Industry Partnership Agreement (I-PA) Between the. NATO Communications and Information Agency (NCI Agency) And. [name of Industry Partner]

Size: px
Start display at page:

Download "Industry Partnership Agreement (I-PA) Between the. NATO Communications and Information Agency (NCI Agency) And. [name of Industry Partner]"

Transcription

1 Industry Partnership Agreement (I-PA) Between the NATO Communications and Information Agency (NCI Agency) And [name of Industry Partner] On Cyber Security Information Sharing Effective date: 8 April 2014 Revision No: Rev 1

2 Change History Revision Number Date Change Original October 2013 Rev 1 April 1014 Changed Ref b.

3 This Industry Partnership Agreement is entered into between The NATO Communications and Information Organisation represented by the NATO Communications and Information Agency (NCI Agency) with headquarters at Boulevard Leopold III, B-1110 Brussels, Belgium and [full details of industry partner] relating to Cyber Security Information Sharing at the Technical Level. References: a) NATO Guidelines on Cyber Security Information Sharing at the Technical Level, dated 1 October 2013; b) The Management of Non-Classified NATO Information, C-M(2002)60; c) Council Decision on the Establishment of the NATO Communications and Information Organisation (C-M(2012)0049-AS1), dated 13 June Scope and purpose The Participants intend to share Information within the voluntary bilateral Cyber Information Sharing Programme which allows NATO Industry Partners and NATO to share cyber security Information in order to mutually enhance situational awareness and the protection of their networks and systems. The purpose of this Industry Partnership Agreement (I-PA) is to specify the procedures, the Information sharing principles, the confidentiality measures to protect the exchanged Information and the points of contact authorised to share Information. 2. Acceptance of the NATO Guidelines on Cyber Security Information Sharing The Participants agree that the NATO Guidelines on Cyber Security Information Sharing at the Technical Level (ref. a) ( Guidelines ) form the basis for their participation in the Programme and that the clauses outlined in the Guidelines apply in their entirety and will take precedence in case of inconsistency between the two texts. 1

4 3. Points of Contact (1) Only the following Points of Contact are authorised to exchange Information relevant to the Programme: a. For the NCI Agency: Primary point of contact: Chris Evis Head, Incident Management Section NATO Computer Incident Response Capability Technical Centre NIATC, NCI Agency b. The Partner s primary POC for participation in the Programme: [include] Further company representatives authorised to communicate under this Programme. [include] 4. Information Sharing The principles set out in the Guidelines will apply to the sharing of Information under the Programme. 5. General provisions (1) Participants will conduct their activities under this Programme in accordance with applicable laws and regulations, including restrictions on the interception, monitoring, access, use, and disclosure of electronic communications or data. Participants bear responsibility for their own actions under this Programme. (2) Nothing in this Programme is intended to abrogate NATO s or the Partner s rights or obligations regarding the handling, safeguarding, sharing, or reporting of Information (whether classified or not), or regarding any physical, personnel, or other security requirements, as required by law, regulation, policy, or a valid legal contractual obligation. 6. Termination (1) Partners and the NCI Agency may unilaterally limit or discontinue participation in the Programme at any time. Shared Information cannot be reclaimed. However, termination shall not relieve the Partners or NCI Agency of obligations to protect against the unauthorised use or disclosure of Information exchanged under this Programme. 2

5 Signed in duplicate, in the English language For the NATO Communications and Information Agency (NCI Agency) For [partner] Name Title NCI Agency Name Title [partner] Date: Date: 3

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines NATO Communications and Information Agency (NCI Agency) - Industry Cyber Security Information Sharing at the Technical Level Guidelines Effective date: 28 March 2014 Revision No: Rev 1 Change History Revision

More information

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents

More information

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures General Register Office for Scotland information about Scotland s people Paper NHSCR GB 5/07 NHSCR s quality assurance procedures November 2007 NHSCR SCOTLAND INFORMATION GOVERNANCE STANDARDS Author: Muriel

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

APRA and PHIAC - Interdependence

APRA and PHIAC - Interdependence Memorandum of Understanding between PRIVATE HEALTH INSURANCE ADMINISTRATION COUNCIL and AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY 2 MEMORANDUM OF UNDERSTANDING BETWEEN THE AUSTRALIAN PRUDENTIAL REGULATION

More information

Information security policy

Information security policy Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current

More information

EA-ISP-001 Information Security Policy

EA-ISP-001 Information Security Policy Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

NHS Business Services Authority Information Security Policy

NHS Business Services Authority Information Security Policy NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA

More information

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:

Viva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of: SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a

More information

Information Governance Plan

Information Governance Plan Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 00658/13/EN WP 204 Explanatory Document on the Processor Binding Corporate Rules Adopted on 19 April 2013 This Working Party was set up under Article 29 of Directive

More information

ESTRO PRIVACY AND DATA SECURITY NOTICE

ESTRO PRIVACY AND DATA SECURITY NOTICE ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted

More information

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

Policies and Procedures. Policy on the Use of Portable Storage Devices

Policies and Procedures. Policy on the Use of Portable Storage Devices Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy

More information

Vacancy Number: B11/0610. Post Number: OSC BCC 0020. Job Title: Assistant (Procurement) NATO Grade: B-5

Vacancy Number: B11/0610. Post Number: OSC BCC 0020. Job Title: Assistant (Procurement) NATO Grade: B-5 Vacancy Number: B11/0610 Post Number: OSC BCC 0020 Job Title: Assistant (Procurement) NATO Grade: B-5 Basic Monthly Salary (12 x per year): 3.809,30, tax free Closing Date: 22 November 2010 GENERAL BACKGROUND:

More information

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation

More information

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) (NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Cloud Governance is more than Security. Cloud Law or Legal Cloud?

Cloud Governance is more than Security. Cloud Law or Legal Cloud? more than Security Cloud Law or Legal Cloud? more than Security Governance principles more than Security Governance principles 1. Context definition Which organisation/ structure? Which roles and responsibilities?

More information

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions Document Control Table Document Title: Author(s) (name, job title and Division): Version Number: Document Status: Date Approved: Approved By: Effective Date: Date of Next Review: Superseded Version: Data

More information

3 August 2012 Policy updated to reflect name changes and alignment with current Aurora Energy Group Policy standards.

3 August 2012 Policy updated to reflect name changes and alignment with current Aurora Energy Group Policy standards. Aurora Energy Risk Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 0 19/11/98 Risk Management Policy Prepared by: Manager Internal Audit 1 March 2007 Risk Management Policy

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Recognizing that Canada and Iceland share common interests as North Atlantic countries and members of NATO, and

Recognizing that Canada and Iceland share common interests as North Atlantic countries and members of NATO, and MEMORANDUM OF UNDERSTANDING BETWEEN THE MINISTRY FOR FOREIGN AFFAIRS OF ICELAND AND THE DEPARTMENT OF NATIONAL DEFENCE OF CANADA CONCERNING DEFENCE COOPERATION 1/6 1. Introduction 1.1 The Ministry for

More information

TERMS OF USE FOR DNBL portal

TERMS OF USE FOR DNBL portal TERMS OF USE FOR DNBL portal User Terms of Use (UToU) Edition 1.0 Table of Contents 1. Introduction... 2 2. Acceptance of User Terms of Use (UToU)... 2 3. Definitions... 3 4. User Terms of Use (UToU)...

More information

Shareholder Communications Policy (v2.0)

Shareholder Communications Policy (v2.0) Shareholder Communications Policy (v2.0) Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1.0 June 2010 First version Board, June 2010 1.1 Nov 2014 Incorporate new requirements Reflect new Retail

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE

INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE CHARTERED INSTITUTE OF INTERNAL AUDIT DEFINITION OF INTERNAL AUDIT Internal auditing is an independent, objective assurance and consulting activity designed

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994

BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

National Certificate in Community and Workplace Fire and Emergency Management (Level 2)

National Certificate in Community and Workplace Fire and Emergency Management (Level 2) NZQF NQ Ref 0910 Version 3 Page 1 of 7 National Certificate in Community and Workplace Fire and Emergency Management (Level 2) Level 2 Credits 44 This qualification has been reviewed. The last date to

More information

MEMORANDUM OF UNDERSTANDING

MEMORANDUM OF UNDERSTANDING MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN

More information

COMMERCIALISM INTEGRITY STEWARDSHIP. Policy and Procedure for Remote Working

COMMERCIALISM INTEGRITY STEWARDSHIP. Policy and Procedure for Remote Working Policy and Procedure for Remote Working Remote Working Contents 1. Aim and purpose 1 2. General Principles 2 3. Legislation 2 4. Requesting to work remotely 2 5. Approving requests for working remotely

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

This qualification is expiring. The last date to meet the requirements is 31 December 2019.

This qualification is expiring. The last date to meet the requirements is 31 December 2019. NZQF NQ Ref 0776 Version 5 Page 1 of 5 National Certificate in Credit Management (Level 4) Level 4 Credits 45 This qualification is expiring. The last date to meet the requirements is 31 December 2019.

More information

COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY AND ITS MEMBER STATES AND UKRAINE

COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY AND ITS MEMBER STATES AND UKRAINE 85 der Beilagen XXIII. GP - Staatsvertrag - 04 Vertragstext englisch - EN (Normativer Teil) 1 von 21 COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY

More information

Unit: CPC 506 Secure financial resources for your organisation s plans (Commissioning, Procurement and Contracting)

Unit: CPC 506 Secure financial resources for your organisation s plans (Commissioning, Procurement and Contracting) Unit: CPC 506 Secure financial resources for your organisation s plans (Commissioning, Procurement and Contracting) Key Purpose The key purpose identified for those working in commissioning, procurement

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

National Certificate in Work and Community Skills (Supported Learning)

National Certificate in Work and Community Skills (Supported Learning) NZQF NQ Ref 0853 Version 4 Page 1 of 5 National Certificate in Work and Community Skills (Supported Learning) Level 1 Credits 40 This qualification has been reviewed. The last date to meet the requirements

More information

[SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.

[SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services. Attachment #1 [SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) 239.9900 Scope of subpart. (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Issues and Recommendations following feedback from and discussion among EARTO members

Issues and Recommendations following feedback from and discussion among EARTO members Contracting and Financial Management in FP7 Research for SME Associations Research for SMEs Issues and Recommendations following feedback from and discussion among EARTO members The FP7 SME instruments

More information

Company Agreement for airline services

Company Agreement for airline services Company Agreement for airline services Between The Customer And Scandinavian Airlines System Denmark-Norway-Sweden 1 Contents 1 Company Agreement for airline services...3 1.1 Content and scope of the Agreement...3

More information

A Question of Balance

A Question of Balance A Question of Balance Independent Assurance of Information Governance Returns Audit Requirement Sheets Contents Scope 4 How to use the audit requirement sheets 4 Evidence 5 Sources of assurance 5 What

More information

NATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND

NATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND HEADQUARTERS, SUPREME ALLIED COMMANDER TRANSFORMATION AS WELL AS SUPREME HEADQUARTERS ALLIED POWERS EUROPE REGARDING

More information

Council of the European Union Brussels, 26 June 2015 (OR. en)

Council of the European Union Brussels, 26 June 2015 (OR. en) Council of the European Union Brussels, 26 June 2015 (OR. en) Interinstitutional File: 2012/0011 (COD) 9985/1/15 REV 1 LIMITE DATAPROTECT 103 JAI 465 MI 402 DIGIT 52 DAPIX 100 FREMP 138 COMIX 281 CODEC

More information

TABLE OF CONTENTS 1. PARTICIPATION BY THE JRC...4 2. INTERNATIONAL ORGANISATIONS (GENERAL RULE)...4

TABLE OF CONTENTS 1. PARTICIPATION BY THE JRC...4 2. INTERNATIONAL ORGANISATIONS (GENERAL RULE)...4 LIST OF ALL SPECIAL CLAUSES APPLICABLE TO THE FP7 MODEL GRANT AGREEMENT FOR THE IMPLEMENTATION OF THE SEVENTH FRAMEWORK PROGRAMMES OF THE EUROPEAN UNION AND EURATOM TABLE OF CONTENTS 1. PARTICIPATION BY

More information

COMMISSION REGULATION (EU) No /.. of XXX

COMMISSION REGULATION (EU) No /.. of XXX EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy

More information

Website terms and conditions

Website terms and conditions Website terms and conditions Thank you for visiting our website. Before you go any further, it is important that you read and understand the conditions under which you will be using this site. Acceptance

More information

Outsourcing Risk Guidance Note for Banks

Outsourcing Risk Guidance Note for Banks Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the

More information

INTRODUCTION 1 STRUCTURE AND APPROACH 1 CONTEXT AND PURPOSE 2 STATEMENT OF PURPOSE 3

INTRODUCTION 1 STRUCTURE AND APPROACH 1 CONTEXT AND PURPOSE 2 STATEMENT OF PURPOSE 3 June 2007 Table of Contents INTRODUCTION 1 STRUCTURE AND APPROACH 1 CONTEXT AND PURPOSE 2 STATEMENT OF PURPOSE 3 3 Standard 1: Statement of purpose 3 Standard 2: Written guide to the adoption service for

More information

INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS

INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS EFFECTIVE 1 JANUARY 2012 TABLE OF CONTENTS INTRODUCTION... 2 Professional Financial Advice... 2 The Six-Step Process... 2 The Core Components...

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

INFORMATION SECURITY PROCEDURES

INFORMATION SECURITY PROCEDURES INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures

More information

INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY]

INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY] 2012 MODEL STC AGREEMENT INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY] AS THE STATE TRANSMISSION/TRANSFER COMPONENT

More information

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION Find A PR agency Terms and Conditions for Clients 1 Introduction 1.1 Find A PR agency is the PRCA s impartial search and referral service for organisations

More information

Information Governance Policy

Information Governance Policy Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its

More information

The eighth data protection principle and international data transfers

The eighth data protection principle and international data transfers Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed

More information

RESTREINT UE/EU RESTRICTED

RESTREINT UE/EU RESTRICTED COUNCIL OF THE EUROPEAN UNION Brussels, 9 April 2014 8761/14 RESTREINT UE/EU RESTRICTED JAI 220 USA 9 DATAPROTECT 56 RELEX 319 NOTE from : Commission Services to : JHA Counsellors No. prev. doc. : 5999/12

More information

How To Use Nordea Internet And Telephone Banking

How To Use Nordea Internet And Telephone Banking TERMS AND CONDITIONS OF INTERNET AND TELEPHONE BANKING SERVICES FOR PRIVATE CUSTOMERS Effective as of 2014-07-10 1. DEFINITIONS 1.1. Terms and Conditions these Terms and Conditions of Internet and Telephone

More information

COMMISSION REGULATION (EU)

COMMISSION REGULATION (EU) L 122/22 Official Journal of the European Union 11.5.2011 COMMISSION REGULATION (EU) No 445/2011 of 10 May 2011 on a system of certification of entities in charge of maintenance for freight wagons and

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY RECORDS MANAGEMENT POLICY APPROVED BY GOVERNING BODY ON 2 APRIL 2009 INTRODUCTION What are Records? Records are documents created, used and maintained for business reasons.

More information

The Hongkong and Shanghai Banking Corporation Limited ("the Bank") MAJOR TERMS AND CONDITIONS OF BUSINESS CARD PROGRAMME AGREEMENT (THE "AGREEMENT") The significant liabilities and obligations of the Cardholder

More information

The EBF would like to take the opportunity to note few general remarks on key issues as follows:

The EBF would like to take the opportunity to note few general remarks on key issues as follows: Ref.:EBF_001314 Brussels, 17 June 2013 Launched in 1960, the European Banking Federation is the voice of the European banking sector from the European Union and European Free Trade Association countries.

More information

Safe and secure use of personal health information

Safe and secure use of personal health information Safe and secure use of personal health information Who is this leaflet for? This leaflet is for anyone who uses any of the services provided by the NHS in Scotland. It has been produced by Health Protection

More information

An Overview. September 2011

An Overview. September 2011 An Overview September 2011 September 2011 Insights into IFRS: An overview 1 INSIGHTS INTO IFRS: AN OVERVIEW Insights into IFRS: An overview brings together all of the individual overview sections from

More information

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the

More information

LAW ON FOREIGN EXCHANGE OPERATIONS

LAW ON FOREIGN EXCHANGE OPERATIONS LAW ON FOREIGN EXCHANGE OPERATIONS This Law shall govern: (CONSOLIDATED) 1 I. BASIC PROVISIONS Article 1 1) payments, collections and transfers between residents and non-residents in foreign means of payment

More information

How To Respect The Agreement On Trade In Cyberspace

How To Respect The Agreement On Trade In Cyberspace CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Trust Operational Policy. Information Security Department. Third Party Remote Access Policy

Trust Operational Policy. Information Security Department. Third Party Remote Access Policy Trust Operational Policy Information Security Department Policy Reference: 3631 Document Control Document Title Author/Contact Document Reference 3631 Pauline Nordoff-Tate, Information Assurance Manager

More information

NATO UNCLASSIFIED. E-mail: alain.courtois@ncia.nato.int

NATO UNCLASSIFIED. E-mail: alain.courtois@ncia.nato.int Acquisition Alain.courtois@ncia.nato.int Telephone: +32 (2) 707 8233 Fax: +32 (2) 707 8770 Notification of Intent to Call for Bids Provide Packet Transport Component- NATO COMMUNICATIONS INFRASTRUCTURE

More information

HACKED: Data Breach Scenario

HACKED: Data Breach Scenario HACKED: Data Breach Scenario John McCabe SVP & Chief Operating Officer, Liberty International Underwriters Andrew Methven Risk & Assurance Manager, City of Sydney Joe Perricone Experienced Chief Information

More information

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.

More information

Council of the European Union Brussels, 5 March 2015 (OR. en)

Council of the European Union Brussels, 5 March 2015 (OR. en) Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:

More information

SPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011

SPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011 SPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011 DEFINITIONS : Cloud: Technology that uses remote resources and storage. Host Server: Physical Server with a memory load and a processor load.

More information

High Assurance Overall, very good management of risk. An effective control environment appears to be in operation.

High Assurance Overall, very good management of risk. An effective control environment appears to be in operation. ANNEX 1 AUDITS COMPLETED AND REPORTS ISSUED The following categories of opinion are used for audit reports. Level of High Overall, very good management of risk. An effective control environment appears

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Appendix, Definition of Roles and Terms, to Policy for IT Security. Date of publication November 2014 (rev. June 2012)

Appendix, Definition of Roles and Terms, to Policy for IT Security. Date of publication November 2014 (rev. June 2012) Division of Buildings and Services GOVERNING DOCUMENT Leif Bouvin 24-11-2014 ref. no. A2014/853 031 789 58 98 Appendix, Definition of Roles and Terms, to Policy for IT Security Date of publication November

More information

National Certificate in Credit Administration (Credit Control) (Level 3)

National Certificate in Credit Administration (Credit Control) (Level 3) NZQF NQ Ref 1189 Version 4 Page 1 of 5 National Certificate in Credit Administration (Credit Control) (Level 3) Level 3 Credits 55 This qualification has been reviewed. The last date to meet the requirements

More information

CLIENT / PROJECT MANAGER AGREEMENT

CLIENT / PROJECT MANAGER AGREEMENT Authorship of this work is claimed by The Association of Construction Project Managers and any unauthorised reproduction constitutes an infringement in terms of the Copyright Act No 98 of 1978. CLIENT

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing

More information

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.

More information

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law

More information

Lancashire County Council Information Governance Framework

Lancashire County Council Information Governance Framework Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information