Open Source Policy Builder

Size: px
Start display at page:

Download "Open Source Policy Builder"

Transcription

1 Open Source Policy Builder In This Guide: Key issues to consider when formulating an open source policy Characteristics of best-in-class open source policies Sample open source policy statements Helping Enterprises Use Open Source Software

2 The following questions represent key characteristics of best-in-class components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open source policy by answering the questions and formulating language expressing its choices in a policy statement. 1. Which open source software (OSS) licenses are approved for use in company products? All open source licenses OSI-approved licenses only All except reciprocal licenses Company-specified list 2. External acquisition where can a customer obtain source code for products purchased from the company? From the company site e.g., From the Internet, any source (e.g., SourceForge, FreshMeat, GitHub, Google, OSDir, other repositories) From a third party supplier, i.e., Red Hat, IBM 3. Internal acquisition who is authorized to bring in open source software that will be used in the company s products? Any employee Only authorized employee(s) Only Open Source Review Board ( OSRB ) 4. Internal acquisition how do company employees acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the OSRB 5. Partner software acquisition how do partners acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the partner s OSRB 6. Who in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Legal Audit Engineering Individual developers IT management Open Source Review Board (OSRB) All of the above 7. What level in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Corporate officer Board of directors Company counsel 8. What business justification is required before approval is given for the use of open source software in company products? needed Must meet engineering requirements that specify the use of open source software Must demonstrate business value TCO versus functionally-equivalent commercial software, ROI, etc. Need to demonstrate why OSS was chosen over a commercial solution Open Source Policy Builder PAGE 1

3 9. Who is the owner of open source software that is brought into the company for the express purpose of using in company products? Who is responsible for initial acquisition and lifecycle management of an OSS component? Individual developer Each OSS component has a named owner One person or central body/team, e.g. OSRB 10. How is the acquisition of open source software initiated? Acquisition is the responsibility of the individual developer Acquisition is the responsibility of procurement/supply chain management Acquisition requests are directed to the OSRB 11. Security and Integrity: what kind of security/integrity review is required before open source software is procured? Download from OSRB-approved repository is sufficient MD5 checksum or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 12. Security and integrity: what kind of security/integrity review is required before open source software is incorporated into a company product? Verified download from OSRB-approved repository is sufficient Verified MD5 checksum (against OSRB-registered MD5) or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 13. Security and integrity: what kind of security/integrity review is required before a company product that includes open source software is shipped? Company-conducted complete source code and binary code scanning for security and integrity Certified scan results provided by supply chain vendors that include open source software in the components they supply to the company Manual review 14. Procurement: does the company distinguish between companies that supply open source software and companies that provide proprietary software? Yes 15. Warranty: what warranties must be obtained from vendors that supply software? (e.g., free replacement of IP infringing code) (no warranties) Bare bones all software provided as is Vendor-supplied software includes/does not include open source software (simple yes/no) 16. Damages: what are the minimum damages required when dealing with a vendor that supplies software? (no damages; sufficient to cure the breach in an agreed-to timeframe) Partial (damages only in actual costs incurred by company to address the breach) Full (damages cover the all costs including indirect costs e.g., loss of reputation) Open Source Policy Builder PAGE 2

4 17. Indemnification: what kind of indemnification must be provided by vendors who supply software to the company? software is as is Minimal - terms of license is sufficient Full indemnification 18. Policy scope: what is the scope of the company OSS policy? Company-wide Divisional/line of business Department Product 19. What provisions (if any) are in place for dealing with software license conflicts? Light we only are concerned with product-level licenses and potential conflicts Robust we have the requisite tooling and procedures to identify all licensed software within the product 20. What level of software categorization does the company have for software contained in distributed products? Light Ideal 21. Remediation: once this policy is established, what are the remediation requirements with respect to existing products that incorporate open source software?, grandfathered in Existing products with OSS must be inventoried (e.g., scanned, audited) within X days 22. OSS architecture: for open source software to be brought into the company for use in distributed products, is there a minimum technical standard that must be met? developers take all the responsibility, use at own risk Project must be considered stable in SourceForge/Freshmeat and/or community must be considered stable (subject to approval by OSRB) Must have significant widespread adoption as measured by downloads Must have significant commercial base, i.e. MySQL dual-license 23. Forking/community abandonment: How will the company deal with project forking or abandonment of open source software used in company products? Are there alternate vendors/suppliers available? Will deal with it when it happens Must have alternate vendor/suppliers listed or identified prior to committing to incorporate the software within company products Must have active written response plan Open Source Policy Builder PAGE 3

5 24. Certification: do OSS components have to be certified before they can be implemented or deployed? If so, who must certify and what kinds of certification must be done? When can OSS be deployed to production?, no certification needed Locally certified by owner or end-user Formal certification by central IT staff External certification Commercial certification 25. Will OSS be distributed in company products?, all use is internal, but will be used in customer-facing environments Yes, will distribute unmodified OSS externally Yes, will distribute modified OSS externally Yes, will integrate and distribute OSS with proprietary IP 26. Can OSS that is to be used in company products be modified?, must be used in native form Can be modified with approval Can be modified in specified ways Can be modified in any way if not distributed Can be modified without restriction 27. Who is responsible for maintaining inventory, usage and other metadata related to OSS component, including licenses? Individual developer Company legal department Each OSS component has a named owner (can be used in 20 divisions) One central person or central body/team, e.g., Open Source Review Board 28. Security: who will be responsible for overseeing security of OSS components? Who will check if the code contains vulnerabilities? Who is responsible for applying security patches? Individual end-user One central person or central body/team, e.g. Open Source Review Board Team to be named IT security staff 29. Are contributions to open source projects allowed? Yes, but only indirectly via use of a proxy (e.g., supplier) Yes, with valid business need and/or approval from management / Open Source Review Board Yes, but only on employees own time Yes, but employees must use non-corporate addresses for interacting with the community Yes, totally unregulated 30. Under what circumstance can an employee make a contribution to an OSS project if it is not related to company business? Under no circumstance possible violation of employment contracts Yes, without attribution to company name and on employee s personal time and no requirement to inform the company of such activity Open Source Policy Builder PAGE 4

6 31. communication: Under what circumstances can employees communicate with OSS communities (with company attribution)? Never When business need dictates but subject to approval/oversight of Open Source Review Board along with Company Communications Department Freely for any reason subject to employment guidelines 32. Are company employees allowed to speak publicly about the company s use of open source software in products? Yes, with prior management approval Yes, with specified approved topics Yes, under any circumstance 33. Support: What level of technical support must be in place prior to implementing open source software in company products? Individual developer responsibility Provided by formal internal team, development or central IT Combination internal with external provider Must have SLA signed with business partner 34. Where should OSS used in distributed company products be housed? Developer responsibility Centrally-managed repository Vendor-managed repository (e.g., OpenLogic) 35. Are source code and binary code scanning of all software in a distributed product required to avoid IP infringement? Yes, source code and binary code must be fingerprinted upon initial acquisition only Yes, source code and binary code must be scanned periodically Yes, source code and binary code must be scanned prior to company s product being commercially shipped 36. Repository tracking: how are open source software components/projects tracked within the company? special project tracking of the repository Custom-built project tracking tool Yes, with vendor-provided tool (e.g., OpenLogic.) 37. What are the requirements for software delivered to the company from a supplier?, responsibility of contractor to make sure they are adhering to any and all OSS or proprietary licenses Supplier must detail all software in their components, including the specific licenses under which the software is being made available Supplier must provide a contractual bill of lading that includes detailed list of software, license(s) along with test results from a code scan (e.g., OpenLogic) About OpenLogic OpenLogic is a leading provider of enterprise open source solutions for the cloud and the data center. OpenLogic helps hundreds of leading enterprise across a wide range of industries to safely acquire, support, and control open source software. OpenLogic offers certification, commercial-grade technical support and indemnification for 600 open source packages backed by the OpenLogic Expert Community. OpenLogic also offers CloudSwing, a complete open PaaS solution for enterprises seeking to deploy applications and customized open source stacks in the cloud, and OLEX Enterprise Edition, a SaaS solution for open source scanning and governance. Open Source Policy Builder PAGE 5

Open Source Policy Builder

Open Source Policy Builder Open Source Policy Builder Effective and comprehensive open source policies are based on a thorough and unbiased organizational assessment. You can start building your organization s open source policy

More information

Open Source Policy Builder

Open Source Policy Builder Open Source Policy Builder The following questions represent components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open

More information

FOSS Governance Fundamentals

FOSS Governance Fundamentals FOSS Governance Fundamentals HP Part Number: 5992-4059 Published: January 2008 Edition: 1.0 Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notice Confidential computer software. Valid license

More information

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management

Client Alert. Global Information Technology & Communications Privacy, Data Protection and Information Management Global Information Technology & Communications Privacy, Data Protection and Information Management Client Alert Umbrellas for Clouds: Risk Mitigation Strategies for SaaS Transactions www.bakermckenzie.com

More information

BOM based on what they input into fossology.

BOM based on what they input into fossology. SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org

More information

Webinar on Dec 9, 2009. Presented by Kim Weins, Sr. VP of Marketing and Rod Cope, CTO and Founder of OpenLogic

Webinar on Dec 9, 2009. Presented by Kim Weins, Sr. VP of Marketing and Rod Cope, CTO and Founder of OpenLogic Top 10 Ways to Stretch Your Budget by Using Top 10 Ways to Stretch Your Budget by Using More Open Source Software in 2010 More Open Source Software in 2010 Webinar on Dec 9, 2009 Presented by Kim Weins,

More information

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive

More information

How To Use Open Source Software

How To Use Open Source Software Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and

More information

How To Manage An Open Source Software

How To Manage An Open Source Software Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Sr. Director OSS Management Olliance Group Speaker Greg Olson Sr. Director, Open Source Management Over 30 years of

More information

+ + Apps, App Stores, and Open Source. End-to-End Open Source Management. Enabling Successful and Safe Open Source Adoption At 300+ Enterprises

+ + Apps, App Stores, and Open Source. End-to-End Open Source Management. Enabling Successful and Safe Open Source Adoption At 300+ Enterprises Apps, App Stores, and Open Source Jilayne Lovejoy Corporate Counsel LinuxCon - August 2012 1 End-to-End Open Source Management Enabling Successful and Safe Open Source Adoption At 300+ Enterprises In the

More information

FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle

FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why

More information

Contract and Vendor Management Guide

Contract and Vendor Management Guide Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

agility made possible

agility made possible SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

Getting Started with Open Source Compliance

Getting Started with Open Source Compliance Getting Started with Open Source Compliance August 9, 2006 www.hro.com Denver Boulder Colorado Springs London Los Angeles Munich Salt Lake City San Francisco Copyright 2006 Holme, Roberts & Owen LLP Where

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ISM Online Course Offerings

ISM Online Course Offerings CERTIFICATION (CPSM and CPSD ) ISM Online Course Offerings 3968 Bridge Review Online Course 21 CEHs This course is designed as a review for current C.P.M. holders as part of their preparation for taking

More information

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

Security Controls in Service Management

Security Controls in Service Management Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

The Cloud De-mystified The Buyers Perspective

The Cloud De-mystified The Buyers Perspective The Cloud De-mystified The Buyers Perspective David Brook Nov 2010 Intro The leading independent experts in saving IT cost and negotiating safer contracts Client Technology Suppliers 2 Agenda 1. Types

More information

The Casper Suite An ROI overview

The Casper Suite An ROI overview The Casper Suite An ROI overview Introduction Inside Read how the Casper Suite delivers significant ROI in the following areas: Imaging Inventory Software Distribution Patch Management Settings and Security

More information

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

Rational Asset Manager 7.2 Editions and Licensing

Rational Asset Manager 7.2 Editions and Licensing Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, ddbaron@us.ibm.com Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

Do You Have a Scanner or a Scanning Program?

Do You Have a Scanner or a Scanning Program? Do You Have a Scanner or a Scanning Program? About Me Dan Cornell Founder and CTO of Denim Group Software developer by background (Java,.NET, etc) OWASP San Antonio 15 years experience in software architecture,

More information

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Introduction to OVAL: A new language to determine the presence of software vulnerabilities Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction

More information

HIT System Procurement Issues and Pitfalls Session 2.03

HIT System Procurement Issues and Pitfalls Session 2.03 HIT System Procurement Issues and Pitfalls Session 2.03 Presented by: Gerry Hinkley Davis Wright Tremaine LLP and Joseph M. DeLuca IT Optimizers Session Goals Provide you with A best practices approach

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

JBoss Enterprise MIDDLEWARE

JBoss Enterprise MIDDLEWARE JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

Productivity Through Open Source Policy Compliance

Productivity Through Open Source Policy Compliance Productivity Through Open Source Policy Compliance This article is part of a series on how Rational Collaborative Lifecycle Management (CLM) solutions support software development compliance. Today the

More information

Copyright 2014 Thomas Trappler All Rights Reserved

Copyright 2014 Thomas Trappler All Rights Reserved 1 Cloud Computing Risk Mitigation 2 Cloud Computing Risk Mitigation http://www.flickr.com/photos/61056899@n06/5751301741/sizes/l/in/photostream/ As with the adoption of any IT solution, The adoption of

More information

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two)

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) By Amy Terry Sheehan Vendors and other third parties are vital to

More information

Dynamic Security for the Hybrid Cloud

Dynamic Security for the Hybrid Cloud Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Cloud Computing. What we should be auditing

Cloud Computing. What we should be auditing Cloud Computing What we should be auditing What is cloud computing? Model Description What it does Examples SAAS Software as a service Applications often available through a browser Workday, Salesforce.com

More information

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen White paper Reducing Software Costs While Increasing Cost Predictability and Control Mikko Marttinen Abstract Effective software procurement addresses contractual and overall cost of ownership through

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

OPEN SOURCE SECURITY

OPEN SOURCE SECURITY OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Nexus Professional Whitepaper. Repository Management: Stages of Adoption

Nexus Professional Whitepaper. Repository Management: Stages of Adoption Sonatype Nexus Professional Whitepaper Repository Management: Stages of Adoption Adopting Repository Management Best Practices SONATYPE www.sonatype.com sales@sonatype.com +1 301-684-8080 12501 Prosperity

More information

Availability of Services in the Era of Cloud Computing

Availability of Services in the Era of Cloud Computing Availability of Services in the Era of Cloud Computing Sanjay P. Ahuja 1 & Sindhu Mani 1 1 School of Computing, University of North Florida, Jacksonville, America Correspondence: Sanjay P. Ahuja, School

More information

ORACLE IT SERVICE MANAGEMENT SUITE

ORACLE IT SERVICE MANAGEMENT SUITE ORACLE IT SERVICE MANAGEMENT SUITE ITIL COMPATIBLE PINKVERIFY ORACLE IT SERVICE MANAGEMENT SUITE HAS BEEN CERTIFIED BY PINK ELEPHANT THROUGH THE PINKVERIFY PROCESS TO BE ITIL COMPATIBLE IN SIX PROCESS

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Cracking the Code on Software License Management

Cracking the Code on Software License Management Cracking the Code on Software License Management Overview of IT Asset Management Integration Integration of the physical, financial, and contractual attributes of IT assets Enables the delivery of timely

More information

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures? SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling

More information

RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network

RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network HRG Insight: Subscription Services - The concept of Subscription Services in software is not new but has become a front-and-center topic recently. Microsoft s recent announcement that it will bundle the

More information

White Paper. Managed IT Services as a Business Solution

White Paper. Managed IT Services as a Business Solution White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...

More information

Implementing Clinical Solutions in the Cloud

Implementing Clinical Solutions in the Cloud Implementing Clinical Solutions in the Cloud NICK LAGROTTA Contents Introduction... 1 What is the Cloud?... 2 Service Models... 2 Delivery Models... 2 Cloud Challenges... 3 The Benefits of a Clinical Cloud...

More information

Schedule 14 CDS Data Center Hosting Agreement

Schedule 14 CDS Data Center Hosting Agreement Schedule 14 This Hosting Agreement ( Agreement ) for the Central Data System is made as of, 2012 (the Effective Date ) by and between the Washington Metropolitan Area Transit Authority (the "Authority"

More information

Content Protection & Security (CPS) Certification Program Overview

Content Protection & Security (CPS) Certification Program Overview Content Protection & Security (CPS) Certification Program Overview GOVERNANCE & SECURITY CULTURE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS BUSINESS RESILIENCE

More information

WHITEPAPER. The Case for Mobile Management Outsourcing

WHITEPAPER. The Case for Mobile Management Outsourcing The Case for Mobile Management Outsourcing Mobile and wireless technologies have fundamentally changed the way we do business and increased productivity in companies of all sizes Mobile and wireless technologies

More information

Cloud Computing: Implications and Guidelines for Records Management in Kentucky State Government

Cloud Computing: Implications and Guidelines for Records Management in Kentucky State Government Cloud Computing: Implications and Guidelines for Records Management in Kentucky State Government (Version 1.0 August 2012) Many information technology (IT) departments and resource allocators are considering

More information

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business

More information

Best Practices of Securing Your Software Intellectual Property Integrity...

Best Practices of Securing Your Software Intellectual Property Integrity... January 31, 2005. Best Practices of Securing Your Software Intellectual Property Integrity.......... Palamida, Inc. 612 Howard Street, Suite 100 San Francisco, CA 94105 info@palamida.com 415-777-9400 www.palamida.com

More information

WEF PUBLISHING SERVICE INSTITUTIONAL USER LICENSE

WEF PUBLISHING SERVICE INSTITUTIONAL USER LICENSE WEF PUBLISHING SERVICE INSTITUTIONAL USER LICENSE 1. BY SIGNING THIS LICENSE ( LICENSE ), the institution identified below ( Subscriber or you ) agrees to the terms and conditions set forth in this License.

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

Information Security Framework. Revision Date: 10/01/2013. Information Security Framework

Information Security Framework. Revision Date: 10/01/2013. Information Security Framework State of Indiana Information Resources Policy and Practices Indiana Office of Technology 1 Table of Contents Chapter 1 Security Policy 1.1 Information security policy ownership 1.2 Information security

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

SoJware as a Service Agreements

SoJware as a Service Agreements SoJware as a Service Agreements William J. Walsh Derek E. Karchner mccandlishlawyers.com (703) 273-2288 Disclaimers We are not giving legal advice. Legal advice is fact driven and furnished to clients

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Software License Asset Management (SLAM) Part 1

Software License Asset Management (SLAM) Part 1 LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying

More information

Your Content refers to the information that you wish to transfer using our Services.

Your Content refers to the information that you wish to transfer using our Services. Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure

More information

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved.

Phil Marshall Black Duck Software. 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Open Source Component Governance and Management Using COBIT Phil Marshall Black Duck Software 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Welcome Type in questions using the Ask A Question

More information

VOLUME 2, SECTION 2.12: NETWORK INVENTORY MANAGEMENT

VOLUME 2, SECTION 2.12: NETWORK INVENTORY MANAGEMENT VOLUME 2, SECTION 2.12: NETWORK INVENTORY MANAGEMENT [C.3.8, M.3.2] Introduction: Level 3 s Network Inventory Ma nagement (NIM) system supports large networks with a variety of service offerings using

More information

Intellectual Property& Technology Law Journal

Intellectual Property& Technology Law Journal Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open

More information

5 Steps for a Winning Open Source Compliance Program

5 Steps for a Winning Open Source Compliance Program 5 Steps for a Winning Open Source Compliance Program Kellan Ponikiewicz Peter Vescuso @black_duck_sw Black Duck 2013 Speakers Peter Vescuso EVP of Marketing Black Duck Software Kellan Ponikiewicz IP Counsel

More information

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

2012 Winston & Strawn LLP

2012 Winston & Strawn LLP 2012 Winston & Strawn LLP Top 5 Negotiation Points for Software, SaaS, and Outsourcing Agreements Brought to you by Winston & Strawn s Advertising, Marketing, and Entertainment Law Group 2012 Winston &

More information

Total Cost of Ownership for Enterprise Content Management

Total Cost of Ownership for Enterprise Content Management Total Cost of Ownership for Enterprise Content Management Discover how to cut through the complexity of the ECM technology stack, avoid proprietary lock-ins and significantly reduce costs by using Open

More information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

NeXUS REPOSITORY managers

NeXUS REPOSITORY managers PRODUCT OVERVIEW NeXUS REPOSITORY managers Nexus OSS, Nexus Pro and Nexus Pro+ Nexus repository managers help organizations build better software, faster. Like a supply chain, applications are built by

More information

Asset management guidelines

Asset management guidelines Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential

More information

Software Asset Management High Risk, High Reward

Software Asset Management High Risk, High Reward Software Asset Management High Risk, High Reward January 2014 Andy Deas adeas@deloitte.com Travis Markowitz tmarkowitz@deloitte.com Eli Black eliblack@deloitte.com Contents What is Software Asset Management

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan Martin.callinan@sourcecodecontrol.co Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

Open Source Management

Open Source Management Open Source Management Best practices for professional use of open source software Simont Braun Avenue Louise, 149/20 1050 Bruxelles T 32 2 533 17 71 F 32 2 533 17 97 E benjamin.docquir@simontbraun.eu

More information

MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES

MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES MASTER SERVICES AGREEMENT This Master Services Agreement (the Agreement ) shall govern the provision of services to the undersigned client (the

More information

Cloud Computing for Architects

Cloud Computing for Architects Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood

More information

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction

More information

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc. Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178

More information