Industry Partnership Agreement (I-PA) Between the. NATO Communications and Information Agency (NCI Agency) And. [name of Industry Partner]
|
|
- Karen Cobb
- 8 years ago
- Views:
Transcription
1 Industry Partnership Agreement (I-PA) Between the NATO Communications and Information Agency (NCI Agency) And [name of Industry Partner] On Cyber Security Information Sharing Effective date: 8 April 2014 Revision No: Rev 1
2 Change History Revision Number Date Change Original October 2013 Rev 1 April 1014 Changed Ref b.
3 This Industry Partnership Agreement is entered into between The NATO Communications and Information Organisation represented by the NATO Communications and Information Agency (NCI Agency) with headquarters at Boulevard Leopold III, B-1110 Brussels, Belgium and [full details of industry partner] relating to Cyber Security Information Sharing at the Technical Level. References: a) NATO Guidelines on Cyber Security Information Sharing at the Technical Level, dated 1 October 2013; b) The Management of Non-Classified NATO Information, C-M(2002)60; c) Council Decision on the Establishment of the NATO Communications and Information Organisation (C-M(2012)0049-AS1), dated 13 June Scope and purpose The Participants intend to share Information within the voluntary bilateral Cyber Information Sharing Programme which allows NATO Industry Partners and NATO to share cyber security Information in order to mutually enhance situational awareness and the protection of their networks and systems. The purpose of this Industry Partnership Agreement (I-PA) is to specify the procedures, the Information sharing principles, the confidentiality measures to protect the exchanged Information and the points of contact authorised to share Information. 2. Acceptance of the NATO Guidelines on Cyber Security Information Sharing The Participants agree that the NATO Guidelines on Cyber Security Information Sharing at the Technical Level (ref. a) ( Guidelines ) form the basis for their participation in the Programme and that the clauses outlined in the Guidelines apply in their entirety and will take precedence in case of inconsistency between the two texts. 1
4 3. Points of Contact (1) Only the following Points of Contact are authorised to exchange Information relevant to the Programme: a. For the NCI Agency: Primary point of contact: Chris Evis Head, Incident Management Section NATO Computer Incident Response Capability Technical Centre NIATC, NCI Agency b. The Partner s primary POC for participation in the Programme: [include] Further company representatives authorised to communicate under this Programme. [include] 4. Information Sharing The principles set out in the Guidelines will apply to the sharing of Information under the Programme. 5. General provisions (1) Participants will conduct their activities under this Programme in accordance with applicable laws and regulations, including restrictions on the interception, monitoring, access, use, and disclosure of electronic communications or data. Participants bear responsibility for their own actions under this Programme. (2) Nothing in this Programme is intended to abrogate NATO s or the Partner s rights or obligations regarding the handling, safeguarding, sharing, or reporting of Information (whether classified or not), or regarding any physical, personnel, or other security requirements, as required by law, regulation, policy, or a valid legal contractual obligation. 6. Termination (1) Partners and the NCI Agency may unilaterally limit or discontinue participation in the Programme at any time. Shared Information cannot be reclaimed. However, termination shall not relieve the Partners or NCI Agency of obligations to protect against the unauthorised use or disclosure of Information exchanged under this Programme. 2
5 Signed in duplicate, in the English language For the NATO Communications and Information Agency (NCI Agency) For [partner] Name Title NCI Agency Name Title [partner] Date: Date: 3
Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines
NATO Communications and Information Agency (NCI Agency) - Industry Cyber Security Information Sharing at the Technical Level Guidelines Effective date: 28 March 2014 Revision No: Rev 1 Change History Revision
More informationGeneral Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards
General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents
More informationGeneral Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures
General Register Office for Scotland information about Scotland s people Paper NHSCR GB 5/07 NHSCR s quality assurance procedures November 2007 NHSCR SCOTLAND INFORMATION GOVERNANCE STANDARDS Author: Muriel
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing
More informationAPRA and PHIAC - Interdependence
Memorandum of Understanding between PRIVATE HEALTH INSURANCE ADMINISTRATION COUNCIL and AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY 2 MEMORANDUM OF UNDERSTANDING BETWEEN THE AUSTRALIAN PRUDENTIAL REGULATION
More informationInformation security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
More informationEA-ISP-001 Information Security Policy
Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:
More informationIssue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
More informationNHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
More informationViva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:
SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a
More informationInformation Governance Plan
Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.
More informationARTICLE 29 DATA PROTECTION WORKING PARTY
ARTICLE 29 DATA PROTECTION WORKING PARTY 00658/13/EN WP 204 Explanatory Document on the Processor Binding Corporate Rules Adopted on 19 April 2013 This Working Party was set up under Article 29 of Directive
More informationESTRO PRIVACY AND DATA SECURITY NOTICE
ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted
More informationNHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
More informationINFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
More informationPolicies and Procedures. Policy on the Use of Portable Storage Devices
Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy
More informationVacancy Number: B11/0610. Post Number: OSC BCC 0020. Job Title: Assistant (Procurement) NATO Grade: B-5
Vacancy Number: B11/0610 Post Number: OSC BCC 0020 Job Title: Assistant (Procurement) NATO Grade: B-5 Basic Monthly Salary (12 x per year): 3.809,30, tax free Closing Date: 22 November 2010 GENERAL BACKGROUND:
More information005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation
More information(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of
More informationCloud Governance is more than Security. Cloud Law or Legal Cloud?
more than Security Cloud Law or Legal Cloud? more than Security Governance principles more than Security Governance principles 1. Context definition Which organisation/ structure? Which roles and responsibilities?
More informationData Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions
Document Control Table Document Title: Author(s) (name, job title and Division): Version Number: Document Status: Date Approved: Approved By: Effective Date: Date of Next Review: Superseded Version: Data
More information3 August 2012 Policy updated to reflect name changes and alignment with current Aurora Energy Group Policy standards.
Aurora Energy Risk Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 0 19/11/98 Risk Management Policy Prepared by: Manager Internal Audit 1 March 2007 Risk Management Policy
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationNATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security
1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West
More informationREPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationRecognizing that Canada and Iceland share common interests as North Atlantic countries and members of NATO, and
MEMORANDUM OF UNDERSTANDING BETWEEN THE MINISTRY FOR FOREIGN AFFAIRS OF ICELAND AND THE DEPARTMENT OF NATIONAL DEFENCE OF CANADA CONCERNING DEFENCE COOPERATION 1/6 1. Introduction 1.1 The Ministry for
More informationTERMS OF USE FOR DNBL portal
TERMS OF USE FOR DNBL portal User Terms of Use (UToU) Edition 1.0 Table of Contents 1. Introduction... 2 2. Acceptance of User Terms of Use (UToU)... 2 3. Definitions... 3 4. User Terms of Use (UToU)...
More informationShareholder Communications Policy (v2.0)
Shareholder Communications Policy (v2.0) Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1.0 June 2010 First version Board, June 2010 1.1 Nov 2014 Incorporate new requirements Reflect new Retail
More informationHarper Adams University College. Information Security Policy
Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting
More informationINTERNAL AUDIT CHARTER AND TERMS OF REFERENCE
INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE CHARTERED INSTITUTE OF INTERNAL AUDIT DEFINITION OF INTERNAL AUDIT Internal auditing is an independent, objective assurance and consulting activity designed
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationBANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
More informationCorporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
More informationNational Certificate in Community and Workplace Fire and Emergency Management (Level 2)
NZQF NQ Ref 0910 Version 3 Page 1 of 7 National Certificate in Community and Workplace Fire and Emergency Management (Level 2) Level 2 Credits 44 This qualification has been reviewed. The last date to
More informationMEMORANDUM OF UNDERSTANDING
MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN
More informationCOMMERCIALISM INTEGRITY STEWARDSHIP. Policy and Procedure for Remote Working
Policy and Procedure for Remote Working Remote Working Contents 1. Aim and purpose 1 2. General Principles 2 3. Legislation 2 4. Requesting to work remotely 2 5. Approving requests for working remotely
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationThis qualification is expiring. The last date to meet the requirements is 31 December 2019.
NZQF NQ Ref 0776 Version 5 Page 1 of 5 National Certificate in Credit Management (Level 4) Level 4 Credits 45 This qualification is expiring. The last date to meet the requirements is 31 December 2019.
More informationCOOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY AND ITS MEMBER STATES AND UKRAINE
85 der Beilagen XXIII. GP - Staatsvertrag - 04 Vertragstext englisch - EN (Normativer Teil) 1 von 21 COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY
More informationUnit: CPC 506 Secure financial resources for your organisation s plans (Commissioning, Procurement and Contracting)
Unit: CPC 506 Secure financial resources for your organisation s plans (Commissioning, Procurement and Contracting) Key Purpose The key purpose identified for those working in commissioning, procurement
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing
More informationNational Certificate in Work and Community Skills (Supported Learning)
NZQF NQ Ref 0853 Version 4 Page 1 of 5 National Certificate in Work and Community Skills (Supported Learning) Level 1 Credits 40 This qualification has been reviewed. The last date to meet the requirements
More information[SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
Attachment #1 [SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) 239.9900 Scope of subpart. (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
More informationTitle: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
More informationIssues and Recommendations following feedback from and discussion among EARTO members
Contracting and Financial Management in FP7 Research for SME Associations Research for SMEs Issues and Recommendations following feedback from and discussion among EARTO members The FP7 SME instruments
More informationCompany Agreement for airline services
Company Agreement for airline services Between The Customer And Scandinavian Airlines System Denmark-Norway-Sweden 1 Contents 1 Company Agreement for airline services...3 1.1 Content and scope of the Agreement...3
More informationA Question of Balance
A Question of Balance Independent Assurance of Information Governance Returns Audit Requirement Sheets Contents Scope 4 How to use the audit requirement sheets 4 Evidence 5 Sources of assurance 5 What
More informationNATO UNCLASSIFIED Releasable to the Public MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND
MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE GOVERNMENT OF THE REPUBLIC OF FINLAND AND HEADQUARTERS, SUPREME ALLIED COMMANDER TRANSFORMATION AS WELL AS SUPREME HEADQUARTERS ALLIED POWERS EUROPE REGARDING
More informationCouncil of the European Union Brussels, 26 June 2015 (OR. en)
Council of the European Union Brussels, 26 June 2015 (OR. en) Interinstitutional File: 2012/0011 (COD) 9985/1/15 REV 1 LIMITE DATAPROTECT 103 JAI 465 MI 402 DIGIT 52 DAPIX 100 FREMP 138 COMIX 281 CODEC
More informationTABLE OF CONTENTS 1. PARTICIPATION BY THE JRC...4 2. INTERNATIONAL ORGANISATIONS (GENERAL RULE)...4
LIST OF ALL SPECIAL CLAUSES APPLICABLE TO THE FP7 MODEL GRANT AGREEMENT FOR THE IMPLEMENTATION OF THE SEVENTH FRAMEWORK PROGRAMMES OF THE EUROPEAN UNION AND EURATOM TABLE OF CONTENTS 1. PARTICIPATION BY
More informationCOMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy
More informationWebsite terms and conditions
Website terms and conditions Thank you for visiting our website. Before you go any further, it is important that you read and understand the conditions under which you will be using this site. Acceptance
More informationOutsourcing Risk Guidance Note for Banks
Outsourcing Risk Guidance Note for Banks Part 1: Definitions Guideline 1 For the purposes of these guidelines, the following is meant by: a) outsourcing: an authorised entity s use of a third party (the
More informationINTRODUCTION 1 STRUCTURE AND APPROACH 1 CONTEXT AND PURPOSE 2 STATEMENT OF PURPOSE 3
June 2007 Table of Contents INTRODUCTION 1 STRUCTURE AND APPROACH 1 CONTEXT AND PURPOSE 2 STATEMENT OF PURPOSE 3 3 Standard 1: Statement of purpose 3 Standard 2: Written guide to the adoption service for
More informationINSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS
INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS EFFECTIVE 1 JANUARY 2012 TABLE OF CONTENTS INTRODUCTION... 2 Professional Financial Advice... 2 The Six-Step Process... 2 The Core Components...
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationINFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
More informationINFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY]
2012 MODEL STC AGREEMENT INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY] AS THE STATE TRANSMISSION/TRANSFER COMPONENT
More informationTHE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients
THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION Find A PR agency Terms and Conditions for Clients 1 Introduction 1.1 Find A PR agency is the PRCA s impartial search and referral service for organisations
More informationInformation Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
More informationThe eighth data protection principle and international data transfers
Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue
More informationThird Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
More information(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
More informationIBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
More informationRESTREINT UE/EU RESTRICTED
COUNCIL OF THE EUROPEAN UNION Brussels, 9 April 2014 8761/14 RESTREINT UE/EU RESTRICTED JAI 220 USA 9 DATAPROTECT 56 RELEX 319 NOTE from : Commission Services to : JHA Counsellors No. prev. doc. : 5999/12
More informationHow To Use Nordea Internet And Telephone Banking
TERMS AND CONDITIONS OF INTERNET AND TELEPHONE BANKING SERVICES FOR PRIVATE CUSTOMERS Effective as of 2014-07-10 1. DEFINITIONS 1.1. Terms and Conditions these Terms and Conditions of Internet and Telephone
More informationCOMMISSION REGULATION (EU)
L 122/22 Official Journal of the European Union 11.5.2011 COMMISSION REGULATION (EU) No 445/2011 of 10 May 2011 on a system of certification of entities in charge of maintenance for freight wagons and
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
More informationCORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY RECORDS MANAGEMENT POLICY APPROVED BY GOVERNING BODY ON 2 APRIL 2009 INTRODUCTION What are Records? Records are documents created, used and maintained for business reasons.
More informationThe Hongkong and Shanghai Banking Corporation Limited ("the Bank") MAJOR TERMS AND CONDITIONS OF BUSINESS CARD PROGRAMME AGREEMENT (THE "AGREEMENT") The significant liabilities and obligations of the Cardholder
More informationThe EBF would like to take the opportunity to note few general remarks on key issues as follows:
Ref.:EBF_001314 Brussels, 17 June 2013 Launched in 1960, the European Banking Federation is the voice of the European banking sector from the European Union and European Free Trade Association countries.
More informationSafe and secure use of personal health information
Safe and secure use of personal health information Who is this leaflet for? This leaflet is for anyone who uses any of the services provided by the NHS in Scotland. It has been produced by Health Protection
More informationAn Overview. September 2011
An Overview September 2011 September 2011 Insights into IFRS: An overview 1 INSIGHTS INTO IFRS: AN OVERVIEW Insights into IFRS: An overview brings together all of the individual overview sections from
More informationBRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
More informationBring Your Own Device
Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the
More informationLAW ON FOREIGN EXCHANGE OPERATIONS
LAW ON FOREIGN EXCHANGE OPERATIONS This Law shall govern: (CONSOLIDATED) 1 I. BASIC PROVISIONS Article 1 1) payments, collections and transfers between residents and non-residents in foreign means of payment
More informationHow To Respect The Agreement On Trade In Cyberspace
CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial
More informationTrust Operational Policy. Information Security Department. Third Party Remote Access Policy
Trust Operational Policy Information Security Department Policy Reference: 3631 Document Control Document Title Author/Contact Document Reference 3631 Pauline Nordoff-Tate, Information Assurance Manager
More informationNATO UNCLASSIFIED. E-mail: alain.courtois@ncia.nato.int
Acquisition Alain.courtois@ncia.nato.int Telephone: +32 (2) 707 8233 Fax: +32 (2) 707 8770 Notification of Intent to Call for Bids Provide Packet Transport Component- NATO COMMUNICATIONS INFRASTRUCTURE
More informationHACKED: Data Breach Scenario
HACKED: Data Breach Scenario John McCabe SVP & Chief Operating Officer, Liberty International Underwriters Andrew Methven Risk & Assurance Manager, City of Sydney Joe Perricone Experienced Chief Information
More informationBUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
More informationCouncil of the European Union Brussels, 5 March 2015 (OR. en)
Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:
More informationSPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011
SPECIAL CONDITIONS OF PRIVATE CLOUD Version dated 08/06/2011 DEFINITIONS : Cloud: Technology that uses remote resources and storage. Host Server: Physical Server with a memory load and a processor load.
More informationHigh Assurance Overall, very good management of risk. An effective control environment appears to be in operation.
ANNEX 1 AUDITS COMPLETED AND REPORTS ISSUED The following categories of opinion are used for audit reports. Level of High Overall, very good management of risk. An effective control environment appears
More informationSecurity tips for the use of social media websites
CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
More informationAppendix, Definition of Roles and Terms, to Policy for IT Security. Date of publication November 2014 (rev. June 2012)
Division of Buildings and Services GOVERNING DOCUMENT Leif Bouvin 24-11-2014 ref. no. A2014/853 031 789 58 98 Appendix, Definition of Roles and Terms, to Policy for IT Security Date of publication November
More informationNational Certificate in Credit Administration (Credit Control) (Level 3)
NZQF NQ Ref 1189 Version 4 Page 1 of 5 National Certificate in Credit Administration (Credit Control) (Level 3) Level 3 Credits 55 This qualification has been reviewed. The last date to meet the requirements
More informationCLIENT / PROJECT MANAGER AGREEMENT
Authorship of this work is claimed by The Association of Construction Project Managers and any unauthorised reproduction constitutes an infringement in terms of the Copyright Act No 98 of 1978. CLIENT
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing
More informationProcessor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
More informationCCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
More informationLancashire County Council Information Governance Framework
Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More information