Operational Risk Management G-Cloud 7 Service Definition
|
|
- Alaina Greene
- 8 years ago
- Views:
Transcription
1 Operational Risk Management G-Cloud 7 Service Definition
2 Copyright Copyright 2015 by 3tc Software Ltd. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the express written permission of 3tc Software Ltd. International copyright and treaties protect all 3tc Software Ltd programs. Any copyright or other intellectual property right of whatever nature which subsists or may subsist in the presentation and/or content of the programs (including without limitation its look, feel, visual or other non-literal elements) remain the property of 3tc Software Ltd or its licensor(s) absolutely. Unauthorised reproduction or distribution of these programs or any part thereof is unlawful and may result in severe civil or criminal penalties. Disclaimer 3tc Software Ltd makes no representations or warranties with respect to the contents hereof, and specifically disclaims any implied warranties of satisfactory quality or fitness for any particular purpose. Further, 3tc Software Ltd reserves the right to revise this publication and to make changes in the contents hereof without obligation to notify any person of such changes or revisions. Trademarks Windows is a registered trademark of Microsoft Corporation. All product names mentioned in this publication, and not listed above, are acknowledged as the trademarks of the respective manufacturers and producers of such products. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 2 of 24
3 Document Change History Version Date Initials Changes /10/2015 CLW Draft /10/2015 CLW Updated with feedback from reviews Glossary AWS CAD DCLG OS PSMA SaaS WMTS Term Amazon Web Services Definition Computer Aided Dispatch/Mobilising system/command and Control System UK Department of Communities and Local Government (UK Government organisation) Ordnance Survey or Operating System (context dependent) Public Sector Mapping Agreement Software as a Service cloud based application provision Web Map Tile Service a service allowing maps to be provided over a network such as the internet Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 3 of 24
4 Contents 1. Operational Risk Management Service Definition Overview Features... 6 Overview... 6 Operational Risk Auditing (Fire Risk Audit)... 6 Fire Safety Auditing... 9 Community Fire Safety... 9 Job Management... 9 GIS Customisation System Load Capacity and Scalability Operational Risk Management Service System Design System Architecture One Customer One System Architecture Pooled Service Architecture FRS Access / Networking Server Organisation Application Server Database Server Customer Installed Components Web Browser Security and Resilience Web Traffic Firewall User Authentication Network / Internet Security Monitoring Data Segregation and Data Access Data Storage Asset Protection and Resilience Customer System Rollout (On-Boarding) Delivery Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 4 of 24
5 Standalone Instance Pooled Instance Optional Services Supplied Documentation Rollout Assumptions Support Software Releases Software Testing Web Browser Compatibility Support SLAs Target Responses Priority Categories Definitions Scheduled Maintenance Unscheduled Maintenance Service Availability Resilience Exclusions Pricing ORM Annual Prices Training Prices Microsoft Licensing Costs for Additional Work OS On-Demand and OS AddressBase Premium General Caveats Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 5 of 24
6 1. Operational Risk Management Service Definition 1.1 Overview Operational Risk Management allows customers to collect operational risk information (using a PORIS compliant scheme), conduct fire safety audits and provide related job management functions. Operational Risk Management is provided either as a self-hosted system, or as a SaaS cloud hosted system. 1.2 Features Overview Operational Risk Management is a web application that enables users to enter and manage information gathered during fire safety audits, fire safety work (such as community engagement) and fire risk audits. The system manages this data for commercial and residential buildings as well as natural risks, generating output documentation (site specific risk information documents for example) and a reinspection program based on the premises risk. Recorded data can be exported to all mobile terminals across the customer s service, ensuring crews have access to risk critical data when traveling to and attending incidents. The main areas that make up the Operational Risk Management system are: Operational Risk Auditing Record operational risk audits of locations Fire Safety Auditing - Record fire safety audits of locations Community Fire Safety Record fire risk and safety related engagements with the public Job Management Track tasks through the system with options to delegate to other staff Performance Management Reporting Monitor staff performance Mobile device support Use the system using a compatible browser on any device with internet access Operational Risk Auditing (Fire Risk Audit) The system provides a PORIS compatible risk auditing facility suitable for conducting risk assessments with regards to the safety of operational crews. Samples of this can be seen in the screenshots below. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 6 of 24
7 Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 7 of 24
8 The system also provides a visual workflow status display allowing staff to easily assess the status of a particular risk audit as shown below. Once completed, risk audits can be made available to mobile data terminals for use by operational crews or to other fire services using a built in over the border facility designed to encourage the sharing of operational risk information with neighbouring fire and rescue services. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 8 of 24
9 Fire Safety Auditing The system provides a Regulatory Reform (Fire Safety) Order 2005 compliant fire safety auditing element allowing customers to keep their key safety and risk assessment tasks in one place, with assessors notified when other audits are required at the location. Community Fire Safety The system allows users to record fire prevention activities such as community engagements using a collection of jobs that mirror fire service guidance regarding these activities. The screenshot below illustrates a portion of one of these job sheets. Job Management The system is based around jobs that are used to task staff members with a particular item of work. Using the integrated job management facilities, work can be delegated to other staff or teams within the organisation. Shown below is the My Open Jobs page that allows a user direct access to the jobs allocated to them. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 9 of 24
10 GIS Mapping Integrated Mapping is provided using Ordnance Survey On-Demand Web Map Tile Service (WMTS) or the customer s own map tile service (Cadcorp GeognoSiS for example). Supported functionality: The user can view and set premise locations on a map (as shown above). This allows panning and zooming of the map Geo-Coding Operational Risk Management provides integrated geo-location (gazetteer address lookup) for geoverification of premise locations. It also allows premises to be tagged with a UPRN (if this is in the source data set). Geo-verification of premise locations adds value to the system by allowing linking to other corporate information, such as an Incident Recording System and Fire Investigations. Users can search for premises using building names, company names and addresses (full or partial) and select the premise location from a list of matching or partially matching addresses. Customisation The standard service is supplied as is and cannot be customised. If modifications are required, a standalone modified system could be hosted on the AWS platform or the customer may self-host the solution. Please contact 3tc Software for further information. The work required to setup a customised solution and modify it to your requirements would be provided as an additional service, as described in the pricing schedule. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 10 of 24
11 1.3 System Load Capacity and Scalability The system is hosted on the Amazon Web Services (AWS) cloud platform to provide a reliable scalable solution that can grow dynamically during periods of heavy load to ensure all customers are provided with their expected level of service. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 11 of 24
12 2. Operational Risk Management Service System Design Operational Risk Management is a SaaS / Cloud system hosted centrally on a proven platform and accessed by customers via the internet. It is hosted on AWS and accessed by the customers across the internet. AWS has been proposed by DCLG as meeting security and resilience requirements, and is currently an approved G-Cloud supplier. Naturally the exact design of the system and the security measures are commercially sensitive information, and disclosure of this could affect the security of the system. 2.1 System Architecture The application is, as standard, supplied on a one customer one system basis, but may also be supplied as a pooled service available to a group of customers (a regional service for example). One Customer One System Architecture This is the standard service offering with each customer system being hosted completely independently on the AWS service. The installation will consist of a web server and a database server that will be used to host a single customer system. Pooled Service Architecture The application architecture when delivered as a pooled service is: Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 12 of 24
13 FRS A Web Clients FRS B Web Clients AWS Load Balancing Application Server Instance Application Server Instance oooo Application Server Instance AWS EC2 Instances ORM Core Database FRS A Database FRS B Database AWS Virtual Database Server AWS Managed Backups 2.2 FRS Access / Networking The system uses a single top-level domain name (TLD). Each FRS accesses the system using a subdomain of this. For example, if the TLD is orm.org, a sub-domain for Anyshire FRS may be anyshirefrs.orm.org. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 13 of 24
14 The sub-domains are associated with the IP address of an IIS web server specific to each FRS via DNS. 2.3 Server Organisation Application Server Operational Risk Management uses a single application instance hosted on the AWS elastic compute cloud (EC2). The number of instances will be dynamically scaled with demand when the system is running as a pooled instance. The server OS version used is the latest available from the hosting provider at the time of installation. Database Server Each instance of the service will use a single database server to host all of the databases required that instance of the service. The database server is kept separate from the Web Server to provide additional security because the data is not stored on an internet facing server. Additionally, the data can be backed up separately reducing backup and restore times. The SQL Server version used is the latest available from the hosting provider at the time of installation. 2.4 Customer Installed Components In order to use the system, customers must install some components on their system. Web Browser In order to access the system, customers must install a web browser compatible with Operational Risk Management (see the relevant section in this document). The installation and support of this is the responsibility of each customer. 2.5 Security and Resilience Security of the system is important as it contains potentially sensitive data. The system is secured as described below. Web Traffic All web traffic is secured by HTTPS the system uses a wildcard SSL Certificate for the TLD. The SSL Certificate is provided and managed by a trusted certificate provider. Firewall The AWS hosting provides software firewall provision, which we configure to only allow the traffic required to access the Operational Risk Management system and the incoming and outgoing interfaces. It is each customer s responsibility to configure their own firewalls and networks for access. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 14 of 24
15 User Authentication Users are authenticated using Forms authentication against credentials stored within the system. Passwords have to meet minimum complexity levels. User sessions automatically time out after a system-wide configurable time period. Network / Internet Security The system undergoes annual penetration testing, which is performed against the server by a reputable third party. We resolve any issues that are identified that potentially allow sensitive data to be compromised. The internal network on AWS is a private network, not accessible to the outside world other than via the defined entry points. It is the customer s responsibility to ensure that the connections are secured at their end of the connection. For example, by ensuring browsers and operating systems are correctly patched and anti-virus and anti-malware software is used. Monitoring Access is monitored using the AWS provided tools and infrastructure. Additional monitoring and auditing is provided by the application layer logging infrastructure and event logs. Where appropriate, automated notification of issues is provided to our support team to allow proactive resolution of security and resilience issues. Data Segregation and Data Access All customers use separate databases and are therefore segregated from each other. Customers are not able to access each other s data via the web application. Customers are not able to access the databases directly. All data access is via the supplied web applications. 3tc Software is able to access all the FRS data for the purposes of delivering and supporting the system only. This is subject to Data Protection and Information Security policies covered under ISO Data Storage Data Backup, Disaster Recovery and Resilience Data is stored within the database server. No sensitive data is stored on the internet facing Web Server. Data is backed up from the database server regularly using AWS s automated backup systems. In between backups, transaction logs are recorded. This allows point in time recovery of the system and minimal data loss. Typically AWS point in time restores provide restorations to within five minutes. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 15 of 24
16 Data backups are only maintained for the purposes of recovery, and therefore only kept for a short retention period Data Extraction / Removal Should a customer decide to end their usage of the system, or migrate to the self-hosted model, their data will be permanently removed from the system. Their data is removed as follows: Data is removed by permanently erasing the databases from the system. Backups of the databases are permanently erased (subject to the short retention period). Any user accounts or other access information used by the customer is removed. Note: Once the retention period has passed, there will be no ability to restore the system. Prior to the permanent removal of their system, the customer is given the opportunity to extract their data to enable them to migrate it to their own system. This will be subject to an administration charge at the prevailing contracted day rate. Note: For customers migrating to the self-hosted Operational Risk Management system, the migration will be included in the migration process and no separate administration charges will apply. Asset Protection and Resilience Data Centre Protection Data centre protection is provided by AWS as described in this white paper: In particular: AWS can help relieve customer burden of operating controls by managing those controls associated with the physical infrastructure deployed in the AWS environment that may previously have been managed by the customer. Controls provide reasonable assurance that physical access to data centers is restricted to authorized personnel and that mechanisms are in place to minimize the effect of a malfunction or physical disaster to data center facilities. To help customers better understand what controls we have in place and how effectively they are operating, we publish a SOC 1 Type II report with controls defined around EC2, S3 and VPC, as well as detailed physical security and environmental controls. These controls are defined at a high level of specificity that should meet most customer needs. AWS customers that have signed a non-disclosure agreement with AWS may request a copy of the SOC 1 Type II report Secure Data Deletion Secure data deletion is provided by AWS as in this white paper: Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 16 of 24
17 In particular: Storage Device Decommissioning When a storage device has reached the end of its useful life, AWS procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. AWS uses the techniques detailed in DoD M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ) to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 17 of 24
18 3. Customer System Rollout (On-Boarding) 3.1 Delivery Standalone Instance When delivered as a standalone service, the basic roll-out process requires the creation of new server instances on the AWS service, along with the creation of administrative and support users (for the main administrative contact and 3tc Software staff respectively). When this has been completed (typically within 1 business day), the customer is free to load their gazetteer data, create the users for their organisation and begin using the system. Pooled Instance When delivered as a pooled service, if the customer is being added to an existing pool the setup is merely a case of adding the customer to the existing system. When that is completed (typically within 1 business day), the customer is free to load their gazetteer data, create the users for their organisation and begin using the system. If a new instance is required, a new standalone instance will be created to host the pool. When this is complete (typically within 1 business day), customers would be added to the pool as described above. 3.2 Optional Services The following chargeable services are available during the roll-out:- Training Training can be provided to cover system administration and use of the system, the later being delivered on a train the trainer basis Data Loading 3tc Software can assist with the automated loading of users, gazetteer data and the import of data from existing systems (if compatible) Please contact 3tc Software for further information and to obtain a quote for the services outlined above. 3.3 Supplied Documentation The following documentation is provided:- System administration guide System user guide 3.4 Rollout Assumptions In order to make the provisioning and transitioning as rapid as possible for new customers, 3tc Software has made various assumptions: There is no acceptance testing by individual customers, or any acceptance testing is done by the FRS on their own timelines. The system is provided as-is, and therefore we will only Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 18 of 24
19 accept any issues raised that pertain to faults in the system or relating to any customisations for a particular customer. No data is imported from existing systems (available as a service). Each customer system is configured identically. Each customer may require configuration of their internal systems (such as networking, firewalls, CAD systems). This is the responsibility (in terms of cost and effort) of the customer. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 19 of 24
20 4. Support We provide technical support between the hours of 0900 and 1700 Monday to Friday. This excludes bank holidays and the days between Christmas and New Year. Support is via a dedicated telephone number, and self-help portal. Urgent issues should be raised by telephone. Issues raised by or by the portal generate an auto-response acknowledging the issue has been raised and issuing a unique incident number. Support is primarily provided from our company premises in Leicester. All support is remote, as there is no facility to physically attend the AWS hosting environment. Support provided to FRSs will also be remote. 4.1 Software Releases 3tc Software typically releases updated versions of the software on a six-monthly basis. The software updates include a roll-up of any new features and bug fixes made during the preceding period. It may be necessary to release software more frequently than the six-monthly schedule. For example should the need arise to address a serious issue, a patch release may be released quickly and directly to the live system. Software Testing Software is tested internally prior to release by our internal test resource. This includes a mixture of automated low-level testing (unit testing) and manual user testing against defined test scripts. The test scripts are designed to test the software to prove functionality and to test issues that have been resolved. Once the release is signed off internally, it is deployed to the customers Test systems. It is then available for a period of one month for familiarisation and testing. After this preview period it is installed on the live system. We resolve any serious issues reported during the preview period prior to release, which may cause a delay of the release to the live system should further testing be required. 4.2 Web Browser Compatibility Operational Risk Management is currently compatible with the following browsers: IE 10+ Chrome Firefox Opera Safari Whichever browser is used, HTTPS, JavaScript and download functionality must be enabled. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 20 of 24
21 4.3 Support SLAs The period during which the Contractor provides System support shall be office hours only from 0900 to 1700 hours from Monday to Friday excluding Public Holidays and weekdays between Christmas and New Year. Target Responses These are our target responses. Priority Primary Response Initial Analysis Restoration of Service Category 1 2 hours * 4 hours 8 hours 2 4 hours * 1 day 4 days 3 1 Working day 5 working days 10 working days 4 2 Working days 10 working days 15 working days Notes: All time shown in above table are working minutes/hours/days Lower priority issues may be released as part of the planned updates instead of patches Priority Categories Report Description Category 1 A Single Fault preventing the use of core features for all users 2 A Single Fault preventing the use of core features for multiple users 3 A Single Fault preventing the use of core features for one user A Single Fault preventing the use of secondary features for multiple users 4 A Single Fault preventing the use of secondary features for one user A Single Fault of a cosmetic or minor nature affecting any number of users All general enquiries Definitions Term Primary Response Initial Analysis Restoration of Service Definition Contact from the Contractor s Support Division to clarify the problem and discuss potential actions that can be taken immediately Contact from the Contractor s Support Division reporting the results of an initial analysis into the problem, giving details in to the possible causes of the problem and, where possible, proposing a solution for a temporary and/or permanent fix and a timetable for achieving that solution An acceptable temporary work around into the problem that allows the users to operate the system without substantial degradation in performance. A temporary fix will only be applied where suitable. In some instances a temporary fix may not be available. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 21 of 24
22 Scheduled Maintenance We perform scheduled maintenance on the system from time to time in order to optimise performance, resolve issues, update data sets (such as gazetteers) and update system components. We plan these events on a quarterly basis, and FRSs are notified in advance of the date and estimated duration of the downtime. Unscheduled Maintenance We do anticipate that there may be instances where there are unplanned events during which the system is unavailable for periods of time. In such events we will work to resolve the system issue as quickly as possible. If the downtime looks like it may be protracted, 3tc Software will notify the FRSs primary contact and advise them of the status of the incident. Service Availability The system availability is 99.9%. This allows for average unplanned down-time as followings: 8.76 hours per year 43.8 minutes per month 10.1 minutes per week 1.44 minutes per day Availability is measured on a per customer basis, not across the entire system and does not cover planned down-time for maintenance as defined in Scheduled Maintenance. 4.4 Resilience The AWS hosting provides backups of SQL Server as follows: Daily instance backups. Five minute transaction logs. This allows point-in time recovery in the event of a database server loss. The loss of a server is anticipated to be extremely low. 4.5 Exclusions We are not able to support issues with the individual customers environment or infrastructure. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 22 of 24
23 5. Pricing All costs are exclusive of VAT. The costs provided have assumed a minimum contract length of two years. Extensions would be possible. For the purposes of costs, we have assumed the AWS hosting will be in the Europe (Ireland) region. 5.1 ORM Annual Prices ORM Annual Licence Cost Per FRS 35, We also provide the service using a pooled application (for a regional consortium for example). See below for pricing: 1 to 5 customers: 35k per annum, per customer 6 to 10 customers: 32k per annum, per customer 5.2 Training Prices Item Training, up to a maximum of 6 delegates per course, based on a train the trainer course delivery (this includes training on all functional modules) Per Course 6, Each Training course covers the following: ORM Administration (1day) ORM User training (2 days) The above syllabus training is provided over a three day session, with the syllabus running back to back. 5.3 Microsoft Licensing AWS licensing for MS SQL Server and MS Windows is included in the hosting costs. 5.4 Costs for Additional Work For any work not covered above, we will charge our standard day rate. Item Per Day Consultancy/Engineering day rate Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 23 of 24
24 For larger packages of work it will be more economical for us to provide a quote against a scope of work. 5.5 OS On-Demand and OS AddressBase Premium It is assumed that end-user organisations are FRSs covered by an OS Public Sector Mapping Agreement (PSMA) allowing free access to OS On-Demand. This is subject to Ordnance Survey s Fair Usage Policy. The system will be configured with your unique API key (available from OS), which will provide access to the mapping service under your existing PSMA. Note: Any usage outside of the Fair Usage policy or exceeding the free entitlement, or outside the PSMA (and any resulting charges from OS), will be the responsibility of each customer. 5.6 General Caveats All IPR for the software designed and developed by 3tc Software will remain with 3tc Software. This includes the application software, database design, overall solution design and any other IP pertinent to this solution. Each Fire & Rescue Service will require a licence, which will cover them for their current geographical area of operation and they will be required to sign an end user licence agreement as detailed in the contract document. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 24 of 24
Marval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
More informationArcGIS Online School Locator
ArcGIS Online School Locator G-Cloud Services RM 1557vi Service Definition Esri UK G-Cloud 6 Lot 3 SaaS Services Crown Commercial Service Acknowledgement Esri and ArcGIS are trademarks, registered trademarks,
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationCA API Management SaaS
SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the
More informationAgilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
More informationExecview Outsourced Services Management
EXECVIEW for G-Cloud Framework Users Execview Outsourced Services Management Service Definition for G-Cloud iv G-Cloud iv Service Description An overview of the G-Cloud Service (functional, non-functional)
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationService Definition Nine23 MDM
Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More informationG-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1
G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER
More informationAt a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
More informationPAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
More informationCLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
More informationThe IaaS Server On Boarding Process
SERVICE DEFINITION G-Cloud 7 MANAGED SERVER Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material
More information1 ForestSafe SaaS Service details Service Description Functional Non Functional
1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.
More informationG-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS
G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS
More informationConnectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
More informationSmartImpact MS Dynamics CRM. Support Service Definition
SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/
More informationService Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management
Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...
More informationG-Cloud Service Definition Cadcorp Web Map Layers
G-Cloud Service Definition Cadcorp Web Map Layers Ref: RM1557/iii Government Procurement Services G-Cloud III Contents 1. Introduction... 3 2. Service Overview... 4 2.1 Web Map Layers... 4 2.2 Initial
More informationSchedule 5: SaaS Premium Service Level Agreement
Schedule 5: SaaS Premium Service Level Agreement Service Level Agreement Number - - - - - _- _- _- _ ( ) Document Version: SLA (with SAAS) V_1_4 Contents 1. Provision of Service Warranty 3 1.1. Formula
More informationUse of The Information Services Active Directory Service (AD) Code of Practice
Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be
More informationishare in the Cloud Service Definition v5.0
Service Definition v5.0 An overview of ishare in the Cloud ishare is an end to end Enterprise GIS for public sector comprising a spatial data warehouse, rich functionality browser based GIS including editing
More informationG-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements
1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........
More informationExecview Project Portfolio Management
EXECVIEW for G-Cloud Framework Users Execview Project Portfolio Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide
More informationNetop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing
Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...
More informationResponse to the Crown Commercial Service from HP Enterprise Services UK Ltd
Response to the Crown Commercial Service from HP Enterprise Services UK Ltd G-Cloud (RM1557) Important Notice The information and data contained within this document constitutes confidential information
More informationFamly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
More informationSpektrix Service Definition
Spektrix Service Definition An overview of the G-Cloud Service Spektrix is a cloud-based ticketing and marketing software package provided as Software as a Service. It is designed for arts and entertainment
More informationTable of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
More informationExecview Corporate Performance Management
EXECVIEW for G-Cloud Framework Users Execview Corporate Performance Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide
More informationCRM Support Services Agreement
CRM Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: Points Purchased in Initial Minimum Term: This Agreement sets forth the terms and conditions under which The CRM
More informationHosted Desktop as a Service
Hosted Desktop as a Service Contents 1 Introduction to Hosted Desktop Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Administration... 4 2.3 Access Methods... 4 2.4 Service
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationAdlib Hosting - Service Level Agreement
Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities
More informationOnline Backup Service Definition
Online Backup Service Definition 2 Table of Contents Purpose of Document... 3 Online Backup Service... 3 Accreditations... 5 Target Service Levels for Online Backup... 5 Service Credits Rules and Claims...
More informationTERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
More informationG-Cloud Custom Enterprise Mobile Applications Service Definition
G-Cloud 6 Custom Enterprise Mobile Applications Service Definition 1 Table of Contents 1 Service Definition (Technical Service Overview) 1.1 Overview 1.2 Service Detail 1.3 Trial 2 Service and Process
More informationIBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
More informationInvolve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition
Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...
More informationDataCentred Cloud Storage
Service Description DataCentred Michigan Park Michigan Avenue Salford Quays M50 2GY United Kingdom Tel: 0161 870 3981 enquiries@datacentred.co.uk www.datacentred.co.uk Contents Service Description... 2
More informationInstallation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationSTL Microsoft Dynamics CRM Consulting and Support Services
STL Microsoft Dynamics CRM Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationStatement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
More informationAdditional services are also available according to your specific plan configuration.
THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationINFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia
INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:
More informationCRM in a Day Support Services Agreement
CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft
More informationCHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
More informationCWSI Service Definition for Server Monitoring
CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.
More informationSaaS Service Level Agreement (SLA)
SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationManaging Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationAurora. Version 1.0. Installation and Administration Guide. June 2012
Aurora Version 1.0 Installation and Administration Guide June 2012 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationService: Contract Management (Software as a Service)
Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,
More informationCustomer Hosted Service Description and Service Level
Customer Hosted Service Description and Service Level Customer Hosted service description and service level Copyright Egton Medical Information Systems Limited 2014 Controlled Document Version 8: 1 November
More informationLive Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
More informationCan SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS
More informationSERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer
More informationSoftware as a Service (SaaS) Online HR
Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore
More informationIBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
More informationTHOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track E-Filing is a stand-alone component of the C-Track product suite which can easily integrate with the C-Track
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
More informationIntegrated windows authentication for customers based on Probation GSI network
Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management
More informationensurcloud Service Level Agreement (SLA)
ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and
More informationGCloud Application Development Service Definition. Application Development
GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding
More informationOracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5
Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Unless otherwise stated, these Oracle Cloud Hosting and Delivery Policies (the Delivery Policies ) describe the Oracle
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationEnterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationLibrary Systems Security: On Premises & Off Premises
Library Systems Security: On Premises & Off Premises Guoying (Grace) Liu University of Windsor Leddy Library Huoxin (Michael) Zheng Castlebreck Inc. CLA 2015 Annual Conference, Ottawa, June 5, 2015 Information
More informationCLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
More informationAmazon Relational Database Service (RDS)
Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
More informationOur Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015
Our Server Support Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Telephone Sales and Accounts 0161 232 0001 Technical Support 0161 232 0125 Email
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationOverview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
More informationAudit Management. service definition document
Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service
More informationSQL Server Database as a Service (DBaaS)
SQL Server Database as a Service (DBaaS) Contents 1 SQL Server Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request Fulfilment...
More informationADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z
ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Service Terms... 4 3.1 Scope of Hosted Exchange Services... 4 3.2 Data centre locations...
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationSFW CRM for Stakeholders - MS Dynamics CRM
SFW CRM for Stakeholders MS Dynamics CRM Service Definition SFW Reference: Version: 5.0 Date 03/04/14 SFW Limited Southern House Station Approach Woking GU22 7UY www.sfwltd.co.uk Page 1 of 13 1 Service
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationZerto Virtual Manager Administration Guide
Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More informationUDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3)
UDiMan Name: UDiMan Identity Management service Service Type: Software as a Service (SaaS Lot 3) Introduction UDiMan is an Enterprise Identity Management solution supporting mission critical authentication
More informationManaging Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
More informationHOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.
HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk
More informationSupplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
More informationSoftware as a Service (SaaS) Requirements
Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By
More informationOcean Park IT Cloud Solution
Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions
More information1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
More informationJohn Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
More informationContents HP Quality Center on SaaS... 3 Delivering a consistent approach to managing application quality... 3 Delivery the way you need...
HP QC on SaaS Contents HP Quality Center on SaaS... 3 Delivering a consistent approach to managing application quality... 3 Delivery the way you need... 4 Service benefits... 4 Specifications... 5 Table
More information