Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?

Size: px
Start display at page:

Download "Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?"

Transcription

1 Frequently Asked Questions (FAQ) Guidelines for quality compliance of eprocurement System 1. What is eprocurement? Electronic Procurement (eprocurement) is the use of Information and Communication Technology (specially the Internet) in procurement processes for the acquisition of goods (supplies), works and services. 2. What are the benefits of eprocurement? The benefits of eprocurement are: Reduced purchasing cost and improved efficiency Standardized purchasing processes across the organization Reduced administrative costs with better effectiveness Significant reduction in the procurement cycle Reduced discretion & increased transparency 3. What are the components of eprocurement System? The components of eprocurement are: e Tendering, (Mandatory) e Auction or Reverse Auction, e Catalogue, emarket Place, e Invocing etc. 4. What is STQC and its role in eprocurement? STQC (Standardization Testing and Quality Certification) is an attached office under Deptt. of Information Technology, Ministry of Communications and IT, Govt. of India. The role of STQC is to undertake testing & audit of the eprocurement System to verify compliance as per the requirements mentioned in Guideline for Compliance to Quality Requirements of eprocurement System and to certify the systems conforming to the essential requirements of the above guideline. 5. What is Guideline for Compliance to Quality Requirements of eprocurement System? This is a guideline document comprises of various essential requirements related to functionality, security, transparency and efficiency that should be implemented in e Procurement systems designed/developed/maintained for Government & Public sector organizations.

2 6. What are the key requirements in the guideline document? The key requirements given in the guidelines for eprocurement System address the GFR requirements, Information Security requirements, CVC Guidelines and IT ACT. 7. What is the approach for eprocurement system evaluation? The eprocurement system (Including data, software, hardware, network, process) shall be evaluated for: Correct & complete implementation of organizational procurement policies & procedures Compliance to GFR rules, CVC guidelines, IT Act (including amendments) Assuring Security by suitable Design & Development (ie some critical security and transparency related functionality has to be built into the e procurement system), Implementation, Deployment & Use. Security of Data Storage and Communication Performance of eprocurement system Usability (optional) Interoperability (optional) Assessment of identified risks and concerns of the e procurement systems & verification of the risk treatment actions. 8. Is the quality compliance requirement different for different outsourcing models of eprocurement systems? The requirements for quality compliance are same for all outsourcing models of the eprocurement systems. The evaluation depth and approach may vary from one model to another. 9. Is there any requirement for use of some specific technology and standard? There is no requirement for use of any specific technology or standard for eprocurement system. However, it is recommended and desirable to use the latest prevalent technology and standard. 10. What will be the test setup for the testing & evaluation of eprocurement system? The testing & evaluation of eprocurement system will be done preferably in production environment (Just before Go Live). In case of difficulty in providing the above environment

3 as an alternative the test/evaluation may be conducted on the exact replica of the system complete with customization and database in a staging environment. 11. What will be audited to have the compliance for security requirements? The whole eprocurement System consisting of network, infrastructure, database, application software, associated processes and people will be under the scope of the compliance audit. 12. If the EPS is already certified as per ISO then the third party agency will recognize it or it will be again audited? The third party agency may review relevant documents e.g. scope, security policy, procedures, SOA(statement of Applicability), and records e.g. external and internal audit/review findings, audit trails, logs etc. to verify that adequate information security measures are in place for the target eprocurement system. 13. Who will monitor the SLAs and what will be the frequency? The SLAs shall be monitored on continuous basis. The frequency of monitoring will depend upon the type of SLA. The SLA shall be monitored by developer himself or any other party as decided by the User organization. The third party agency (STQC) will do the audit of the monitored SLAs for their compliance to the requirements and methodology used for monitoring. 14. What are the different layers of quality Evaluation Model? The Quality & Security evaluation model consist of four layers namely, Data, Application, Infrastructure and Process. Brief description of the layers (from outermost to inner) is as given below: Process Layer ISO Processes Audit # Monitoring against agreed SLAs # Infrastructure Layer Architecture Review # Vulnerability Assessment (Servers & Network Devices) # Penetration Testing of the System # Performance Testing of the System # Application Layer Application Design Review # Application Code review * Application Functional Testing #

4 Application Security Testing # Application Usability Testing * Application Interoperability and Compatibility Testing * Data Layer Data Storage Security Audit # Data Communication Security Audit# Note: # means Mandatory & * means Optional. 15. Whether this evaluation model will ensure the compliance to legal & regulatory requirements? Yes. The Layer by layer assessment will also ensure the compliance with applicable requirements such as CVC, IT Act, GFR 2005 and concerns of other stakeholders. 16. What is the approach for getting the system certified? The applicant shall submit the request to Testing and auditing agency (like STQC) to get e procurement System assessed and certified. During the application the applicant shall clearly mention the scope of certification (i.e. the application system along with the associated infrastructure). The applicant shall also submit necessary inputs as mentioned in 17 below. The audit team nominated by STQC will conduct formal audit as per the defined criteria and submit a report to the applicant highlighting the non compliances. The applicant shall submit his closure report after taking necessary corrective measures to STQC. The team of auditors will verify the closure and submit its final report along with its recommendations to the STQC Certification body. A certificate of compliance will be issued by STQC if it is satisfied with the compliance status of the eprocurement System. 17. What are the inputs required by the STQC for the EPS certification? The Inputs required by the STQC are: RFP of the e Procurement System Software Requirements Specification (SRS) addressing functional and non functional requirements including business functions and applicable regulations, standards and policies. User manual (operational instructions). Traceability matrix for RFP vs SRS Software High Level Design Document Software test reports complete with test cases and test logs/screenshots etc demonstrating the compliance to the functional and non functional requirements as specified in the RFP/SRS Hardening guide/standard for critical server and network devices Vulnerability Assessment report of the critical servers and network devices

5 Application Vulnerability Assessment report indicating that the application is free from OWASP top 10 and other known vulnerabilities. Remote penetration testing report indicating the system is reasonably immune to the hacking attacks from the untrusted networks/internet. Performance and stress testing report indicating its capability to serve specified no. of simultaneous transactions and immunity to Denial of Service attacks. Software Application Source Code (if the need is to assess to all desirable requirements) 18. What are the essential requirements to demonstrate the conformity? The ESSENTIAL Quality and Security requirements which need to be complied are: Evidence of compliance to implementation of ISO Information Security Management System The risk analysis, mitigation methodology and techniques implemented should ensure eprocurement Information System is secure. The service provider shall demonstrate that the requirements of vigilance administration (CVC) are adequately addressed in the Information Security Management System. The software shall be tested for functionality, workflow and other essential requirements (like CVC Guidelines, GFR & IT Act). The application hardening shall ensure the addressal of Top 10 vulnerabilities defined by OWASP Network is assessed for adequate security through penetration testing and vulnerability assessment as per NIST Are there any desirable requirements to demonstrate the conformity? Yes. The desirable requirements are as follows: The software source code shall be evaluated for detecting malicious codes/ Trojan/backdoor etc. To ensure Interoperability and Compatibility of various solutions both at buyer and supplier end Workflow shall be in line with the requirement of standardized Business Processes and ebxml Core Components Technical Specification for Data Structure The solution shall be tested to Usability requirements. 20. What is the criterion to define the scope of certification? The applicant can define any module as a part of scope of certification however the etendering module is the essential requirement to obtain the certification. Depending on the complexity of the module and the scope identified by the applicant the Certification Body/Test Agency will charge for testing and certification.

6 21. What is the significance of audit trail in e procurement systems? The e procurement system should have audit trail facilities. These audit trails are complex but dependable. The audit trails reports provide useful information about the instructions which take place in the system both at operating system and application software. This information is necessary to analyze nature of intrusion, vulnerabilities exploited and to track the perpetrators. It also helps in taking steps in preventing future intrusion. 22. How the multiple encryption /decryption feature can be used to protect the bid in e procurement systems? Application of multiple encryption of the bid document using the public keys of the authorized officers of the tendering organization could be used in a predefined order. Decryption will have to be carried out in the reverse order using the multiple decryption keys (i.e. private keys of the above officers). 23. What are the Concerns/ clarifications based on the IT Act 2000 relating to Digital Signatures? Under the IT Act, 2000 any holder of a Digital Signature, who s issued a Digital Signature Certificate by a licensed CA, is responsible for protecting the corresponding private key. Unless the certificate validity has expired or the certificate has been revoked by the issuing CA, any digital signature will be legally valid and will be attributed to the person listed in the Digital Signature Certificate. 24. What is the role of time stamping facility in e procurement systems? Any e procurement/e tendering services must provide the facility of Time Stamping which is critical for establishing date and time of document submission and its acknowledgement. Time Stamping feature should be built within the application and synchronisation of e tendering/ e procurement server should be done with master server at the data center where the e procurement system is hosted. Alternatively; the e procurement service provider can take Time Stamping services being provided by licensed CAs. 25. What are the requirements of GFR in e procurement systems? The GFR requires that tenders be opened in public in the presence of the authorized representatives of the bidders. The Finance Ministry Manual on procurement procedures

7 outlines the details on the requirements of a transparently conducted Public Tender Opening Event. 26. Who will approach the STQC for certification of e procurement systems? The owner of e procurement systems will approach for certification. The owner may be 1) User (Govt Deptt. /PSU) In case Govt /PSU is the owner & sole user of the entire EPS including application, infrastructure, Policies & procedure & Service levels. 2) Service Provider Who owns the EPS & provides services to multiple govt. /PSU. 27. What will be the cost of STQC certification? Certification Fee: Rs 1 lakh 1) This fee includes application fee & audit fee of EPS. This includes one cycle of audit (one initial audit followed by closure verification). It doesn t include the testing/assessment charges for functional, application security, VA/PT, SLA/Performance etc. 2) Travel, stay & logistic arrangement for auditors shall be borne by the applicant extra. 3) Applicant should get the above tested (before approaching for certification) at extra cost from any recognized body (e.g. any STQC IT Centre /CERT IN empanelled agency for application security and network security). 28. What will be the validity period of STQC certification? The validity of certification shall be one year provided no major change in the EPS is carried out. 29. What are the criteria for STQC certification? The certification is based on Quality & Security evaluation of EPS. STQC will be auditing the EPS against the criterion of ISMS (based on ISO/IEC 27001), CVC guideline, GFR & IT act. The details requirements are provided in guidance documents (Guideline for Compliance to Quality Requirements of eprocurement System). The applicant shall submit a compliance document against these four categories of criteria. At the time of audit STQC will look for the artifact like compliance test report (for functional, application security, VA/PT, SLA/Performance) which consists of Application, Infrastructure and Processes of EPS. 30. If one service provider provides the services to multiple users, whether he needs multiple certifications?

8 Yes, separate certificate is required for each user because of customization/modification in the EPS. Each certificate issued to service provider will be in context of application & the user. 31. What is the time period required for certifications? Minimum one month time is required after the application is accepted by STQC. The application will be accepted based on compliance to criterion (Ref. Question no. 29). 32. What approach STQC follows if user organization requires certification of the e procurement solution as a pre requisite for placing purchase order to potential e procurement service provider? The User organization in their acceptance criteria while placing the PO, shall mention the certification as a mandatory requirement after deployment. The User organization shall advise service provider to approach STQC to demonstrate his capability by getting acceptance test report for Functional, application security & demonstrating compliance to GFR, CVC & IT act requirements (in staging/test environment). STQC will advise user organization accordingly. Note: Final certificate shall be issued after deployment of e procurement solution in the actual user environment & after successful completion of the activities as mentioned in Question no Who is the Nodal authority for E procurement System Certification? The nodal authority for e Procurement system certification is STQC HQ, Delhi. The contact details are: Sh. U. K. Nandwani, Senior Director Phone no. : , E Mail: uknandwani@stqc.nic.in 34. Is the EPS Certification Scheme applicable to only Govt and Public Sector Organizations or Private Sector too? The present scope of EPS certification scheme is only for Govt & Public sector organizations.

Guidelines for compliance to. Quality requirements of eprocurement Systems

Guidelines for compliance to. Quality requirements of eprocurement Systems Guidelines for compliance to Quality requirements of eprocurement Systems STQC Directorate Department of Information Technology, Ministry of Communications & Information Technology, Electronics Niketan,

More information

Procedure for Assessment of System and Software

Procedure for Assessment of System and Software Doc. No: STQC IT/ Assessment/ 01, Version 1.0 Procedure for Assessment of System and Software May, 2014 STQC - IT Services STQC Directorate, Department of Electronics and Information Technology, Ministry

More information

C1 India. Leader in e-procurement

C1 India. Leader in e-procurement C1 India Leader in e-procurement About us Industry Leader in e-procurement since 2000 Pioneer in providing e-procurement as SaaS Implemented some of world s largest e-procurement systems One of the fastest

More information

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

Electoral Commission. Auction # 10220759. Patch Management Solution

Electoral Commission. Auction # 10220759. Patch Management Solution Electoral Commission Auction # 10220759 Patch Management Solution IMPORTANT NOTICE Failure to comply with the completion of the auction conditions and the required information (i.e. Make, model and size

More information

Indian Railways Embrace e-procurement Solutions to

Indian Railways Embrace e-procurement Solutions to Travel, Transportation & Logistics Indian Railways Embrace e-procurement Solutions to Improve Efficiency and Enhance Performance Client Brief The Indian Railways (IR) is Asia's largest and the world's

More information

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion

Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN. Draft for discussion Guidelines for Independent Third Party Audit and Performance Monitoring Of SWAN Draft for discussion April 2007 Department of Information Technology (DIT) Government of India, New Delhi 1. Introduction

More information

PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC

PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC As per the Office Memorandum (OM)no. 10/3/2012-PPC dated 30 th March, 2012, issued by the Department of Expenditure, all Ministries / Departments of the

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

Outsourcing of Metering and Billing. 14 th September 2015

Outsourcing of Metering and Billing. 14 th September 2015 Outsourcing of Metering and Billing 14 th September 2015 1 Objective for today meeting To discuss Scope Of Work for outsourcing of parts of Metering and Billing activities for the 3 Discoms To discuss

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Guidelines to bidders for participation e-taps (e-tender And Procurement System) of Airports Authority of India (AAI).

Guidelines to bidders for participation e-taps (e-tender And Procurement System) of Airports Authority of India (AAI). Guidelines to bidders for participation e-taps (e-tender And Procurement System) of Airports Authority of India (AAI). 1. e-taps portal of AAI. 1.1 The bidders can visit and download the electronic bids

More information

PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC

PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC PRELIMINARY GUIDELINES E-PROCUREMENT MODULE OF NIC As per the Office Memorandum (OM) no. 10/3/2012-PPC dated 30 th March, 2012 and all subsequent OMs, issued by the of Expenditure, all Ministries / s of

More information

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Security Testing and Vulnerability Management Process. e-governance

Security Testing and Vulnerability Management Process. e-governance Security Testing and Vulnerability Management Process for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India.

More information

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05

allowed. Request for inclusion and consideration of ISO 2008:9001 quality certification. CMMI Level 5 : 10 Marks CMMI Level 3 : 07 marks ISO: 05 Corrigendum for the Tender for Web Based Project Monitoring Tool & MIS System Bidders Clarification Sl. Clause /Page no Tender Clause Clarification Sought Clarification No. 1 Page No:4 No consortium Consortium

More information

ELECTRONIC TENDERING SYSTEM FOR RFQ

ELECTRONIC TENDERING SYSTEM FOR RFQ ELECTRONIC TENDERING SYSTEM FOR RFQ 1. Guidelines These conditions will over-rule the conditions stated in the RFQ, wherever relevant and applicable. 2. Registration 3. Digital Certificate All the Bidders/Applicants

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Frequently Asked Questions Please read this document before using this application.

Frequently Asked Questions Please read this document before using this application. Frequently Asked Questions Please read this document before using this application. 1. What is an Electronic Tendering System? Electronic Tendering System is an end to end Tendering System which can be

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

E-Tendering Requirements for MDB Financed Procurement October 2005

E-Tendering Requirements for MDB Financed Procurement October 2005 E-Tendering Requirements for MDB Financed Procurement October 2005 e-gp MDB e-tendering Requirements October 2005 1 Introduction Borrowing countries are increasingly inclined to use electronic procurement

More information

F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India

F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India F. No. E 12020/03/2015-E&A Food Safety and Standards Authority of India (A Statutory Authority established under the Food Safety & Standards Act, 2006) Establishment Division FDA Bhawan, Kotla Road, Near

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Information Security Controls for Website Development and Hosting

Information Security Controls for Website Development and Hosting Information Security Controls for Website Development and Hosting Version: 1.0 Author: ictqatar Classification: Internal Date of Issue: 18 th August 2011 Information Security Controls for Website Hosting

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

Annexure1: Pre-qualification criteria for Common SOC RFP

Annexure1: Pre-qualification criteria for Common SOC RFP Annexure1: Pre-qualification criteria for Common SOC RFP Table 1: Prequalification Criteria for Financial of SI S. No Pre-qualification Criteria 1 2 The Bidder should be a registered company in India providing

More information

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200. Call for Quotations

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200. Call for Quotations Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200 Call for Quotations Closing Date: 7 th October 2014 at 10:00 am Date Published: 16

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

PROCUREMENT is one of

PROCUREMENT is one of Procurement is the complete process of acquisition of goods, works or services at the best possible total cost, in the right quality and quantity, at the right time, in the right place and from the right

More information

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.

December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS. Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Q1: Which type of Digital Signature is required for Registration? Whether Encryption Certificate is also required? A: As a legal requirement, Class3 certificate (preferably with

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

E-Tendering Requirements for MDB Financed Procurement November 2009

E-Tendering Requirements for MDB Financed Procurement November 2009 E-Tendering Requirements for MDB Financed Procurement November 2009 MDB e-tendering Requirements November 2009 1 Introduction Borrowing countries are increasingly inclined to use electronic procurement

More information

Request For Quotation from Service Providers. for. Web Security & Performance Testing for Web-based Applications for UTIITSL

Request For Quotation from Service Providers. for. Web Security & Performance Testing for Web-based Applications for UTIITSL Request For Quotation from Service Providers for Web Security & Performance Testing for Web-based Applications for Release Date: 06-Aug-2015 Page 1 of 8 UTI Infrastructure Technology And Services Limited

More information

Outsourcing and Information Security

Outsourcing and Information Security IBM Global Technology Services Outsourcing and Information Security Preparation is the Key However ultimately accountability cannot be outsourced February 2009 page 2 1. Introduction 3 1.1 Reason for outsourcing

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1

ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 PREFACE The Rubber Board a statutory Body under the Ministry of Commerce & Industry, Govt. of India, for the development

More information

TENDER FOR ANNUAL MAINTENANCE CONTRACT OF WEBSITEs OF O/O DIRECTORATE OF FILM FESTIVALS.

TENDER FOR ANNUAL MAINTENANCE CONTRACT OF WEBSITEs OF O/O DIRECTORATE OF FILM FESTIVALS. Government of India Directorate of Film Festivals Ministry of Information & Broadcasting Siri fort Auditorium Complex August Kranti Marg New Delhi-110049 Dated:-17.05.2013 TENDER FOR ANNUAL MAINTENANCE

More information

Company Name Query Response. Systems Pvt. Ltd. the Bid in spite of neither being an ISO 9001:2008 nor a CMMI L3 certified company with a valid

Company Name Query Response. Systems Pvt. Ltd. the Bid in spite of neither being an ISO 9001:2008 nor a CMMI L3 certified company with a valid Following are the queries received from different companies with regard to the RFP for School Quality Assessment and Accreditation Management Solution : Company Name Query Response Orion India 1. Can Orion

More information

Project Management Guidelines

Project Management Guidelines Project Management Guidelines 1. INTRODUCTION. This Appendix (Project Management Guidelines) sets forth the detailed Project Management Guidelines. 2. PROJECT MANAGEMENT PLAN POLICY AND GUIDELINES OVERVIEW.

More information

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI) Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...

More information

Security and Security Certificates for OpenADR systems. Background. Content:

Security and Security Certificates for OpenADR systems. Background. Content: Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management

More information

Invitation for Expression of interest : e-maintenance management system

Invitation for Expression of interest : e-maintenance management system Invitation for Expression of interest : e-maintenance management system Introduction 1. The maintenance responsibility in the IAF spans across a diverse range of aircraft, associated equipment, support

More information

Digital Signature Application

Digital Signature Application Department of Science and Technology Republic of South Africa Specification Digital Signature Application 1. INTRODUCTION The Department of Science and Technology (DST) has 100 employees in Pretoria and

More information

TENDER FOR ANNUAL MAINTENANCE CONTRACT & CREATION OF WEBSITES OF O/o DIRECTORATE OF FILM FESTIVALS.

TENDER FOR ANNUAL MAINTENANCE CONTRACT & CREATION OF WEBSITES OF O/o DIRECTORATE OF FILM FESTIVALS. Government of India Directorate of Film Festivals Ministry of Information & Broadcasting Siri fort Auditorium Complex August Kranti Marg New Delhi-110049 Dated:-. 08. 06.2016 TENDER FOR ANNUAL MAINTENANCE

More information

Spillemyndigheden s change management programme. Version 1.3.0 of 1 July 2012

Spillemyndigheden s change management programme. Version 1.3.0 of 1 July 2012 Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2. Framework for managing system changes...

More information

SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD

SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD 1. PURPOSE & SCOPE: The purpose of security initiative is to enlist the procedures and guidelines, which are

More information

ONGC Guidelines to Bidders for E-Procurement Application

ONGC Guidelines to Bidders for E-Procurement Application ONGC Guidelines to Bidders for E-Procurement Application Page 1 of 18 1. Guidelines : The Notice Inviting Tenders (NITs) of all tenders/bid invitations above value of Rs.5.00 lakhs including e-procurement

More information

QUALITY MANAGEMENT SYSTEM REQUIREMENTS General Requirements. Documentation Requirements. General. Quality Manual. Control of Documents

QUALITY MANAGEMENT SYSTEM REQUIREMENTS General Requirements. Documentation Requirements. General. Quality Manual. Control of Documents Chapter j 38 Self Assessment 729 QUALITY MANAGEMENT SYSTEM REQUIREMENTS General Requirements 1. Establishing and implementing a documented quality management system 2. Implementing a documented quality

More information

Electoral Commission. Auction # 10220790. Active Directory Management Software

Electoral Commission. Auction # 10220790. Active Directory Management Software Electoral Commission Auction # 10220790 Active Directory Management Software IMPORTANT NOTICE Failure to comply with the completion of the auction conditions and the required information (i.e. Make, model

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS

PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS PUNJAB NATIONAL BANK EXPRESSION OF INTEREST (EOI) FOR EARLY WARNING SYSTEM LOAN ACCOUNTS Punjab National Bank HO: Information Technology Division 5, Sansad Marg, New Delhi-01 Information Technology Division

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

COMESA Guidelines on Free and Open Source Software (FOSS)

COMESA Guidelines on Free and Open Source Software (FOSS) COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

TENDERS INVITED FOR DESIGN, DEVELOPMENT, HOSTING AND MAINTENANCE OF WEBSITE FOR ICAR - CENTRAL CITRUS RESEARCH INSTITUTE LOCATION: OPP. N.B.S.S.

TENDERS INVITED FOR DESIGN, DEVELOPMENT, HOSTING AND MAINTENANCE OF WEBSITE FOR ICAR - CENTRAL CITRUS RESEARCH INSTITUTE LOCATION: OPP. N.B.S.S. TENDERS INVITED FOR DESIGN, DEVELOPMENT, HOSTING AND MAINTENANCE OF WEBSITE FOR ICAR - CENTRAL CITRUS RESEARCH INSTITUTE LOCATION: OPP. N.B.S.S. & L.U.P. AMRAVATI ROAD,NAGPUR-440 010 Proposals are invited

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

TCIL/61/12/IT/2014 22/12/2014. Expression of Interest for Identifying Partner for development and Integration of IT enabled Software Services

TCIL/61/12/IT/2014 22/12/2014. Expression of Interest for Identifying Partner for development and Integration of IT enabled Software Services TCIL/61/12/IT/2014 22/12/2014 Expression of Interest for Identifying Partner for development and Integration of IT enabled Software Services Introduction TCIL intends to empanel Software OEM bidders to

More information

ASSAM POWER GENERATION CORPORATION LIMITED

ASSAM POWER GENERATION CORPORATION LIMITED ASSAM POWER GENERATION CORPORATION LIMITED Notice Inviting Expression of Interest for Consultancy in connection of Assam Power Sector Investment Program financed by ADB NIT No. NIT/PMU/05 of 2014-15 Director

More information

INVITATION FOR EXPRESSION OF INTEREST SYSTEM INTEGRATOR- SUPPLY AND IMPLEMENTATION OF ERP BASED CGLMS

INVITATION FOR EXPRESSION OF INTEREST SYSTEM INTEGRATOR- SUPPLY AND IMPLEMENTATION OF ERP BASED CGLMS 1 INVITATION FOR EXPRESSION OF INTEREST SYSTEM INTEGRATOR- SUPPLY AND IMPLEMENTATION OF ERP BASED CGLMS Purpose of the EOI 1. Headquarters, Indian Coast Guard, invites Expression of Interest from vendors

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Procurement Policy Note Use of Cyber Essentials Scheme certification

Procurement Policy Note Use of Cyber Essentials Scheme certification Procurement Policy Note Use of Cyber Essentials Scheme certification Action Note 09/14 25 September 2014 Issue 1. Government is taking steps to further reduce the levels of cyber security risk in its supply

More information

Progress by Partnership. State Wide E-Procurement Implementation

Progress by Partnership. State Wide E-Procurement Implementation Progress by Partnership 1 State Wide E-Procurement Implementation Contents Selecting the Platform and Model Snapshot of progress so far Implementation Challenges Way forward 3 Selecting the e-procurement

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Service Level Terms Inter8 Cloud Services. Service Level Terms Inter8 Cloud Services

Service Level Terms Inter8 Cloud Services. Service Level Terms Inter8 Cloud Services Date 7 July 2015 SERVICE LEVEL TERMS INTER8 CLOUD SERVICES Article 1. Definitions In these Service Level Terms ( SLT ), the following terms, indicated with a capital, whether single or plural, will have

More information

EXPRESSION OF INTEREST. for. Selection of Software Development Agency for MCA SPV

EXPRESSION OF INTEREST. for. Selection of Software Development Agency for MCA SPV EXPRESSION OF INTEREST for Selection of Software Development Agency for MCA SPV Introduction MCA SPV is planning to increase the IT effectiveness of the Official Liquidator offices of Ministry of Corporate

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

SCHEDULE 25. Business Continuity

SCHEDULE 25. Business Continuity SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable

More information

Concepts of e-procurement

Concepts of e-procurement Concepts of e-procurement J Satyanarayana IAS CEO, NISG Capacity Building workshop under NeGP 4-6 May 07 Overview of Presentation 1.e-Government Concepts 2.Issues in Public Procurement 3.What is e-procurement?

More information

Amendment 1 - Annexure 5 (C) Technical Criteria

Amendment 1 - Annexure 5 (C) Technical Criteria 1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical

More information

HINDUSTAN AERONAUTICS LIMITED (BANGALORE COMPLEX) FACILITIES MANAGEMENT DIVISION BANGALORE- 560 017 E-TENDER NOTICE FM/NEP/INT/27/14-15 Date: 29.01.

HINDUSTAN AERONAUTICS LIMITED (BANGALORE COMPLEX) FACILITIES MANAGEMENT DIVISION BANGALORE- 560 017 E-TENDER NOTICE FM/NEP/INT/27/14-15 Date: 29.01. HINDUSTAN AERONAUTICS LIMITED (BANGALORE COMPLEX) FACILITIES MANAGEMENT DIVISION BANGALORE- 560 017 E-TENDER NOTICE FM/NEP/INT/27/14-15 Date: 29.01.15 Online E-tenders are invited in Two-Bid System for

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

NOTICE INVITING PROPOSAL

NOTICE INVITING PROPOSAL NOTICE INVITING PROPOSAL Sl. Pg. 1 1. CIDCO of Maharashtra Limited through the process of e-tendering invites On-line Proposal from single business entities fulfilling the eligibility criteria for PMIC

More information

Expression of Interest (EOI) For. End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank

Expression of Interest (EOI) For. End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank Expression of Interest (EOI) For End to End Solution For Enterprise Data Warehouse Solution In Punjab National Bank PUNJAB NATIONAL BANK INFORMATION TECHNOLOGY DIVISION HEAD OFFICE, 5 SANSAD MARG, NEW

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Tender No. CWC/RO-CNI/H&T-MDU I & II (Adhoc) /2015-16/ Date: 09.01.2016. Tender notice

Tender No. CWC/RO-CNI/H&T-MDU I & II (Adhoc) /2015-16/ Date: 09.01.2016. Tender notice CENTRAL WAREHOUSING CORPORATION (A GOVT. OF INDIA UNDERTAKING) Regional Office : No.4 North Avenue,Srinagar Colony,Saidapet, Chennai 15. Phone : 22201216/0350 Fax. 22200068. E-Mail :rmmdrs.cwhc@nic.in

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Environmental Certification Services: Certification Manual for Green Squared SM Tile and Installation Material Sustainability

Environmental Certification Services: Certification Manual for Green Squared SM Tile and Installation Material Sustainability SCS Green Squared SM Certification Manual 2011. Scientific Certification Systems Environmental Certification Services: Certification Manual for Green Squared SM Tile and Installation Material Sustainability

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Request For Quotation from Service Providers. for. ISO/IEC 27001:2013 Certification for UTIITSL

Request For Quotation from Service Providers. for. ISO/IEC 27001:2013 Certification for UTIITSL Request For Quotation from Service Providers for ISO/IEC 27001:2013 Certification for UTIITSL Release Date: 17-Jun-2015 Page 1 of 8 UTI Infrastructure Technology And Services Limited (UTIITSL) is looking

More information

1 ST CORRIGENDUM - RFP For Procurement Of Web Application Firewall (Subscription Model) RFP No. IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015

1 ST CORRIGENDUM - RFP For Procurement Of Web Application Firewall (Subscription Model) RFP No. IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015 RFP IDBI/PCell/RFP/2014-15/18 dated 24 th January 2015 1. - - Document 2. - - Document 3. - - Document 4. - - Document 6 A Bid Security of Rs.50,000/- (Rupees Fifty thousand Only)by way of demand draft

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

Electoral Commission. Auction # 10293738. Lumension Software Maintenance Renewal

Electoral Commission. Auction # 10293738. Lumension Software Maintenance Renewal Electoral Commission Auction # 10293738 Lumension Software Maintenance Renewal IMPORTANT NOTICE Failure to comply with the completion of the auction conditions and the required information or submission

More information

itac solutions for the medical industry Quality assurance of the highest standard FDA-compliant. Reliable. Productive.

itac solutions for the medical industry Quality assurance of the highest standard FDA-compliant. Reliable. Productive. Quality assurance of the highest standard FDA-compliant. Reliable. Productive. Market Requirements 1 Statutory regulations and stringent requirements laid down by the American regulatory authority, FDA

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013 Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of

More information

DEPARTMENT OF INFORMATION TECHNOLOGY GOVERNMENT OF GOA TECHNICAL SPECIFICATIONS FOR GOA GOVERNMENT WEBSITES

DEPARTMENT OF INFORMATION TECHNOLOGY GOVERNMENT OF GOA TECHNICAL SPECIFICATIONS FOR GOA GOVERNMENT WEBSITES DEPARTMENT OF INFORMATION TECHNOLOGY GOVERNMENT OF GOA TECHNICAL SPECIFICATIONS FOR GOA GOVERNMENT WEBSITES February 2010 Page 1 of 9 Contents 1. Introduction 3 2. Development 4 3. Website Hosting 6 4.

More information

Challenges and Role of Standards in Building Interoperable e-governance Solutions

Challenges and Role of Standards in Building Interoperable e-governance Solutions 24 Compendium of e-governance Initiatives CHAPTER in India 3 Challenges and Role of Standards in Building Interoperable e-governance Solutions Renu Budhiraja Director e-governance Group, Department of

More information