Technical dialogue regarding forensic data analysis software

Size: px
Start display at page:

Download "Technical dialogue regarding forensic data analysis software"

Transcription

1 31 January 2014 File ref.: SOK Case officer: OKA001 STATE PROSECUTOR FOR SERIOUS ECONOMIC AND INTERNATIONAL CRIME Kampmannsgade 1 DK-1604 Copenhagen V Tel.: OKA001@politi.dk Web: Technical dialogue regarding forensic data analysis software

2 Contents 1. Purpose of conducting a technical dialogue About the State Prosecutor for Serious Economic and International Crime Current state of forensic data analysis at SØIK Conducting the technical dialogue Themes The supplier s presentation Formalities Invitation to participate in the technical dialogue Preclusive time limit for requests to participate Selection criteria Technical dialogue dates Procedure for the technical dialogue Rights and obligations Appendix... 8 Page 1 of 8

3 1. Purpose of conducting a technical dialogue The State Prosecutor for Serious Economic and International Crime (SØIK) wants to conduct a technical dialogue with relevant market players to gain insight into the conditions of the market for forensic data analysis software. This will enable the State Prosecutor to make a decision regarding the most practical way to invite tenders for forensic data analysis software with a view to achieving good competitive exposure as well as market-consistent services and contract terms. In other words, the technical dialogue will form the basis for decisions about the key planning elements of an upcoming invitation to tender for forensic data analysis software and provide inspiration for the most expedient invitation process, with related commercial conditions, to secure the most attractive deliverables and stable commercial terms for SØIK. 2. About the State Prosecutor for Serious Economic and International Crime The State Prosecutor for Serious Economic and International Crime (SØIK) is a unit of the Danish Prosecution Service, and its main duties are investigating and prosecuting cases concerning serious economic crime. Specifically, these are suspected cases of economic crime: of significant scope, as part of organised crime, using peculiar business methods or that otherwise are of a particularly qualified nature. Secondly, SØIK handles international criminal cases, particularly genocide, crimes against humanity, war crimes and other serious crime committed abroad whose investigation and criminal prosecution require: specialised knowledge and insight into conditions abroad and the establishment of collaboration with authorities, institutions, organisations, etc, in other countries. As well as specific criminal cases, SØIK is also involved in preparatory legislative and international work, and its duties furthermore include: Receipt and analysis of reports about money laundering and the financing of terrorism Tracking, recovery and confiscation of proceeds from crime Initial review of criminal cases, including reports about intellectual rights infringements. SØIK staff consist of legal staff, police officers, special advisors with a financial background, analysts and administrative assistants, a total of 124 people. Of these, approx are expected to be required to use the forensic data analysis software. All users are expected to work from the State Prosecutor s offices in Copenhagen. SØIK works with a number of authorities including the National Police Service, SKAT (the Danish tax authority), the Danish Competition and Consumer Authority, and the Financial Supervisory Authority. Page 2 of 8

4 3. Current state of forensic data analysis at SØIK IT material required for the investigation of criminal cases at SØIK is acquired through searches, requests for disclosure of documents or provided in connection with crimes reported by individuals or authorities. SØIK actively collects evidence material (data) via the National Police High Tech Crime Centre (NITES), which forensically images all data on storage media selected by SØIK investigators. Such media include single computers, networks, smartphones, USB keys, CDs, etc. The forensic imaging process secures active data, deleted data, operating systems, log files, programs and activities carried out by active and former users without changing the data. NITES uses the EnCase forensic imaging system. Imaging takes place on site, and quality control normally also takes place on site, because EnCase validates whether the imaged data are identical with the original data before the data securing process is considered concluded. NITES secures data on separate, wiped hard disks that are re-copied onto other hard disks for use by SØIK as working copies. SØIK carries out all subsequent IT material processing on a working copy. The original image is kept for reference on a back-up tape, in case of any later doubt regarding the data or allegations of subsequent changes. EnCase analysis is used for investigating files from computers. The program filters operating systems, programs and file types for subsequent indexation of all humanly created files from all imaged computers in the same case. Using various forms of software, investigators can search accessible files across the imaged computers by search words and other parameters. The search results can be opened, reviewed and manually printed with a source reference. The subsequent image data processing consists of four elements: filtration, indexation, search and presentation. The processing is done on large desktop computers unconnected to a network. For security reasons, the computers used for investigation are stand-alone machines and thus not exposed to malicious code (virus, spyware, etc). SØIK uses commercially available standard tools for data searches and indexation. In future, NITES is also expected to supply data in Guidance Software EnCase 6 and 7 format. It is also expected that it must be possible to input data from the Danish Competition and Consumer Authority, which uses AccessData Forensic Toolkit. 4. Conducting the technical dialogue The technical dialogue will be conducted as meetings between SØIK and relevant suppliers. One supplier only will attend each meeting, and one meeting only will be held with each supplier. The meetings will have a maximum duration of one hour. Representatives from SØIK and the Government s Legal Advisor will take part in the meetings. The meetings will also be attended by Deloitte, which will assist SØIK with planning and conducting the invitation to tender for forensic data analysis software. The format of the technical dialogue will consist of the supplier s oral presentation of a written proposal based on the information and themes outlined in the following. Page 3 of 8

5 In its presentation, the supplier is expected to compare SØIK with other relevant and comparable customers and describe its acquired experience. The supplier is also expected to relate this experience to general market trends and to explain the commercial and technical risks that commonly arise in comparable projects. 4.1 Themes During the technical dialogue, SØIK wants to hear the supplier s viewpoints on the following themes: Contract and licence terms Delivery models Payment models System flexibility Other matters. The themes will be elaborated on below. Contract and licence terms The State Prosecutor for Serious Economic and International Crime wants a contract based on on stable, transparent licence and contract terms. In principle, tenderers will be expected to use a standard K02 contract 1 with related appendices. The supplier s view on which equipment and licence ownership models are most advantageous for SØIK. The supplier s view on the risks in the K02 contract. The supplier s view on the risks in the appendices to the K02 contract. Any general reservations the supplier may have regarding the K02 contract with appendices. A proposed alternative to the contract form if the supplier has reservations regarding K02. Delivery models SØIK is seeking a delivery model that allows it to install and operate the forensic data analysis software inhouse. The software is expected to work without external ties on SØIK s closed network. The future supplier is also expected to assist with solution configuration and support. Which delivery models can the supplier offer (eg, local installation, cloud, on-demand)? The supplier s views on delivery models which, from experience, should be considered for closer assessment with a view to achieving a more cost-efficient and market-consistent product. Which delivery model does the supplier recommend? What requirements does the delivery model recommended by the supplier make on SØIK s infrastructure or network? What type of consultancy service (eg, in connection with installation and configuration) can the supplier offer? 1 Standard contract for long-term IT projects (in Danish): Standardkontrakt-for-laengerevarende-it-projekter. In English: Standardkontrakt-for-laengerevarende-it-projekter/Engelsk-version-af-K02. Page 4 of 8

6 Which support and maintenance delivery models, possibly including on-site support, can the supplier offer? Which support and maintenance delivery model would the supplier recommend? What type of system training and instruction can the supplier offer? Payment models The State Prosecutor for Serious Economic and International Crime wants a contract based on a transparent payment model in which the price units and discount structures will match the supplier s actual cost-drivers in order to obtain an attractive price, for example, by minimising the supplier s risks?. The supplier s proposals for relevant payment models and actual cost-drivers, including the price units and discount structures that will best match the supplier s true cost structure. The number of users is expected to rise during the term of the contract, and it is similarly expected that external data access will eventually be granted to other authorities or defence attorneys in specific cases. The supplier s proposals for relevant payment models that best match the expected increase in users. The supplier s proposals for relevant payment models that best match the anticipated granting of access to external parties. SØIK also wishes to benefit from technological developments during the term of the contract, for example, in the form of new versions and releases. How does the supplier propose to ensure that SØIK can benefit from technological developments during the term of the contract? System flexibility Data input to the solution is currently expected to be in the form of EnCase or FTK (Forensic Toolkit) files. However, the solution must accommodate the need to support a broader range of file and data types in future. Are there any limitations on the file types supported by the supplier s solution? How are search data results displayed? Does the supplier s solution support the display of accounts, database tables/sources and similar? What possibilities exist for indexation and searches for/in image, sound and video files? Are there any limitations on data volumes or similar in the supplier s solution? What possibilities does the solution offer for securing physical documents (eg, by scanning)? Can the supplier s solution support encrypted file input? If so, which encryption forms are supported? What general skills are users of the solution required to have? Does the supplier s solution require additional user and skills profiles? The supplier s general proposals for optimal data security and indexation procedures, etc, in the solution. Other matters Page 5 of 8

7 SØIK would like to achieve good competitive exposure for the tendering for forensic data analysis software, as well as contract terms and services that are as market consistent as possible and support positive and efficient collaboration with the supplier, requesting The supplier s input to the process, time schedule, etc., for an invitation to tender for forensic data analysis software. The supplier s other views on matters of relevance for an upcoming invitation to tender, including relevant experience positive as well as negative from other tendering procedures of which SØIK should be aware. 4.2 The supplier s presentation The presentation should be organised according to the following structure: Contract and licence terms Delivery models Payment models System flexibility Other matters. Since a maximum of one hour has been assigned per supplier, the supplier s oral presentation of the written proposal may last no longer than 45 minutes to enable SØIK to use the remaining time to ask questions about the supplier s presentation. SØIK has listed the themes in order of priority. If a supplier does not cover all the themes in its 45-minute oral presentation, SØIK will find information itself about the other themes in the written proposal. It should be emphasised that SØIK does not want a general presentation of the supplier s company, business concept, etc. SØIK wants the technical dialogue to focus consistently on the inspiration that the supplier can provide for an upcoming invitation to tender for forensic data analysis software for SØIK. 5. Formalities 5.1 Invitation to participate in the technical dialogue This invitation to participate in the technical dialogue was sent electronically to the Official Journal of the European Union on 11. February 2014 as a prior information notice. This material was published on 11. February 2014 on Preclusive time limit for requests to participate Suppliers must register their request for participation in the technical dialogue by 2 pm (14.00) on Thursday 27 February 2014 at the latest by to saoek@ankl.dk Suppliers must submit a completed Appendix 1 along with their requests for participation. Page 6 of 8

8 Requests received after expiry of the deadline f requests not accompanied by a completed Appendix 1 will not be considered. 5.3 Selection criteria SØIK hopes to conduct a technical dialogue with a maximum of five relevant suppliers. If SØIK receives more than five requests, it reserves the right to select the suppliers with which it wishes to conduct a technical dialogue. In such an event, suppliers will be selected on the basis of the following prioritised selection criteria: Experience with performing comparable supplies Revenue generated by comparable contracts with public authorities within the latest financial year available, depending on when the supplier was established or started its business, if these revenue figures are available. Suppliers must complete the enclosed Appendix 1 and forward it when requesting participation; see item Technical dialogue dates The technical dialogue round will be held in the period from Monday 3 March to Friday 7 March, both dates inclusive. SØIK has reserved the following meeting times: Monday 3 March Tuesday 4 March Wednesday 5 March Thursday 6 March Friday 7 March The meeting times will be allocated as follows: The first supplier who requests participation in a technical dialogue has the first option of selecting a meeting time from the above list, and so on, provided the supplier in question is selected to take part in the technical dialogue. Suppliers should indicate their preferred meeting times, in order of priority, in Appendix 1. All times are given in Danish local time, CET (UTC+01:00). The meetings will be held at the offices of the State Prosecutor for Serious Economic and International Crime, Kampmannsgade 1, DK-1604 Copenhagen V. However, the meetings can be held as videoconferences if the supplier so requests. The meetings will be held in Danish, Norwegian, Swedish or English. Page 7 of 8

9 5.5 Procedure for the technical dialogue At the meeting, the supplier will present its written proposal, structured according to item 4.2. SØIK would prefer that the supplier forward its presentation at the latest at 10 am on the day before the technical dialogue with the supplier concerned to the address given in item 4.2. The forwarded presentation must be in PDF format. In addition, the supplier must forward the material in MS Office format on a USB key or via . The material may be prepared in Danish or English. 5.6 Rights and obligations SØIK reserves the right to use the information that may come to its knowledge in connection with the technical dialogue procedure. The information may be used in connection with SØIK s preparation of the set of tender documents. 6. Appendix Appendix 1 Form to be used for submitting information about the supplier; see item 5.2. Page 8 of 8

Digital Forensics Services

Digital Forensics Services Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA

INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA 6 th October 2014 Dear Sir/Ma, INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA Computer Forensics Institute, Nigeria

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

Policies and Procedures. Policy on the Use of Portable Storage Devices

Policies and Procedures. Policy on the Use of Portable Storage Devices Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy

More information

INVITATION TO TENDER FOR SO16649 DEBT MANAGEMENT FUNCTIONAL DESIGN PRINCIPLES, STANDARDS AND MEASURES, AND DEBT LANDSCAPE

INVITATION TO TENDER FOR SO16649 DEBT MANAGEMENT FUNCTIONAL DESIGN PRINCIPLES, STANDARDS AND MEASURES, AND DEBT LANDSCAPE INVITATION TO TENDER FOR SO16649 DEBT MANAGEMENT FUNCTIONAL DESIGN PRINCIPLES, STANDARDS AND MEASURES, AND DEBT LANDSCAPE Version 1.0 Date: 8 th February 2016 Author: Harbinder Manku CONTENTS 1. INTRODUCTION...

More information

BACKUP AND RECOVERY PLAN MS SQL SERVER

BACKUP AND RECOVERY PLAN MS SQL SERVER BUREAU OF INFORMATION & TELECOMMUNICATIONS BACKUP AND RECOVERY PLAN MS SQL SERVER Page 1 of 5 Revisions & Addendums Log: Instructions: Changes and Addendum can be sent to: James R. Douglas, Technical Analyst

More information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"

More information

ATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD

ATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD ATTORNEY GENERAL S GUIDELINES ON PLEA DISCUSSIONS IN CASES OF SERIOUS OR COMPLEX FRAUD A FOREWORD A1. These Guidelines set out a process by which a prosecutor may discuss an allegation of serious or complex

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

Managed Exchange. Access secure email from any Internet connection in the world

Managed Exchange. Access secure email from any Internet connection in the world Managed Exchange Access secure email from any Internet connection in the world Business grade email capabilities: Increased security against viruses and hackers Ability to access your email from any web

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

IT Data Security Policy

IT Data Security Policy IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...

More information

Hygienic Engineering and Contamination Control

Hygienic Engineering and Contamination Control High Level International Advanced Course Hygienic Engineering and Contamination Control - for the food and pharmaceutical industry as well as equipment manufacturers Place DTU Hygienic Design Centre, National

More information

Cloud computing and the legal framework

Cloud computing and the legal framework Cloud computing and the legal framework - Guidance on legislative requirement and the contractual environment related to cloud computing Content 1. Introduction 3 2. The Danish Act on Processing of Personal

More information

BACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN

BACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN BACKUP SOLUTIONS FOR SCHOOLS Advice and Guidance ICT Services 42 New Union Street Coventry CV1 2HN Revision History and Approval Date Author Version Comments Approval 26/02/2014 Alison York 1.00 Initial

More information

Terms and conditions for the invitation by the Danish Emergency Management Agency to submit tenders for a contract concerning the purchase of a mass

Terms and conditions for the invitation by the Danish Emergency Management Agency to submit tenders for a contract concerning the purchase of a mass Terms and conditions for the invitation by the Danish Emergency Management Agency to submit tenders for a contract concerning the purchase of a mass spectrometer system 1 May 2014 Table of contents 1.

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

Guideline for E-mail Services

Guideline for E-mail Services Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

EXAMS. EXAMS Time: The Business Plan. Time and - Place What to submit and when Evaluation Principles Presentation Exam Plan

EXAMS. EXAMS Time: The Business Plan. Time and - Place What to submit and when Evaluation Principles Presentation Exam Plan EXAMS Time and - Place What to submit and when Evaluation Principles Presentation Exam Plan EXAMS Time: Thursday 18. December from 08:00 a.m. Friday 19. December from 08:00 am Location: Building 424, room

More information

MOCK TRIAL WORKSHOP 18-22 February 2013 Hotel Srbija, Svetosavski trg 12, Vršac AGENDA

MOCK TRIAL WORKSHOP 18-22 February 2013 Hotel Srbija, Svetosavski trg 12, Vršac AGENDA Project against Money Laundering and Terrorist Financing in Serbia MOLI Serbia MOCK TRIAL WORKSHOP 18-22 February 2013 Hotel Srbija, Svetosavski trg 12, Vršac AGENDA 18 February 2013 - Monday 10.00-10.45

More information

Case study on asset tracing

Case study on asset tracing Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Keepit starter guide

Keepit starter guide Keepit starter guide Contents Getting started page 3 Regarding transfer times page 3 About the encryption key page 3 If you lose your encryption key page 3 Backing up your data page 4 Restoring your files

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.

SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the

More information

SPECIFIC RESPONSIBILITIES:

SPECIFIC RESPONSIBILITIES: Job Description POST: RESPONSIBLE TO: Senior 3rd Line Server and Systems Engineer Senior Engineering Team Leader SALARY: 39,069-42,672 (SCP 41-45, Inner London Scale) per annum + Expenses + Local Government

More information

1. Backup and Recovery Policy

1. Backup and Recovery Policy POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO)

NOT PROTECTIVELY MARKED. Service Level Agreement between the. Association of Chief Police Officers (ACPO) Service Level Agreement between the Association of Chief Police Officers (ACPO) and the Internet Watch Foundation (IWF) 1 Sections 1. Parties to the Agreement 2. Introduction 3. Purpose of the Agreement

More information

G-Cloud 6 Service Definition DCG Cloud Backup Service

G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6, Service Description, DCG Cloud Backup Service Page 1 of 16 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W:

More information

XIT CLOUD SOLUTIONS LIMITED

XIT CLOUD SOLUTIONS LIMITED DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

2,000,000 files on 240 computers in 3 countries. By Monday. How?*

2,000,000 files on 240 computers in 3 countries. By Monday. How?* e-discovery Services 2,000,000 files on 240 computers in 3 countries. By Monday. How?* *connectedthinking With dedicated forensic labs in Zurich and Lausanne, our Swiss team of skilled professionals have

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Contract Appendix 7 Operation, Support and Maintenance Services

Contract Appendix 7 Operation, Support and Maintenance Services Contract Appendix 7 Operation, Support and Maintenance Services [Instructions for the Supplier when submitting a tender This Appendix includes UCN's requirements for the Supplier's Operation, Support and

More information

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Webnet2000 DataCentre

Webnet2000 DataCentre Webnet2000 DataCentre WEBNET2000 have been enabling organisations develop their Internet presence for over 10 Years. The Webnet2000 Datacentre features the very latest world class resilient infrastructure,

More information

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

2) applied methods and means of authorisation and procedures connected with their management and use;

2) applied methods and means of authorisation and procedures connected with their management and use; Guidelines on the way of developing the instruction specifying the method of managing the computer system used for personal data processing, with particular consideration of the information security requirements.

More information

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Invitation to Tender for 3VA

Invitation to Tender for 3VA Invitation to Tender for 3VA Offers are invited for supply of the goods/services detailed below. Offers must be submitted via email to adam.chugg@3va.org.uk no later than 5.00pm on 17th September 2015.

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document

More information

IT Data Backup Policy

IT Data Backup Policy IT Data Backup Policy TABLE OF CONTENTS 1. Purpose and Intention of the Policy... 2 2. Definitions of concepts... 2 3. Legislative Authority... 2 4. Scope... 3 5. responsibilty... 3 6. Frequency of data

More information

Guidelines for Industrial PhD In force as of 9 March 2015

Guidelines for Industrial PhD In force as of 9 March 2015 Guidelines for Industrial PhD In force as of 9 March 2015 Contents 1. What is an Industrial PhD?... 1 2. General conditions... 3 3. Entry requirements... 4 4. Application... 7 5. Decision on applications...

More information

Data Security and Data Protection

Data Security and Data Protection Most companies are totally reliant on information stored on their PCs, Laptops and Networks. If plant machinery stops working it can be replaced without too much inconvenience. If a computer stops working

More information

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

JOB DESCRIPTION. Financial Services and Support. Lead Service Desk Analyst

JOB DESCRIPTION. Financial Services and Support. Lead Service Desk Analyst a JOB DESCRIPTION Job Title: Division: Department/Region/Section: Location: Reports to: Responsible for: Grade: Service Desk Analyst Financial Services and Support Information Systems & Support HQ, Southwater

More information

CLOUD ATTACHED STORAGE. Protect your data, protect your business

CLOUD ATTACHED STORAGE. Protect your data, protect your business CLOUD ATTACHED STORAGE Protect your data, protect your business CONTENTS Introduction 3 Data The Life Blood of a Business 3 Sharing, Synchronising and Securing Data 4 Cloud-Based Solutions 5 The Role of

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

Synergy Controller Cloud Storage Features and Benefits

Synergy Controller Cloud Storage Features and Benefits Synergy Controller Cloud Storage Features and Benefits The exploding popularity of cloud based data storage and application services is a direct result of the benefits they provide in virtually all business

More information

CHAPTER 9 System Backup and Restoration, Disk Cloning

CHAPTER 9 System Backup and Restoration, Disk Cloning CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the

More information

Video surveillance policy (PUBLIC)

Video surveillance policy (PUBLIC) 29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security

More information

State of Montana Montana Board of Crime Control. Agency IT Plan Fiscal Year 2012-2017

State of Montana Montana Board of Crime Control. Agency IT Plan Fiscal Year 2012-2017 State of Montana Montana Board of Crime Control Agency IT Plan Fiscal Year 2012-2017 Prepared July 2012 Brooke Marshall, Executive Director Jerry Kozak, IT Manager Board of Crime Control 5 S Last Chance

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

STAFF VACANCIES Ref. 1527TAAST4

STAFF VACANCIES Ref. 1527TAAST4 2 October 2015 STAFF VACANCIES Ref. 1527TAAST4 The European Insurance and Occupational Pensions Authority (EIOPA) is currently inviting applications for a position as IT Specialist for its Headquarters

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

ADDITIONAL CONTRACTUAL TERMS RELATING TO THE PROVISION OF MANAGED SERVICES

ADDITIONAL CONTRACTUAL TERMS RELATING TO THE PROVISION OF MANAGED SERVICES ADDITIONAL CONTRACTUAL TERMS RELATING TO THE PROVISION OF MANAGED SERVICES ACT Document Version: 3.0 Customer Document Version: 1.0 Issue Date: XXXXXX COMMERCIAL IN CONFIDENCE Please replace this image

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA. Using Enterprise Content Management Principles to Manage Research Assets Kelly Mannix, Manager Deloitte Consulting Perth, WA November 2010 Agenda Introduction Defining ECM Understanding the Challenges

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Security and Computer Forensics ITP 477 (4 Units)

Security and Computer Forensics ITP 477 (4 Units) Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Code of Practice for Access to Council Meetings and Documents

Code of Practice for Access to Council Meetings and Documents Code of Practice for Access to Council Meetings and Documents Policy Type: Responsible Department: Responsible Officer: Related Policies and Procedures Council Policy Office of the Chief Executive Officer

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Invitation to Quote for GHG Reporting Consultancy Support

Invitation to Quote for GHG Reporting Consultancy Support Invitation to Quote for GHG Reporting Consultancy Support Contents: Subject Page Introduction 2 About ENWORKS 2 The ENWORKS Online Resource Efficiency Toolkit 3 Objectives 3 Brief 3 Application 5 Evaluation

More information

IT Support for London

IT Support for London IT Support for London London Systems IT Support Your Helpdesk What s included; We are your IT Department, we are at the end of a phone to listen and work with you to resolve the situation no matter where

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

Invitation to Tender

Invitation to Tender Invitation to Tender Provision of Training in Technology Transfer and Related Areas for The Southern Africa Innovation Support Programme 1. Drawing up the tender The tender must be submitted in writing

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Transport for London. INVITATION TO TENDER FOR BRIDGE DESIGN CONSULTANCY SERVICES ITT REF: TfL/90711 PUBLICATION DATE: 13 FEBRUARY 2013

Transport for London. INVITATION TO TENDER FOR BRIDGE DESIGN CONSULTANCY SERVICES ITT REF: TfL/90711 PUBLICATION DATE: 13 FEBRUARY 2013 Transport for London INVITATION TO TENDER FOR BRIDGE DESIGN CONSULTANCY SERVICES ITT REF: TfL/90711 PUBLICATION DATE: 13 FEBRUARY 2013 Invitation to Tender TfL/90711 Bridge Design Consultancy Services

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Thank you for your interest in a Police Staff position with Avon and Somerset Constabulary. Please find attached:

Thank you for your interest in a Police Staff position with Avon and Somerset Constabulary. Please find attached: Dear Applicant Police Headquarters PO Box 37, Valley Road Portishead, Bristol, BS20 8QJ Telephone: 01275 816351 Facsimile: 01275 816124 Email: recruitment@avonandsomerset.police.uk Office hours 08:30 17:00

More information

White Paper: Efficient Management of Cloud Resources

White Paper: Efficient Management of Cloud Resources White Paper: 215, Cloud Point ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties whatsoever including

More information

Grow your business - with social collaboration] Minimise TCO - Maximise revenue growth

Grow your business - with social collaboration] Minimise TCO - Maximise revenue growth Grow your business - with social collaboration] Minimise TCO - Maximise revenue growth Projectplace mission Projectplace helps IT decision-makers leverage and expand their business, and turn it into a

More information