Clarifications: 1) We are asking for a two week extension in order to provide a detailed response to the requirements outlined in the REI.

Size: px
Start display at page:

Download "Clarifications: 1) We are asking for a two week extension in order to provide a detailed response to the requirements outlined in the REI."

Transcription

1 ADDENDUM # 02 Thursday, February 06, 2014 REI# Request for Expressions of Interest for Audit & Enforcement Replacement of Nova Scotia Indian Fuel Tax Exemption (NSIFTE) System The following clarifications are provided for this RFP: Clarifications: 1) We are asking for a two week extension in order to provide a detailed response to the requirements outlined in the REI. A ONE WEEK extension has been granted. The REI closing date is now February 13, NOTE: Please see REI Addendum #1 posted on February 3. 2) Does the proposed solution have to comply with the target architectures? This depends on the solution defined by the vendor. Any solution components hosted and managed by the Province need to comply with the Province's architecture standards. 3) We are assuming that Disaster Recovery services are not within the scope of this REI. Is this correct? Disaster Recovery (DR) needs to be addressed for any retailer installed solution components (e.g., the POS system). If there are solution components installed on hardware managed by the Province, then DR processes will be managed by the Province. 4) Is there only 1 POS vendor for all the stores? What services/agreements do these vendors have with the stores currently? Are the POS devices/registers Windows based? There is currently one POS vendor for on-reserve fuel transactions. Any services/agreements are between the retailers and the POS vendor with no involvement by the Province. Some retailers are "pay as you go" with the vendor, some are on annual contracts. The current POS system is Windows based. 1

2 5) Do any of the stores have pay at the pump functionality? Some retailers do have pay at pump. However, NSIFTE transactions cannot occur at the pump as retailer clerks are required to manually verify the customer against the provided Driver's License in order to be eligible for the fuel tax rebate. 6) If the application solution is in store and forward mode, is the business assumption that the purchaser receives the tax exemption anyway? Yes. In this situation, the tax rebate will be provided. Overages/exceptions will be managed within the Province's application once these transactions have been forwarded. NOTE: If the vendor/service provider is unable to resolve the transmission issue within an acceptable defined period (to be defined at a later date), subsequent transactions would be denied at the POS until the communications issue is resolved. Transactional data, including license master number and litres purchased, etc., would be cached locally in an encrypted state until the network connection is restored and the information can be transmitted/deleted. 7) Please clarify the existing SNSMR In-House system component regarding the import/export data format. The data format is CSV flat file. 8) Will the provided solution require the vendor to maintain a server in the Province s Network to run the web service? Or, can the vendor run the web service on an existing server managed by the Province? Either approach is possible. Please indicate your preferred approach in your solution description. 9) Will the vendor be required to supply a physical server? If so will the vendor also be responsible for its maintenance? The province uses VMware so can provide a virtual server instead of using physical hardware. Using a virtual server would be our strong preference. If the vendor solution components run on hardware supplied by the Province, the Province will be responsible for its maintenance. System admin privileges would not be given to the vendor. 2

3 10) Will the vendor be supplying a complete solution to each retailer site inclusive of the prescribed NSIFTE SW as well as POS/Pump Control/BackOffice SW for the operation and management of the sites to an industry standard solution as normally found in a retail fuel site? Yes. There will be a variety of pump technologies to accommodate at the 21 on-reserve fuel retailers. Some additional information on the retailers that may be of interest: - They range from a 1 pump, 2 nozzle island to 4 or more pumps/island. Average would be 4 pumps, 2 islands. - Some retailers use the NSIFTE POS only for NSIFTE transactions, while others use the POS for all retail store sales (it s about 50/50). - All, with one possible exception, have their POS connected to the pumps (e.g., via a PIE box). 11) Are we to supply all retail site HW inclusive of till computers, peripherals (scanners, cash drawers, etc.), backoffice computers as well as needed pump control (dispensers need fuel control HW & SW: PIE Box, Wayne Fusion etc.)? Yes. Whatever retailer components are required to implement the proposed solution must be supplied by the vendor. 12) If the answer to any of question #10 and #11 is yes, then we require detailed store site surveys inclusive of the following: i. Number of tills ii. Type of dispensers iii. Bank card processor iv. BackOffice management needs inventory control, promotions management etc. v. Location and operator name vi. Access to broadband internet vii. PCI assessment status viii. Site operator requirements for POS and BackOffice functionality This information cannot be supplied. It is expected that the vendor, for the purposes of the REI, can provide a high level cost estimate without this detailed information. If the information is deemed absolutely necessary by the vendor, it needs to be retrieved directly from the retailers. 3

4 13) Is the Province or Retailer responsible for paying for the system as well as its maintenance (by way of HW support) and well as SW and technical support as provided by us? The cost of retail site components of the solution (including technical support) is the responsibility of the retailers. Only the components used to interface with the Province's in-house application are the responsibility of the Province. 14) Information as to the current system(s) installed at retailer sites, as this will impact data migration as well as complete site HW and SW needs. This information cannot be provided by the Province. See question #12. 15) We will also need protocol documentation for any available interface (departmental component etc.) that you currently have to determine the exact requirements of the solution/system needed. All existing interfaces are flat files over secure FTP. 16) The Program Eligibility / Fuel Sales Data Broker diagram (Solution Requirements FINAL v5 p. 6.): The following questions relate to the building, deployment and maintenance of the Broker: - The document refers to real-time updates, but the Eligibility Data and Fuel Sales Data in this diagram are labelled Daily. Should these be labelled Real-Time? The Broker receives data daily from the SNSMR in-house NSIFTE application. It is the Province s expectation that the vendor solution at the retailer sites communicates with the Broker in real-time to retrieve eligibility data and send sales data. 17) Do the POS systems run in a Virtual Private Network with the Broker? Or do they communicate with the Broker through intermediate firewalls, proxy servers, etc.? The retailer POS systems communicate with the Broker over the internet (there is no VPN). 4

5 18) Is the Broker itself to be deployed internally to Service Nova Scotia & Municipal Relations, behind a firewall? Or is a hosted / managed / cloud operation an option? Either approach is possible. Please indicate your preferred approach in your solution description. 19) What types of communications are to be used between the Broker and the SNSMR NSIFTE Reporting System? For example, is the Eligibility Data sent to the Broker over web protocols (HTTP or HTTP/S)? And should the Broker send Fuel Sales Data to the SNSMR NSIFTE Reporting System over web protocols? Or is the Broker expected to be connected directly to an Enterprise Service Bus? Secure file transfer protocols are currently used. 20) We assume that redundancy / failover and scalability of the Broker are beyond consideration at this stage. This functionality needs to be accounted for in the proposed solution. 21) FR02 Real-time consumer exemption eligibility information: What is the expected outcome when a POS system fails to query the eligibility data? For example if a network outage prevents the POS system from querying the eligibility data: Should the POS give out no exemption? Or should the POS fall back on a locally stored cache of yesterday s eligibility data, for example? In this situation, the tax rebate will be provided. Overages/exceptions will be managed within the Province's application once these transactions have been forwarded. NOTE: If the vendor/service provider is unable to resolve the transmission issue within an acceptable defined period (to be defined at a later date), subsequent transactions would be denied at the POS until the communications issue is resolved. Transactional data, including license master number and litres purchased, etc., would be cached locally in an encrypted state until the network connection is restored and the information can be transmitted/deleted. 5

6 22) What happens when the customer is close to the litres quota limit? For example, customer has a 100 L limit, has previously pumped 95 L, and now pumps 10 L. Should this customer receive a full tax exemption? Or no tax exemption at all? Or should 50% of the fuel tax be exempted (since 5 L were within quota, and 5 L were beyond quota)? Only 5 litres would be tax exempted since that would expend the 100 litre limit. 23) Is quota information maintained only centrally, province-wide, in real-time? Or does each store need to maintain its own independent quota sales information? For example if the central province-wide quota data is only updated daily, then presumably a single store must maintain its own, up-to-the-transaction quota details. That way a single customer who reaches the quota during a transaction cannot receive further exemptions later the same day. Monthly quota data is to be maintained in real-time via communication between the retailer POS system and the Data Broker. No quota/eligibility data is to be stored locally at the retailer site. 24) IN01 Exemption Eligibility Information Retrieval: Does the POS query the Broker for eligibility data keyed by the customer s driver s license #? Or does the query require additional elements, such as the expiry date? The key for eligibility data is Driver s License Master #. 25) Why is personal information (first and last name) necessary? Do the first and last names need to be printed on the customer s receipt? Consumer first and last name are currently printed on the NSIFTE transaction receipt. 26) Which industry and/or government standards must be adhered to when transmitting driver s license personal data? For example, encryption requirements, retention limits, and so on. Please refer to the WAN security standards in the Target Security and Privacy Architecture V3 document. 6

7 27) Are client- and server-side certificates sufficient for authentication, when the POS connects to the Broker to query eligibility information? Or is some kind of user authentication required for each POS to connect to the Broker (with a user ID and password, session identifier, session timeout, etc.)? Industry standard server side security certificates are sufficient; however other solutions are also acceptable provided they meet government security standards. 28) General: Are there any specific backup and recovery requirements for the Broker and/or the POS systems? Disaster Recovery (DR) needs to be addressed for any retailer installed solution components (e.g., the POS system). If there are solution components installed on hardware managed by the Province, then DR processes will be managed by the Province. 29) Are there any specific data purging requirements for the Broker, to conserve disk space? No. 30) How would the vendor login remotely to maintain and support each POS system? For example, would the vendor have VPN access to the individual stores? Or would each store s firewall require an open port for TeamViewer or a similar application? This functionality would need to be defined and implemented directly with each retailer. 31) How would the vendor login remotely to maintain and support the Broker? For example, would the vendor have VPN access to Service Nova Scotia s server? Or would Service Nova Scotia provide a firewall opening for the vendor to login to the Broker? The Province will grant the required remote access to the Broker. 32) How would Service Nova Scotia staff access the Broker, for running reports, inspecting logs, and so on? 7

8 For example, would all access by Service Nova Scotia staff be through a browser? Or would additional access methods, such as SSH or TeamViewer, be required in order for Service Nova Scotia staff to use the system? SNSMR staff would access the Data Broker via a web application interface. 33) Target Security and Privacy Architecture Supporting Best Practices P. 19 Message security is implemented to the level indicated from the Citizen Online Identity Authentication Framework Is this a formal document? This does not apply to the NSIFTE solution since there is no online citizen facing component. 34) Are you looking at a vendor to write both the backend and the retail side? The Province is looking for a vendor to provide a complete NSIFTE solution that includes both the retailer site components and what is referred to as the Data Broker component of the solution in the diagram on page 5 of the REI document. 35) You mention there are 21 stores. Will the successful bidder get all the stores or a portion of them? The solution vendor would be required to install the retailer solution components (e.g., POS system) at all 21 retail stores. 36) How many terminals (lanes) does each store have? See question #10. This addendum will NOT require a revision to the Closing Date and Time, or other dates given in the Request for Proposal document. On your NSRSO tender document, acknowledge this addendum in section 6. Failure to acknowledge addendums may result in disqualification of your bid. Yours Truly, Wade Whynot Project Manager Service Nova Scotia and Municipal Relations 8

9 ADDENDUM # 01 Monday, February 03, 2014 REI# Request for Expressions of Interest for Audit & Enforcement Replacement of Nova Scotia Indian Fuel Tax Exemption (NSIFTE) System The following changes/clarifications are required for this RFP: 1.0 Document Changes/Clarifications: 1.1 REI Cover Page- delete table in its entirety and insert: Questions & Information Sessions Questions pertaining to the content of this REI and its related documents are asked to be received by SNSMR during the period of January 23, 2014 to February 12, The proponent is invited to schedule a REI Information Session prior to the REI closing date. The Information Session can be either in person or via a conference call and will be scheduled between January 28, February 11, 2014 at a mutually agreed to time. Vendors can contact Wade Whynot, SNSMR REI contact (section 1.4) prior to February 5, 2014 to arrange a time. 1.2 Section 1.4 Delete the following sentence: Questions pertaining to the content of this REI and its related documents are asked to be received by SNSMR between January 23, 2014 and February 5, Insert the following sentence: Questions pertaining to the content of this REI and its related documents are asked to be received by SNSMR between January 23, 2014 and February 12, This addendum WILL require a revision to the Closing Date and Time, or other dates given in the Request for Proposal document. The closing date and time will now close at 2:00 pm on Thursday, February 13, On your NSRSO tender document, acknowledge this addendum in section 6. Failure to acknowledge addendums may result in disqualification of your bid. Yours Truly, Wade Whynot Project Manager Service Nova Scotia and Municipal Relations 1

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire Overview This pre-implementation questionnaire is designed to provide the Boston College Internal Audit Department with a general understanding

More information

1B1 SECURITY RESPONSIBILITY

1B1 SECURITY RESPONSIBILITY (ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,

More information

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest.

For windows erver, Which edition of Windows server 2008 is required ( i. e. Web / Standard / Enterprise )?? Kindly suggest. Clarifications/Responses for Notice Inviting Tender From Companies/Agencies for Hiring Four Dedicated Servers (3 - Linux & 1 - Windows) Sr. No. Page No. Clause in Tender Clarification/Suggestion Sought

More information

Policies and Procedures

Policies and Procedures Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,

More information

Management Standards for Information Security Measures for the Central Government Computer Systems

Management Standards for Information Security Measures for the Central Government Computer Systems Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

3.11 System Administration

3.11 System Administration 3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Payment Application Data Security Standard

Payment Application Data Security Standard Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV

More information

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

How To Protect Your School From A Breach Of Security

How To Protect Your School From A Breach Of Security SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary

More information

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods: Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used

More information

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC April 2007 Achieving PCI Compliance A White Paper by e-dmz Security,

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

How To Protect Your Data From Being Stolen

How To Protect Your Data From Being Stolen DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access edmz Introduces Achieving PCI Compliance for: & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC February 2010 C o p y r ig h t 2 0 1 0 e - D M Z S e c u r i t y, LL C. A l l

More information

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries

Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA Pre-Bid Queries The pre-bid meeting for clarifications on the Re-Tender RFP for Providing Dedicated Web Hosting Services for IBA was held

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA)

U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) U.S. Securities and Exchange Commission (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) February 24, 2013 General Information 1. Name of Project or System. (MPTS) 2. Describe the project and its purpose or function

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Mille Lacs Band of Ojibwe Indians Gaming Regulatory Authority Detailed Gaming Regulations

Mille Lacs Band of Ojibwe Indians Gaming Regulatory Authority Detailed Gaming Regulations I. SCOPE. This document includes the for Information Technology to be regulated and played in compliance with Title 15 of the Mille Lacs Band Statutes Annotated. II. REGULATIONS APPLICABLE TO INFORMATION

More information

Cloud Store & Share Frequently Ask Questions

Cloud Store & Share Frequently Ask Questions Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

ATTENTION FOR ONLINE MONITORING. In continuation to CPCB s earlier Web Advertisement, it is to further inform that All the

ATTENTION FOR ONLINE MONITORING. In continuation to CPCB s earlier Web Advertisement, it is to further inform that All the 11.06.2015 Web Advertisement (C 12011/33/2015 Tech) ATTENTION FOR ONLINE MONITORING In continuation to CPCB s earlier Web Advertisement, it is to further inform that All the a) Instrument manufacturers

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Amendment 1 - Annexure 5 (C) Technical Criteria

Amendment 1 - Annexure 5 (C) Technical Criteria 1 - Annexure 5 (C) Technical Criteria S. Eligibility Criteria Documents required Complied Y/N Formatted: Heading 2, Indent: Left: 0", Hanging: 0.4" C) Technical Criteria (Experience and other Technical

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Determine if the expectations/goals/strategies of the firewall have been identified and are sound. Firewall Documentation Develop background information about the firewall(s) in place: Segment diagrams Software Hardware Routers Version levels Host names IP addresses Connections Specific policies for

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Information Sheet. PCI DSS Overview

Information Sheet. PCI DSS Overview The payment card industry (PCI) protects cardholder data through technical and operations standard set by its Council. Compliance with PCI standards is mandatory. It is enforced by the major payment card

More information

How to Set Up Your Virtual Server infrastructure

How to Set Up Your Virtual Server infrastructure Connect Internet Solutions Ltd 4th Floor, New Barratt House, 47 North John Street, Liverpool, L2 6SG Tel: 0151 282 4321 Fax: 0151 282 4322 Email: gcloud@connectinternetsolutions.com Web: www.connectinternetsolutions.com

More information

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation

ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,

More information

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1

211 LA County. Technology Infrastructure Assessment. Request for Proposals. August 2012 Request for Proposals- 211 LA County 1 211 LA County Technology Infrastructure Assessment Request for Proposals August 2012 Request for Proposals- 211 LA County 1 1. General conditions and proposers directions 1.1. Overview 1.1.1. 211 LA County

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

MIGRATIONWIZ SECURITY OVERVIEW

MIGRATIONWIZ SECURITY OVERVIEW MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...

More information

A Glossary of Web Hosting Terms

A Glossary of Web Hosting Terms Limited www.webdrive.co.nz PO Box 302829 North Harbour North Shore City 0751 Telephone: 0800 SPECIFIC SERVICE TERMS These specific service terms must be read in conjunction with 's General Terms and Conditions

More information

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008

Invitation To Bid By State of Connecticut Office of Policy and Management. Vendor to Host Internet Applications. Amendment #2 October 29, 2008 Invitation To Bid By State of Connecticut Office of Policy and Management Vendor to Host Internet Applications Amendment #2 October 29, 2008 Responses to Questions Below please find the responses to the

More information

SECTION 1: INTRODUCTION

SECTION 1: INTRODUCTION 3117 NETWORK ARCHITECTURE STANDARD OWNER: Security Management Branch ISSUE DATE: 10/25/2011 DISTRIBUTION: All Employees REVISED DATE: 7/1/2013 SECTION 1: INTRODUCTION The California Department of Technology

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

REQUEST FOR INFORMATION. Hosted Website Solution and Services RFI #E15-037. Closing: March 24, 2015 at 2:00 pm local time.

REQUEST FOR INFORMATION. Hosted Website Solution and Services RFI #E15-037. Closing: March 24, 2015 at 2:00 pm local time. REQUEST FOR INFORMATION Hosted Website Solution and Services RFI #E15-037 Closing: March 24, 2015 at 2:00 pm local time. Halifax Regional Municipality Procurement Section Suite 103, 1 st Floor, 40 Alderney

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

said period logs can be moved to Service

said period logs can be moved to Service Replies to Queries by Various by vendors for Centralised Desktop management Solution S# Page# Clause Point in the RFP Queries Clarification by UIIC e) Backup and Restore: Successful bidder should provide

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Administrative Systems

Administrative Systems Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept

More information

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Attachment D System Hardware & Software Overview & Recommendations For IRP System Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3

More information

Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to:

Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to: Brown County Information Technology Aberdeen, SD Request for Proposals For Document Management Solution Proposals Deadline: 9:10am, January 12, 2016 Submit proposals to: Brown County Auditor 25 Market

More information

ICT Professional Optional Programmes

ICT Professional Optional Programmes ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications

More information

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE INTRODUCTION The healthcare industry is driven by many specialized documents. Each day, volumes of critical information are sent to and from

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

Infrastructure Technical Support Services. Request for Proposal

Infrastructure Technical Support Services. Request for Proposal Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Deployment Topologies

Deployment Topologies , page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,

More information

DATABASE SECURITY, INTEGRITY AND RECOVERY

DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY Database Security and Integrity Definitions Threats to security and integrity Resolution of problems DEFINITIONS SECURITY:

More information