Ascend Capital, LLC INFORMATION TECHNOLOGY DOCUMENTATION. Abacus Group, LLC

Size: px
Start display at page:

Download "Ascend Capital, LLC INFORMATION TECHNOLOGY DOCUMENTATION. Abacus Group, LLC"

Transcription

1 Ascend Capital, LLC INFORMATION TECHNOLOGY DOCUMENTATION Abacus Group, LLC June 18, 2015

2 CONTENTS ABACUS TECHNICAL SUPPORT CONTACT INFORMATION... 2 CLIENT SUPPORT HOURS... 2 PROBLEM REPORTING ABACUS HELPDESK... 2 SUPPORT ESCALATION... 2 TECHNOLOGY AND NETWORK OVERVIEW... 3 HIGHLIGHTS... 3 DATA CENTERS... 3 ENVIRONMENTAL DESIGN... 4 PHYSICAL SECURITY... 5 NETWORK SECURITY... 5 WIDE AREA NETWORK... 5 NETWORK DIAGRAM... 6 INFRASTRUCTURE TECHNOLOGY DIAGRAM... 7 INFRASTRUCTURE TECHNOLOGY SERVICES ARCHITECTURE... 8 INTERNET ACCESS X7 NETWORK MONITORING... 8 DISASTER RECOVERY... 9 STORAGE SOLUTIONS... 9 VMWARE HIGH AVAILABILITY (HA)... 9 MULTI-SITE REPLICATION MULTI-SITE BACKUP AND RESTORE DATA RETENTION SCHEDULES & INSTANT MESSAGE ARCHIVING GLOBAL RELAY ARCHIVING SERVICE OVERVIEW GLOBAL RELAY FEATURES & FUNCTIONALITY BUSINESS CONTINUITY INTERNET AND/OR NETWORK IS UNAVAILABLE POWER OUTAGE IN OFFICE OFFICE BUILDING IS INACCESSIBLE Abacus Group LLC [1] Confidential

3 ABACUS TECHNICAL SUPPORT CONTACT INFORMATION CLIENT SUPPORT HOURS Ascend is provided with information technology services and support by Abacus Information Technology, LLC (Abacus) between the following business hours: Monday to Friday: 6am 6pm Pacific Time, and after hours on an as needed basis Saturday and Sunday: On an as-needed basis PROBLEM REPORTING ABACUS HELPDESK The Abacus Helpdesk will be Ascend s primary point of contact. In the event of a hardware / software issue, Ascend will contact the Abacus Helpdesk for assistance resolving the issue. helpdesk@abacusgroupllc.com Phone: SUPPORT ESCALATION Mike Herman Director - Client Technical Services Phone: mherman@abacusgroupllc.com Mike Herman Director Client Technical Server Phone: mherman@abcusgroupllc.com Abacus Group LLC [2] Confidential

4 TECHNOLOGY AND NETWORK OVERVIEW Abacus has built an adaptive infrastructure to provide the most reliable and scalable computing environment possible. Abacus has partnered with leading technology vendors such as Network Appliance, Cisco, Microsoft, Dell and VMware to deliver IT services to customers at a fraction of the cost of doing it themselves. Leveraging industry best practices for hosting services, the Abacus Group delivers secure and robust access to mission critical applications such as , File, ActivSync / BES and Database servers/services. HIGHLIGHTS Advanced anti-spam technology leveraging machine learning from Postini Multi-level anti-virus solutions from Symantec Enterprise level storage solutions powered by Network Appliance Highly Redundant network and firewall Infrastructure from Cisco Systems Tier III data centers provided by Sungard and Internap. DATA CENTERS Abacus has high-performance data centers that are designed to be secure, highly available, scalable and manageable. The network infrastructure is built using Cisco routers, switches and firewalls. The following are the details of the data centers utilized for Abacus s IT platform (AbacusFLEX). Primary Data Center Abacus hosts Ascend s primary IT infrastructure at the Digital Realty Trust Data Center located at 720 2nd Street, Oakland, CA The facility is an 111,000 square foot Tier III data center located near Jack London Square in Oakland, California. Built in 2001, the data center is located in the region s fiber-rich district next to a PG&E substation. The facility is owned and operated by Digital Realty Trust Inc. The data center is certified to the highest industry standards and compliance requirements including: 24/7/365 power, cooling, connectivity and security capabilities to ensure mission-critical operations and business continuity for tenants. Secondary Data Center (Disaster Recovery) Abacus concurrently replicates and hosts Ascend s secondary / disaster recovery IT infrastructure at the Sungard Availability Services Data Center located at 1500 Spring Garden Street, Philadelphia, PA The facility is a 1,080,544 square foot Tier III data center. The data center is certified to the highest industry standards and compliance requirements including: 24/7/365 power, cooling, connectivity and security capabilities to ensure mission-critical operations and business continuity for tenants. Abacus Group LLC [3] Confidential

5 ENVIRONMENTAL DESIGN The Primary Data Center is located at a Tier-III Co-Location facility and is designed with very stringent environmental and power requirements: Continuous power supply with backup uninterruptible power supply utilizing CPS Hitec systems: Adequate power capacity including air conditioning and lights Hitec systems tested at full load on monthly schedule Fuel for generators (72 hours worth) kept on premises and monitored for local environmental compliance Conforms to or exceeds applicable local structural building codes utilizing standards such as bullet proof glass, fire doors and reinforced walls and complying with disaster proof design: Complies with all local zoning ordinances Certified not located in a 100-year flood plain Earthquake and hurricane bracing on all racks and cable trays (where appropriate) Adequate multi-zone air conditioning, including a backup system for the multizone air conditioning: Climate control including humidity sensors and control. Designed to provide cooling for 150W per/sq.ft. Heat and smoke detectors that meet or exceed all local fire code regulations. Very Early Smoke Detection Alarm (VESDA) Double pre-action sprinkler system Pre-action dry pipe system zoned to release water only where needed Easily removable access panels in raised flooring Flood sensors and monitoring under raised floors and in other critical areas Separate grounding systems to prevent grounding loops; true ground versus green wire ground Sealed cable vault entrances to facility, remotely monitored Formalized physical facility preventive maintenance program -- Facility is SAS70 Type II Certified Sub-breakers per relay rack or lineup CPS systems clean all power before it enters the building to protect against any power fluctuation. Abacus Group LLC [4] Confidential

6 PHYSICAL SECURITY The Primary Data Center is located at a Tier-III Co-Location facility which has very stringent physical security requirements: Building access procedures: Limited number of building entrances in compliance with local fire ordinance Access limited and managed via security policies for all facility entrances 24x7 onsite security guards Visitor-logging procedure Card-key, biometric, or similar entry locks ID-badge system for all employees and visitors Staff and visitors must wear badges at all times on premises Individual cabinet locks; master in NOC; key list from customer Equipment location: Video surveillance and motion sensors for entrances into and out of the building Locked cages Secure rooms available Managed firewall services with 24x7 monitoring available Backup lighting systems for entry ways and cable vaults Individual cabinet locks; master in NOC; key list from customer NETWORK SECURITY All three locations (Client Site, Primary Data Center and Secondary Data Center) will be protected by best in class Cisco ASA firewalls deployed in a failover configuration. Remote access will be encrypted via Cisco VPN or Citrix. Client domains will be segregated on separate VLANs. Industry best practices will be utilized to ensure that security patches are deployed on a regular basis through WSUS update servers. Group policy will enforce security standards on workstations and laptops. Symantec Anti-Virus will protect against emerging virus and spyware threats. will be scanned before entering the network for malware. Spam will be filtered and quarantined based on individual user preferences. WIDE AREA NETWORK Data Centers are interconnected using multiple high-speed links in order to provide high performance, scalability and redundancy. Using a dynamic routing protocol (e.g. OSPF), the network can detect link and router failures; quickly finding an alternate best path and rerouting the traffic accordingly. Abacus Group LLC [5] Confidential

7 NETWORK DIAGRAM Abacus Group LLC [6] Confidential

8 INFRASTRUCTURE TECHNOLOGY DIAGRAM Abacus Group LLC [7] Confidential

9 INFRASTRUCTURE TECHNOLOGY SERVICES ARCHITECTURE AbacusFLEX utilizes three components to provide Ascend with a secure, redundant and scalable network. 1) Ascend s site hosts an ESX server to provide multiple VMs supplying Domain controller functionality (DNS, DHCP, AD), file/print services, and utility services such as WSUS (Windows Server Update Services) and monitoring. Through this configuration, the client experiences no latency when accessing files and critical services. 2) The Primary Data Center hosts a clustered Exchange farm utilizing CCR (clustered continuous replication) to provide highly available messaging. Additionally, BlackBerry Enterprise servers are configured for failover to DR. The ESX servers, at the production data center, host virtual instances to provide redundancy for all critical applications. 3) The Secondary Data Center provides fail-over capabilities in the event there is a regional disaster and the client site and/or primary / production data center are not available. All data from the client site is replicated to the secondary data center such that there will be minimal loss of data in the event the client site and primary data center are inoperable. INTERNET ACCESS Each client site is connected to the production data center through their primary circuit (bandwidth to be determined by local infrastructure and availability). Client Internet traffic routinely flows over this line and through the production data center's dual 100 Mbps DIA (Direct Internet Access) lines. These circuits are multi-homed through BGPv4 with Cogent Communications and Internap allowing automatic failover in the event of an Internet Service Provider failure. Additionally, each client site has a DIA line of varying size. Through dynamic routing (OSPF) traffic will automatically reroute around failed network devices or down circuits. This design provides the highest level of resiliency and minimizes downtime during hardware and/or link failures or any routing issues within the Service Provider s networks. 24X7 NETWORK MONITORING All components of our network are monitored 24x7 by our Network Management Systems. Enterpriselevel network monitoring applications not only detect faults in real-time but can inform of potential problems before they occur. Performance metrics from all routers and switches are collected and analyzed to determine abnormal device/traffic behavior that could have a negative impact on the performance of a customer s network. Abacus Group LLC [8] Confidential

10 DISASTER RECOVERY Abacus s Disaster Recovery service will be managed out of the Sungard Data Center in Philadelphia, PA. In the event of a local or regional disaster, data and applications will be available to users via Citrix. This service will allow Ascend s users to securely access their data and applications via any internet browser. The Abacus Disaster Recovery solution has been architected to allow for the failure of individual components without impacting Ascend or any of its users in regards to their use of the IT functions. All of the data and applications at the client site will be replicated to the secondary data center in Philadelphia, PA in near real-time ensuring minimal data loss in the event of a disaster. The primary data center in Oakland, CA will replicate the clustered Exchange mailbox servers to this site via near real-time SCR (Standby Continuous Replication) log shipping. Abacus provides multiple levels of DR planning to accommodate single points of failure and catastrophic outages. Clustered servers for zero downtime applications Highly available storage solutions with RAID technology Multi-level Snapshot capability to restore lost or corrupted data Multi-site replication for long term catastrophic failures Multi-site backup and restore of all files and databases using advanced tape library backup STORAGE SOLUTIONS Abacus s Storage Arrays provide extremely high reliability with redundant components and hitless upgrades ensuring that we can deliver 24x7-computing services. Based on a new virtualized model, data is written across as many as 40 disk drives, which improves performance and provides for instantaneous recovery of a drive failure using RAID or Mirroring techniques. VMWARE HIGH AVAILABILITY (HA) All Virtual Machines running in the Production and Secondary Data Centers are protected by VMWare's High Availability (HA) technology. This feature will automatically move and restart all virtual machines on a failed physical host. This technology significantly shortens downtime due to failed hardware. Abacus Group LLC [9] Confidential

11 MULTI-SITE REPLICATION Abacus Group's main hosting centers are geographically dispersed. The Primary Data Center is located in Oakland, CA. The secondary is in Philadelphia, PA. All data is replicated between each data center using advanced Microsoft and XOSoft replication technologies. MULTI-SITE BACKUP AND RESTORE Abacus Group uses Backup Exec to backup all databases, and files to secondary storage. Open files are backed up seamlessly, enabling backups to occur without interruption to critical business applications. Backups are configured to run automatically on a daily cycle. DATA RETENTION SCHEDULES All data will be backed up according to the retention schedule for each data type, as shown in the table below: DATA TYPE FREQUENCY RETENTION PERIOD File Data Daily 30 Days System Data Daily 30 Days Exchange Data Daily 30 Days SQL Data Daily 30 Days Abacus Group LLC [10] Confidential

12 & INSTANT MESSAGE ARCHIVING Ascend utilizes Smarsh s Archiving Solution for and Instant Message Archiving. Smarsh has developed an industry leading archiving solution to meet electronic communications regulatory mandates from the SEC and NASD (now FINRA). SMARSH ARCHIVING SERVICE OVERVIEW The Smarsh archiving service allows compliance officer(s) or designated reviewer(s) to monitor corporate communication with ease and intelligent functionality, as well as provide immediate access to missioncritical data stored in a secure Write-Once, Read Many format (WORM). The Web-based Smarsh management console enables reviewers to securely produce data on-demand and monitor all of the fund s electronic messages in one place. The system s rule-setting engine enables compliance personnel to search and retrieve messages within the archive based on customizable criteria, including random samples, keywords and phrases. The comprehensive Reporting Center is capable of producing customizable organizational usage reports and evidence of supervision/ policy enforcement. SMARSH FEATURES & FUNCTIONALITY The Smarsh s service provides Abacus clients with the ability to scan every single and instant message as it leaves or enters our Exchange server and/or the Instant Message clients of all of our employees. Through Smarsh Ascend is able to run keyword/phrase searches based on every field (or Boolean combination) associated with an or instant message. Ascend can also track chains of E- mails and s from multiple individuals. The service tracks message header information (where the originated or is sent), and demonstrates review policy enforcement with audit trail reports. Ascend is also able to save search criteria, and facilitate necessary review policy with regularly scheduled saved searches. Lastly, Ascend is able to define higher-risk users and assign appropriate scrutiny based on corporate policy, as well as configure company approved keyword lists for individual compliance officers/osjs Abacus Group LLC [11] Confidential

13 BUSINESS CONTINUITY In the event that one of the following scenarios occurs, please follow the appropriate steps to regain normal business functionality: INTERNET AND/OR NETWORK IS UNAVAILABLE Probability: Low Description: - Internet is unavailable - IM is unavailable - is unavailable - P drive is unavailable - Z drive is unavailable - Cannot log in to the domain Probable Source: This scenario may be caused by many potential sources possibilities include, but are not limited to - necessary configuration updates, router/switch failure, hardware failure, software corruption, patch requirements, virus infection, etc. Actions Needed: - Call the Abacus Helpdesk to alert of outage - The Abacus Helpdesk will troubleshoot with internal and/or external groups (if necessary) and advise of next steps SLA for Recovery: 2 hours or less (depending on the identified source) Abacus Group LLC [12] Confidential

14 POWER OUTAGE IN OFFICE Probability: Low/Medium Description: - Power in the building is available but no power in the office - No lights - Desktops are not functional - Network is functional - Phones are functional - Laptops are functional (running on battery) Probable Source: Various Actions Needed: - Call the Abacus Helpdesk to alert of outage - The Abacus Helpdesk will troubleshoot with internal and/or external groups (if necessary) and advise of next steps SLA for Recovery: In the event that this scenario occurs, the UPS will automatically kick in to generate power to the network equipment allowing the network and phones to remain unharmed. If you are using Cisco IP phones they most likely receive power from the UPS. It may be possible to remain in your office and continue normal business functions (via Wi-Fi and/or laptop). However it is advisable to work from a remote location until power is restored in the office Abacus Group LLC [13] Confidential

15 OFFICE BUILDING IS INACCESSIBLE Probability: Extremely Low Description: - Office building is inaccessible / unavailable Probable Source: In the event that this scenario occurs, it is likely that a catastrophic even has occurred in the region causing the building to become unavailable. Catastrophic events include: terrorism, acts of nature, fire, etc. Actions Needed: - Call the Abacus Helpdesk to alert of outage SLA for Recovery: The SLA for recovery will vary and is dependent on many factors. However, since all data is stored offsite, it is possible to resume normal business functionality by remotely logging in to the DR data center via Citrix. Abacus Group LLC [14] Confidential

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

DATA CENTRE DATA CENTRE MAY 2015

DATA CENTRE DATA CENTRE MAY 2015 DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service

vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity

More information

Office of Information Technology Hosted Services Service Level Agreement FY2009

Office of Information Technology Hosted Services Service Level Agreement FY2009 Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

DATA CENTRE DATA CENTRE

DATA CENTRE DATA CENTRE DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service

More information

Datacenter Hosting and Cloud Computing Services

Datacenter Hosting and Cloud Computing Services Datacenter Hosting and Cloud Computing Services Overview Background Founded in 1995, Lore Systems operates an international datacenter network which today includes full service 3+ datacenter facilities

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

White paper. SAS Solutions OnDemand Hosting Overview

White paper. SAS Solutions OnDemand Hosting Overview White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE

TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE TRADITIONAL ENTERPRISE SCIENTIFIC SOFTWARE deployments have been complicated and expensive. They require a data center with office space, power, cooling, bandwidth, networks, servers, and storage. They

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS 7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Managed IT Secure Infrastructure Flexible Offerings Peace of Mind Your Place or Ours Why Trust Your Network to SymQuest? SymQuest is an industry leader with a national reputation for service excellence

More information

SaaS architecture security

SaaS architecture security Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

WHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices

WHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices DELL SURVEY OF EMAIL OUTAGES WHITE PAPER Dell Modular Services www.dell.com/modularservices THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

Why Host Microsoft Exchange with RTL Technologies?

Why Host Microsoft Exchange with RTL Technologies? Why Host Microsoft Exchange with RTL Technologies? When looking to implement or outsource Microsoft Exchange, there are several key factors to consider. Is the service reliable? Are there engineers on

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

CAPABILITIES STATEMENT

CAPABILITIES STATEMENT CAPABILITIES STATEMENT TABLE OF CONTENTS About Entity Data 1 Customer Benefits 2 Why Choose Entity Data 3 Our Data Centre 5 Our Solutions > Solutions Overview 6 > Enterprise Virtualisation 7 > Host Security,

More information

A Glossary of Web Hosting Terms

A Glossary of Web Hosting Terms Limited www.webdrive.co.nz PO Box 302829 North Harbour North Shore City 0751 Telephone: 0800 SPECIFIC SERVICE TERMS These specific service terms must be read in conjunction with 's General Terms and Conditions

More information

Data Center Infrastructure & Managed Services Outline

Data Center Infrastructure & Managed Services Outline Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists

More information

Hosting Features, Terms & Policies

Hosting Features, Terms & Policies Hosting Features, Terms & Policies Portalogiks SharePoint Hosting Table of Contents Data Center Introduction... 2 Connectivity... 3 Power... 3 Security... 3 Environment... 3 Hosting Hardware & Software...

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

SolveXia Business Continuity Planning

SolveXia Business Continuity Planning Business continuity planning is the term we use to describe all the steps we take at SolveXia to ensure that our service is up and running when you need it. As a 'Software as a Service' provider, our aim

More information

CHICAGO S PREMIERE DATA CENTER

CHICAGO S PREMIERE DATA CENTER CHICAGO S PREMIERE DATA CENTER White City collocation was founded in June, 2010 by a highly experienced industry executive in conjunction with several investment companies. The strategy of White City is

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

BOWMAN SYSTEMS SECURING CLIENT DATA

BOWMAN SYSTEMS SECURING CLIENT DATA BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...

More information

Service Description Email Filtering

Service Description Email Filtering Service Description Email Filtering Table of Contents Overview iomart Email Filtering... 3 iomart Email Filtering Features... 3 Technical Features... 3 Anti-Spam... 3 Cost Reduction... 4 Anti-Virus...

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

OVERVIEW. IQmedia Networks Technical Brief

OVERVIEW. IQmedia Networks Technical Brief IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

Itron Cloud Services Offering

Itron Cloud Services Offering Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...

More information

Network & Information Services Network Service Level Commitment

Network & Information Services Network Service Level Commitment Network & Information Services Network Service Level Commitment Agreement This agreement is to define CESD Network Services provided to our component school districts as a service outlined in the annual

More information

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME THE NEED FOR HIGH AVAILABILITY AND UPTIME 1 THE NEED FOR HIGH AVAILABILITY AND UPTIME All Clouds Are Not Created Equal INTRODUCTION Companies increasingly are looking to the cloud to help deliver IT services.

More information

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951. IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

Disaster Recovery & Business Continuity Dell IT Executive Learning Series

Disaster Recovery & Business Continuity Dell IT Executive Learning Series Disaster Recovery & Business Continuity Dell IT Executive Learning Series Presented by Rich Armour, Debi Higdon & Mitchell McGovern THIS PRESENTATION SUMMARY IS FOR INFORMATIONAL PURPOSES ONLY AND MAY

More information

NeuStar Ultra Services Physical Security Overview

NeuStar Ultra Services Physical Security Overview NeuStar Ultra Services Physical Security Overview Mission-critical network operations must have the highest standards of quality, security and reliability. NeuStar Ultra Services currently locates its

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

Total Message Care. Why E-mail Sorting Solutions?

Total Message Care. Why E-mail Sorting Solutions? Total Message Care Hosted Email- POP3, IMAP, MAPI, & Web Mail IM Filtering Email Filtering Web Filtering Archiving Shared Calendar, Tasks Mobile Device Synchronization Outlook Compatibility Why E-mail

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Servers Australia Capability Statement. 1st January 2012

Servers Australia Capability Statement. 1st January 2012 Servers Australia Capability Statement 1st January 2012 Servers Australia Servers Australia was established in October 2006 and has become a premium supplier of hosting, VoIP, Co-location, internet services

More information

Enterprise Security Model in SAS Environment

Enterprise Security Model in SAS Environment Enterprise Security Model in SAS Environment WHITE PAPER Enterprise Security Model in SAS Environment Emerging internet threats coupled with strict compliance requirements of banks, financial institutions,

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Data Center Management

Data Center Management Data Center Management How Cisco IT Operates, Manages, and Protects Its Data Center A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview The Cisco IT Operations Data Center on the San Jose, California

More information

What is the Cloud, and why should it matter?

What is the Cloud, and why should it matter? 391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator

MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator MINNEAPOLIS PARK AND RECREATION BOARD JOB DESCRIPTION JOB TITLE: Network & Operations Coordinator Job Number: 07229P Date Finalized: 7/14/11 Service Department: Information Accountable To: Director, Information

More information

Cherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426

Cherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426 Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.

More information

Why Email Fails MessageOne Survey of Email Outages

Why Email Fails MessageOne Survey of Email Outages Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 services@audcomp.com

611 Tradewind Dr. Suite 100, Ancaster ON, L9G 4V5 (905) 304-1775 ext 244 services@audcomp.com Connecting To The Cloud Is Easier Than You Think Audcomp Cloud Services can bring your organization into the cloud. We provide a secure reliable medium to maximize your uptime, allowing you to focus on

More information

HealthcareBookings.com Security Set Up

HealthcareBookings.com Security Set Up HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES:

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: Data Replication Exchange 2010 real-time data replicates to protect critical information in the event of a hardware failure or database corruption. Multi-tenant

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information