Technical dialogue regarding forensic data analysis software
|
|
- Byron Wilcox
- 8 years ago
- Views:
Transcription
1 31 January 2014 File ref.: SOK Case officer: OKA001 STATE PROSECUTOR FOR SERIOUS ECONOMIC AND INTERNATIONAL CRIME Kampmannsgade 1 DK-1604 Copenhagen V Tel.: OKA001@politi.dk Web: Technical dialogue regarding forensic data analysis software
2 Contents 1. Purpose of conducting a technical dialogue About the State Prosecutor for Serious Economic and International Crime Current state of forensic data analysis at SØIK Conducting the technical dialogue Themes The supplier s presentation Formalities Invitation to participate in the technical dialogue Preclusive time limit for requests to participate Selection criteria Technical dialogue dates Procedure for the technical dialogue Rights and obligations Appendix... 8 Page 1 of 8
3 1. Purpose of conducting a technical dialogue The State Prosecutor for Serious Economic and International Crime (SØIK) wants to conduct a technical dialogue with relevant market players to gain insight into the conditions of the market for forensic data analysis software. This will enable the State Prosecutor to make a decision regarding the most practical way to invite tenders for forensic data analysis software with a view to achieving good competitive exposure as well as market-consistent services and contract terms. In other words, the technical dialogue will form the basis for decisions about the key planning elements of an upcoming invitation to tender for forensic data analysis software and provide inspiration for the most expedient invitation process, with related commercial conditions, to secure the most attractive deliverables and stable commercial terms for SØIK. 2. About the State Prosecutor for Serious Economic and International Crime The State Prosecutor for Serious Economic and International Crime (SØIK) is a unit of the Danish Prosecution Service, and its main duties are investigating and prosecuting cases concerning serious economic crime. Specifically, these are suspected cases of economic crime: of significant scope, as part of organised crime, using peculiar business methods or that otherwise are of a particularly qualified nature. Secondly, SØIK handles international criminal cases, particularly genocide, crimes against humanity, war crimes and other serious crime committed abroad whose investigation and criminal prosecution require: specialised knowledge and insight into conditions abroad and the establishment of collaboration with authorities, institutions, organisations, etc, in other countries. As well as specific criminal cases, SØIK is also involved in preparatory legislative and international work, and its duties furthermore include: Receipt and analysis of reports about money laundering and the financing of terrorism Tracking, recovery and confiscation of proceeds from crime Initial review of criminal cases, including reports about intellectual rights infringements. SØIK staff consist of legal staff, police officers, special advisors with a financial background, analysts and administrative assistants, a total of 124 people. Of these, approx are expected to be required to use the forensic data analysis software. All users are expected to work from the State Prosecutor s offices in Copenhagen. SØIK works with a number of authorities including the National Police Service, SKAT (the Danish tax authority), the Danish Competition and Consumer Authority, and the Financial Supervisory Authority. Page 2 of 8
4 3. Current state of forensic data analysis at SØIK IT material required for the investigation of criminal cases at SØIK is acquired through searches, requests for disclosure of documents or provided in connection with crimes reported by individuals or authorities. SØIK actively collects evidence material (data) via the National Police High Tech Crime Centre (NITES), which forensically images all data on storage media selected by SØIK investigators. Such media include single computers, networks, smartphones, USB keys, CDs, etc. The forensic imaging process secures active data, deleted data, operating systems, log files, programs and activities carried out by active and former users without changing the data. NITES uses the EnCase forensic imaging system. Imaging takes place on site, and quality control normally also takes place on site, because EnCase validates whether the imaged data are identical with the original data before the data securing process is considered concluded. NITES secures data on separate, wiped hard disks that are re-copied onto other hard disks for use by SØIK as working copies. SØIK carries out all subsequent IT material processing on a working copy. The original image is kept for reference on a back-up tape, in case of any later doubt regarding the data or allegations of subsequent changes. EnCase analysis is used for investigating files from computers. The program filters operating systems, programs and file types for subsequent indexation of all humanly created files from all imaged computers in the same case. Using various forms of software, investigators can search accessible files across the imaged computers by search words and other parameters. The search results can be opened, reviewed and manually printed with a source reference. The subsequent image data processing consists of four elements: filtration, indexation, search and presentation. The processing is done on large desktop computers unconnected to a network. For security reasons, the computers used for investigation are stand-alone machines and thus not exposed to malicious code (virus, spyware, etc). SØIK uses commercially available standard tools for data searches and indexation. In future, NITES is also expected to supply data in Guidance Software EnCase 6 and 7 format. It is also expected that it must be possible to input data from the Danish Competition and Consumer Authority, which uses AccessData Forensic Toolkit. 4. Conducting the technical dialogue The technical dialogue will be conducted as meetings between SØIK and relevant suppliers. One supplier only will attend each meeting, and one meeting only will be held with each supplier. The meetings will have a maximum duration of one hour. Representatives from SØIK and the Government s Legal Advisor will take part in the meetings. The meetings will also be attended by Deloitte, which will assist SØIK with planning and conducting the invitation to tender for forensic data analysis software. The format of the technical dialogue will consist of the supplier s oral presentation of a written proposal based on the information and themes outlined in the following. Page 3 of 8
5 In its presentation, the supplier is expected to compare SØIK with other relevant and comparable customers and describe its acquired experience. The supplier is also expected to relate this experience to general market trends and to explain the commercial and technical risks that commonly arise in comparable projects. 4.1 Themes During the technical dialogue, SØIK wants to hear the supplier s viewpoints on the following themes: Contract and licence terms Delivery models Payment models System flexibility Other matters. The themes will be elaborated on below. Contract and licence terms The State Prosecutor for Serious Economic and International Crime wants a contract based on on stable, transparent licence and contract terms. In principle, tenderers will be expected to use a standard K02 contract 1 with related appendices. The supplier s view on which equipment and licence ownership models are most advantageous for SØIK. The supplier s view on the risks in the K02 contract. The supplier s view on the risks in the appendices to the K02 contract. Any general reservations the supplier may have regarding the K02 contract with appendices. A proposed alternative to the contract form if the supplier has reservations regarding K02. Delivery models SØIK is seeking a delivery model that allows it to install and operate the forensic data analysis software inhouse. The software is expected to work without external ties on SØIK s closed network. The future supplier is also expected to assist with solution configuration and support. Which delivery models can the supplier offer (eg, local installation, cloud, on-demand)? The supplier s views on delivery models which, from experience, should be considered for closer assessment with a view to achieving a more cost-efficient and market-consistent product. Which delivery model does the supplier recommend? What requirements does the delivery model recommended by the supplier make on SØIK s infrastructure or network? What type of consultancy service (eg, in connection with installation and configuration) can the supplier offer? 1 Standard contract for long-term IT projects (in Danish): Standardkontrakt-for-laengerevarende-it-projekter. In English: Standardkontrakt-for-laengerevarende-it-projekter/Engelsk-version-af-K02. Page 4 of 8
6 Which support and maintenance delivery models, possibly including on-site support, can the supplier offer? Which support and maintenance delivery model would the supplier recommend? What type of system training and instruction can the supplier offer? Payment models The State Prosecutor for Serious Economic and International Crime wants a contract based on a transparent payment model in which the price units and discount structures will match the supplier s actual cost-drivers in order to obtain an attractive price, for example, by minimising the supplier s risks?. The supplier s proposals for relevant payment models and actual cost-drivers, including the price units and discount structures that will best match the supplier s true cost structure. The number of users is expected to rise during the term of the contract, and it is similarly expected that external data access will eventually be granted to other authorities or defence attorneys in specific cases. The supplier s proposals for relevant payment models that best match the expected increase in users. The supplier s proposals for relevant payment models that best match the anticipated granting of access to external parties. SØIK also wishes to benefit from technological developments during the term of the contract, for example, in the form of new versions and releases. How does the supplier propose to ensure that SØIK can benefit from technological developments during the term of the contract? System flexibility Data input to the solution is currently expected to be in the form of EnCase or FTK (Forensic Toolkit) files. However, the solution must accommodate the need to support a broader range of file and data types in future. Are there any limitations on the file types supported by the supplier s solution? How are search data results displayed? Does the supplier s solution support the display of accounts, database tables/sources and similar? What possibilities exist for indexation and searches for/in image, sound and video files? Are there any limitations on data volumes or similar in the supplier s solution? What possibilities does the solution offer for securing physical documents (eg, by scanning)? Can the supplier s solution support encrypted file input? If so, which encryption forms are supported? What general skills are users of the solution required to have? Does the supplier s solution require additional user and skills profiles? The supplier s general proposals for optimal data security and indexation procedures, etc, in the solution. Other matters Page 5 of 8
7 SØIK would like to achieve good competitive exposure for the tendering for forensic data analysis software, as well as contract terms and services that are as market consistent as possible and support positive and efficient collaboration with the supplier, requesting The supplier s input to the process, time schedule, etc., for an invitation to tender for forensic data analysis software. The supplier s other views on matters of relevance for an upcoming invitation to tender, including relevant experience positive as well as negative from other tendering procedures of which SØIK should be aware. 4.2 The supplier s presentation The presentation should be organised according to the following structure: Contract and licence terms Delivery models Payment models System flexibility Other matters. Since a maximum of one hour has been assigned per supplier, the supplier s oral presentation of the written proposal may last no longer than 45 minutes to enable SØIK to use the remaining time to ask questions about the supplier s presentation. SØIK has listed the themes in order of priority. If a supplier does not cover all the themes in its 45-minute oral presentation, SØIK will find information itself about the other themes in the written proposal. It should be emphasised that SØIK does not want a general presentation of the supplier s company, business concept, etc. SØIK wants the technical dialogue to focus consistently on the inspiration that the supplier can provide for an upcoming invitation to tender for forensic data analysis software for SØIK. 5. Formalities 5.1 Invitation to participate in the technical dialogue This invitation to participate in the technical dialogue was sent electronically to the Official Journal of the European Union on 11. February 2014 as a prior information notice. This material was published on 11. February 2014 on Preclusive time limit for requests to participate Suppliers must register their request for participation in the technical dialogue by 2 pm (14.00) on Thursday 27 February 2014 at the latest by to saoek@ankl.dk Suppliers must submit a completed Appendix 1 along with their requests for participation. Page 6 of 8
8 Requests received after expiry of the deadline f requests not accompanied by a completed Appendix 1 will not be considered. 5.3 Selection criteria SØIK hopes to conduct a technical dialogue with a maximum of five relevant suppliers. If SØIK receives more than five requests, it reserves the right to select the suppliers with which it wishes to conduct a technical dialogue. In such an event, suppliers will be selected on the basis of the following prioritised selection criteria: Experience with performing comparable supplies Revenue generated by comparable contracts with public authorities within the latest financial year available, depending on when the supplier was established or started its business, if these revenue figures are available. Suppliers must complete the enclosed Appendix 1 and forward it when requesting participation; see item Technical dialogue dates The technical dialogue round will be held in the period from Monday 3 March to Friday 7 March, both dates inclusive. SØIK has reserved the following meeting times: Monday 3 March Tuesday 4 March Wednesday 5 March Thursday 6 March Friday 7 March The meeting times will be allocated as follows: The first supplier who requests participation in a technical dialogue has the first option of selecting a meeting time from the above list, and so on, provided the supplier in question is selected to take part in the technical dialogue. Suppliers should indicate their preferred meeting times, in order of priority, in Appendix 1. All times are given in Danish local time, CET (UTC+01:00). The meetings will be held at the offices of the State Prosecutor for Serious Economic and International Crime, Kampmannsgade 1, DK-1604 Copenhagen V. However, the meetings can be held as videoconferences if the supplier so requests. The meetings will be held in Danish, Norwegian, Swedish or English. Page 7 of 8
9 5.5 Procedure for the technical dialogue At the meeting, the supplier will present its written proposal, structured according to item 4.2. SØIK would prefer that the supplier forward its presentation at the latest at 10 am on the day before the technical dialogue with the supplier concerned to the address given in item 4.2. The forwarded presentation must be in PDF format. In addition, the supplier must forward the material in MS Office format on a USB key or via . The material may be prepared in Danish or English. 5.6 Rights and obligations SØIK reserves the right to use the information that may come to its knowledge in connection with the technical dialogue procedure. The information may be used in connection with SØIK s preparation of the set of tender documents. 6. Appendix Appendix 1 Form to be used for submitting information about the supplier; see item 5.2. Page 8 of 8
Digital Forensics Services
Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together
More informationEC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More information1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.
Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security
More informationINVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA
6 th October 2014 Dear Sir/Ma, INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA Computer Forensics Institute, Nigeria
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationPolicies and Procedures. Policy on the Use of Portable Storage Devices
Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy
More informationINVITATION TO TENDER FOR SO16649 DEBT MANAGEMENT FUNCTIONAL DESIGN PRINCIPLES, STANDARDS AND MEASURES, AND DEBT LANDSCAPE
INVITATION TO TENDER FOR SO16649 DEBT MANAGEMENT FUNCTIONAL DESIGN PRINCIPLES, STANDARDS AND MEASURES, AND DEBT LANDSCAPE Version 1.0 Date: 8 th February 2016 Author: Harbinder Manku CONTENTS 1. INTRODUCTION...
More informationBACKUP AND RECOVERY PLAN MS SQL SERVER
BUREAU OF INFORMATION & TELECOMMUNICATIONS BACKUP AND RECOVERY PLAN MS SQL SERVER Page 1 of 5 Revisions & Addendums Log: Instructions: Changes and Addendum can be sent to: James R. Douglas, Technical Analyst
More informationAstaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
More informationATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD
ATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD A FOREWORD A1. These Guidelines set out a process by which a prosecutor may discuss an allegation of serious or complex
More informationGuidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
More informationAdvanced Digital Forensics ITP 475 (4 Units)
Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming
More informationManaged Exchange. Access secure email from any Internet connection in the world
Managed Exchange Access secure email from any Internet connection in the world Business grade email capabilities: Increased security against viruses and hackers Ability to access your email from any web
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationIT Data Security Policy
IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...
More informationHygienic Engineering and Contamination Control
High Level International Advanced Course Hygienic Engineering and Contamination Control - for the food and pharmaceutical industry as well as equipment manufacturers Place DTU Hygienic Design Centre, National
More informationCloud computing and the legal framework
Cloud computing and the legal framework - Guidance on legislative requirement and the contractual environment related to cloud computing Content 1. Introduction 3 2. The Danish Act on Processing of Personal
More informationBACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN
BACKUP SOLUTIONS FOR SCHOOLS Advice and Guidance ICT Services 42 New Union Street Coventry CV1 2HN Revision History and Approval Date Author Version Comments Approval 26/02/2014 Alison York 1.00 Initial
More informationTerms and conditions for the invitation by the Danish Emergency Management Agency to submit tenders for a contract concerning the purchase of a mass
Terms and conditions for the invitation by the Danish Emergency Management Agency to submit tenders for a contract concerning the purchase of a mass spectrometer system 1 May 2014 Table of contents 1.
More informationSecondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS
1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,
More informationGuideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
More informationBOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy
BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationEXAMS. EXAMS Time: The Business Plan. Time and - Place What to submit and when Evaluation Principles Presentation Exam Plan
EXAMS Time and - Place What to submit and when Evaluation Principles Presentation Exam Plan EXAMS Time: Thursday 18. December from 08:00 a.m. Friday 19. December from 08:00 am Location: Building 424, room
More informationMOCK TRIAL WORKSHOP 18-22 February 2013 Hotel Srbija, Svetosavski trg 12, Vršac AGENDA
Project against Money Laundering and Terrorist Financing in Serbia MOLI Serbia MOCK TRIAL WORKSHOP 18-22 February 2013 Hotel Srbija, Svetosavski trg 12, Vršac AGENDA 18 February 2013 - Monday 10.00-10.45
More informationCase study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
More informationCyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
More informationKeepit starter guide
Keepit starter guide Contents Getting started page 3 Regarding transfer times page 3 About the encryption key page 3 If you lose your encryption key page 3 Backing up your data page 4 Restoring your files
More informationHow To Protect Research Data From Being Compromised
University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...
More informationSafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.
SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the
More informationSPECIFIC RESPONSIBILITIES:
Job Description POST: RESPONSIBLE TO: Senior 3rd Line Server and Systems Engineer Senior Engineering Team Leader SALARY: 39,069-42,672 (SCP 41-45, Inner London Scale) per annum + Expenses + Local Government
More information1. Backup and Recovery Policy
POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer
More informationICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
More informationNOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)
Service Level Agreement between the Association of Chief Police Officers (ACPO) and the Internet Watch Foundation (IWF) 1 Sections 1. Parties to the Agreement 2. Introduction 3. Purpose of the Agreement
More informationG-Cloud 6 Service Definition DCG Cloud Backup Service
G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6, Service Description, DCG Cloud Backup Service Page 1 of 16 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W:
More informationXIT CLOUD SOLUTIONS LIMITED
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More information2,000,000 files on 240 computers in 3 countries. By Monday. How?*
e-discovery Services 2,000,000 files on 240 computers in 3 countries. By Monday. How?* *connectedthinking With dedicated forensic labs in Zurich and Lausanne, our Swiss team of skilled professionals have
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
More informationContract Appendix 7 Operation, Support and Maintenance Services
Contract Appendix 7 Operation, Support and Maintenance Services [Instructions for the Supplier when submitting a tender This Appendix includes UCN's requirements for the Supplier's Operation, Support and
More informationDigital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
More informationHow To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
More informationWebnet2000 DataCentre
Webnet2000 DataCentre WEBNET2000 have been enabling organisations develop their Internet presence for over 10 Years. The Webnet2000 Datacentre features the very latest world class resilient infrastructure,
More informationPolicy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media
Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationMonitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationTELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
More information2) applied methods and means of authorisation and procedures connected with their management and use;
Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.
More informationICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT
POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationInvitation to Tender for 3VA
Invitation to Tender for 3VA Offers are invited for supply of the goods/services detailed below. Offers must be submitted via email to adam.chugg@3va.org.uk no later than 5.00pm on 17th September 2015.
More informationVersion: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationCloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
More informationIT Data Backup Policy
IT Data Backup Policy TABLE OF CONTENTS 1. Purpose and Intention of the Policy... 2 2. Definitions of concepts... 2 3. Legislative Authority... 2 4. Scope... 3 5. responsibilty... 3 6. Frequency of data
More informationGuidelines for Industrial PhD In force as of 9 March 2015
Guidelines for Industrial PhD In force as of 9 March 2015 Contents 1. What is an Industrial PhD?... 1 2. General conditions... 3 3. Entry requirements... 4 4. Application... 7 5. Decision on applications...
More informationData Security and Data Protection
Most companies are totally reliant on information stored on their PCs, Laptops and Networks. If plant machinery stops working it can be replaced without too much inconvenience. If a computer stops working
More informationBACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationUniversity of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
More informationJOB DESCRIPTION. Financial Services and Support. Lead Service Desk Analyst
a JOB DESCRIPTION Job Title: Division: Department/Region/Section: Location: Reports to: Responsible for: Grade: Service Desk Analyst Financial Services and Support Information Systems & Support HQ, Southwater
More informationCLOUD ATTACHED STORAGE. Protect your data, protect your business
CLOUD ATTACHED STORAGE Protect your data, protect your business CONTENTS Introduction 3 Data The Life Blood of a Business 3 Sharing, Synchronising and Securing Data 4 Cloud-Based Solutions 5 The Role of
More informationAdlib Hosting - Service Level Agreement
Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities
More informationCJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013
More informationSynergy Controller Cloud Storage Features and Benefits
Synergy Controller Cloud Storage Features and Benefits The exploding popularity of cloud based data storage and application services is a direct result of the benefits they provide in virtually all business
More informationCHAPTER 9 System Backup and Restoration, Disk Cloning
CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the
More informationVideo surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
More informationState of Montana Montana Board of Crime Control. Agency IT Plan Fiscal Year 2012-2017
State of Montana Montana Board of Crime Control Agency IT Plan Fiscal Year 2012-2017 Prepared July 2012 Brooke Marshall, Executive Director Jerry Kozak, IT Manager Board of Crime Control 5 S Last Chance
More informationHow To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
More informationSTAFF VACANCIES Ref. 1527TAAST4
2 October 2015 STAFF VACANCIES Ref. 1527TAAST4 The European Insurance and Occupational Pensions Authority (EIOPA) is currently inviting applications for a position as IT Specialist for its Headquarters
More informationCOUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationSummary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
More informationADDITIONAL CONTRACTUAL TERMS RELATING TO THE PROVISION OF MANAGED SERVICES
ADDITIONAL CONTRACTUAL TERMS RELATING TO THE PROVISION OF MANAGED SERVICES ACT Document Version: 3.0 Customer Document Version: 1.0 Issue Date: XXXXXX COMMERCIAL IN CONFIDENCE Please replace this image
More informationCaedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
More informationUsing Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.
Using Enterprise Content Management Principles to Manage Research Assets Kelly Mannix, Manager Deloitte Consulting Perth, WA November 2010 Agenda Introduction Defining ECM Understanding the Challenges
More informationInformation Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
More informationSecurity and Computer Forensics ITP 477 (4 Units)
Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,
More informationhttps://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
More informationCode of Practice for Access to Council Meetings and Documents
Code of Practice for Access to Council Meetings and Documents Policy Type: Responsible Department: Responsible Officer: Related Policies and Procedures Council Policy Office of the Chief Executive Officer
More informationDATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
More informationChapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
More informationCyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
More informationInvitation to Quote for GHG Reporting Consultancy Support
Invitation to Quote for GHG Reporting Consultancy Support Contents: Subject Page Introduction 2 About ENWORKS 2 The ENWORKS Online Resource Efficiency Toolkit 3 Objectives 3 Brief 3 Application 5 Evaluation
More informationIT Support for London
IT Support for London London Systems IT Support Your Helpdesk What s included; We are your IT Department, we are at the end of a phone to listen and work with you to resolve the situation no matter where
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationWEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
More informationCOVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
More informationSpillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...
More informationInvitation to Tender
Invitation to Tender Provision of Training in Technology Transfer and Related Areas for The Southern Africa Innovation Support Programme 1. Drawing up the tender The tender must be submitted in writing
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationTransport for London. INVITATION TO TENDER FOR BRIDGE DESIGN CONSULTANCY SERVICES ITT REF: TfL/90711 PUBLICATION DATE: 13 FEBRUARY 2013
Transport for London INVITATION TO TENDER FOR BRIDGE DESIGN CONSULTANCY SERVICES ITT REF: TfL/90711 PUBLICATION DATE: 13 FEBRUARY 2013 Invitation to Tender TfL/90711 Bridge Design Consultancy Services
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationThank you for your interest in a Police Staff position with Avon and Somerset Constabulary. Please find attached:
Dear Applicant Police Headquarters PO Box 37, Valley Road Portishead, Bristol, BS20 8QJ Telephone: 01275 816351 Facsimile: 01275 816124 Email: recruitment@avonandsomerset.police.uk Office hours 08:30 17:00
More informationWhite Paper: Efficient Management of Cloud Resources
White Paper: 215, Cloud Point ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties whatsoever including
More informationGrow your business - with social collaboration] Minimise TCO - Maximise revenue growth
Grow your business - with social collaboration] Minimise TCO - Maximise revenue growth Projectplace mission Projectplace helps IT decision-makers leverage and expand their business, and turn it into a
More information