Ticoon Technology Inc. Ticoon Data Governance and Stewardship

Size: px
Start display at page:

Download "Ticoon Technology Inc. Ticoon Data Governance and Stewardship"

Transcription

1 Ticoon Technology Inc. Ticoon Data Governance and Stewardship

2 Contact Us Thank you for your interest in the Ticoon Service. If you have any questions or concerns about the content of this document, or you would like to know more about Ticoon, please feel free to contact us using any of the methods indicated below. Our office hours are 8:30 5:00, Monday to Friday - we look forward to hearing from you. Gil Quesnelle Brett McGoldrick Michael Morgan VP Sales Director, Data Engineering Privacy Officer Tel: (416) x245 Tel: (416) x292 (416) [email protected] [email protected] [email protected] Ticoon Technology Inc. 56 The Esplanade, Suite 404 Toronto, Ontario, M5E 1A7 [email protected] Tel: (416) Fax: (416) of 17

3 Table of Contents GLOSSARY OF TERMS INTRODUCTION DATA SUPPLIER DOCUMENTATION PRESENTATION & USE OF CLIENT DATA DATA ACCESS PRESENTATION OF CLIENT DATA DATA LOCKING IDENTIFICATION OF DATA SUPPLIER IDENTIFICATION OF MANUAL VERSUS ELECTRONIC ENTRIES SEPARATION OF VERIFIED VERSUS UNVERIFIED ACCOUNTS & POLICIES IDENTIFICATION OF DATA SUPPLIER AT THE TRANSACTION LEVEL DATA LOADING MODELS USE OF CLIENT DATA CLIENT REPORTING CLIENT INTEGRATED PORTFOLIO REPORTING VERSUS STATEMENTS CLIENT PORTFOLIO REPORTING TIME/DATA REPORTING FINANCIAL INSTITUTION AND LIFE INSURANCE CARRIER IDENTIFICATION IDENTIFICATION OF MANUAL ENTRIES CURRENCIES DISCLAIMER LOCATIONS DISCLAIMER FONT SIZE PAGINATION DISCLAIMER WORDING ACCORD - STANDARD TERMINOLOGY RATE- OF- RETURN CALCULATION COMBINED RATE OF RETURN DATA PRIVACY PRIVACY DATA MATCHING AND MERGING INFORMATION SHARING TO THIRD PARTIES PRIVACY AND CITS IMPLEMENTATION GUIDES PHYSICAL SECURITY & INFRASTRUCTURE TICOON DATA CENTER DATA CENTER SPECIFICATIONS HOSTING - CANADA GUIDELINES RELATED TO EXTERNAL REGULATORS MFDA REGULATIONS CLIENT COMMUNICATIONS VERSUS CLIENT STATEMENTS ACCOUNT CARRIER IDENTIFICATION DISCLAIMER OFFICIAL STATEMENT DISCLAIMER MFDA INVESTOR PROTECTION DISCLAIMER THIRD PARTY PRODUCTS TECHNICAL REQUIREMENTS DATA ENCRYPTION of 17

4 FILE TRANSFER PROTOCOLS INDIVIDUAL FILE FORMAT BATCH FILE FORMAT AND NAMING CONVENTION END- OF- TRANSMISSION FLAG BASIC DATA FLOW DIAGRAM EXAMPLE (UPLOAD) of 17

5 Glossary of Terms Advisor Advisor Data Advisor Team Member Client Data (Investor Data) Client (investor) Data Supplier Distributor Sync Source Third Party Software or Service Ticoon Service Ticoon Store Unverified Data User Verified Data Individual employed, directly or indirectly, or contracted, directly or indirectly, with a Distributor or MGA. For the purpose of this document an Advisor shall also include the Advisor s administrator. Information about the advisor s organization received from a Data supplier or manually entered by a Distributor or an Advisor. Individuals associated with the Advisor and who support the Advisor to service the Client. Personal, financial and insurance data received electronically from a Data Supplier, or entered manually by a Distributor or MGA, an Advisor or a Client. Client Data includes verified and unverified data. Consumer or investor who have purchased financial and/or insurance products produced through a Distributor or Advisor, from a Data Supplier. Sources of Client Data including Financial Product Manufacturers such as Banks, Insurance Companies, Mutual Fund Companies & Asset Managers. Data Suppliers may provide Verified Data. Includes IIROC registered brokers, MFDA registered dealers, Credit Unions, MGAs (Managing General Agents), banks and insurance companies. The unique identifier applied to each Data Supplier system and available in the user interface including information regarding the last updated date and time. Software or solutions integrated with the Ticoon Service that enables Users to extend the use of the service. Third Party Software or Services includes financial planning software, portfolio management software, insurance illustration software and other. The service provided to Users and includes: TicoonSales: Client Management System for Advisors TicoonFieldforce: Advisor Management system for Distributors TicoonTouch/MyTicoon: Financial services and insurance portal for Clients For more information on the Ticoon Service visit Location within the Ticoon Service that allows an Advisor to purchase additional Ticoon or Third Party Software or Service functionality. Data source where a manual intervention can/has taken place. An individual licensed to access the Ticoon Service including: Distributor s Personnel: an individual employed, directly or indirectly, or contracted directly or indirectly, with the Distributor s Personnel, and that has a license to access the Ticoon Service. Advisor: an individual employed, directly or indirectly or contracted, directly or indirectly with a Distributor, and that has a license to access the Ticoon Service. Advisor Team Member: an individual associated with the Advisor and who supports the Advisor in servicing the Client, and that has a license to access the Ticoon Service. Client: an individual who has a license to access the Ticoon Service from their Advisor or Distributor. Data source is electronic (i.e. no manual intervention). 5 of 17

6 Introduction Ticoon consolidates Client Investment, Banking, Insurance and Other Data from multiple Data Suppliers. Ticoon only consolidates Client Data for existing accounts and in- force life insurance policies, and does not consolidate information regarding pending or potential new business (e.g pending life insurance policies, or potential new investment accounts). The most practical source of Client Data depends on the industry: Client Investment data is typically accessed from book- of- record or administrative systems managed by the Distributor, or from Fundserv. These systems often have data export capabilities or interfaces that enable Ticoon to extract or receive Client Data. Client Life Insurance data (in- force policy data) is typically not available through the Distributor s administrative system, but is often available directly from a Life Insurance carrier s underwriting system, administrative system or corporate database. Banking data is not available through the Distributor s administrative system but is often available directly from the banks administration systems, accounting systems or corporate database. Ticoon integrates directly with banks source systems to extract or access banking data. The purpose of this document is to provide a Data Supplier s operational, compliance/legal and business departments with an understanding of the Ticoon best practices regarding the i) transfer; ii) storage; iii) presentation; and iv) use; of Client Data. Adherence by Ticoon to the guidelines set out in this document assures Data Suppliers that compliance and regulatory guidelines and best practices are applied to the access, distribution and use of Client Data. 6 of 17

7 Data Supplier Documentation Ticoon s platform serves as a conduit for the distribution and sharing of Client and Advisor Data and Documents between Data Suppliers, Distributors, Advisors, and Clients. Presentation & Use of Client Data Data Access Ticoon s data access model and security infrastructure ensures that Client Data received from each respective Data Supplier is segregated appropriately and is only available to Users with explicit permission to view or access that Client Data including the: Distributor: whose registered or licensed Advisors have sold products and services, where those products and services were sold through the respective Distributor, and will have access to Client Data pertaining specifically to each respective Client for whom those products or services were sold. Advisor: who has sold products or services and will have access to Client Data pertaining specifically to each respective Client for whom those products or services were sold. Advisor Team Members: whose associated Advisor has sold products or services, and will have access to Client Data pertaining specifically to each respective Client for whom those products or services were sold, when access to that data is explicitly granted by the respective Advisor. Clients: who have purchased products or services and will have access to Client Data specifically pertaining to those products or services that they have purchased and members of the Client s household or other third parties to whom the Client has explicitly granted access by the Client. Ticoon Staff: Ticoon limits employee access to Client and Advisor Data to those employees that are required to see the data to support Ticoon s customers. All Ticoon employees undergo 3 rd party background checks and annual screening including criminal, identity, and educational confirmations in accordance with industry best practices. Only those employees involved in the data mapping, loading, and troubleshooting are provided with access to Client and Advisor Data. Presentation of Client Data Client Data will be presented in a number of different views and reports for Users depending on each Users data access, including: Summary Views Net Worth Views Consolidated Views Product Type Views Data Supplier Views (by Bank, Insurance Company or other) Other Views Client Data electronically supplied by a Data Supplier is clearly identified with the respective Data Supplier s name in all views. Data Locking Financial and insurance data (e.g. policy or account) that comes from a Data Supplier, including any transactions associated with that policy/account, is a Data Supplier holding and considered Verified Data. Verified Data is flagged in the Ticoon database as locked so that the holding cannot be modified. This protects the Data Supplier from having its data misrepresented to the Client. 7 of 17

8 Identification of Data Supplier The Ticoon system clearly separates Client Data by Data Supplier. All Verified Data fed by a Data Supplier is clearly identified for such Data Supplier. This will support any presentation requirements (printed or on- line) where separation of information based on the Data Supplier is required (this supports MFDA & IIROC data presentation requirements). Identification of Manual versus Electronic Entries The Ticoon system supports manually adding Client holdings (Unverified Data holdings). Manually entered holdings are flagged as such and clearly identified for the Client. Appropriate disclaimers are presented to the Client on views and reports. Separation of verified versus unverified Accounts & Policies Verified or locked Data has a verified account balance that comes on the Data Supplier electronic feed (i.e. it comes from the Data Supplier s system). The value is part of a locked holding (and cannot be altered). Ticoon provides the capability of calculating account balances based on the transactions associated with the holding. Such a calculated balance is considered unverified and clearly presented as such (clearly and separately as unverified). Identification of Data Supplier at the Transaction Level Ticoon supports the inclusion, by the Advisor, of manually added transactions for an account that is received in an electronic feed from a Data Supplier enabling the addition of transactions that pre- date the association the Advisor had with their current Distributor. In other words, an account for a Client may span a move by the Advisor from one Distributor to another. Ticoon segregates the data appropriately and clearly distinguishes those accounts that include manually added transactions. Data Loading Models All data provided to Ticoon is stored securely and remains encrypted behind Ticoon s firewall. Please refer to the basic data flow diagram for usage of the private PGP key. Ticoon applies two distinct models to the loading of data: Full Load: A full data load may be completed for data from a single supplier when the Distributor is also the provider, or has requested the data for their own use. When this load model is applied, all data from the data supplier file will be loaded to the Ticoon production database. Limited Load: A limited load may be completed when data is specifically requested for pre- identified advisors, and when the Distributor has no interest in viewing the aggregated financial data. When this load model is applied, specific advisor data will be filtered from the data supplier file to be loaded to the Ticoon production database. Use of Client Data Ticoon s functional access control module ensures that Users only have access to features and functions appropriate to their role. In most cases the use of the Client Data is as follows: To request a demo of how Ticoon uses Client Data, please contact the Ticoon Sales team at or [email protected] Distributor use of Client Data (see Data Access) may include the following, if they have received approval to communicate with the client: Aggregate, non- identifiable summary information that uses Client Data for research, analysis and reporting Viewing online (see Presentation of Client Data) 8 of 17

9 Searching for specific information related to Client Data Segmentation based on Client Data Rate of Return Calculation Analysis of Client Data Producing reports that include Client Data Research using Client Data Generating communications to Clients using Client Data Producing Client letters and communications using Client Data Advisor use of Client Data (see Data Access) may include: Viewing online (see Presentation of Client Data) Searching for specific information related to Client Data Segmentation based on Client Data Rate of Return Calculation Analysis of Client Data Producing reports that include Client Data Research using Client Data Generating communications to Clients using Client Data Producing Client letters and communications using Client Data Advisor Team Member use of Supplier Data may include: Viewing online (see Presentation of Client Data) Searching for specific information related to Client Data Segmentation based on Client Data Analysis of Client Data Producing reports that include Client Data Research using Client Data Generating communications to Clients using Client Data Producing Client letters and communications using Client Data Clients may be granted access to their Client Data (investment, Insurance & Banking Data) through Ticoon s Investor Portal (CFS). This includes summary information, accounts & policy information as well as transaction details. Client use of Supplier Data may include: Viewing online Generating reports Client Reporting Client integrated reporting refers to any reporting involving Verified Date and Unverified Data that is shown to the Client, either in a report, through Ticoon s Advisor Desktop or Investor Portal. Client Integrated Portfolio Reporting versus Statements Official statement reporting comes from the financial institution and/or life insurance carriers, including statements from Distributor and statements from fund companies. Those statements reflect back- office systems that are regarded as official book- of- record information. By common convention, the term statement is reserved for official reporting of Client information. Ticoon does not provide official reporting (or statements) to Clients and all views and reports include disclaimers that state such. The Ticoon Service brings all the financial affairs of the Client together in an integrated view and provides a 9 of 17

10 coherent financial picture that supports financial decision- making and planning. Ticoon recommends that all decision making should be confirmed using official statements and reports. Client Portfolio Reporting The Advisor may provide to the Client a report of the Client s investments, life insurance and banking information (verified and unverified). Verified and unverified source data will be separated using standard conventions. Time/Data Reporting The accuracy of information is linked to the data refresh date (i.e. last date the synchronization was run). Ticoon consolidates data from multiple source systems, some of which are unable to provide current data. Ticoon always shows the latest refresh date so Users know when the specific data was last updated. Financial Institution and Life Insurance Carrier Identification All holdings supplied by a Data Supplier will be clearly identified as such. Identification of Manual Entries Any holdings that have been entered manually are identified as such and clearly separated and disclosed as unverified or manually entered data. Currencies Any non- Canadian currencies are clearly identified on any Client reporting. Disclaimers include information regarding foreign currencies and fluctuations of exchange rates that can affect the value. Disclaimer Locations Disclaimers are located such that they cannot be omitted from a report; this includes blocking all disclaimers to the last page, or positioning disclaimers at the bottom edge of the page or beneath the page number. Disclaimer Font Size Disclaimers are 8pt or larger font size. Pagination Each page in a report is numbered, including a page n of m where m is the total number of pages in the report. Disclaimer Wording Generic disclaimer wording is standardized by Ticoon on the Portfolio Report for all users, and conveys the following points: The report is not an official statement. The client should refer to official Distributor statements for book- of- record details. ACCORD - Standard Terminology Ticoon is a member of CLIEDIS and where possible, Ticoon uses ACCORD standard terminology. ACCORD has defined almost every term used in the insurance industry but note that not all terms defined by ACCORD are unambiguous in a Canadian context. Work actively continues to remove any such ambiguities from a global perspective. of 17

11 Rate- of- Return Calculation Ticoon provides a rate- of- return (ROR) calculation based on Verified Data and Unverified Data provided by multiple Data Suppliers. Rates of return may be calculated based on a single holding or a combination of holdings; and may be based on Verified Data and Unverified Data, or a combination of Verified Data and Unverified Data. Transactions are the primary source of data used to calculate rates of return. Transactional data is required in order to provide any form of Rate of Return calculations in the Ticoon Solution. Combined Rate of Return This refers to any rate- of- return calculation that is reported on a collection of holdings on the Client s portfolio. A combined rate of return will include the financial activity from any number of holdings and products and for any number of Data Suppliers. Both verified and unverified transactional activity could be part of the calculation. Combined rates of return adheres to the following: It is clearly blocked separately in a summary section of the report from any detailed holdings reporting; It is clearly designated as a rate of return on combined holdings; It is clear which holdings are included in the rate of return calculation; It is clearly designed as a value that has been calculated by Ticoon; (this value is not part of electronically fed data from the Data Supplier); It clearly indicates the time period to which the rate of return pertains; It provides an appropriate explanation of methodology; and All calculations are annualized. Data Privacy For more information on Ticoon s Privacy Policy visit policy/ Privacy The Personal Information Protection and Electronic Documents Act (PIPEDA), the compliance of which is overseen The Office of the Privacy Commissioner of Canada within the federal government of Canada, details the requirements for protecting personal information. Ticoon s policies in limiting the sharing of Client s personal information specified in this document are in keeping with our understanding of the terms and conditions of PIPEDA. Distributors, Data Suppliers and Advisors must be familiar with PIPEDA and ensure that their own policies are in alignment with PIPEDA. Ticoon reserves the right to halt feeding data to any party that is not acting in accordance with the protecting Client privacy. Further information can be found at Some provinces also have their own privacy legislation. A Distributor, Data Supplier and/or Advisor doing business in any province with privacy legislation should be familiar with such legislation. Data Matching and Merging Ticoon has been successfully matching, merging, and splitting multiple back- office source contact data on our databases since Our proprietary algorithm uses an extremely conservative approach to contact matching/merging, and automatically performs this function only when we are certain that the contact records provided represent the same individual. If there is ever any doubt as to the accuracy of the merge 11 of 17

12 occurring through the automated process when new data is provided through the back office source, a split will occur generating two separate contact records. Ticoon supports the following contact matching, merging, and grouping processes: Contact Merging This can be performed automatically by our sync process using a proprietary algorithm, or manually by an advisor who has access to both contact records if there is insufficient data to provide an automatic match. Contact Splitting If there is reason to believe that contacts previously merged by the sync should not have been matched, a contact split can be automatically performed by our sync process using a proprietary algorithm at the next data load. This will not affect contacts manually merged by the advisor without manual intervention by Ticoon. Householding If household data is provided from a data supplier, contacts can be automatically added to households by our sync process using a proprietary algorithm. Alternatively, the advisor can complete this manually. Clients can be removed from a household at any time. Information Sharing to Third Parties To support users and create efficiency we will share data with third party applications and solutions, such as those providing account opening services, pre- populated forms, or financial planning tools. All third party applications will be passed data specifically to be used in the continuance of the advisor relationship, and only information specifically necessary to the use of the third party application will be passed. Third party services made available in the Ticoon Store have been pre- vetted for security and utility to Ticoon s subscribers, and all data will be transferred securely between Ticoon and the third party service, however Ticoon cannot be responsible for the internal practices of all integrated solutions providers. When a user purchases a third party app via the Ticoon Store, the terms and conditions of the third party application are disclosed and agreed to by the purchaser, and the service is used at the sole discretion of the purchaser. Privacy and CITS Implementation Guides CITS is a subcommittee of CLIEDIS. CITS develops implementation guides for the exchange of electronic data. Those guides specify the limited subsets of data fields related to Client Data that are permitted to be included. These have been agreed to across the industry in Canada with participation from the major carriers and Distributors. 12 of 17

13 Physical Security & Infrastructure All data and information received directly by Ticoon, from a Data Supplier, is stored in the Ticoon database, housed in Ticoon s secure storage facility. Data is available through the use of the Ticoon Service only. Ticoon Data Center Ticoon leverages the bench strength of one of Canada s premier managed services organizations to ensure it s infrastructure and applications are secure and available Ticoon s provider s facility has undergone and passed multiple 3rd party audits and penetration tests which confirm the platform is protected from compromise. Audits include the CICA 5970, the SAS 70 Type II audit, and the Payment Card Industry Data Security Standards (PCI DSS) audit. Data Center Specifications Operations Centre (OC): Located in Ticoon s provider s facility, the OC provides monitoring of infrastructure switching equipment, security, electrical systems, HVAC, fire detection, and the Ticoon System. Ticoon s Provider s Data Network delivers: Multiple fiber conduits into the building via physically diverse paths. Bandwidth capacity of four gigabits. Ethernet connections supplied by four different network providers. Facility core switching infrastructure that connects to the facility with redundant fiber, scalable from 1 Gbps to 500 Gbps and beyond. A Customer System that is connected to internal infrastructure providing high availability and redundant switching. IP network infrastructure that has no single point of failure between the data center backbone and the Ticoon System. The Ticoon System is connected to two redundant distribution switches. Network topology is a multi- layer design to enable bandwidth expansion based on current and future requirements. Cable plant is NORDX certified on CAT5E and CAT6. Ticoon s Provider s Network Security includes: Switched Ethernet to each server to prevent packet sniffing and provide bandwidth to the switch Packet filtering employed at border routers and data center firewalls ensure only authorized access is permitted. A distributed radius- based authentication system to provide maximum password management and security. An intrusion detection system that sends alerts directly to the OC. Ticoon s Provider s Physical Security includes: Facility entrance and security areas that are protected with bulletproof glass. Facility personnel that are on premises A single point of entry, mantraps and card access controls to ensure no unsolicited visitors. An envelope style layout with raised floor space in an enclosed building within the overall structure. Surveillance cameras that are strategically located to monitor building exterior, approaches to entrance and throughout the raised floor area. Ticoon s Provider s Electrical Systems includes: Dual incoming electrical feeds of 13,800 volts at 4,000 amps. 13 of 17

14 Facility- owned double- ended main switchgear with tiebreaker, including independent step- down transformers at both ends capable of handling the entire switchboard. UPS: A total of 3,000 kva through 4 UPS modules in a N+1 configuration with multiple independent delivery infrastructures to the platform. Redundant UPS power distribution sources (A & B configuration) provided to every cabinet. N+1 backup provided by 3 diesel generators (two at 1.5 MW, one at 1.25 MW for a total of 4.25 MW total stand- by power). Fuel storage that allows for 72 hours of uninterrupted generator operation. Multiple supplier agreements for refueling within 2 hours. Approximately 30,000 L of diesel on premises. Ticoon s Provider s Air Cooling & Handling Systems include: Air quality handling systems control temperature and humidity. Cooling systems: central cooling plant consisting of four 300- ton open drive centrifugal chillers supporting an independent two pipe chilled water delivery system to 47 air handling units (N+1 configuration on pumps, towers, chillers and air handling units). Temperature Range: 68-78F; Humidity Range: 35-50% Early Fire Detection & Suppression Systems: Siemens FireFinder detectors provide very early detection of actual fires and distinguish them from deceptive conditions (e.g. humidity, dust, temperature shifts, etc.) based on fingerprints of different types of fires. Any detection is reported instantly to the facility staff and to the OC through site automation system. Additional monitoring by 3rd party security monitoring firm. 12 detection zones display any potential problems below or above the raised floor to the monitoring system, allowing staff to quickly pinpoint and resolve the problem. Hosting - Canada Ticoon hosting servers are physically located in Canada only. 14 of 17

15 Guidelines Related to External Regulators Many of these items are covered in other sections of this document and Ticoon meets or exceeds industry guidelines as of the date of this document. MFDA Regulations Any use of mutual funds data is regulated by the MFDA. These rules related to client information reporting are detailed in MFDA Regulations 2.8 and 5.3, along with supplementary notice MR NOTE: The full MFDA regulations are available at: Client Communications versus Client Statements Under MFDA rules of reporting, any distributor- level client reporting is regarded as client communications and is not to be confused with the official client statement reporting that MFDA members are obligated to provide. Any Distributor providing client information must take care to avoid any confusion. For example, the term statement should never be used in any context as it related to this level of client reporting. Account Carrier Identification A particular holding must clearly identify the legal entity that holds the particular asset or money balance e.g. the Distributor. In the mutual funds industry, this will generally be different than the manufacturer of the holding. Disclaimer Official Statement Ticoon contains a prominently displayed disclaimer stating that Ticoon does not include an official statement of account but rather supplemental information to the official account statement. Disclaimer MFDA Investor Protection Ticoon s disclaimer covers the fact that the MFDA s Investor Protection Corporation does not necessarily apply to all positions that the Client has, and the Client should refer to their respective Distributor s official account statement to determine which assets are eligible for coverage. Disclaimer Third Party Products Ticoon s disclaimer includes a statement that Ticoon cannot verify that the Client Data is accurate and/or complete. 15 of 17

16 Technical Requirements Data Encryption Ticoon s standard for data encryption is Pretty Good Protection (PGP). PGP is a public key encryption method most commonly used on market that provides cryptographic privacy and authentication for data communication. File Transfer Protocols SSH File Transfer Protocol (sometimes called Secure File Transfer Protocol or SFTP) is a network protocol that provides file access, file transfer, and file management functionality over any reliable data stream. Ticoon uses SFTP to receive data from Clients. Clients can use any software available to connect and upload data streams to Ticoon s secure FTP. Software examples include WinSCP, which is an open source SFTP client, and FTP client for Windows. Individual File Format Each individual file representing source data will have its own standard format and naming convention. Batch File Format and Naming Convention All data files needed to process specific daily, monthly or any other batch job should be saved in pre- defined format and compressed into single archive. Ticoon uses ZIP file compression and archive format without using standard ZIP encryption. ZIP file should be then PGP encrypted using a public key provided by Ticoon before being uploaded to the secure FTP. Each batch file must contain all individual files needed for processing and must be named and transmitted based on Ticoon s standard naming convention. End- of- transmission Flag The end- of- transmission flag should follow all successfully uploaded files. Ticoon uses this method to identify that file uploading is complete and to start data sync. End- of- transmission flag is zero length text file with exactly the same file name except for the extension part. 16 of 17

17 Basic data flow diagram example (upload) 17 of 17

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Data Center Infrastructure & Managed Services Outline

Data Center Infrastructure & Managed Services Outline Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Data Center Overview Document

Data Center Overview Document Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Experience Matters...

Experience Matters... Experience Matters... Travelport Data Center offers confidence and space to meet your demanding IT needs Transwestern presents the Travelport Data Center in Denver, Colorado totaling 267,000 SF with 121,600

More information

vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service

vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

DATA CENTRE DATA CENTRE MAY 2015

DATA CENTRE DATA CENTRE MAY 2015 DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

san francisco//usa data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence

san francisco//usa data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in San Francisco, USA. We can colocate standard rack-mountable servers

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

YubiCloud OTP Validation Service. Version 1.2

YubiCloud OTP Validation Service. Version 1.2 YubiCloud OTP Validation Service Version 1.2 5/12/2015 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

CHICAGO S PREMIERE DATA CENTER

CHICAGO S PREMIERE DATA CENTER CHICAGO S PREMIERE DATA CENTER White City collocation was founded in June, 2010 by a highly experienced industry executive in conjunction with several investment companies. The strategy of White City is

More information

Security & Infra-Structure Overview

Security & Infra-Structure Overview Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

ASX ITS Co-location Hosting Solution

ASX ITS Co-location Hosting Solution ASX ITS Co-location Hosting Solution Introduction The Australian Securities Exchange (ASX) is proposing to offer a Co-location hosting service to its Market Participants that will facilitate DMA and Algorithmic

More information

LEVEL 3 DATA CENTER SERVICES IN OMAHA, NEBRASKA HIGH AVAILABILITY ENTERPRISE COMPUTING BUSINESS DEMANDS IT. LEVEL 3 DELIVERS IT.

LEVEL 3 DATA CENTER SERVICES IN OMAHA, NEBRASKA HIGH AVAILABILITY ENTERPRISE COMPUTING BUSINESS DEMANDS IT. LEVEL 3 DELIVERS IT. LEVEL 3 DATA CENTER SERVICES IN OMAHA, NEBRASKA HIGH AVAILABILITY ENTERPRISE COMPUTING BUSINESS DEMANDS IT. LEVEL 3 DELIVERS IT. THE SCALE TO SUPPORT GLOBAL ENTERPRISE IT Designed and equipped to meet

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Game-Changing Program For Financial Advisors & Insurance Agents. (An Introduction to TicoonSales)

Game-Changing Program For Financial Advisors & Insurance Agents. (An Introduction to TicoonSales) Game-Changing Program For Financial Advisors & Insurance Agents (An Introduction to TicoonSales) Who We Are In business since 1996 About Ticoon 100% focused on the Canadian financial services and life

More information

CyberFortress Data Center at Innovation Park Infrastructure and Topology Guide. Innovation Park Charlotte. NC 28262. DRAFT V0.

CyberFortress Data Center at Innovation Park Infrastructure and Topology Guide. Innovation Park Charlotte. NC 28262. DRAFT V0. Innovation Park Charlotte. NC 28262 DRAFT V0.1 Page 2 CyberFortress Data Center at Innovation Park BECO South purchased Innovation Park in March 2010 and immediately launched a dramatic top-to-bottom $30M

More information

THE INTERNET DATA VAULT

THE INTERNET DATA VAULT THE INTERNET DATA VAULT From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data storage

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science COMSATS Institute of Information Technology, Abbottabad Department of Computer Science Course: CSC 432 Telecom Network Design (3,0) (Spring 2015) Office: Instructor: Office hours: Email: Z-Block (Z-359)

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

Chicago 1 (CHI-1) Data Center

Chicago 1 (CHI-1) Data Center 215 W. Ohio St. 5th Floor Chicago, IL 60564 Call Us Toll-Free 1 (866) 817-2811 Follow Us @SingleHop Like Us facebook.com/singlehop Chicago 1 (CHI-1) Data Center Enterprise-Class, Downtown Chicago Facility

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Data Centre Stockholm II, Sweden Flexible, advanced and efficient by design.

Data Centre Stockholm II, Sweden Flexible, advanced and efficient by design. Data Centre Stockholm II, Sweden Flexible, advanced and efficient by design. Equinix Telecity Kvastvägen 25-29 128 62 Sköndal Stockholm Sweden Tel: +46 (0) 8 799 3800 [email protected] www.telecitygroup.se

More information

Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks

Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager [email protected] Introduction Gigabit network applications are becoming more and more popular in the modern networking

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF INTERNAL AUDIT DIVISION AUDIT REPORT Audit of the Riskmetrics system in the Investment Management Division of UNJSPF Overall results relating to the effective implementation of the Riskmetrics system were

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

Report of Independent Auditors

Report of Independent Auditors Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

out of this world guide to: POWERFUL DEDICATED SERVERS

out of this world guide to: POWERFUL DEDICATED SERVERS out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled

More information

Why Choose Go4Hosting Data Center?

Why Choose Go4Hosting Data Center? Why Choose Go4Hosting Data Center? Security When it comes to web hosting we understand the level of technical sophistication and server security involved. At Go4Hosting Data Center we focus on Security,

More information

NY-1 DATACENTER AT A GLANCE. NY-1 is a Tier III-rated, SAS SSAE16 and HIPAA-certified data center

NY-1 DATACENTER AT A GLANCE. NY-1 is a Tier III-rated, SAS SSAE16 and HIPAA-certified data center NY-1 1.866.WEBAIR.1 WWW.NY1.WEBAIR.COM NY-1 LONG ISLAND S MOST SECURE, FULLY-REDUNDANT DATA CENTER ENTERPRISE COLOCATION, PRIVATE AND HYBRID CLOUD SOLUTIONS, AND MANAGED SERVICES. DATACENTER Enjoy the

More information

Private Clouds & Hosted IT Solutions

Private Clouds & Hosted IT Solutions Private Clouds & Hosted IT Solutions Your Infrastructure, our datacenters With the help of its World-class partners, PBC can safely host any of your Mission-critical application on powerful, secure, Dedicated

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet

More information

100 Locust Avenue, Berkeley Heights, New Jersey P R O P E R T Y O F F E R I N G

100 Locust Avenue, Berkeley Heights, New Jersey P R O P E R T Y O F F E R I N G 100 Locust Avenue, Berkeley Heights, New Jersey P R O P E R T Y O F F E R I N G The Opportunity Jones Lang LaSalle, Inc. (the Broker ) is please to offer the fee simple interest in 100 Locust Avenue (the

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

South Asia s First Uptime Institute Certified TIER- IV IDC in Mumbai delivering 99.999% uptime

South Asia s First Uptime Institute Certified TIER- IV IDC in Mumbai delivering 99.999% uptime South Asia s First Uptime Institute Certified TIER- IV IDC in Mumbai delivering 99.999% uptime GPX India Pvt Ltd The Leader In Carrier Neutral TIER IV IDC s In Emerging Markets Incorporated in August 2002,

More information

OVERVIEW. IQmedia Networks Technical Brief

OVERVIEW. IQmedia Networks Technical Brief IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building

More information

DATA CENTRE DATA CENTRE

DATA CENTRE DATA CENTRE DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service

More information

South Asia s First Uptime Institute Certified TIER-IV IDC in Mumbai delivering 99.999% guaranteed uptime

South Asia s First Uptime Institute Certified TIER-IV IDC in Mumbai delivering 99.999% guaranteed uptime South Asia s First Uptime Institute Certified TIER-IV IDC in Mumbai delivering 99.999% guaranteed uptime GPX India Pvt Ltd The Leader In Carrier Neutral TIER IV IDC s In Emerging Markets Incorporated in

More information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

ISOMEDIA COLOCATION WWW.ISOMEDIA.COM/COLOCATION

ISOMEDIA COLOCATION WWW.ISOMEDIA.COM/COLOCATION ISOMEDIA COLOCATION WWW.ISOMEDIA.COM/COLOCATION Your business needs a robust infrastructure that is secure, cost effective and reliable in order to remain competitive in today s market. ISOMEDIA s colocation

More information

Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for Shared IT Infrastructure Global competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building their own

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0 Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Security & Infrastructure White Paper

Security & Infrastructure White Paper Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

OPERATOR - FACILITY ADDRESS - DATE

OPERATOR - FACILITY ADDRESS - DATE . Facility Criteria (RFP).0 Location Characteristics Criteria Requirements 1 Ownership and Management: Please identify the owner(s) and managers of the property and indicate if there is on-site management.

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Calculating Total Power Requirements for Data Centers

Calculating Total Power Requirements for Data Centers Calculating Total Power Requirements for Data Centers By Richard Sawyer White Paper #3 Executive Summary Part of data center planning and design is to align the power and cooling requirements of the IT

More information

Datacenter Hosting and Cloud Computing Services

Datacenter Hosting and Cloud Computing Services Datacenter Hosting and Cloud Computing Services Overview Background Founded in 1995, Lore Systems operates an international datacenter network which today includes full service 3+ datacenter facilities

More information

VOLICO. Colocation Hosting. Enterprise Hosting Solutions. 888 865 4261 [email protected] www.volico.com

VOLICO. Colocation Hosting. Enterprise Hosting Solutions. 888 865 4261 sales@volico.com www.volico.com 888 865 4261 [email protected] www.volico.com Performance, reliability, and the peace of mind your business deserves Colocation Overview A Reliable and Secure Home Your Data Can Trust! Discover how Volico

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive

Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive Co-Location Services Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive optimum performance 24x7. SERVICE

More information

YubiCloud Validation Service. Version 1.1

YubiCloud Validation Service. Version 1.1 YubiCloud Service Version 1.1 5/29/2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Powerful Dedicated Servers

Powerful Dedicated Servers Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

ASX Australian Liquidity Centre. ASXCoLo

ASX Australian Liquidity Centre. ASXCoLo ASX Australian Liquidity Centre ASXCoLo Australian Liquidity Centre Location The ASX Australian Liquidity Centre is located at: Gore Hill Business Park 219-247 Pacific Highway Artarmon. NSW, 2064 The location

More information