Operational Risk Management G-Cloud 7 Service Definition

Size: px
Start display at page:

Download "Operational Risk Management G-Cloud 7 Service Definition"

Transcription

1 Operational Risk Management G-Cloud 7 Service Definition

2 Copyright Copyright 2015 by 3tc Software Ltd. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the express written permission of 3tc Software Ltd. International copyright and treaties protect all 3tc Software Ltd programs. Any copyright or other intellectual property right of whatever nature which subsists or may subsist in the presentation and/or content of the programs (including without limitation its look, feel, visual or other non-literal elements) remain the property of 3tc Software Ltd or its licensor(s) absolutely. Unauthorised reproduction or distribution of these programs or any part thereof is unlawful and may result in severe civil or criminal penalties. Disclaimer 3tc Software Ltd makes no representations or warranties with respect to the contents hereof, and specifically disclaims any implied warranties of satisfactory quality or fitness for any particular purpose. Further, 3tc Software Ltd reserves the right to revise this publication and to make changes in the contents hereof without obligation to notify any person of such changes or revisions. Trademarks Windows is a registered trademark of Microsoft Corporation. All product names mentioned in this publication, and not listed above, are acknowledged as the trademarks of the respective manufacturers and producers of such products. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 2 of 24

3 Document Change History Version Date Initials Changes /10/2015 CLW Draft /10/2015 CLW Updated with feedback from reviews Glossary AWS CAD DCLG OS PSMA SaaS WMTS Term Amazon Web Services Definition Computer Aided Dispatch/Mobilising system/command and Control System UK Department of Communities and Local Government (UK Government organisation) Ordnance Survey or Operating System (context dependent) Public Sector Mapping Agreement Software as a Service cloud based application provision Web Map Tile Service a service allowing maps to be provided over a network such as the internet Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 3 of 24

4 Contents 1. Operational Risk Management Service Definition Overview Features... 6 Overview... 6 Operational Risk Auditing (Fire Risk Audit)... 6 Fire Safety Auditing... 9 Community Fire Safety... 9 Job Management... 9 GIS Customisation System Load Capacity and Scalability Operational Risk Management Service System Design System Architecture One Customer One System Architecture Pooled Service Architecture FRS Access / Networking Server Organisation Application Server Database Server Customer Installed Components Web Browser Security and Resilience Web Traffic Firewall User Authentication Network / Internet Security Monitoring Data Segregation and Data Access Data Storage Asset Protection and Resilience Customer System Rollout (On-Boarding) Delivery Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 4 of 24

5 Standalone Instance Pooled Instance Optional Services Supplied Documentation Rollout Assumptions Support Software Releases Software Testing Web Browser Compatibility Support SLAs Target Responses Priority Categories Definitions Scheduled Maintenance Unscheduled Maintenance Service Availability Resilience Exclusions Pricing ORM Annual Prices Training Prices Microsoft Licensing Costs for Additional Work OS On-Demand and OS AddressBase Premium General Caveats Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 5 of 24

6 1. Operational Risk Management Service Definition 1.1 Overview Operational Risk Management allows customers to collect operational risk information (using a PORIS compliant scheme), conduct fire safety audits and provide related job management functions. Operational Risk Management is provided either as a self-hosted system, or as a SaaS cloud hosted system. 1.2 Features Overview Operational Risk Management is a web application that enables users to enter and manage information gathered during fire safety audits, fire safety work (such as community engagement) and fire risk audits. The system manages this data for commercial and residential buildings as well as natural risks, generating output documentation (site specific risk information documents for example) and a reinspection program based on the premises risk. Recorded data can be exported to all mobile terminals across the customer s service, ensuring crews have access to risk critical data when traveling to and attending incidents. The main areas that make up the Operational Risk Management system are: Operational Risk Auditing Record operational risk audits of locations Fire Safety Auditing - Record fire safety audits of locations Community Fire Safety Record fire risk and safety related engagements with the public Job Management Track tasks through the system with options to delegate to other staff Performance Management Reporting Monitor staff performance Mobile device support Use the system using a compatible browser on any device with internet access Operational Risk Auditing (Fire Risk Audit) The system provides a PORIS compatible risk auditing facility suitable for conducting risk assessments with regards to the safety of operational crews. Samples of this can be seen in the screenshots below. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 6 of 24

7 Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 7 of 24

8 The system also provides a visual workflow status display allowing staff to easily assess the status of a particular risk audit as shown below. Once completed, risk audits can be made available to mobile data terminals for use by operational crews or to other fire services using a built in over the border facility designed to encourage the sharing of operational risk information with neighbouring fire and rescue services. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 8 of 24

9 Fire Safety Auditing The system provides a Regulatory Reform (Fire Safety) Order 2005 compliant fire safety auditing element allowing customers to keep their key safety and risk assessment tasks in one place, with assessors notified when other audits are required at the location. Community Fire Safety The system allows users to record fire prevention activities such as community engagements using a collection of jobs that mirror fire service guidance regarding these activities. The screenshot below illustrates a portion of one of these job sheets. Job Management The system is based around jobs that are used to task staff members with a particular item of work. Using the integrated job management facilities, work can be delegated to other staff or teams within the organisation. Shown below is the My Open Jobs page that allows a user direct access to the jobs allocated to them. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 9 of 24

10 GIS Mapping Integrated Mapping is provided using Ordnance Survey On-Demand Web Map Tile Service (WMTS) or the customer s own map tile service (Cadcorp GeognoSiS for example). Supported functionality: The user can view and set premise locations on a map (as shown above). This allows panning and zooming of the map Geo-Coding Operational Risk Management provides integrated geo-location (gazetteer address lookup) for geoverification of premise locations. It also allows premises to be tagged with a UPRN (if this is in the source data set). Geo-verification of premise locations adds value to the system by allowing linking to other corporate information, such as an Incident Recording System and Fire Investigations. Users can search for premises using building names, company names and addresses (full or partial) and select the premise location from a list of matching or partially matching addresses. Customisation The standard service is supplied as is and cannot be customised. If modifications are required, a standalone modified system could be hosted on the AWS platform or the customer may self-host the solution. Please contact 3tc Software for further information. The work required to setup a customised solution and modify it to your requirements would be provided as an additional service, as described in the pricing schedule. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 10 of 24

11 1.3 System Load Capacity and Scalability The system is hosted on the Amazon Web Services (AWS) cloud platform to provide a reliable scalable solution that can grow dynamically during periods of heavy load to ensure all customers are provided with their expected level of service. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 11 of 24

12 2. Operational Risk Management Service System Design Operational Risk Management is a SaaS / Cloud system hosted centrally on a proven platform and accessed by customers via the internet. It is hosted on AWS and accessed by the customers across the internet. AWS has been proposed by DCLG as meeting security and resilience requirements, and is currently an approved G-Cloud supplier. Naturally the exact design of the system and the security measures are commercially sensitive information, and disclosure of this could affect the security of the system. 2.1 System Architecture The application is, as standard, supplied on a one customer one system basis, but may also be supplied as a pooled service available to a group of customers (a regional service for example). One Customer One System Architecture This is the standard service offering with each customer system being hosted completely independently on the AWS service. The installation will consist of a web server and a database server that will be used to host a single customer system. Pooled Service Architecture The application architecture when delivered as a pooled service is: Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 12 of 24

13 FRS A Web Clients FRS B Web Clients AWS Load Balancing Application Server Instance Application Server Instance oooo Application Server Instance AWS EC2 Instances ORM Core Database FRS A Database FRS B Database AWS Virtual Database Server AWS Managed Backups 2.2 FRS Access / Networking The system uses a single top-level domain name (TLD). Each FRS accesses the system using a subdomain of this. For example, if the TLD is orm.org, a sub-domain for Anyshire FRS may be anyshirefrs.orm.org. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 13 of 24

14 The sub-domains are associated with the IP address of an IIS web server specific to each FRS via DNS. 2.3 Server Organisation Application Server Operational Risk Management uses a single application instance hosted on the AWS elastic compute cloud (EC2). The number of instances will be dynamically scaled with demand when the system is running as a pooled instance. The server OS version used is the latest available from the hosting provider at the time of installation. Database Server Each instance of the service will use a single database server to host all of the databases required that instance of the service. The database server is kept separate from the Web Server to provide additional security because the data is not stored on an internet facing server. Additionally, the data can be backed up separately reducing backup and restore times. The SQL Server version used is the latest available from the hosting provider at the time of installation. 2.4 Customer Installed Components In order to use the system, customers must install some components on their system. Web Browser In order to access the system, customers must install a web browser compatible with Operational Risk Management (see the relevant section in this document). The installation and support of this is the responsibility of each customer. 2.5 Security and Resilience Security of the system is important as it contains potentially sensitive data. The system is secured as described below. Web Traffic All web traffic is secured by HTTPS the system uses a wildcard SSL Certificate for the TLD. The SSL Certificate is provided and managed by a trusted certificate provider. Firewall The AWS hosting provides software firewall provision, which we configure to only allow the traffic required to access the Operational Risk Management system and the incoming and outgoing interfaces. It is each customer s responsibility to configure their own firewalls and networks for access. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 14 of 24

15 User Authentication Users are authenticated using Forms authentication against credentials stored within the system. Passwords have to meet minimum complexity levels. User sessions automatically time out after a system-wide configurable time period. Network / Internet Security The system undergoes annual penetration testing, which is performed against the server by a reputable third party. We resolve any issues that are identified that potentially allow sensitive data to be compromised. The internal network on AWS is a private network, not accessible to the outside world other than via the defined entry points. It is the customer s responsibility to ensure that the connections are secured at their end of the connection. For example, by ensuring browsers and operating systems are correctly patched and anti-virus and anti-malware software is used. Monitoring Access is monitored using the AWS provided tools and infrastructure. Additional monitoring and auditing is provided by the application layer logging infrastructure and event logs. Where appropriate, automated notification of issues is provided to our support team to allow proactive resolution of security and resilience issues. Data Segregation and Data Access All customers use separate databases and are therefore segregated from each other. Customers are not able to access each other s data via the web application. Customers are not able to access the databases directly. All data access is via the supplied web applications. 3tc Software is able to access all the FRS data for the purposes of delivering and supporting the system only. This is subject to Data Protection and Information Security policies covered under ISO Data Storage Data Backup, Disaster Recovery and Resilience Data is stored within the database server. No sensitive data is stored on the internet facing Web Server. Data is backed up from the database server regularly using AWS s automated backup systems. In between backups, transaction logs are recorded. This allows point in time recovery of the system and minimal data loss. Typically AWS point in time restores provide restorations to within five minutes. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 15 of 24

16 Data backups are only maintained for the purposes of recovery, and therefore only kept for a short retention period Data Extraction / Removal Should a customer decide to end their usage of the system, or migrate to the self-hosted model, their data will be permanently removed from the system. Their data is removed as follows: Data is removed by permanently erasing the databases from the system. Backups of the databases are permanently erased (subject to the short retention period). Any user accounts or other access information used by the customer is removed. Note: Once the retention period has passed, there will be no ability to restore the system. Prior to the permanent removal of their system, the customer is given the opportunity to extract their data to enable them to migrate it to their own system. This will be subject to an administration charge at the prevailing contracted day rate. Note: For customers migrating to the self-hosted Operational Risk Management system, the migration will be included in the migration process and no separate administration charges will apply. Asset Protection and Resilience Data Centre Protection Data centre protection is provided by AWS as described in this white paper: In particular: AWS can help relieve customer burden of operating controls by managing those controls associated with the physical infrastructure deployed in the AWS environment that may previously have been managed by the customer. Controls provide reasonable assurance that physical access to data centers is restricted to authorized personnel and that mechanisms are in place to minimize the effect of a malfunction or physical disaster to data center facilities. To help customers better understand what controls we have in place and how effectively they are operating, we publish a SOC 1 Type II report with controls defined around EC2, S3 and VPC, as well as detailed physical security and environmental controls. These controls are defined at a high level of specificity that should meet most customer needs. AWS customers that have signed a non-disclosure agreement with AWS may request a copy of the SOC 1 Type II report Secure Data Deletion Secure data deletion is provided by AWS as in this white paper: Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 16 of 24

17 In particular: Storage Device Decommissioning When a storage device has reached the end of its useful life, AWS procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. AWS uses the techniques detailed in DoD M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ) to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 17 of 24

18 3. Customer System Rollout (On-Boarding) 3.1 Delivery Standalone Instance When delivered as a standalone service, the basic roll-out process requires the creation of new server instances on the AWS service, along with the creation of administrative and support users (for the main administrative contact and 3tc Software staff respectively). When this has been completed (typically within 1 business day), the customer is free to load their gazetteer data, create the users for their organisation and begin using the system. Pooled Instance When delivered as a pooled service, if the customer is being added to an existing pool the setup is merely a case of adding the customer to the existing system. When that is completed (typically within 1 business day), the customer is free to load their gazetteer data, create the users for their organisation and begin using the system. If a new instance is required, a new standalone instance will be created to host the pool. When this is complete (typically within 1 business day), customers would be added to the pool as described above. 3.2 Optional Services The following chargeable services are available during the roll-out:- Training Training can be provided to cover system administration and use of the system, the later being delivered on a train the trainer basis Data Loading 3tc Software can assist with the automated loading of users, gazetteer data and the import of data from existing systems (if compatible) Please contact 3tc Software for further information and to obtain a quote for the services outlined above. 3.3 Supplied Documentation The following documentation is provided:- System administration guide System user guide 3.4 Rollout Assumptions In order to make the provisioning and transitioning as rapid as possible for new customers, 3tc Software has made various assumptions: There is no acceptance testing by individual customers, or any acceptance testing is done by the FRS on their own timelines. The system is provided as-is, and therefore we will only Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 18 of 24

19 accept any issues raised that pertain to faults in the system or relating to any customisations for a particular customer. No data is imported from existing systems (available as a service). Each customer system is configured identically. Each customer may require configuration of their internal systems (such as networking, firewalls, CAD systems). This is the responsibility (in terms of cost and effort) of the customer. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 19 of 24

20 4. Support We provide technical support between the hours of 0900 and 1700 Monday to Friday. This excludes bank holidays and the days between Christmas and New Year. Support is via a dedicated telephone number, and self-help portal. Urgent issues should be raised by telephone. Issues raised by or by the portal generate an auto-response acknowledging the issue has been raised and issuing a unique incident number. Support is primarily provided from our company premises in Leicester. All support is remote, as there is no facility to physically attend the AWS hosting environment. Support provided to FRSs will also be remote. 4.1 Software Releases 3tc Software typically releases updated versions of the software on a six-monthly basis. The software updates include a roll-up of any new features and bug fixes made during the preceding period. It may be necessary to release software more frequently than the six-monthly schedule. For example should the need arise to address a serious issue, a patch release may be released quickly and directly to the live system. Software Testing Software is tested internally prior to release by our internal test resource. This includes a mixture of automated low-level testing (unit testing) and manual user testing against defined test scripts. The test scripts are designed to test the software to prove functionality and to test issues that have been resolved. Once the release is signed off internally, it is deployed to the customers Test systems. It is then available for a period of one month for familiarisation and testing. After this preview period it is installed on the live system. We resolve any serious issues reported during the preview period prior to release, which may cause a delay of the release to the live system should further testing be required. 4.2 Web Browser Compatibility Operational Risk Management is currently compatible with the following browsers: IE 10+ Chrome Firefox Opera Safari Whichever browser is used, HTTPS, JavaScript and download functionality must be enabled. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 20 of 24

21 4.3 Support SLAs The period during which the Contractor provides System support shall be office hours only from 0900 to 1700 hours from Monday to Friday excluding Public Holidays and weekdays between Christmas and New Year. Target Responses These are our target responses. Priority Primary Response Initial Analysis Restoration of Service Category 1 2 hours * 4 hours 8 hours 2 4 hours * 1 day 4 days 3 1 Working day 5 working days 10 working days 4 2 Working days 10 working days 15 working days Notes: All time shown in above table are working minutes/hours/days Lower priority issues may be released as part of the planned updates instead of patches Priority Categories Report Description Category 1 A Single Fault preventing the use of core features for all users 2 A Single Fault preventing the use of core features for multiple users 3 A Single Fault preventing the use of core features for one user A Single Fault preventing the use of secondary features for multiple users 4 A Single Fault preventing the use of secondary features for one user A Single Fault of a cosmetic or minor nature affecting any number of users All general enquiries Definitions Term Primary Response Initial Analysis Restoration of Service Definition Contact from the Contractor s Support Division to clarify the problem and discuss potential actions that can be taken immediately Contact from the Contractor s Support Division reporting the results of an initial analysis into the problem, giving details in to the possible causes of the problem and, where possible, proposing a solution for a temporary and/or permanent fix and a timetable for achieving that solution An acceptable temporary work around into the problem that allows the users to operate the system without substantial degradation in performance. A temporary fix will only be applied where suitable. In some instances a temporary fix may not be available. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 21 of 24

22 Scheduled Maintenance We perform scheduled maintenance on the system from time to time in order to optimise performance, resolve issues, update data sets (such as gazetteers) and update system components. We plan these events on a quarterly basis, and FRSs are notified in advance of the date and estimated duration of the downtime. Unscheduled Maintenance We do anticipate that there may be instances where there are unplanned events during which the system is unavailable for periods of time. In such events we will work to resolve the system issue as quickly as possible. If the downtime looks like it may be protracted, 3tc Software will notify the FRSs primary contact and advise them of the status of the incident. Service Availability The system availability is 99.9%. This allows for average unplanned down-time as followings: 8.76 hours per year 43.8 minutes per month 10.1 minutes per week 1.44 minutes per day Availability is measured on a per customer basis, not across the entire system and does not cover planned down-time for maintenance as defined in Scheduled Maintenance. 4.4 Resilience The AWS hosting provides backups of SQL Server as follows: Daily instance backups. Five minute transaction logs. This allows point-in time recovery in the event of a database server loss. The loss of a server is anticipated to be extremely low. 4.5 Exclusions We are not able to support issues with the individual customers environment or infrastructure. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 22 of 24

23 5. Pricing All costs are exclusive of VAT. The costs provided have assumed a minimum contract length of two years. Extensions would be possible. For the purposes of costs, we have assumed the AWS hosting will be in the Europe (Ireland) region. 5.1 ORM Annual Prices ORM Annual Licence Cost Per FRS 35, We also provide the service using a pooled application (for a regional consortium for example). See below for pricing: 1 to 5 customers: 35k per annum, per customer 6 to 10 customers: 32k per annum, per customer 5.2 Training Prices Item Training, up to a maximum of 6 delegates per course, based on a train the trainer course delivery (this includes training on all functional modules) Per Course 6, Each Training course covers the following: ORM Administration (1day) ORM User training (2 days) The above syllabus training is provided over a three day session, with the syllabus running back to back. 5.3 Microsoft Licensing AWS licensing for MS SQL Server and MS Windows is included in the hosting costs. 5.4 Costs for Additional Work For any work not covered above, we will charge our standard day rate. Item Per Day Consultancy/Engineering day rate Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 23 of 24

24 For larger packages of work it will be more economical for us to provide a quote against a scope of work. 5.5 OS On-Demand and OS AddressBase Premium It is assumed that end-user organisations are FRSs covered by an OS Public Sector Mapping Agreement (PSMA) allowing free access to OS On-Demand. This is subject to Ordnance Survey s Fair Usage Policy. The system will be configured with your unique API key (available from OS), which will provide access to the mapping service under your existing PSMA. Note: Any usage outside of the Fair Usage policy or exceeding the free entitlement, or outside the PSMA (and any resulting charges from OS), will be the responsibility of each customer. 5.6 General Caveats All IPR for the software designed and developed by 3tc Software will remain with 3tc Software. This includes the application software, database design, overall solution design and any other IP pertinent to this solution. Each Fire & Rescue Service will require a licence, which will cover them for their current geographical area of operation and they will be required to sign an end user licence agreement as detailed in the contract document. Copyright 2015 by 3tc Software Ltd Commercial In Confidence Page 24 of 24

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

ArcGIS Online School Locator

ArcGIS Online School Locator ArcGIS Online School Locator G-Cloud Services RM 1557vi Service Definition Esri UK G-Cloud 6 Lot 3 SaaS Services Crown Commercial Service Acknowledgement Esri and ArcGIS are trademarks, registered trademarks,

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

CA API Management SaaS

CA API Management SaaS SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

Execview Outsourced Services Management

Execview Outsourced Services Management EXECVIEW for G-Cloud Framework Users Execview Outsourced Services Management Service Definition for G-Cloud iv G-Cloud iv Service Description An overview of the G-Cloud Service (functional, non-functional)

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1 G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

The IaaS Server On Boarding Process

The IaaS Server On Boarding Process SERVICE DEFINITION G-Cloud 7 MANAGED SERVER Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material

More information

1 ForestSafe SaaS Service details Service Description Functional Non Functional

1 ForestSafe SaaS Service details Service Description Functional Non Functional 1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.

More information

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS

More information

Connectivity to Polycom RealPresence Platform Source Data

Connectivity to Polycom RealPresence Platform Source Data Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

G-Cloud Service Definition Cadcorp Web Map Layers

G-Cloud Service Definition Cadcorp Web Map Layers G-Cloud Service Definition Cadcorp Web Map Layers Ref: RM1557/iii Government Procurement Services G-Cloud III Contents 1. Introduction... 3 2. Service Overview... 4 2.1 Web Map Layers... 4 2.2 Initial

More information

Schedule 5: SaaS Premium Service Level Agreement

Schedule 5: SaaS Premium Service Level Agreement Schedule 5: SaaS Premium Service Level Agreement Service Level Agreement Number - - - - - _- _- _- _ ( ) Document Version: SLA (with SAAS) V_1_4 Contents 1. Provision of Service Warranty 3 1.1. Formula

More information

Use of The Information Services Active Directory Service (AD) Code of Practice

Use of The Information Services Active Directory Service (AD) Code of Practice Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be

More information

ishare in the Cloud Service Definition v5.0

ishare in the Cloud Service Definition v5.0 Service Definition v5.0 An overview of ishare in the Cloud ishare is an end to end Enterprise GIS for public sector comprising a spatial data warehouse, rich functionality browser based GIS including editing

More information

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements 1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........

More information

Execview Project Portfolio Management

Execview Project Portfolio Management EXECVIEW for G-Cloud Framework Users Execview Project Portfolio Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide

More information

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...

More information

Response to the Crown Commercial Service from HP Enterprise Services UK Ltd

Response to the Crown Commercial Service from HP Enterprise Services UK Ltd Response to the Crown Commercial Service from HP Enterprise Services UK Ltd G-Cloud (RM1557) Important Notice The information and data contained within this document constitutes confidential information

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

Spektrix Service Definition

Spektrix Service Definition Spektrix Service Definition An overview of the G-Cloud Service Spektrix is a cloud-based ticketing and marketing software package provided as Software as a Service. It is designed for arts and entertainment

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

Execview Corporate Performance Management

Execview Corporate Performance Management EXECVIEW for G-Cloud Framework Users Execview Corporate Performance Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide

More information

CRM Support Services Agreement

CRM Support Services Agreement CRM Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: Points Purchased in Initial Minimum Term: This Agreement sets forth the terms and conditions under which The CRM

More information

Hosted Desktop as a Service

Hosted Desktop as a Service Hosted Desktop as a Service Contents 1 Introduction to Hosted Desktop Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Administration... 4 2.3 Access Methods... 4 2.4 Service

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

Online Backup Service Definition

Online Backup Service Definition Online Backup Service Definition 2 Table of Contents Purpose of Document... 3 Online Backup Service... 3 Accreditations... 5 Target Service Levels for Online Backup... 5 Service Credits Rules and Claims...

More information

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote

More information

G-Cloud Custom Enterprise Mobile Applications Service Definition

G-Cloud Custom Enterprise Mobile Applications Service Definition G-Cloud 6 Custom Enterprise Mobile Applications Service Definition 1 Table of Contents 1 Service Definition (Technical Service Overview) 1.1 Overview 1.2 Service Detail 1.3 Trial 2 Service and Process

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...

More information

DataCentred Cloud Storage

DataCentred Cloud Storage Service Description DataCentred Michigan Park Michigan Avenue Salford Quays M50 2GY United Kingdom Tel: 0161 870 3981 enquiries@datacentred.co.uk www.datacentred.co.uk Contents Service Description... 2

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

STL Microsoft Dynamics CRM Consulting and Support Services

STL Microsoft Dynamics CRM Consulting and Support Services STL Microsoft Dynamics CRM Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

CRM in a Day Support Services Agreement

CRM in a Day Support Services Agreement CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

CWSI Service Definition for Server Monitoring

CWSI Service Definition for Server Monitoring CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015 Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Aurora. Version 1.0. Installation and Administration Guide. June 2012

Aurora. Version 1.0. Installation and Administration Guide. June 2012 Aurora Version 1.0 Installation and Administration Guide June 2012 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Service: Contract Management (Software as a Service)

Service: Contract Management (Software as a Service) Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,

More information

Customer Hosted Service Description and Service Level

Customer Hosted Service Description and Service Level Customer Hosted Service Description and Service Level Customer Hosted service description and service level Copyright Egton Medical Information Systems Limited 2014 Controlled Document Version 8: 1 November

More information

Live Guide System Architecture and Security TECHNICAL ARTICLE

Live Guide System Architecture and Security TECHNICAL ARTICLE Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network

More information

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 THOMSON REUTERS C-TRACK E-FILING SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track E-Filing is a stand-alone component of the C-Track product suite which can easily integrate with the C-Track

More information

Planning and Administering Windows Server 2008 Servers

Planning and Administering Windows Server 2008 Servers Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

GCloud Application Development Service Definition. Application Development

GCloud Application Development Service Definition. Application Development GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding

More information

Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5

Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Oracle Cloud Hosting and Delivery Policies Effective Date: June 1, 2015 Version 1.5 Unless otherwise stated, these Oracle Cloud Hosting and Delivery Policies (the Delivery Policies ) describe the Oracle

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

Library Systems Security: On Premises & Off Premises

Library Systems Security: On Premises & Off Premises Library Systems Security: On Premises & Off Premises Guoying (Grace) Liu University of Windsor Leddy Library Huoxin (Michael) Zheng Castlebreck Inc. CLA 2015 Annual Conference, Ottawa, June 5, 2015 Information

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Our Server Support Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Telephone Sales and Accounts 0161 232 0001 Technical Support 0161 232 0125 Email

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

SQL Server Database as a Service (DBaaS)

SQL Server Database as a Service (DBaaS) SQL Server Database as a Service (DBaaS) Contents 1 SQL Server Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request Fulfilment...

More information

ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z

ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Service Terms... 4 3.1 Scope of Hosted Exchange Services... 4 3.2 Data centre locations...

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

SFW CRM for Stakeholders - MS Dynamics CRM

SFW CRM for Stakeholders - MS Dynamics CRM SFW CRM for Stakeholders MS Dynamics CRM Service Definition SFW Reference: Version: 5.0 Date 03/04/14 SFW Limited Southern House Station Approach Woking GU22 7UY www.sfwltd.co.uk Page 1 of 13 1 Service

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3)

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3) UDiMan Name: UDiMan Identity Management service Service Type: Software as a Service (SaaS Lot 3) Introduction UDiMan is an Enterprise Identity Management solution supporting mission critical authentication

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.

HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration. HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

Software as a Service (SaaS) Requirements

Software as a Service (SaaS) Requirements Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By

More information

Ocean Park IT Cloud Solution

Ocean Park IT Cloud Solution Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions

More information

1.1 SERVICE DESCRIPTION

1.1 SERVICE DESCRIPTION ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

Contents HP Quality Center on SaaS... 3 Delivering a consistent approach to managing application quality... 3 Delivery the way you need...

Contents HP Quality Center on SaaS... 3 Delivering a consistent approach to managing application quality... 3 Delivery the way you need... HP QC on SaaS Contents HP Quality Center on SaaS... 3 Delivering a consistent approach to managing application quality... 3 Delivery the way you need... 4 Service benefits... 4 Specifications... 5 Table

More information