of the error in a log. Correcting such an error shall require operator intervention unless there is a secure automated process to do so; and d) An audit log of the following should be retained for a minimum of one month: Sufficient time stamping of significant events so as to be able to resolve any player disputes arising as a result of timing issues. For example: i) Time stamp of final stake being placed within the game. ii) Time stamp as to when winning determinant(s) was received by 4

5 terminal. iii) Time stamp of point within the game at which no more stakes can be placed. iv) Time stamp of any warnings given that no more stakes would be accepted. Winning determinant as displayed to the player (if presented differently to that received from external source) Total stake including any combinations placed with sufficient information to be able to determine win/loss from winning determinant. The audit log should be available for inspection on request. The Commission does not intend to set out exact requirements for time stamping of significant events as it is considered better that the manufacturer do so on the basis of the overall system design. Section 11: Wireless Network Systems 14. Our priority in setting standards for wireless network systems (communication between devices using radio waves) is to ensure game integrity, fairness and transparency. We have therefore required that such devices be limited to use where they are operationally reliable as described in sections We have set minimum requirements for instances where network failures occur (section 11.2) with a view to protecting the player s interests but do not intend to prescribe as to how operators should deal with voided games. Operators should make it transparent to the player prior to the use of such devices as to how voided games will be dealt with. We have again set a requirement for a secure means to transmit data, section 11.3, but have not stated how this should be achieved for same reasons previously given. 16. Section 11.4 requires that the player is able to determine the time available for play (battery life or other power source) for transparency purposes and section 11.5 requires audit information, again to ensure game fairness where disputes or other non-compliance issues arise WIRELESS NETWORK SYSTEMS 11.1 Network Coverage If a gaming machine is designed to allow players to participate using a wireless network the following shall be complied with: a) Unless denoted by clear signage there shall be no areas where players may participate in any gambling using such a device where the communication signal is; i) Not available ii) Of poor quality such that interruptions in play would be likely b) There shall be adequate wireless coverage so that the failure of a single transmitter does not significantly reduce the players ability to participate in gambling Network Failure Where a network failure occurs: a) The device shall alert the player within 10 seconds of it occurring. It is permissible for the device to continue with any gambling if the network connection is restored provided 5

6 that the player is not disadvantaged in any way. b) A manual alternative method of play (e.g. keying in game outcome or other element as opposed to an automatic download via wireless network) is permissible where there is no disadvantage to the player and that there is adequate time to do so. Catch up facilities (e.g. button pressed to bring device up to current position within game) may only be used where the game in which the credit was taken has not been completed. The Commission does not intend to set any rules pertaining to voided games as a result of communication loss or other device malfunctions as it is expected that the operator will do so in their terms and conditions which should be transparent to the player prior to its use Communication requirements All protocols must use communication techniques that have proper error detection and/or recovery mechanisms which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with secure seeds or algorithms Power level display requirements Portable devices should ensure that players have adequate information as to the likely battery life (preferably in hours/minutes) and give additional warnings when this reaches a low level (e.g. 10 minutes charge remaining) Audit requirements An audit log of the following should be retained for a minimum of one month: Sufficient time stamping of significant events so as to be able to resolve any player disputes arising as a result of timing issues. For example: i) Time stamp of final stake being placed within the game. ii) Time stamp as to when winning determinant(s) was received by terminal. iii) Time stamp of point within the game at which no more stakes can be placed. iv) Time stamp of any warnings given that no more stakes would be accepted. Winning determinant as displayed to the player (if presented differently to that received from external source). Total stake including any combinations placed with sufficient information to be able to determine win/loss from winning determinant(s). The audit log should be available for inspection on request. The Commission does not intend to set out exact requirements for time stamping of significant events as it is considered better that the manufacturer do so on the basis of the overall system design. Section 12: Cashless Payment Systems 17. This section covers cashless payment systems such as smart cards. We have included a general statement on what the Commission considers to be a cashless system (section 6

7 12.1). This excludes ticket in and out systems (TITO) and tokens, as these forms of payment are covered in our earlier consultation document. We propose to require that funds on a smart card or other payment systems can be retrieved at any time if they have not been committed to play (section 12.2) and also that the customer should have easy access to information about the funds on their card. 18. We have also included in sections 12.4 to 12.6 additional requirements that would allow the player to set deposit limits and track the amount they are spending. The player will also be able to self exclude and the card or other payment mechanism must not be able to credit a gaming machine during a self-exclusion period. Technical Standard provision All categories of gaming machine 12.0 Cashless payment system requirements 12.1 General statement Where the gaming machine has the facility to take credit and make payment to the same medium (e.g. smartcard) then the requirements of this section must be complied with. TITO systems (ticket in and out) and tokens are not required to comply with this section. The term token for the purpose of this section refers to an object with a fixed monetary value, usually exchanged for cash that may be used for the purpose of crediting the gaming machine Cashing out The player shall have the facility to cash out in full all non-committed funds to the medium from which they originated, where capacity allows. The system may allow the player to cash out a portion of the funds held on the machine if they so choose, but they should always be given the option to cash out in full Viewing funds held A facility must be available on the premises which will show the player their current monetary balance held on the medium without the requirement to transfer funds or a game having to be played. Such a facility shall not offer any inducements to the player to commit money for play or further play Self exclusion The player shall have the opportunity to be able to self exclude from machine gaming at any reasonable time. A gaming machine shall not accept funds from a medium where the account holder has self excluded themselves Reversal of self exclusion For a gaming machine to accept funds from a medium where the player has self excluded shall require an action by the site operator. It shall not be possible to reverse a decision by the player to self exclude within the agreed period of self-exclusion. (The minimum period for selfexclusion is set out in the relevant operator s Licence Conditions and Codes of Practice.) 12.6 Deposit Limits The player shall have the facility to track and/or limit the amount of money they are able to deposit onto the medium over a given period of time. The limit that the individual chooses to impose may only be set or modified once in any 24 hour period. 7

8 Next Steps 19. We are currently considering the responses which we have received in relation to our earlier Gaming Machine Technical Standards Consultation. During October, we intend to hold several seminars to discuss the issues raised during the consultation - and will invite representatives from each of the relevant trade associations and other bodies with an interest in machine technical standards to attend. We intend to issue a final consolidated version of the standards, including the sections in our earlier consultation and those set out in this paper, in November. 20. We will also be working further on the testing procedures that will apply to various categories of machine and back office systems and will issue a separate consultation on those processes later in the year. 21. It is intended that compliance with the Commission s technical standards will be a requirement for all new machines from 1 September In our earlier consultation, we received responses to indicate that it would be extremely difficult and costly for machines that exist in the market currently to be brought into line with all aspects of these standards. We are therefore in the process of identifying any areas with which all machines, including legacy machines, should be required to comply from September We may allow a reasonable period for machines in the market to be adapted or replaced to comply with other areas relating to the standards. We will discuss these issues with the industry. Responses to this document and further information 22. For more information on the Commission, including on licence conditions and codes of practice, please visit This consultation paper is seen as supplementary to our main consultations. It is aimed at a specialist audience, exploring specific technical issues arising form the main consultation. Therefore the consultation period for this paper will be six weeks. The consultation period for this document will close on 27 October Please send your comments to consultation@gamblingcommission.gov.uk, or by post to: Consultation Coordinator Gambling Commission Victoria Square House Victoria Square Birmingham B2 4BP T F E consultation@gamblingcommission.gov.uk Gambling Commission, September

Bingo and Casino Equipment Technical Requirements

Bingo and Casino Equipment Technical Requirements Bingo and Casino Equipment Technical Requirements July 2008 Contents Introduction 4 PART I - Casino Equipment Technical Requirements Game requirements 5 Speed of play Display of information on players

More information

Bingo and casino equipment technical requirements and related issues

Bingo and casino equipment technical requirements and related issues Bingo and casino equipment technical requirements and related issues Consultation Paper, April 2007 Contents Introduction and layout of this document 3 Introduction 3 Background and context 3 The Commission

More information

Machine Standards Non-Complex Category D

Machine Standards Non-Complex Category D Machine Standards Non-Complex Category D June 2007 Contents Introduction 3 Other relevant gaming machine technical standards 3 The Gambling Commission s approach 4 Definition of non-complex gaming machines

More information

Testing strategy for compliance with remote gambling and software technical standards. First published August 2009

Testing strategy for compliance with remote gambling and software technical standards. First published August 2009 Testing strategy for compliance with remote gambling and software technical standards First published August 2009 Updated July 2015 1 Introduction 1.1 Sections 89 and 97 of the Gambling Act 2005 enable

More information

Gaming Machine Type I Gaming Machine Type II

Gaming Machine Type I Gaming Machine Type II Licence Conditions and Codes of Practice applicable to: Gaming Machine Type I Gaming Machine Type II February 2010 Your licence is subject to certain conditions and codes of practice, these are detailed

More information

Machine Standards Category B3, B4, C & D (Legacy machines)

Machine Standards Category B3, B4, C & D (Legacy machines) Machine Standards Category B3, B4, C & D (Legacy machines) June 2007 Contents Introduction 3 Other Applicable Documents 3 Section 1 Key points 4 Section 2 Live jackpots 5 Section 3 Displays 6 Percentage

More information

How To Know If Bingo Is Gambling

How To Know If Bingo Is Gambling What constitutes bingo? Advice note, January 2014 1 Summary 1.1 Bingo is a traditional form of gambling that has seen considerable innovation in recent years. It is also the only form of gambling recognised

More information

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences

Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences Security audit advice For holders of all remote gambling operator licences including specified remote lottery licences July 2015 1 Introduction 1.1 This July 2015 advice is updated from the previously

More information

1.3 If you are responding on behalf of an organisation, please indicate which type of organisation:

1.3 If you are responding on behalf of an organisation, please indicate which type of organisation: Proposed amendments to the social responsibility provisions in the licence conditions and codes of practice for all operators (the LCCP) Consultation responses template: summer 2014 LCCP 14/20 1.1 This

More information

What is gambling software?

What is gambling software? What is gambling software? Advice, June 2014 1 Introduction/background 1.1 The Gambling Commission (the Commission) recently published Licence conditions and codes of practice (consolidated version) May

More information

Betting: advice for remote, non-remote and betting intermediaries Advice note

Betting: advice for remote, non-remote and betting intermediaries Advice note Betting: advice for remote, non-remote and betting intermediaries Advice note October 2013 (updated October 2014) 1 Summary 1.1 This advice note explains the approach adopted by the Gambling Commission

More information

Trade Up CASINO BETTING RULEBOOK

Trade Up CASINO BETTING RULEBOOK Trade Up CASINO BETTING RULEBOOK 2 SPORTS ROOM: 08000 526 575/ +44 (0) 1727 895 090 CONTENTS Page 4 Page 4 Page 4 Page 5 Page 6 Page 6 Page 6 Page 7 Page 7 1. Introduction 2. Transfer of Funds 3. Prohibited

More information

Customer funds: segregation, disclosure to customers and reporting requirements

Customer funds: segregation, disclosure to customers and reporting requirements Customer funds: segregation, disclosure to customers and reporting requirements Ratings system and advice note for operators January 2016 * 1 Introduction 1.1 This note: sets out the Gambling Commission

More information

Licence conditions and codes of practice. February 2015 (Updated April 2015)

Licence conditions and codes of practice. February 2015 (Updated April 2015) Licence conditions and codes of practice February 2015 (Updated April 2015) Contents If using an electronic version of this document, please click on the headings to move to the relevant section or provision.

More information

Remote gambling equipment Guidance note

Remote gambling equipment Guidance note Remote gambling equipment Guidance note March 2008 (updated October 2014) 1 Introduction 1.1 This document sets out our interpretation of which elements of a gambling system will meet the definition of

More information

Casino gaming reserve

Casino gaming reserve Casino gaming reserve Consultation, May 2009 1 Introduction 1.1 The Gambling Commission (the Commission) included in its Licence Conditions and Codes of Practice (LCCP) a requirement that all casino operators

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

543.7 What are the minimum internal control standards for bingo?

543.7 What are the minimum internal control standards for bingo? Bingo Purpose This section provides guidance on the development of internal controls, policies, and procedures for the operation of bingo. It has been compiled by tribal regulators, Class II gaming operators,

More information

STANDARD SERIES GLI-18: Promotional Systems in Casinos. Version: 2.1

STANDARD SERIES GLI-18: Promotional Systems in Casinos. Version: 2.1 STANDARD SERIES GLI-18: Promotional Systems in Casinos Version: 2.1 Release Date: This Page Intentionally Left Blank ABOUT THIS STANDARD This Standard has been produced by Gaming Laboratories International,

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

CyberSource Payment Security. with PCI DSS Tokenization Guidelines CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Briefing note on the national online self-exclusion scheme

Briefing note on the national online self-exclusion scheme Briefing note on the national online self-exclusion scheme May 2015 Contents 1 Introduction 2 Background 3 Draft architecture 4 Costs and funding 5 Next steps 2 2 5 11 12 Annex A Working group membership/attendees

More information

CHAPTER 466b. SLOT COMPUTER SYSTEMS TECHNICAL STANDARD

CHAPTER 466b. SLOT COMPUTER SYSTEMS TECHNICAL STANDARD CHAPTER 466b. SLOT COMPUTER SYSTEMS TECHNICAL STANDARD 466b.1. Slot computer systems. (a) Definitions. The following words and terms, when used in this chapter, have the following meanings, unless the

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

STATUTORY INSTRUMENTS 2012 No. _

STATUTORY INSTRUMENTS 2012 No. _ STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION

More information

Approval of test houses Application form guidance notes

Approval of test houses Application form guidance notes Approval of test houses Application form guidance notes Introduction This guidance has been written to help you complete the application form GCTHA and the annex GCTHA/AA. Please read this document carefully

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

MEDIA BINGO TERMS AND CONDITIONS

MEDIA BINGO TERMS AND CONDITIONS MEDIA BINGO TERMS AND CONDITIONS SASKATCHEWAN LIQUOR AND GAMING AUTHORITY Media Bingo - Terms and Conditions TABLE OF CONTENTS Section Page 1. Definitions...1 2. General...2 3. Joint Operations...3 4.

More information

RULES AND REGULATIONS TITLE 58. RECREATION PENNSYLVANIA GAMING CONTROL BOARD. [58 PA. CODE CHS 441 and 463] PREAMBLE

RULES AND REGULATIONS TITLE 58. RECREATION PENNSYLVANIA GAMING CONTROL BOARD. [58 PA. CODE CHS 441 and 463] PREAMBLE RULES AND REGULATIONS TITLE 58. RECREATION PENNSYLVANIA GAMING CONTROL BOARD [58 PA. CODE CHS 441 and 463] PREAMBLE The Pennsylvania Gaming Control Board (Board), under authority in 4 Pa.C.S. 1202 (relating

More information

Standard conditions of the Electricity Distribution Licence

Standard conditions of the Electricity Distribution Licence Gas and Electricity Markets Authority ELECTRICITY ACT 1989 Standard conditions of the Electricity Distribution Licence Standard conditions of the Electricity Distribution Licence 30 October 2015 SECTION

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

ILLINOIS GAMING BOARD MINIMUM INTERNAL CONTROL STANDARDS SECTION A - GENERAL AND ADMINISTRATIVE TABLE OF CONTENTS

ILLINOIS GAMING BOARD MINIMUM INTERNAL CONTROL STANDARDS SECTION A - GENERAL AND ADMINISTRATIVE TABLE OF CONTENTS TABLE OF CONTENTS General A-1 Management Information System (MIS) A-2 Remote Access A-4 Voucher System Security A-6 Problem and Underage Gambling A-8 Property Based Self-Exclusion Program A-8 IGB Statewide

More information

How To Monitor A Municipality

How To Monitor A Municipality UMHLABUYALINGANA MUNICIPALITY ACTIVITY MONITORING POLICY AND PROCEDURE Activity Monitoring Policy and Procedure Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator

More information

Kinetic Internet Limited

Kinetic Internet Limited Kinetic Internet Limited Company No: 4470080 ADDENDUM Dedicated Server Terms and Conditions KINETIC INTERNET is an International Communications company that provides Dedicated Server services. The customer

More information

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 This Microsoft privacy statement sets out how your personal information is used by Vodafone in connection with the provision of the Microsoft

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

G4 Responsible e-gambling Code of Practice Version G02/20130214

G4 Responsible e-gambling Code of Practice Version G02/20130214 G4 Responsible e-gambling Code of Practice Version G02/20130214 1 Index Introduction 1. Responsible e-gambling Code of Practice page 3 2. e-gambling Company s Mission Statement page 3 3. Corporate Standards

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Promoting society and local authority lotteries

Promoting society and local authority lotteries Promoting society and local authority lotteries Advice for society and local authority lotteries which require a licence or registration September 2014 1 Introduction 1.1 Lotteries are illegal unless they

More information

INTEGRITY CERTIFICATION REQUIREMENTS: CENTRAL SYSTEMS FOR SLOT MACHINES

INTEGRITY CERTIFICATION REQUIREMENTS: CENTRAL SYSTEMS FOR SLOT MACHINES INTEGRITY CERTIFICATION REQUIREMENTS: CENTRAL SYSTEMS FOR SLOT MACHINES INTRODUCTION 8 BACKGROUND 8 PURPOSE 8 GENERAL 8 1.1 OWNERSHIP AND CONTROL OF TECHNICAL GAMING INTEGRITY DOCUMENT 8 1.1.1 DOCUMENT

More information

Social Responsibility in Gambling

Social Responsibility in Gambling Social Responsibility in Gambling Introduction The Air Ambulance Service (TAAS) operates a lottery to help raise funds to support its Hems Operations. The charity is committed to ensuring that each lottery

More information

Gambling Protections and Controls. April 2014

Gambling Protections and Controls. April 2014 Gambling Protections and Controls April 2014 Foreword The 2005 Gambling Act was introduced by the then Government with the aim of liberalising the gambling market in Great Britain. Nearly seven years on

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

TRUE TITLE BEST PRACTICES

TRUE TITLE BEST PRACTICES TRUE TITLE BEST PRACTICES Mission Statement The American Land Title Association (ALTA) seeks to guide its membership on best practices to protect consumers, promote quality service, provide for ongoing

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7 Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance ADVANCED INTERNET TECHNOLOGIES, INC. https://www.ait.com Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance Table of Contents Introduction... 2 Encryption and Protection

More information

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text)

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text) On basis of article 153 of the National Assembly of Slovenia Rules of Procedure the National Assembly of the Republic

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Social Responsibility in Gambling

Social Responsibility in Gambling Social Responsibility in Gambling Introduction Wiltshire Air Ambulance Charitable Trust operates a lottery to help raise funds to support its Hems Operations. The charity is committed to ensuring that

More information

Review of remote casino, betting and bingo regulatory return and gambling software regulatory return. Consultation document

Review of remote casino, betting and bingo regulatory return and gambling software regulatory return. Consultation document Review of remote casino, betting and bingo regulatory return and gambling software regulatory return Consultation document October 2013 Contents 1 Introduction 3 2 Background and context 5 3 Reasons for

More information

Service Level Agreement (SLA) Arcplace Backup Enterprise Service

Service Level Agreement (SLA) Arcplace Backup Enterprise Service (SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise

More information

Vehicle Tracking System,

Vehicle Tracking System, Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT

VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT CD/14/448293 VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT February 2015 Version 1.0 Table of Contents 1 GLOSSARY...7 2 FOREWORD...14 2.1 Pre-commitment framework...14 3 INTRODUCTION...15 3.1 General

More information

ACT GAMBLING AND RACING COMMISSION

ACT GAMBLING AND RACING COMMISSION ACT GAMBLING AND RACING COMMISSION Review of the Gambling and Racing Control (Code of Practice) Regulation 2002 Paper October 2012 Contents 1. Introduction... 3 2. Scope of the Review... 4 3. Requirements

More information

The Gambling Act 2005 received Royal Assent in April 2005.

The Gambling Act 2005 received Royal Assent in April 2005. Gambling Act 2005 and the Gambling Commission The questions, answers and notes below attempt to address potential concerns that may arise from the change in legislation. A great deal of the details of

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Guidance for Industry Computerized Systems Used in Clinical Investigations

Guidance for Industry Computerized Systems Used in Clinical Investigations Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance

More information

G4 Responsible Casino Code of Practice Version G02/20130214

G4 Responsible Casino Code of Practice Version G02/20130214 G4 Responsible Casino Code of Practice Version G02/20130214 1 Index Introduction 1. Casino Code of Practice page 3 2. Casino Company s Mission Statement page 3 3. Corporate Standards page 4 3.1 Licensing

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

SafeNet Authentication Manager Express. Upgrade Instructions All versions

SafeNet Authentication Manager Express. Upgrade Instructions All versions SafeNet Authentication Manager Express Upgrade Instructions All versions www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 www.safenet-inc.com

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

Information Crib Sheet Internet Access Service Agreement

Information Crib Sheet Internet Access Service Agreement Information Crib Sheet Internet Access Service Agreement 1. Definitions and Interpretation This Service Agreement is to be read in conjunction with the Conditions for Communications Services (the Conditions

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0 Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

ELECTRONIC PULL-TAB GAME SYSTEM STANDARDS AND REQUIREMENTS. Checklist. Manufacturing standards for the design and manufacture of:

ELECTRONIC PULL-TAB GAME SYSTEM STANDARDS AND REQUIREMENTS. Checklist. Manufacturing standards for the design and manufacture of: Gambling Control Suite 300 South 1711 West County Rd B Roseville MN 55113 651-539-1900 Minnesota Gambling Control Board ELECTRONIC PULL-TAB GAME SYSTEM STANDARDS AND REQUIREMENTS Checklist Manufacturing

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: pharma.aud@siemens.com Fax: +49

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1 Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations

More information

Lotteries and the Law (Gambling Act 2005)

Lotteries and the Law (Gambling Act 2005) Lotteries and the Law (Gambling Act 2005) Advice for society and local authority lotteries, May 2007 1 Introduction 1.1 This advice provides a general guide to the main principles and requirements of lotteries

More information

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. VOID WHERE PROHIBITED.

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. VOID WHERE PROHIBITED. OFFICIAL RULES FAMOUS AMOS 40 TH BIRTHDAY TEXT-TO-WIN GAME NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. VOID WHERE PROHIBITED. 1. PROMOTION DESCRIPTION.

More information

Maryland Department of Aging

Maryland Department of Aging Audit Report Maryland Department of Aging March 2011 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up correspondence are available

More information

"Broadband Voice Telephone Adapter" a broadband voice telephone adapter or BT Voyager 220V which may be bought from BT.

Broadband Voice Telephone Adapter a broadband voice telephone adapter or BT Voyager 220V which may be bought from BT. Terms and Conditions 1. Definitions 2. Providing the Service 3. Managing the Service 4. Monitoring Calls 5. Customer Equipment 6. Misusing the Service 7. Security 8. Intellectual Property Rights 9. Intellectual

More information

Cathay Business Online Banking

Cathay Business Online Banking Cathay Business Online Banking A QUICK GUIDE TO CATHAY BUSINESS ONLINE BANKING R6119 CATHAY 8_5x11 Cover V2.indd 1 6/11/13 5:50 PM Welcome Welcome to Cathay Business Online Banking (formerly known as Cathay

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information