OPEN DATA: ADOPTING A SECURITY-MINDED APPROACH
|
|
|
- Marion Wade
- 10 years ago
- Views:
Transcription
1 OFFICIAL OPEN DATA: ADOPTING A SECURITY-MINDED APPROACH November 2015 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation or favour by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect or consequential, and including but not limited to, loss of profits or anticipated profits, loss of data, business or goodwill) incurred by any person and howsoever caused arising from or connected with any error or omission in this document or from any person acting, omitting to act or refraining from acting upon, or otherwise using the information contained in this document or its references. You should make your own judgment as regards use of this document and seek independent professional advice on your particular circumstances. Crown Copyright 2015 OFFICIAL
2 In June 2012, the UK Government published its Open Data White Paper: Unleashing the Potential 1 aimed at: making it easier to access public data; making it easier for publishers to release data in standardised, open formats; and engraining a presumption to publish unless there are clear, specific reasons (such as privacy or national security) not to do so. Such openness provides significant opportunities for reform of services, citizen engagement and innovation which in turn can each contribute to economic growth. However, it also requires that particular care is taken to identify and protect information which could impact on the safety and security of: individuals; sensitive assets and systems; and the benefits which the sensitive asset or system exists to deliver. This guidance provides a framework for adopting a security-minded approach to the sharing and publication of that data which could be exploited by those with hostile or malicious intent. Its purpose is not in any way to undermine the principles of open data. Rather it encourages the adoption of appropriate and proportionate measures by data owners and data publishers to ensure that the many benefits can still be realised, while protecting both key assets and the public s right to privacy. It draws on advice contained in PAS and should be read in conjunction with it. What is Open Data? The Government White Paper defines Open Data as that which meets the following criteria: accessible (ideally via the internet) at no more than the cost of reproduction, without limitations based on user identity or intent; in a digital, machine readable format for interoperation with other data; and free of restriction on use or redistribution in its licensing conditions. In some cases data may be geographically tagged, enabling its geospatial visualisation (e.g. open mapping), and thereby allowing relationships, patterns and trends to be more easily analysed. In order to deliver this open data and to realise its intended aims, including the need to protect certain information, an approach is required which delivers: safety - preventing the creation, by the use of open data, of harmful states which may lead to injury or loss of life or unintentional environmental damage; authenticity - ensuring that the open data is genuine; availability (including reliability) - ensuring accessibility and usability of the data in an appropriate and timely fashion; confidentiality - ensuring control of access and prevention of unauthorised access to sensitive information; integrity - maintaining consistency, coherence and configuration of data sets; 1 Available from 2 PAS , Specification for security-minded building information modelling, digital built environments and smart asset management. Available from 2
3 possession - preventing unauthorised control, manipulation or interference with systems disseminating open data; resilience - ensuring the ability of systems disseminating open data to transform, renew and recover in a timely fashion in response to adverse events; and utility - ensuring usability and usefulness of the data sets over time. The security-minded approach A security-minded approach should be adopted where a clear and specific reason for not publishing data exists, namely: to prevent an individual, or group of individuals, being identified or identifiable in the hands of a recipient of the data; to protect information about the location of sensitive assets or systems not otherwise generally visible directly or through other sources; to protect certain information pertaining to sensitive assets or systems, the location of which can be readily identified; and when the aggregation (through accumulation or association) of data, or an increase in the accuracy of the location of assets or systems, could compromise safety and security of an individual, an asset, a system or a related service. Even where a data set has been anonymised or pseudonymised, care must be exercised to ensure that de-anonymisation is not possible, for example, where data aggregation allows restoration of identifiers or characteristics of a data set, leading to identification of an asset or individuals or systems, e.g. security systems. There will be an additional security risk when this process would allow pattern of life analysis of certain individuals to be undertaken using data collected over an extended period of time, thereby understanding that particular individual s habits and potentially predicting future behaviours. The need for such an approach should therefore be assessed by the data owner prior to the release of a data set to a third party, and by the data publisher prior to: the publication of a new open data set; the update of an existing published data set; undertaking a review of an existing data set; or augmenting or linking a new or existing open data set with another data set. The process for applying a security-minded approach is shown in Figure 1 below. 3
4 Figure 1. Summary of the security-minded process for publishing open data Identifying the need for a security-minded approach When a decision has been taken to publish a data set as open data, the need for, and extent of, a security-minded approach to be applied, in whole or in part, should be assessed by the publisher using the open data security triage process outlined in Figure 2 below. 4
5 Figure 2. Open data security triage process Further information on the concept of security and the different security issues which are relevant to open data can be found in Clause 4 of PAS Where there is any uncertainty as to the sensitivity of data, appropriate advice should be sought. Information on sources of advice can be found in Clause of PAS Open data - managing risk Where the open data security triage process identifies the need for a security-minded approach, it will be necessary to develop a risk management strategy comprising a risk assessment, risk mitigation, and a process of review. The risk management process is shown in Figure 3 below. 5
6 Figure 3. Open data risk management process [adapted from Fig 6 - PAS :2015, reproduced with the kind permission of BSI] Further information on the risk assessment, risk mitigation and review processes can be found in Clauses , 7.2.3, and of PAS
7 Risk mitigation measures which it may be appropriate to adopt include: removing a sub-set of the data from the published data set where only that sub-set creates a risk; reducing the precision of the information where the precision of location or timing data increases the risk; providing the data in summary form to reduce the level of detail available where the granularity of the data increases the risk; publish the data set without the metadata, or remove the sensitive fields, where the metadata creates a risk; reduce the level of detail and/or remove some layers of mapped data as a user zooms in to view a locality where the granularity of the data increases the risk; and monitoring access by requiring user registration/login to access specific data sets. Open Data Security Strategy (ODSS) It is recommended that an ODSS in line with Clauses 7.1.1, and of PAS is developed. To maintain its relevance and validity, the ODSS and its inherent risk management strategy cannot be static and it is therefore necessary to have in place a suitable mechanism for its periodic review. The review process should identify and assess any risks which have changed for political, economic, social, technological, legal or environmental reasons. Reviews should be undertaken: prior to publication of an open data set; on a periodic basis to assess the data aggregation risks associated with material published by other data owners; in the event of a security breach or incident; in response to the development of new tools and techniques to analyse data. Access to any part of the ODSS that details the security risks and/or potential mitigation measures, should be managed on a strict need-to-know basis, with all such information subject to security measures appropriate to the level of risk, with regard to its creation, storage, distribution and use. Open Data Security Management Plan (ODSMP) It is vital that the policies, processes and procedures implement a holistic approach which addresses security around the aspects of people and process, as well as physical and/or technological security. People need to be aware of, and understand, the security policies in place. Alongside this, the security processes and measures, be they physical or technological, need to be effective and efficient. Without any one of these elements the effectiveness of the overall security regime will be reduced and there is real risk that the measures in place will be ignored or circumvented. The ODSMP should include: a) the policies, processes and procedures for the preparation, release, storage and dissemination of the open data, including the technical security requirements covering the aspects shown in Figure 4 below and described on page 2 of this guidance; b) monitoring, auditing and review arrangements; c) a plan for handling security breaches and incidents, in line with Clause 9 of PAS ; and 7
8 d) the process and procedures for the provision of information to third parties who intend to publish the data, including an outline of the contractual or licensing measures required. As with the ODSS, a suitable mechanism for the periodic review of the ODSMP will need to be in place. Access to any part of the ODSMP which details sensitive: requirements; systems; policies; processes; and/or procedures should be managed on a strict need-to-know basis, with all such information subject to appropriate security measures with regards to its creation, storage, distribution and use. Figure 4. Technical security requirements Accountability and responsibility for the security-minded approach It will be necessary for an individual to be responsible for the security-minded approach adopted. This role should: a) consult with the data originator regarding potential security and data aggregation issues; b) take ownership, and manage the development, of the ODSS and ODSMP; c) be accountable for security decisions that are taken; d) advise on the need for, and undertake, the review and auditing of documentation, policies, processes and procedures relating to the security of the open data; e) where appropriate and necessary, seek appropriate professional security advice to provide additional guidance throughout the lifecycle of the open data. Compliance with other legislation and standards The ODSS and ODSMP should take into consideration relevant legislation and regulations. Further information can be found in Clause 13 of PAS
CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH
CLOUD-BASED BIM AND SMART ASSET MANAGEMENT: ADOPTING A SECURITY-MINDED APPROACH March 2016 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,
FAQs about PAS 1192-5, A Specification for securityminded building information modelling, digital built environments and smart asset management
FAQs about PAS 1192-5, A Specification for securityminded building information modelling, digital built environments and smart asset management May 2015 Disclaimer Reference to any specific commercial
Introduction. Clarification of terminology
Initiating a dialogue about the security of digital built assets: a guide for managers (with regard to PAS 1192-5, A Specification for security-minded building information modelling, digital built environments
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
BYOD Guidance: Architectural Approaches
GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and
TERMS AND CONDITIONS OF USE OF KUWAIT FINANCE HOUSE BAHRAIN S WEBSITE & INTERNET BANKING SERVICES
TERMS AND CONDITIONS OF USE OF KUWAIT FINANCE HOUSE BAHRAIN S WEBSITE & INTERNET BANKING SERVICES Acknowledgement and acceptance of Terms Kuwait Finance House (Bahrain) B.S.C. (the Bank, our, us or we
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
User Agreement. Quality. Value. Efficiency.
User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
A specification for security-minded building information modelling, digital built environments and smart asset management
Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification
idata Improving Defences Against Targeted Attack
idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does
App Terms and Conditions!
1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
You are authorised to view and download one copy to a local hard drive or disk, print and make copies of such printouts, provided that:
Terms of Use The Standard Bank of South Africa Limited ( Standard Bank ) maintains this demonstration trading platform (the "Demo Trading Platform") and the virtual services/products ("Virtual Services")
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to
TERMS OF USE 1. Definitions
TERMS OF USE 1. Definitions This website (website) is owned and operated by BATS Trading Limited a company applying to be authorised and regulated by the Financial Services Authority, whose registered
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
Infrastructure-as-a-Service (IaaS) Product Terms
Infrastructure-as-a-Service (IaaS) Product Terms 1. Our contract with you 1.1. These Product Terms apply to the services ( IAAS Services ) provided by the Company ( us, we or our ) to the Client ( you
IAAS Product Terms PRODUCT TERMS
IAAS Product Terms PRODUCT TERMS 1. Our contract with you 1.1. These Product Terms apply to the services ( IAAS Services ) provided by the Company ( us, we or our ) to the Client ( you or your ) under
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.
Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL
MANAGE THIRD PARTY RISKS
SECURITY FOR INDUSTRIAL CONTROL SYSTEMS MANAGE THIRD PARTY RISKS A GOOD PRACTICE GUIDE Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,
Website Terms and Conditions
Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..
Thermal Imaging Test Target THERMAKIN Manufacture and Test Standard
Thermal Imaging Test Target THERMAKIN Manufacture and Test Standard June 2014 This document has been produced by CPNI as the standard for the physical design, manufacture and method of use of the Thermal
Should you have any questions please do not hesitate to contact the NIG Broker Support on 0845 600 8408* or by email to brokersupport@nig-uk.
Dear Broker Principal, RE: Access to the NIG Extranet (including The Hub). U K Insurance Limited, trading as NIG ( NIG/we/us ), has received an application from a member of staff at your organisation (
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Ya-YaOnline Platform ( Service ).
SOFTWARE AS A SERVICE AGREEMENT FOR THE USE OF: Ya-YaOnline Platform ( Service ). NOW IT IS HEREBY AGREED by and between the parties hereto as follows:- Definitions "Agreement" means this Agreement and
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING This Supplemental Terms and Conditions of Trading is supplemental to and forms part of the terms and conditions set out in the
Definitions. Broker means Veda Advantage Information Systems and Solutions Limited;
Definitions Authorised Purposes means: (a) dealings with interests in land authorised by Law; or (b) a purpose directly related to such dealing provided that the purpose is not contrary to any Law; or
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).
Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE ENTSO-E TRANSPARENCY PLATFORM
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE ENTSO-E TRANSPARENCY PLATFORM (January 2015) In accordance with Article 3 of the Regulation (EU) N 543/2013 on submission and publication of data in electricity
Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES
Web Drive Limited STANDARD TERMS AND CONDITIONS FOR THE SUPPLY OF SERVICES Web Drive Limited trading is herein referred to as "Web Drive". 1. Definitions a) Web Drive includes its employees and directors.
CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES
CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES APRIL 2010 CPNI in conjunction with the Sister Banks would like to acknowledge and thank ECA Ltd for their help in the preparation of this report. The
WEBSITE TERMS OF USE
WEBSITE TERMS OF USE 1. GENERAL 1.1 The Site is operated by Locomote Technologies Trading Pty Ltd (we). We are registered in Australia under company number 160 815 430. For the purposes of these Website
Lancashire County Council Information Governance Framework
Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice
Quorum Privacy Policy
Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
SOFTWARE DEVELOPMENT AGREEMENT
SOFTWARE DEVELOPMENT AGREEMENT THIS AGREEMENT dated the day of 20. BETWEEN: AND: ACN of (the Customer ; 1iT Pty Ltd ACN 092 074 247 of 41 Oxford Close West Leederville (the Contractor. BACKGROUND A. The
You must not: (a) Copy and republish material from this website (including republication on another website);
Terms of Use (1) Introduction These terms of use govern your use of our website; by using our website, you accept these terms of use in full. If you disagree with these terms of use or any part of these
Terms of Use (basic) 1
Terms of Use (basic) 1 (1) Introduction These terms of use govern your use of our website; by using our website, you accept these terms of use in full. 2 If you disagree with these terms of use or any
Terms and conditions 2011
Terms and conditions 2011 MailPerformance UK Ltd is engaged in the business of, amongst other things, providing certain email distribution services, including delivering content generated by MailPerformance
3.0 ACCEPTANCE OF WORK
Terms and Conditions All orders placed with The Web Bureau Ltd. are accepted subject to the following conditions, which shall form the basis of the contract between The Web Bureau Ltd and the customer.
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
07/2013. Specific Terms and Conditions Mobile Device Management
07/2013 Specific Terms and Conditions Mobile Device Management GENERAL PROVISIONS 1. Offer and Agreement 1.1 The present contractual terms and conditions (hereinafter referred to as Terms and Conditions
IT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
PerfectForms End-User License Agreement
PerfectForms End-User License Agreement 2011 PerfectForms Page 1 of 12 Contents 1. DEFINITIONS... 4 2. GRANT OF RIGHTS... 4 3. FEES... 5 4. CONFIGURATION... 5 5. INTELLECTUAL PROPERTY... 5 6. TERM AND
ACOT WEBSITE PRIVACY POLICY
ACOT WEBSITE PRIVACY POLICY Our commitment to privacy acot.ca (the Website ) is a website owned and operated by The Alberta College of Occupational Therapists ( ACOT ), also referred to as we, us, or our
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.
LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection
Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Use of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
SOFTWARE LICENSE AGREEMENT
SOFTWARE LICENSE AGREEMENT This Software License Agreement (the "Agreement") is made as of the day of, 2015 ( Effective Date ), by and between ("Company"), located at and ("Subscriber"), located at. Both
Earth Science Academic Archive
Earth Science Academic Archive The Principles of Good Data Management The National Geoscience Data Centre British Geological Survey, Keyworth, Nottingham, NG12 5GG Contents Purpose of this guide 1 What
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Asset Management Policy March 2014
Asset Management Policy March 2014 In February 2011, we published our current Asset Management Policy. This is the first update incorporating further developments in our thinking on capacity planning and
TERMS OF USE. Last Updated: October 8, 2015
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is
ENTERPRISE MANAGEMENT AND SUPPORT IN THE AUTOMOTIVE INDUSTRY
ENTERPRISE MANAGEMENT AND SUPPORT IN THE AUTOMOTIVE INDUSTRY The Automotive Industry Businesses in the automotive industry face increasing pressures to improve efficiency, reduce costs, and quickly identify
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Corporate and Investment Banking. Webtrader Challenge Rules. Play the Global Markets
Corporate and Investment Banking Webtrader Challenge Rules Play the Global Markets Please consider these Rules carefully as they may limit Standard Bank s liability and amount to an assumption of risk
Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance
QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment
UK Dedicated Servers Limited. Acceptable Use Policy
UK Dedicated Servers Limited Acceptable Use Policy Last Revision 10/12/2014 Telephone: 03450 915 620 Postal Address: UK Dedicated Servers Limited 61 Somers Road Industrial Estate Rugby Warwickshire CV22
TERMS OF USE TomTom Websites
TERMS OF USE TomTom Websites 1 Scope These Terms of Use apply to the use of TomTom Websites and contain your rights, obligations and restrictions when using TomTom Websites. By continuing to use this TomTom
Captain Compare - Website Terms of Use
Captain Compare - Website Terms of Use The Captain Compare Website is owned and operated by AGS. Captain Compare is a business name and trade mark of AGS. The meaning given to certain words used in these
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
AXIS12 DRUPAL IN A BOX ON THE CLOUD
SERVICE LEVEL AGREEMENT AXIS12 DRUPAL IN A BOX ON THE CLOUD version 1.0 Page 1 of 6 This Axis12 Drupal in a box on the cloud Service Level Agreement ( SLA ) is a policy governing the use of the Axis12
BHARTIYA SAMAJ OF CENTRAL FLORIDA (www.bscfl.com) WEBSITE TERMS AND CONDITIONS
BHARTIYA SAMAJ OF CENTRAL FLORIDA (www.bscfl.com) WEBSITE TERMS AND CONDITIONS Introduction These terms and conditions govern your use of this website; by using this website, you accept these terms and
