MEMORANDUM Date Our reference Page Measures based on the action plan for improved Internet security

Size: px
Start display at page:

Download "MEMORANDUM Date Our reference Page Measures based on the action plan for improved Internet security"

Transcription

1 MEMORANDUM Date Our reference Page 13 Feb File ref: (12) Network Security Department Björn Scharin +46(0) Ministry of Enterprise, Energy and Communications SE Stockholm Measures based on the action plan for improved Internet security The present memorandum accounts for the work of the National Post and Telecom Agency () being carried out on the basis of the action plan for improved Internet security. 1 Assignment no. 2 in the Terms of Reference for the year 2007 For the budget year 2007, the Terms of Reference state the following: 2. The National Post and Telecom Agency shall report on the measures which the Agency has undertaken based on the Agency s proposed action plan for improved Internet security in Sweden, which was submitted to the Government in July 2006, and assess the results of these measures. This assignment shall be reported upon to the Government (Ministry of Enterprise, Energy and Communications) no later than in connection with the annual accounts for On 4 July 2006, presented a report to the Swedish Government entitled Strategy to improve Internet Security in Sweden. This report contains strategic positions adopted 2, an action plan for implementing the strategy and a management plan. The 2006 action plan contained activities presented in the form of a table, see Appendix 1. The table is presented below with an updated status for February Below this table, describes the activities the Agency has undertaken within the framework of each respective measure of the action plan. 1 This action plan is described in the report Strategy to improve Internet Security in Sweden -ER-2006:12 2 The strategy was established following minor amendments by the Government dated 7 December 2006 in the document Strategy for Improved Security in the Internet Infrastructure, N2006/5335/ITFoU

2 Measure Party responsible Status Measures to protect the Internet's physical and logical infrastructure Produce recommendations to providers of content services for increased accessibility and advice for ordering Internet Services Promote the use of DNSSEC in name servers Produce recommendations for more secure traffic exchange between Internet operators Measures for information to users Provide information about vulnerabilities /Sitic Develop advice for ordering Internet services Coordinate and intensify information initiatives towards users Educate trainee teachers in Internet security Further develop 's website for Internet security Universities and colleges This measure is included in the abovementioned assignment regarding recommendations to providers of content services for increased accessibility Presupposes separate assignment and financing Important/not commenced Presupposes separate financing Measures to enhance the assumption of responsibility for user security Work with specified requirements for good function and technical security Follow up the Internet operators' functional capacity Provide the Internet operators with a legal possibility of impeding the dissemination of harmful traffic Government Very important/not commenced

3 Investigate the requirements for increased responsibility for providers of software and equipment Government Very important/not commenced Measures to promote the improvement of knowledge Inform stakeholders about the financing sources available Work to ensure that funds are allocated within the framework of the EU's research programmes relating to the Internet infrastructure Relevant authorities Government Very important/not commenced Important/not commenced Measures to enhance Swedish participation in international work Increase Swedish coordination and participation in international fora Clarify Swedish distribution of responsibility in conjunction with international contexts concerning security of the Internet infrastructure Further develop operative international networks for incident management Continued active participation in review of EU directives Increase participation in standardisation work Government /Sitic Government Presupposes separate financing Very important/not commenced Presupposes separate financing Measures to improve capacity for crisis management Increase exchange of experience, follow-up and learn from major disruptions /Sitic Produce a coordinated continuity plan for the Internet infrastructure in Sweden Planned to commence in spring of 2008 Investigate alternative forms of communication for operations managers during crises Investigate alternative information channels from Sitic to users concerning the status of the Internet in conjunction with disruptions to the Internet /Sitic Has not commenced

4 Measures to protect the Internet s physical and logical infrastructure Produce recommendations to providers of content services for increased accessibility is currently running a project together with Verva, the Swedish Administrative Development Agency, and SEMA, the Swedish Emergency Management Agency, with the aim of producing a guide. 3. This guidance document has the title Guide so users can retain or achieve the required level of robustness in electronic communications and create awareness as to why robustness is a matter for parties to consider in an agreement. This guide is intended to be used in contacts between a purchaser and an operator and other suppliers of electronic communications. This project should be concluded in the spring of This measure is also being implemented as a part of s tasks in the area of robustness in terms of encouraging increased user responsibility within electronic communications from s strategy for robust electronic communications for the years 2003 to 2005 and 2006 to The area of the strategies encompasses electronic communications in a wider perspective and contributes to the improved security of Internet infrastructure. The strategy for the period encompasses the following areas for measures: The areas for measures include: 1. The promotion of increased user responsibility within electronic communications 2. Increased redundancy and flexibility in networks 3. Improved protection against both physical and electromagnetic threats 4. Increased awareness about information security 5. More robust electricity supply for electronic communications and improved collaboration between the areas of power supply and telecommunications 6. Improved collaboration 7. Enhanced international collaboration 8. Improved capacity for crisis management within electronic communications 9. Increased robustness in networks Promote the use of DNSSEC in name servers has produced a report concerning the implementation of DNSSEC 5 and testing of how this works for a domain administrator. In conjunction with this, has, together with.se and other parties, presented and promoted the use of DNSSEC during a seminar held in Sweden, a seminar in connection with the ICANN meeting in Lisbon held in the spring of 2007, and also put DNSSEC on the agenda in connection with various EU-level meetings, e.g. ENISA. Sweden has come very far in terms of DNSSEC, which was implemented in the Swedish national top domain.se as early as the autumn of DNSSEC has been offered as a service for domains in.se since February 2007; e.g. Swedbank is in the midst of implementing DNSSEC. Today three of the major ISP:s in Sweden have support 3 File ref Robust electronic communications Strategy for the years (-ER-2003:13) and Robust electronic communications Strategy for the years (-ER-2006:19) 5 Improved security of the Domain Name System, -ER-2006:36

5 for DNSSEC in their DNS resolver servers. Together with its operator, is currently in the process of preparing for the implementation of DNSSEC for the domain, pts.se. Produce recommendations for more secure traffic exchange between Internet operators has produced a report describing tests of vulnerabilities present in border routing, i.e. the function that routes traffic between operators. Simulations of how disruptions in the protocol for border routing (BGP) spread in a model of the Swedish part of the Internet 6 have improved the insight into how end users in Sweden would be affected. The report contains a number of recommendations concerning protective measures against disruptions and attacks which are mainly directed at Internet operators. The intention is for operators to be invited to in 2008 in order to discuss the proposed measures in the report and other possible remedies in order to improve protection for the critical border routing function. Measures for information to users Information about vulnerabilities During the year, the IT Incident Centre published 152 security noteables, 199 vulnerability alerts and 5 flash messages. These messages have the aim of informing interested parties about vulnerabilities and technical circumstances in systems that may affect their stability. The different channels are used in a sequence reflecting the increased level of seriousness of vulnerabilities in order to give the interested parties a straightforward opportunity to choose which level of problem they wish to monitor. The IT Incident Centre is currently investigating requests and the need for monitoring of vulnerabilities that is more adapted to the interested parties. Develop advice for ordering Internet services This measure has been combined with and is being implemented in connection with the measure Produce recommendations for providers of content services for improved availability. Coordinate and intensify information initiatives towards users Implementation of this measure presupposes a Government Assignment and separate financing. During the year, actively contributed to the Surf Calmly campaign as one of the financiers but also in the steering group, the Surf Calmly expert web panel and by means of competence in connection with regional meetings. In 2008, Surf Calmly will initiate measures to improve the security of e-transactions directed at small businesses. Educate trainee teachers in Internet security Implementation of this measure is being carried out by the respective college and university. only has limited resources to exert influence in this area. Within the framework of the Surf Calmly campaign, has held lectures on Internet security at regional seminars for teachers and other parties. Further develop 's website for Internet security During the year, managed and updated its website for security information directed toward Internet users, in particular content from the report about security in wireless local area networks 6 Threats to security in the exchange of traffic between Internet service providers -ER-2007:14

6 which was published during the year. 7 However, in order to carry out major initiatives and develop the website, separate financing is needed. Measures to enhance the assumption of responsibility for user security Work with specified requirements for good function and technical security has specified requirements on good function and technical security mainly in terms of the preventive security work containing requirements on risk analysis, risk management and planning, and routines for dealing with interruptions and interference. has carried this out in the form of general advice for providers of public communications networks and electronic communications services, which include Internet operators. 8 Follow up the Internet operators' functional capacity has initiated a supervisory initiative in order to monitor compliance with the provisions of the Electronic Communications Act (LEK), Chapter 5, Section 6a covering, among other things, Internet operators. 9 The supervisory initiative is directed at 55 providers of public electronic communications networks and services. Besides this supervisory initiative, has informed all 450 operators having been reported to about the obligations contained in this Act and the general advice. Provide the Internet operators with a legal possibility of impeding the dissemination of harmful traffic In connection with the report entitled Strategy to improve Internet Security in Sweden, submitted a proposal to the Government concerning an amendment to the Electronic Communications Act (LEK), which would give Internet operators a legal possibility to undertake emergency measures such as filtering of electronic messages jeopardising such service or the function of the network, such as denial of service attacks. Internet operators have limited potential to undertake measures against subscribers in a situation where they have been affected by a Trojan or a program that sends mass s or overloads web services. This type of legal possibility should be associated with a requirement concerning information about the measures being undertaken. The proposed legislative amendment is currently being considered by the Ministry of Enterprise, Energy and Communications. As far as is aware, no amendment to LEK is being planned in accordance with s proposal. Investigate the requirements for increased responsibility for providers of software and equipment In the action plan to improve Internet security in Sweden, proposed that an investigation should be made concerning the requirement for increased responsibility for providers of software and equipment. This type of investigation is mainly outside the mandate of. has noted the positive development that Internet operators are to an increasing extent bundling security software with the services being delivered and that hardware, such as modems with wireless functionality, has preset security mechanisms when purchased. It would be desirable with a similar development on the part of other providers of software and equipment. 7 Security in wireless local area networks advice to users for improved security, -ER-2007:16 8 s General Advice on good function and technical security in addition to reliability and availability during extraordinary events in peacetime 9 Thematic supervision of general advice on good function and technical security, file ref

7 Measures to promote the improvement of knowledge Inform stakeholders about the financing sources available The primary responsibility for this activity rests with the authorities having responsibility for the respective area of research. has noted that SEMA has actively commenced information efforts concerning research grants from the EU in the area of the protection of critical infrastructure. Work to ensure that funds are allocated within the framework of the EU's research programmes relating to the Internet infrastructure The action plan activities are difficult for to influence, but has noted an increase in such funding, for example through an EU research programme called EPCIP (European Programme for Critical Infrastructure Protection). Measures to enhance Swedish participation in international work Increase Swedish coordination and participation in international fora This measure encompasses international work related to Internet security and is a part of the area of Internet Governance, or international management of the Internet. has commenced the work on enhancing Swedish participation in such international work. Together with the Ministry of Enterprise, Energy and Communications, has set up a Swedish reference group for issues concerning the international management of the Internet, and which encompasses Internet security. participates actively in several bodies and fora working with these issues, e.g. Internet Governance Forum (IGF), GAC/ICANN (the Internet Corporation for Assigned Names and Numbers), RIPE, the International Telecommunication Union (ITU), the European Network and Information Security Agency (ENISA), where is the Swedish point of contact, and the international networks participated in by Sitic (IT Incident Centre), see below. Increased responsibility for coordination and participation in international fora presupposes separate financing. Clarify Swedish distribution of responsibility in conjunction with international contexts concerning security of the Internet infrastructure The primary responsibility for this activity rests with the Government Offices of Sweden. Further develop operative international networks for incident management Sitic, the IT Incident Centre is a member of the networks FIRST, TF-CSIRT and EGC, which all have a growing number of members. Furthermore, the IT Incident Centre is active within NCF, IWWN and participates in ENISA projects. These networks have proven to be effective for both the dissemination of information and coordination during operational initiatives in 2007, for instance during the DDoS attacks in Estonia. Continued active participation in review of EU directives The primary responsibility for this activity rests with the Government Offices of Sweden. has actively contributed with documentation. Increase participation in standardisation work has carried out a pilot study concerning standardisation organisations and groups within this area. However, increased participation in standardisation work is demanding in terms of resources and would require separate financing. No decisions have been made as to whether participation should be increased in different groups.

8 Measures to improve capacity for crisis management Increase exchange of experience, follow-up and learn from major disruptions The substantial disruptions that took place in 2007 can be divided into disruptions related to technology or content. The technical disruptions that arose, mainly as a result of the weather situation, cables damaged during excavation, equipment failures, for example due to inadequate program updates, etc., were dealt with within the framework of s robustness work and supervisory work. Disruptions which arose due to the traffic content of the Internet were dealt with by the Sitic, which during the year continued to publish information related to lessons learned and analyses. Publications state that a secure Internet is largely something that users will themselves need to lay the foundation for through their behaviour, and changing behaviour requires both information and motivation. By quickly providing accurate information, without exaggeration or alarmism, has, through the Sitic, enabled users to identify reasons for improving their security awareness. Produce a coordinated continuity plan for the Internet infrastructure in Sweden This activity will be commenced in This activity will take place through collaboration with the industry. Investigate alternative forms of communication for operations managers during crises The intention of this activity is that, in the event of substantial disruptions or crises, those who maintain crucial components of Internet infrastructure may need to be able to communicate concerning the disruption or crisis via a channel other than the one affected by a disruption in order to jointly deal with the situation. This activity has been carried out for many years within the framework of the National Telecommunications Coordination Group (NTSG). This work affects the Internet since it utilises the networks of these operators and several of the members are Internet operators. An application for linking the operational management centres of these operators to the telecommunications network of the Swedish Armed Forces (FTN) has been submitted to the Swedish Armed Forces. Investigate alternative information channels from Sitic to users concerning the status of the Internet in conjunction with disruptions to the Internet This activity has not commenced. Proposed activities for 2008 In 2008, will commence activities which have not yet been implemented and which is capable of carrying out. intends to further develop its collaboration with other organisations in order to carry out the activities contained in the action plan. will also produce a renewed action plan in accordance with the management plan contained in the report Strategy to improve Internet Security in Sweden (-ER-2006:12). Measures which require a separate assignment or financing intends to provide additional information in March 2008 pertaining to the measures in the action plan which has been appointed as responsible for but which require a separate assignment or financing. These measures include: - Coordinating and intensifying information initiatives to users

9 - Further developing 's website for Internet security - Increasing Swedish coordination and participation in international fora - Increasing participation in standardisation work Marianne Treschow Director-General This memorandum was approved by Director-General Marianne Treschow. The final administration of this matter was also participated in by acting departmental head Christoffer Karsberg and administrator Björn Scharin (who submitted the report).

10 Appendix 1 Summary of the original action plan from Strategy to improve Internet Security, 4 July 2006 The party responsible states the stakeholder(s) responsible for the measure in question being implemented and performed in the manner intended. The level of importance states whether a measure is ongoing, planned or proposed. If it is proposed, it is weighted as important or very important. The precondition for the implementation of a proposed measure may be a decision at government level. The measures that is prepared to implement involve a separate assignment and, when appropriate, funding may be required to implement the measure. The timeframe states the period within which a measure is planned to be implemented: within one year, two years, three years or four years. Otherwise, it is expressed as continuous. Costs state the estimated cost of the proposed measures, that is to say those that are not ongoing or planned. The estimation of cost has been made within the following intervals: Low: Below SEK Medium: SEK High: Above SEK Costs for continuous measures are estimated on an annual basis. Measure Party responsible Level of importance Timeframe Costs 6.1 Measures to protect the Internet's physical and logical infrastructure Produce recommendations to providers of content services for increased accessibility Promote the use of DNSSEC in name servers Produce recommendations for more secure traffic exchange between Internet operators Planned < 2 years - Planned < 2 years - < 2 years Measures for information to users Provide information about vulnerabilities Develop advice for ordering Internet services Coordinate and intensify information initiatives towards users /Sitic Continuous - II Foundation < 2 years - Very important Continuous High Educate trainee teachers in Internet security Universities and colleges Important < 2 years High

11 Further develop 's website for Internet security Important < 2 years Medium 6.3 Measures to enhance the assumption of responsibility for user security Work with specified requirements for good function and technical security < 1 year - Follow up the Internet operators' functional capacity Planned < 2 years, thereafter continuous - Provide the Internet operators with a legal possibility of impeding the dissemination of harmful traffic Investigate the requirements for increased responsibility for providers of software and equipment Government Very important < 2 years Low Government Very important < 3 years High 6.4 Measures to promote the improvement of knowledge Inform stakeholders about the financing sources available Relevant authorities Important Continuous Low Work to ensure that funds are allocated within the framework of the EU's research programmes relating to the Internet infrastructure Government Important Continuous Low 6.5 Measures to enhance Swedish participation in international work Increase Swedish coordination and participation in international fora Clarify Swedish distribution of responsibility in conjunction with international contexts concerning security of the Internet infrastructure Further develop operative international networks for incident management Continued active participation in review of EU directives Increase participation in standardisation work Very important Continuous High Government Very important < 1 year Low /Sitic Continuous - Government < 2 years - Important Continuous High 6.6 Measures to improve capacity for crisis management Increase exchange of experience, follow-up and learn from major disruptions /Sitic Continuous - Produce a coordinated continuity Very important < 4 years High

12 plan for the Internet infrastructure in Sweden Investigate alternative forms of communication for operations managers during crises Investigate alternative information channels from Sitic to users concerning the status of the Internet in conjunction with disruptions to the Internet Important < 4 years Medium /Sitic Planned < 2 years -

Date Page 28 January 2009 1(11)

Date Page 28 January 2009 1(11) Date Page 28 January 2009 1(11) PTS-ER-2009:6 Network neutrality Summary The purpose of this memorandum is to describe the concept of network neutrality, the rules, and the role of PTS now and in the future.

More information

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report.

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report. REPORT TO: SCRUTINY COMMITTEE 25 JUNE 2013 REPORT ON: REPORT BY: INTERNAL AUDIT REPORTS CHIEF INTERNAL AUDITOR REPORT NO: 280-2013 1.0 PURPOSE OF REPORT To submit to Members of the Scrutiny Committee a

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Information Security in Sweden

Information Security in Sweden Information Security in Sweden Action plan 2008 2009 2010 Summary In January 2007, SEMA was commissioned by the government to prepare proposals for an action plan for information security in Sweden. The

More information

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit

More information

Summary - ENUM functions that maps telephone numbers to Internet based addresses - A description and the possible introduction to Sweden

Summary - ENUM functions that maps telephone numbers to Internet based addresses - A description and the possible introduction to Sweden DATE REFERENCE NO. 30 March 2001 01-9734 Summary - ENUM functions that maps telephone numbers to Internet based addresses - A description and the possible introduction to Sweden AUTHOR Joakim Strålmark

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

Agreement on cooperation on statistics between. Sveriges Riksbank (the Riksbank) and Statistics Sweden (SCB)

Agreement on cooperation on statistics between. Sveriges Riksbank (the Riksbank) and Statistics Sweden (SCB) Agreement on cooperation on statistics between Sveriges Riksbank (the Riksbank) and Statistics Sweden (SCB) Agreement Background Under the provisions of the Sveriges Riksbank Act (1988:1385), the Riksbank

More information

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company

More information

Advisory Guidelines of the Financial Supervision Authority. Requirements for Organising the Business Continuity Process of Supervised Entities

Advisory Guidelines of the Financial Supervision Authority. Requirements for Organising the Business Continuity Process of Supervised Entities Advisory Guidelines of the Financial Supervision Authority Requirements for Organising the Business Continuity Process of Supervised Entities These advisory guidelines were established by Resolution No

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

FICORA s strategy 2020

FICORA s strategy 2020 FICORA s strategy 2020 2 FICORA s strategy 2020 Content Introduction...4 Vision...5 Mission statement...5 Strategic goals, priorities and measures...6 Strategic goal 1: Provision of communications services

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

National Report Sweden - Report on the Swedish follow-up of the Bologna Declaration and the Prague Communiqué

National Report Sweden - Report on the Swedish follow-up of the Bologna Declaration and the Prague Communiqué Memorandum 30 April 2003 Ministry of Education and Science Sweden Division for Higher Education National Report Sweden - Report on the Swedish follow-up of the Bologna Declaration and the Prague Communiqué

More information

AUDIT REPORT, SUMMARY. Summary. Information security in the civil public administration (RiR 2014:23) SWEDISH NATIONAL AUDIT OFFICE

AUDIT REPORT, SUMMARY. Summary. Information security in the civil public administration (RiR 2014:23) SWEDISH NATIONAL AUDIT OFFICE AUDIT REPORT, SUMMARY 1 Summary Information security in the civil public administration (RiR 2014:23) SWEDISH NATIONAL AUDIT OFFICE 1 Information security in the civil public administration We now live

More information

EBA final draft Regulatory Technical Standards

EBA final draft Regulatory Technical Standards EBA/RTS/2014/11 18 July 2014 EBA final draft Regulatory Technical Standards on the content of recovery plans under Article 5(10) of Directive 2014/59/EU establishing a framework for the recovery and resolution

More information

Cyber Europe 2012. Key Findings and Recommendations

Cyber Europe 2012. Key Findings and Recommendations Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,

More information

GUIDELINES GUIDELINES FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST

GUIDELINES GUIDELINES FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST 1 (25) decision by Vice-Chancellor, 26/03/2012 Ref. no. 2012/231 A 21 FOR EMPLOYMENT AND PROMOTION OF TEACHERS AT UNIVERSITY WEST The university's employment regulations specify the rules applied when

More information

Research into consumer financial services

Research into consumer financial services 1 5/10/11 Call for proposals Research into consumer financial services A call under the Financial Market Research programme. 2 1. The call in brief VINNOVA is Sweden s innovation agency and exists to increase

More information

Memorandum of Understanding. The (Re-)Integration of (Ex-)Offenders Community of Practice

Memorandum of Understanding. The (Re-)Integration of (Ex-)Offenders Community of Practice Memorandum of Understanding The (Re-)Integration of (Ex-)Offenders Community of Practice (Ex-)Offenders CoP This Memorandum of Understanding seeks to define the roles and responsibilities of the partners

More information

Chair Cabinet Committee on State Sector Reform and Expenditure Control

Chair Cabinet Committee on State Sector Reform and Expenditure Control Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Nordea Bank AB FI Ref. 13-1784 through Chair of Board Service no. 1 Smålandsgatan 17 105 71 STOCKHOLM

Nordea Bank AB FI Ref. 13-1784 through Chair of Board Service no. 1 Smålandsgatan 17 105 71 STOCKHOLM 18 May 2015 DECISION Nordea Bank AB FI Ref. 13-1784 through Chair of Board Service no. 1 Smålandsgatan 17 105 71 STOCKHOLM Warning and administrative fine Finansinspektionen's decision (to be issued on

More information

Development of Tools for Knowledge Management in SMEs

Development of Tools for Knowledge Management in SMEs Development of Tools for Knowledge Management in SMEs 26 SMEs shift Carinthia to a knowledge based region in Austria Since knowledge-based value creation becomes more and more important within the EU especially

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

E-PRIVACY DIRECTIVE: Personal Data Breach Notification

E-PRIVACY DIRECTIVE: Personal Data Breach Notification E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou digital@beuc.eu Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification

More information

Policy Number: 054 Work Health and Safety July 2015

Policy Number: 054 Work Health and Safety July 2015 Policy Number: 054 Work Health and Safety July 2015 TRIM Ref: TD14/318 Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors and volunteers 3. Approved by

More information

South Norfolk Council Business Continuity Policy

South Norfolk Council Business Continuity Policy South Norfolk Council Business Continuity Policy 1 Title: Business Continuity Policy Date of Publication: TBC Version: 2 Published by: Emergency Planning Team Review date: April 2014 Document Owner: Document

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003

Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003 Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003 Guidance Publication date: 08 August 2014 About this document The legislation that applies to telecoms providers

More information

LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012

LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012 106 LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT 2011-2012 Leicestershire County Council believes that managing current and future risk, both opportunity and threat, is increasingly vital

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

JOB DESCRIPTION. T&T Security and Resilience Manager. Technology and Telecommunications. Bedford, Chelmsford or Norwich

JOB DESCRIPTION. T&T Security and Resilience Manager. Technology and Telecommunications. Bedford, Chelmsford or Norwich JOB DESCRIPTION PART A: JOB DETAILS JOB TITLE: AFC BAND: T&T Security and Resilience Manager 8a HOURS: 37.5 DIRECTORATE: DEPARTMENT: REPORTING TO: BASE: IM&T Technology and Telecommunications Head of T&T

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Comments on Docket Number 0810021307-81308-1, Enhancing the Security and Stability of the Internet s Domain Name and Addressing System

Comments on Docket Number 0810021307-81308-1, Enhancing the Security and Stability of the Internet s Domain Name and Addressing System The Office of International Affairs National Telecommunications and Information Administration U.S. Department of Commerce Ms. Fiona Alexander Comments on Docket Number 0810021307-81308-1, Enhancing the

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

RESOLUTION 102 (REV. BUSAN, 2014)

RESOLUTION 102 (REV. BUSAN, 2014) RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses

More information

Fostering Information Security Awareness Among Responding Countries

Fostering Information Security Awareness Among Responding Countries Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) (NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies

More information

NHS 24 - Business Continuity Strategy

NHS 24 - Business Continuity Strategy NHS 24 - Strategy Version: 0.3 Issue Date: 20/09/2005 Status: Issued for Board Approval Status: draft Page 1 of 13 Table of Contents 1 INTRODUCTION...3 2 PURPOSE...3 3 SCOPE...3 4 ASSUMPTIONS...4 5 BUSINESS

More information

November 2007 Recommendations for Business Continuity Management (BCM)

November 2007 Recommendations for Business Continuity Management (BCM) November 2007 Recommendations for Business Continuity Management (BCM) Recommendations for Business Continuity Management (BCM) Contents 1. Background and objectives...2 2. Link with the BCP Swiss Financial

More information

1. History In 2003, the Prosecutor-General created the National Anti-Corruption Unit (NACU).

1. History In 2003, the Prosecutor-General created the National Anti-Corruption Unit (NACU). Sweden The National Anti-Corruption Unit (NACU) 1. History In 2003, the Prosecutor-General created the National Anti-Corruption Unit (NACU). 2. Structure The unit initially consisted of three prosecutors

More information

Civil Service Conciliation and Arbitration Scheme General Council Report 1368

Civil Service Conciliation and Arbitration Scheme General Council Report 1368 Civil Service Conciliation and Arbitration Scheme General Council Report 1368 (Meeting/s of 4 May 2000) Agreement on the introduction of the Performance Management and Development System in the Irish Civil

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Corporate Health and Safety Policy

Corporate Health and Safety Policy Corporate Health and Safety Policy November 2013 Ref: HSP/V01/13 EALING COUNCIL Table of Contents PART 1: POLICY STATEMENT... 3 PART 2: ORGANISATION... 4 2.1 THE COUNCIL:... 4 2.2 ALLOCATION OF RESPONSIBILITY...

More information

BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS

BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS BUSINESS CONTINUITY MANAGEMENT GUIDELINES FOR BANKS AND FINANCIAL INSTITUTIONS DIRECTORATE OF BANKING SUPERVISION AUGUST 2009 TABLE OF CONTENTS PAGE 1.0 INTRODUCTION..3 1.1 Background...3 1.2 Citation...3

More information

Safety Excellence Matrix

Safety Excellence Matrix Safety Excellence Matrix 1 = Performance just meets minimum standards 2 = Performance is satisfactory got the basics 3 = Performance is good going beyond the norm 4 = Performance is very good best practice

More information

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu Romanian National Computer Security Incident Response Team CERT-RO dan.tofan@cert-ro.eu http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Risks and uncertainties

Risks and uncertainties Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that

More information

The successful applicants will be entrusted with the following main tasks:

The successful applicants will be entrusted with the following main tasks: Position Details Security and Safety Managers Reference 2016-123-EXT Function The Security and Safety Division of the European Central Bank (ECB) operates a physical security and safety programme for the

More information

Response by Swedish authorities to the European Commission s public consultation on short selling

Response by Swedish authorities to the European Commission s public consultation on short selling Ministry of Finance Financial Institutions and Markets Fi2010/3634 10-5913 Financial Stability Department 2010-560-AFS European Commission Internal Markets and Services DG Financial Institutions markt-g3-consultations@ec.europa.eu

More information

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities 03 December 2015 Subject: SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities The Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee

More information

Terms and conditions and rules for registering.sedomain

Terms and conditions and rules for registering.sedomain Terms and conditions and rules for registering.sedomain names with.se Updated June 3, 2013 (If there is deviation in this document from the Terms and Conditions for the registration of the top-level.se,

More information

Draft WGIG issue paper on Network and Information Security

Draft WGIG issue paper on Network and Information Security Draft WGIG issue paper on Network and Information Security This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members,

More information

Niagara Region Emergency Management Plan

Niagara Region Emergency Management Plan Niagara Region Emergency Management Plan Page i PAGE LEFT BLANK FOR DOUBLE SIDED PRINTING Niagara Region Emergency Management Plan Page ii Niagara Region Emergency Management Plan TABLE OF CONTENTS PAGE

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Opinion. of the European Insurance and Occupational Pensions Authority of 24 November 2014 on

Opinion. of the European Insurance and Occupational Pensions Authority of 24 November 2014 on EIOPA-BoS-14/120 24 November 2014 Opinion of the European Insurance and Occupational Pensions Authority of 24 November 2014 on Sound principles for Crisis Prevention, Management and Resolution preparedness

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility

More information

Business Continuity Management Policy and Plan

Business Continuity Management Policy and Plan Business Continuity Management Policy and Plan 1 Page No: Contents 1.0 Introduction 3 2.0 Purpose 3 3.0 Definitions 4 4.0 Roles, Duties & Responsibilities 4 4.1 Legal And Statutory Duties, Responsibilities

More information

WESTERN EDUCATION AND LIBRARY BOARD

WESTERN EDUCATION AND LIBRARY BOARD WESTERN EDUCATION AND LIBRARY BOARD Post Title: Department: Division: Reports to: Salary: Base: Educational Psychologist Early Years Capacity Building Programme Children and Young People s Services Learning

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Principal Designer Guidance

Principal Designer Guidance Principal Designer Five or more employees 1 CONTENTS INTRODUCTION 3 Further reading / additional resources 3 QUESTION 1: POLICY AND ORGANISATION 4 4 4 QUESTION 2: ARRANGEMENTS/PROCEDURES FOR HEALTH AND

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

AUSTRALIAN COMMUNICATIONS AUTHORITY CALL FOR EXPRESSIONS OF INTEREST FOR A TIER 1 REGISTRY OPERATOR FOR THE AUSTRALIAN TRIAL OF ENUM

AUSTRALIAN COMMUNICATIONS AUTHORITY CALL FOR EXPRESSIONS OF INTEREST FOR A TIER 1 REGISTRY OPERATOR FOR THE AUSTRALIAN TRIAL OF ENUM AUSTRALIAN COMMUNICATIONS AUTHORITY CALL FOR EXPRESSIONS OF INTEREST FOR A TIER 1 REGISTRY OPERATOR FOR THE AUSTRALIAN TRIAL OF ENUM REFERENCE: 04/ACA017 Organisations are invited to express their interest

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM

More information

FSB launches peer review on deposit insurance systems and invites feedback from stakeholders

FSB launches peer review on deposit insurance systems and invites feedback from stakeholders Press release Press enquiries: Basel +41 61 280 8037 Press.service@bis.org Ref no: 26/2011 1 July 2011 FSB launches peer review on deposit insurance systems and invites feedback from stakeholders The Financial

More information

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00) Subject and version number of document: Serial Number: Business Continuity Management Policy

More information

EBA FINAL draft Regulatory Technical Standards

EBA FINAL draft Regulatory Technical Standards EBA/RTS/2015/03 03 July 2015 EBA FINAL draft Regulatory Technical Standards on resolution colleges under Article 88(7) of Directive 2014/59/EU Contents 1. Executive summary 3 2. Background and rationale

More information

Good Practices on Reporting Security Incidents

Good Practices on Reporting Security Incidents Resilient e-communications Networks December 09 Good Practices on Reporting Security Incidents 2 Good Practices on- Reporting Security Incidents Resilient e-communications Networks 3 Acknowledgements About

More information

Performance audit report. Performance of the contact centre for Work and Income

Performance audit report. Performance of the contact centre for Work and Income Performance audit report Performance of the contact centre for Work and Income Office of the Auditor-General Private Box 3928, Wellington Telephone: (04) 917 1500 Facsimile: (04) 917 1549 E-mail: reports@oag.govt.nz

More information

Internal Audit Report Business Continuity Planning Arrangements

Internal Audit Report Business Continuity Planning Arrangements The Highland Council Community Services Committee 6 November 2014 Agenda Item Report No 19 COM 45/14 Internal Audit Report Planning Arrangements Report by Director of Community Services Summary This report

More information

DNSSEC in stats. GC-SEC Global Cyber Security Center. Andrea Rigoni. CENTR Bruxelles, 7th October 2010. Global Cyber Security Center Director General

DNSSEC in stats. GC-SEC Global Cyber Security Center. Andrea Rigoni. CENTR Bruxelles, 7th October 2010. Global Cyber Security Center Director General Global Cyber Security Center DNSSEC in stats CENTR Bruxelles, 7th October 2010 Andrea Rigoni Global Cyber Security Center Director General andrea.rigoni@gcsec.org On the 7 th of May 2010 Poste Italiane

More information

Risk Management Plan template <TEMPLATE> RISK MANAGEMENT PLAN FOR THE <PROJECT-NAME> PROJECT

Risk Management Plan template <TEMPLATE> RISK MANAGEMENT PLAN FOR THE <PROJECT-NAME> PROJECT RISK MANAGEMENT PLAN FOR THE PROJECT Prepared by: Approved by: Reference: Version: Date: INTRODUCTION This document is the Risk Management

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

In these Terms and Conditions of Registration, the following terms and expressions shall have the following meanings, unless stated otherwise:

In these Terms and Conditions of Registration, the following terms and expressions shall have the following meanings, unless stated otherwise: TERMS AND CONDITIONS OF REGISTRATION Applicable for the top-level domain.se from February 15, 2011 (The Swedish version of the Terms and Conditions of Registration shall prevail) 1 INTRODUCTION 1.1 Stiftelsen

More information

Flinders University IT Disaster Recovery Framework

Flinders University IT Disaster Recovery Framework Flinders University IT Disaster Recovery Framework Establishment: Flinders University, 1 August 2013 Last Amended: Manager, ITS Security Services, 4 October 2013 Nature of Amendment: Initial release Date

More information

CONTENT BILLING GATEWAY COLLABORATIVE CONTRACT CONTRACT NO [ ]

CONTENT BILLING GATEWAY COLLABORATIVE CONTRACT CONTRACT NO [ ] CONTENT BILLING GATEWAY COLLABORATIVE CONTRACT CONTRACT NO [ ] Supplier: Company name Address Organisation registration nummer Telephone number Telefax number Company name Organisation registration number

More information

How Cisco IT Protects Against Distributed Denial of Service Attacks

How Cisco IT Protects Against Distributed Denial of Service Attacks How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN

More information

Internet Technical Governance: Orange s view

Internet Technical Governance: Orange s view Internet Technical Governance: Orange s view 1 Internet Technical Governance: Orange s view With the increasing use of IP technologies in the electronic communication networks and services, Internet Technical

More information

INDICATIVE GUIDELINES ON EVALUATION METHODS: EVALUATION DURING THE PROGRAMMING PERIOD

INDICATIVE GUIDELINES ON EVALUATION METHODS: EVALUATION DURING THE PROGRAMMING PERIOD EUROPEAN COMMISSION DIRECTORATE-GENERAL REGIONAL POLICY Thematic development, impact, evaluation and innovative actions Evaluation and additionality The New Programming Period 2007-2013 INDICATIVE GUIDELINES

More information

Kinetic Internet Limited

Kinetic Internet Limited Kinetic Internet Limited Company No: 4470080 ADDENDUM Dedicated Server Terms and Conditions KINETIC INTERNET is an International Communications company that provides Dedicated Server services. The customer

More information

PEOPLE AND ORGANISATION DEVELOPMENT STRATEGIC FRAMEWORK FOR LOCAL GOVERNMENT IN NORTHERN IRELAND

PEOPLE AND ORGANISATION DEVELOPMENT STRATEGIC FRAMEWORK FOR LOCAL GOVERNMENT IN NORTHERN IRELAND PEOPLE AND ORGANISATION DEVELOPMENT STRATEGIC FRAMEWORK FOR LOCAL GOVERNMENT IN NORTHERN IRELAND DRAFT JULY 2011 PEOPLE AND ORGANISATION DEVELOPMENT STRATEGIC FRAMEWORK FOR LOCAL GOVERNMENT IN NORTHERN

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

MULTI ANNUAL WORK PLAN 2013 2015

MULTI ANNUAL WORK PLAN 2013 2015 MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic

More information

Network Rail Infrastructure Projects Joint Relationship Management Plan

Network Rail Infrastructure Projects Joint Relationship Management Plan Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf

More information

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)

More information

Summary. Remit and points of departure

Summary. Remit and points of departure Summary The digital society and the digital economy are already here. Digitalisation means that it is becoming natural for people, organisations and things to communicate digitally. This changes how we

More information

Business Continuity Management Policy and Plan

Business Continuity Management Policy and Plan Business Continuity Management Policy and Plan Version No Author Date of Update 0.3 Allan Jude and Charmaine Grundy 05/06/2015 1 P a g e Contents Contents... 2 1. Introduction... 3 2. Purpose... 4 3. Definitions...

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Guidance Notes Automated Trading Systems. Issued : 1st

Guidance Notes Automated Trading Systems. Issued : 1st Issued : 1st June 2012 Table of Contents Introduction & Scope... 3 Definitions... 4 Purpose... 6 Guideline 1... 6 Organisational requirements for regulated markets and multilateral trading facilities electronic

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Security Management in RED.ES. Ricardo Marin Beltran Security Area Ricardo.Marin@red.es

Security Management in RED.ES. Ricardo Marin Beltran Security Area Ricardo.Marin@red.es Security Management in RED.ES Ricardo Marin Beltran Security Area Ricardo.Marin@red.es 1 INDEX 1.- Introduction to RED.ES 2.- Security Management 3.- Summary 2 1.1 Who s RED.ES? Red.es is a public company,

More information