DOCUMENT CONTROL PROCEDURE
|
|
|
- Robyn Maxwell
- 10 years ago
- Views:
Transcription
1 DOCUMENT CONTROL PROCEDURE KING SAUD UNIVERSITY DEANSHIP OF E-TRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY
2 PREPARED BY REVIEWED BY APPROVED BY ALTAMASH SAYED NASSER A. AMMAR DR. MOHAMMED A ALNUEM REVISION HISTORY Sr. No. Date of Revision Ver. Validity Description of change Reviewed By Approved By 1 18/03/ One Year Initialization Nasser A. Ammar Dr. Mohammed A Alnuem 2 02/03/ One Year Department Ownership Changed Mr. Toqeer Ahmad 3 05/03/ One Year No Change Mr. Toqeer Ahmad Mr. Mohammed A. Alsarkhi Mr. Mohammed A. Alsarkhi DISTRIBUTION LIST Sr. No Version Number Name Designation Department ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 2 of 10 Internal Use Only
3 TABLE OF CONTENTS 1. PURPOSE SCOPE RELATED POLICIES AND PROCEDURES PROCEDURE ENFORCEMENT / COMPLIANCE DOCUMENT OWNER ROLES & RESPONSIBILITY INVOCATION PROCESS FLOWCHART PROCEDURE DETAILS OUTPUTS RECORDS REFERENCES ANNEXURE ISMS DOCUMENT AND RECORDS CHANGE REQUEST FORM ISMS DOCUMENT CHANGE REQUEST LOG FILE ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 3 of 10 Internal Use Only
4 1. PURPOSE The Purpose of this procedure is to enforce a consistent way to maintain, evaluate and update the ISMS documentation and respective records and ensure that changes to this documentation are performed in a controlled and systematic manner. 2. SCOPE This procedure applies to King Saud University (KSU) - etransactions & Communication (ETC) Deanship and all parties, its affiliated partners or subsidiaries, including data processing and process control systems, that are in possession of or using information and/or facilities owned by KSU-ETC Deanship. This procedure applies to all staff/ users that are directly or indirectly employed by KSU-ETC Deanship, subsidiaries or any entity conducting work on behalf of KSU that involves the use of information assets owned by ETC Deanship. 3. RELATED POLICIES AND PROCEDURES ISMS Management Policy. 4. PROCEDURE ENFORCEMENT / COMPLIANCE Compliance with this procedure is mandatory and ETC Deanship managers shall ensure continuous compliance monitoring within their departments. Compliance with the statements of this procedure is a matter of periodic review by Risk & Information Security Department and any violation of the procedure will result in corrective action by the ISMS Steering Committee. Disciplinary action will be depending on the severity of the violation which will be determined by the investigations. Actions such as termination or others as deemed appropriate by ETC Management and Human Resources Department will be taken. 5. DOCUMENT OWNER ISMS Manager ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 4 of 10 Internal Use Only
5 6. ROLES & RESPONSIBILITY Each role involved in this procedure shall have main responsibilities as follows: 1. ISMS Manager Develops, maintains and updates this procedure. Approves / Rejects the modification requests. Implements the approved modification. Informs the requestor about the outcome of his request. Updates the ISMS Modifications Log File. Reports annually to the ISMS Steering Committee the changes to the ISMS documentation that have taken place (if any). 2. ISMS Steering Committee Approves / Rejects the Change request when it concerns changes to Policies and Procedures. 3. Information Security Officer Fill in the ISMS Document Change Note and forward it to the ISMS. 7. INVOCATION This procedure shall be followed whenever there is: Update/Modification of ISMS Documentation To ensure the modification of procedures and controls is adequate to respond to internal/external changes that may impact security, including: Business requirement. Security requirement. Regulatory/ legal requirement. Acceptable level of risks/criteria. ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 5 of 10 Internal Use Only
6 8. PROCESS FLOWCHART Identified need for document change Document and Records Control Procedure Start Information Security Officer Step 1 ISMS Document Change Request ISMS Document Change Request Form Process ISMS Manager Step 2 Review Request Decision No Step 4 Implementation Step 5 Inform Requestor ISMS Documentation Change Log End Yes Yes ISMS Steering Committee Step 3 Approval Decision No Start / End Start and end of the procedure Reference to another procedure Another related procedure Input/ Input or output infomation Log/Record Storage to file Step 1 An activity / step Decision A decision in a procedure Form Document / Form 1 Follow to step no. Flow of 2 or more different decisions ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 6 of 10 Internal Use Only
7 9. PROCEDURE DETAILS This section reflects the broad activities/steps to be carried out in the procedure. STEP 1: ISMS DOCUMENT CHANGE REQUEST Responsibility Input Information Security Officer Identified need for document change Actions Fills in and forwards the Document Change Request Form to the ISMS Manager. The type of the requested change must be clearly stated in the form (security policies, security procedures, organizational structure). Document Change Request Form STEP 2: REVIEW REQUEST Responsibility Input ISMS Manager Document Change Request Form Actions Reviews the completed form. If the requested change involves Major changes in the security policies, the security principles or the organizational structure, he forwards the form to the ISMS Steering Committee for evaluation. None. STEP 3: APPROVAL Responsibility Input Actions ISMS Steering Committee Document Change Request Form The committee evaluates the request: If the ISMS Steering Committee approves the change, go to step 4. If the ISMS Steering Committee rejects the change, the ISMS Manager informs the requestor of the rejection. Change approval / rejection ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 7 of 10 Internal Use Only
8 STEP 4: IMPLEMENTATION Responsibility Input Actions ISMS Manager Document Change Request Form Implements the document change Document change issue of new version STEP 5: INFORM REQUESTER Responsibility Input ISMS Manager Decision on change request. Actions He informs the requestor about the outcome of his request. Updates the ISMS Documentation Change Log File ISMS Documentation Change Log Requestor update 10. OUTPUTS The following activity will be an output of the process. ISMS Document Change 11. RECORDS The following are the list of all applicable records that are the evidence of implementation of the Process. The records are maintained in hard and soft copy. ISMS Document and Records Change Request Form. ISMS Document Change Request Log File. 12. REFERENCES The following are the useful references which can be used to carry out the defined process based on ISO standards ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 8 of 10 Internal Use Only
9 13. ANNEXURE 13.1 ISMS DOCUMENT AND RECORDS CHANGE REQUEST FORM Date Requested by Document Title Proposed Changes Documents Influenced by Change Approved by Requestor s Manager Approval by ISMS Manager (if no approval, please provide clarification) Approval by ISMS Management Steering Committee when required (if no approval, please provide clarification) Change Implementation by Implementation Date Verification by ISMS Manager / Date ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 9 of 10 Internal Use Only
10 13.2 ISMS DOCUMENT CHANGE REQUEST LOG FILE ISMS DOCUMENTATION CHANGE LOG FILE Request No. Requestor's Name Request Date Approved by Approval Date Change Description Affected Documents Implementation Date Notes ISMS/4-8/4.3.2_4.3.3/DCP/PRO/ V1.1 Page 10 of 10 Internal Use Only
BACKUP & RESTORATION PROCEDURE
BACKUP & RESTORATION PROCEDURE KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY ALTAMASH SAYED NASSER A. AMMAR DR. MOHAMMED
DIRECTIVE NUMBER: 141.03.04.001 v2.0. SUBJECT: Correctional Integration Systems Change Management Plan
DEPARTMENT OF CORRECTION SUPPORT Management Services DIRECTIVE NUMBER: SUBJECT: Correctional Integration Systems Change PAGE NUMBER: 1 of 10 Adopted: 12-15-03 01.00.00. POLICY OF THE DEPARTMENT It is the
Log management and ISO 27001
Log management and ISO 27001 Rakesh Maheshwari STQC Directorate Department of Information Technology Ministry of Communications & IT [email protected] Log management Log management is the process of generating,
Authors: Tunç Lokmanhekim, Nazlı Nil Yukaruç and Çağla Yazdıç, ELIG, Attorneys-at-Law
Corporate Governance Tips for Mergers & Acquisitions Authors: Tunç Lokmanhekim, Nazlı Nil Yukaruç and Çağla Yazdıç, ELIG, Attorneys-at-Law I. Introduction This article is prepared for demonstrating the
ISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
DATA CENTER SERVICE CATALOG
DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI
CORPORATE COMPLIANCE PROGRAM
CORPORATE COMPLIANCE PROGRAM BACKGROUND AND POLICY: The Oakwood Accountable Care Organization, LLC. ( ACO ) corporate policy relating to compliance with applicable laws and regulations is embodied in this
LOBBYING DISCLOSURE IN PENNSYLVANIA 2014 ANNUAL REPORT PENNSYLVANIA DEPARTMENT OF STATE. June 2015. Tom Wolf Governor
LOBBYING DISCLOSURE IN PENNSYLVANIA 2014 ANNUAL REPORT PENNSYLVANIA DEPARTMENT OF STATE June 2015 Tom Wolf Governor Pedro A. Cortés Secretary of the Commonwealth Summary of Act 134 of 2006 This Act amends
Admiral Insurance Company
Executive Liability Insurance Proposal Form for Employment Practices Liability CLAIMS MADE WARNING FOR APPLICATION: This Proposal Form is for a Claims Made and Reported Policy, relating to claims made
Email Policy. Purpose
Email Policy St. John Fisher College requires the use of email by the campus community to share information and knowledge in support of the Collegeʹs mission and to conduct the Collegeʹs business. To this
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
PITTSBURG UNIFIED SCHOOL DISTRICT
PITTSBURG UNIFIED SCHOOL DISTRICT New Construction and Modernization Projects PRE-QUALIFICATION PROGRAM QUESTIONNAIRE FOR PROJECTS $20 MILLION AND OVER TABLE OF CONTENTS PAGE NO. GENERAL INFORMATION.......i
CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems
Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: [email protected] CP14 ISSUE 5 DATED 1 st OCTOBER
Standard CIP 004 3a Cyber Security Personnel and Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access
MANAGEMENT RESPONSIBILITY
Process Flow: (5.0) Page No. 1 of 7 Management Commitment Customer Focus Quality Policy Quality Planning Quality Objectives System Planning Resource Provision Human Infrastructure Work environment Responsibility
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
LAUREATE ANTI-CORRUPTION POLICY
LAUREATE ANTI-CORRUPTION POLICY Laureate Anti-Corruption Policy 1.0 PURPOSE AND BACKGROUND This Anti-Corruption Policy establishes basic standards and a framework for the prevention and detection of bribery
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...
Regulatory Compliance Policy No. COMP-RCC 4.32 Title:
I. SCOPE: Regulatory Compliance Policy No. COMP-RCC 4.32 Page: 1 of 4 This policy applies to (1) Tenet Healthcare Corporation and its wholly-owned subsidiaries and affiliates (each, an Affiliate ); (2)
General Director Regulations EuroChem Mineral & Chemical Company, OJSC
APPROVED By decision of the Annual General Shareholders Meeting of Minutes dated 25 June 2008 General Director Regulations (new revision) Moscow 2008 Contents 1. GENERAL PROVISIONS... 3 2. THE GENERAL
ITD Project Management and System Development Procedure ITD PROJECT MANAGEMENT AND SYSTEM DEVELOPMENT PROCEDURE
PURPOSE ITD PROJECT MANAGEMENT AND SYSTEM DEVELOPMENT PROCEDURE ITD s core business is to implement IT solutions. The purpose of this procedure is to facilitate the identification, management and monitoring
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Cross-Sound Cable Company, LLC Procedure for Disclosure of Critical Energy Infrastructure Information
Cross-Sound Cable Company, LLC Procedure for Disclosure of Critical Energy Infrastructure Information 1. FERC Order No. 890 requires that Cross-Sound Cable Company, LLC ( CSC LLC ) establish disclosure
Office of Health Care Ombudsman, statutory duties
Office of Health Care Ombudsman, statutory duties Enabling statute, 8 V.S.A. 4089w (a) The department shall establish the office of the health care ombudsman by contract with any nonprofit organization.
M E M O R A N D U M. 1) Practice of Architecture
M E M O R A N D U M TO: FROM: DATE: RE: Massachusetts Board of Registration of Architects AIA Massachusetts March 11, 2014 (revised since February 18 version) Comments to proposed changes in the Board
GRANITE FINANCIAL PARTNERS, LLC. Investment Adviser Code of Ethics
GRANITE FINANCIAL PARTNERS, LLC Investment Adviser Code of Ethics 1 Code of Ethics Statement Background In accordance with New Hampshire regulations, Granite Financial Partners, LLC ( The Firm ) has adopted
Insider Trading Policy
Insider Trading Policy FEBRUARY 2014 Table of Contents 1. Introduction... 2 2. Insider Trading Restrictions... 2 a) Insider Trading Restrictions... 2 b) Material Information... 3 c) Persons in Special
Guidance on Insider and Significant Shareholder Markers
Rules Notice Guidance Note UMIR Please distribute internally to: Legal and Compliance Trading Contact: Timothy Ryan Director, Market Regulation Policy Telephone: 416.646.7266 Fax: 416.646.7265 e-mail:
ISO 9001:2015 vs. ISO 9001:2008
ISO 9001:2015 vs. ISO 9001:2008 (A side by side comparison) Many people are understandably curious about how the new ISO 9001:2015 stacks up against the existing ISO 9001:2008 standard. Perry Johnson Registrars
Frequently Asked Questions (FAQs) Medicare First Tier, Downstream, and Related Entity (FDR) Compliance Program Requirements
TABLE OF CONTENTS I. FDR General Compliance & Fraud, Waste, and Abuse Training and Standards/Code of Conduct 1. Why am I receiving notice to complete training for Aetna? 2. Why is this training necessary?
Territory and Municipal Services Reference Document 10
Territory and Municipal Services Reference Document 10 REQUIREMENTS FOR SOFT LANDSCAPE CONSOLIDATION AND HANDOVER Issue 2 Revision 2 APPROVED FOR ISSUE Approved by: Fay Steward Executive Director Land
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
TOWN OF SILVERTHORNE, COLORADO RFP for Independent Professional Auditing Services
Nature of Services Required A. General The Town is soliciting the services of qualified firms of certified public accountants to audit its financial statements for the fiscal year ending December 31, 2011,
QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY
QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY The purpose of this insider policy is to summarize the insider trading restrictions to which directors, officers, consultants
Process for Sales Projection Process Documentation Template: Description Sales Projection (Sales Forecasting) Process
Sales Projection Process Sui Generis Team Process for Sales Projection Process Documentation Template: Item Description Process Title Sales Projection (Sales Forecasting) Process Process # CMPE202-5-Sui1
QUALITY MANAGEMENT PROCESS
QUALITY MANAGEMENT PROCESS The Quality Management Program s Process for Quality Assurance This Quality Management Process has been issued by authority of the CEO of Kforce Government Solutions, Inc. (KGS)
Oracle Engineering. User s Guide Release 11i Part No. A75090-03
Oracle Engineering User s Guide Release 11i Part No. A75090-03 December 2004 Oracle Engineering User s Guide, Release 11i Part No. A75090-03 Copyright 2001, 2004, Oracle. All rights reserved. Primary Author:
Trust Operational Policy. Information Security Department. Third Party Remote Access Policy
Trust Operational Policy Information Security Department Policy Reference: 3631 Document Control Document Title Author/Contact Document Reference 3631 Pauline Nordoff-Tate, Information Assurance Manager
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept
General Terms and Conditions Advertiser
General Terms and Conditions Advertiser 1 General Provisions These Terms and Conditions apply to the use of the platform www.financeads.com (subsequently referred to as "platform") of financeads International
Roane State Community College. Affirmative Action Plan For Protected Veterans
Roane State Community College Affirmative Action Plan For Protected Veterans 2015 1 TABLE OF CONTENTS SECTION PAGE Definitions 3 A. Policy Statement 4 B. Review of Personnel Processes 6 C. Review of Physical
CODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
Notice of Formation Solicitation for Official Committee of Student Creditors
Office of the United States Trustee District of Delaware 844 King Street, Suite 2207 Wilmington, DE 19801 Tel. No. (302) 573-6491 Fax No. (302) 573-6497 IN RE: Chapter 11 Corinthian Colleges, Inc., et
AMERICAN HISTORY HIGH SCHOOL SCHOOL POLICIES
AMERICAN HISTORY HIGH SCHOOL SCHOOL POLICIES Mr. 74 Montgomery St. Newark, NJ 07103 Fax: 973-456-7086 CLASSROOM ATTENDANCE PROCEDURES Classroom attendance and punctuality will be monitored daily by the
WASTE SERVICES & DISPOSAL AGREEMENT. By: By: Name: Name: Title: Title:
WASTE SERVICES & DISPOSAL AGREEMENT COMPANY: CUSTOMER: By: By: Name: Name: Date Date Title: Title: Effective Date of Agreement: Initial Term: Contract No. This Waste & Disposal Services Agreement, consisting
Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE
Infinedi HIPAA Business Associate Agreement This Business Associate Agreement ( Agreement ) is entered into this day of, 20 between ( Company ) and Infinedi, LLC, a Limited Liability Corporation, ( Contractor
DRIVER ADDENDUM TO SERVICES AGREEMENT. Last update: October 20, 2015
DRIVER ADDENDUM TO SERVICES AGREEMENT Last update: October 20, 2015 This Driver Addendum to Services Agreement ( Addendum ) constitutes a legal agreement between an independent company in the business
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
Information Security Policy version 2.0
http://kfu.edu.sa KING FAISAL UNIVERSITY Information Security Policy version 2.0 Prepared & Presented by: M. Shahul Hameed, MBA, M.Sc.IT, C\MA, CIA, PMP, CGEIT, CISA, CISM, ITSM(ITIL), ISO27001LA, Head
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
King Faisal University
KINGDOM OF SAUDI ARABIA Ministry of Higher Education KING FAISAL UNIVERSITY المملكة العربية السعودية وزارة التعليم العالي جامعة الملك فيصل King Faisal University Deanship of Information Technology Information
code of Business Conduct and ethics
code of Business Conduct and ethics Introduction This document provides information about our Code of Business Conduct and Ethics. All directors, officers and employees are individually and collectively
If No is selected above, provide a detailed explanation of any changes.
Attachment B Form FP-NMA Application Contact Information Provide the following information for the person who will be the primary contact for the Funding Portal ( FP ) Applicant during FINRA s review of
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (hereinafter Agreement ) is between COVERED ENTITY NAME (hereinafter Covered Entity ) and BUSINESS ASSOCIATE NAME (hereinafter Business
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended
DELEGATION AGREEMENT
DELEGATION AGREEMENT This DELEGATION AGREEMENT, (the Agreement ), is by and among New York Stock Exchange LLC, a New York limited liability company, NYSE Regulation, Inc., a New York Type A not-for-profit
ALARIS ROYALTY CORP. TRADING AND BLACKOUT POLICY
ALARIS ROYALTY CORP. TRADING AND BLACKOUT POLICY Purpose The purpose of this Policy is to ensure compliance with applicable Canadian securities laws governing trading in securities of Alaris Royalty Corp.
Minnesota Health Insurance Exchange (MNHIX)
Minnesota Health Insurance Exchange (MNHIX) 1.2 Plan September 21st, 2012 Version: FINAL v.1.0 11/9/2012 2:58 PM Page 1 of 87 T A B L E O F C O N T E N T S 1 Introduction to the Plan... 12 2 Integration
Electronic Communication
Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction...
INSIDER TRADING POLICY. Guidelines with Respect to Certain Transactions in Company Securities
INSIDER TRADING POLICY Guidelines with Respect to Certain Transactions in Company Securities This Policy provides guidelines to all employees, officers and directors of F5 Networks, Inc. and its subsidiaries
PART B - BROKER INFORMATION
SASKATCHEWAN REAL ESTATE COMMISSION BROKERAGE / BROKER REGISTRATION APPLICATION INSTRUCTIONS NOTE: THE BROKERAGE / BROKER HAVE NO AUTHORITY TO TRADE IN REAL ESTATE UNTIL CONFIRMATION OR AUTHORIZATION HAS
ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY
Issued: November 12, 2013 ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY SCOPE This policy applies to all Magnetek, Inc. ( Magnetek ) employees, its subsidiaries and affiliates worldwide,
American Society of Agricultural Consultants
American Society of Agricultural Consultants Membership Application VISION ASAC Represents Excellence and Professionalism in Agricultural Consulting...Worldwide MISSION The specific purpose of ASAC is
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Introduction PriorFX LTD Right to Privacy Information
Privacy Policy 1.Introduction 1.1 PriorFX LTD ( PriorFx or we ) is a Cyprus Investment Firm regulated by the Cyprus Securities and Exchange Commission (License No. 221/13). 1.2 PriorFX is operating under
Requirements for Qualifications Package Submittals
Florida Keys Aqueduct Authority 1100 Kennedy Drive Key West, Florida 33040 January 2015 Request for Qualifications FKAA-RFQ-0002-15 Hydrogeological Services Requirements for Qualifications Package Submittals
[Pursuant to Regulation 12 (1) & (2) of the SEBI (Prohibition of Insider Trading) Regulations, 1992 as amended]
CODE OF CONDUCT FOR THE PREVENTION OF INSIDER TRADING AND CODE OF CORPORATE DISCLOSURE PRACTICES [Pursuant to Regulation 12 (1) & (2) of the SEBI (Prohibition of Insider Trading) Regulations, 1992 as amended]
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
ISO 9001:2008 STANDARD OPERATING PROCEDURES MANUAL
8200 Brownleigh Drive Raleigh, NC 27617-7423 Phone: (919) 510-9696 Fax: (919) 510-9668 ISO 9001:2008 STANDARD OPERATING PROCEDURES MANUAL ALLIANCE OF PROFESSIONALS & CONSULTANTS, INC. - 1 - Table of Contents
Camar Aircraft Products Co. QUALITY MANUAL Revision D
QUALITY MANUAL Revision D Gujll'y Manual Introduction The purpose of this manual is to describe the Quality Assurance Program implemented by Camar Aircraft Products Co. (hereafter referred to as C.A.P.C.)
Inca One Gold Corp. Insider Trading Policy
Inca One Gold Corp. Insider Trading Policy 1.0 Introduction The Board of Directors (the Board ) of Inca One Gold Corp. ( Inca One ) 1 has determined that Inca One should formalize its policy on securities
Trading In Securities Policy
Trading In Securities Policy Approved Date: 28th May 2015 POLICY STATEMENT This policy relates to dealings in securities and other financial products, including Meridian shares and other companies shares.
Printed copies are for reference only. Please refer to the electronic copy for the latest version.
Title: FINANCIAL CONFLICT OF INTEREST POLICY FOR PUBLIC HEALTH SERVICE-SPONSORED RESEARCH STUDIES Document Owner: Joyce Romans Approver(s): Joyce Romans, Mary Ann Kowalczyk Effective Date: 04/14/2014 Printed
ANNUAL PREQUALIFACTION APPLICATION. Interested Subcontractor:
ANNUAL PREQUALIFACTION APPLICATION Interested Subcontractor: Each Frank L. Blum Construction subcontractor that has the potential of having a contract greater than $50,000 must submit a completed Subcontractor
TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs)
TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs) AUGUST 2014 1. Introduction National Information Technology Authority (NITA-U) was established by the Act of Parliament (National Information Technology
Professional Solutions Insurance Company. Business Associate Agreement re HIPAA Rules
Professional Solutions Insurance Company Business Associate Agreement re HIPAA Rules I. Purpose of Agreement This Agreement reflects Professional Solutions Insurance Company s agreement to comply with
WellDyneRxWEST Customer (TPA, Broker, Consultant, Group Health Plan, and other).
WellDyneRxWEST Customer (TPA, Broker, Consultant, Group Health Plan, and other). RE: HIPAA Business Associate Agreement Effective 4/14/04 Business Associate: WellDyneRxWEST, Inc., a Colorado Corporation
