Open Source Policy Builder

Size: px
Start display at page:

Download "Open Source Policy Builder"

Transcription

1 Open Source Policy Builder In This Guide: Key issues to consider when formulating an open source policy Characteristics of best-in-class open source policies Sample open source policy statements Helping Enterprises Use Open Source Software

2 The following questions represent key characteristics of best-in-class components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open source policy by answering the questions and formulating language expressing its choices in a policy statement. 1. Which open source software (OSS) licenses are approved for use in company products? All open source licenses OSI-approved licenses only All except reciprocal licenses Company-specified list 2. External acquisition where can a customer obtain source code for products purchased from the company? From the company site e.g., From the Internet, any source (e.g., SourceForge, FreshMeat, GitHub, Google, OSDir, other repositories) From a third party supplier, i.e., Red Hat, IBM 3. Internal acquisition who is authorized to bring in open source software that will be used in the company s products? Any employee Only authorized employee(s) Only Open Source Review Board ( OSRB ) 4. Internal acquisition how do company employees acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the OSRB 5. Partner software acquisition how do partners acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the partner s OSRB 6. Who in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Legal Audit Engineering Individual developers IT management Open Source Review Board (OSRB) All of the above 7. What level in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Corporate officer Board of directors Company counsel 8. What business justification is required before approval is given for the use of open source software in company products? needed Must meet engineering requirements that specify the use of open source software Must demonstrate business value TCO versus functionally-equivalent commercial software, ROI, etc. Need to demonstrate why OSS was chosen over a commercial solution Open Source Policy Builder PAGE 1

3 9. Who is the owner of open source software that is brought into the company for the express purpose of using in company products? Who is responsible for initial acquisition and lifecycle management of an OSS component? Individual developer Each OSS component has a named owner One person or central body/team, e.g. OSRB 10. How is the acquisition of open source software initiated? Acquisition is the responsibility of the individual developer Acquisition is the responsibility of procurement/supply chain management Acquisition requests are directed to the OSRB 11. Security and Integrity: what kind of security/integrity review is required before open source software is procured? Download from OSRB-approved repository is sufficient MD5 checksum or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 12. Security and integrity: what kind of security/integrity review is required before open source software is incorporated into a company product? Verified download from OSRB-approved repository is sufficient Verified MD5 checksum (against OSRB-registered MD5) or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 13. Security and integrity: what kind of security/integrity review is required before a company product that includes open source software is shipped? Company-conducted complete source code and binary code scanning for security and integrity Certified scan results provided by supply chain vendors that include open source software in the components they supply to the company Manual review 14. Procurement: does the company distinguish between companies that supply open source software and companies that provide proprietary software? Yes 15. Warranty: what warranties must be obtained from vendors that supply software? (e.g., free replacement of IP infringing code) (no warranties) Bare bones all software provided as is Vendor-supplied software includes/does not include open source software (simple yes/no) 16. Damages: what are the minimum damages required when dealing with a vendor that supplies software? (no damages; sufficient to cure the breach in an agreed-to timeframe) Partial (damages only in actual costs incurred by company to address the breach) Full (damages cover the all costs including indirect costs e.g., loss of reputation) Open Source Policy Builder PAGE 2

4 17. Indemnification: what kind of indemnification must be provided by vendors who supply software to the company? software is as is Minimal - terms of license is sufficient Full indemnification 18. Policy scope: what is the scope of the company OSS policy? Company-wide Divisional/line of business Department Product 19. What provisions (if any) are in place for dealing with software license conflicts? Light we only are concerned with product-level licenses and potential conflicts Robust we have the requisite tooling and procedures to identify all licensed software within the product 20. What level of software categorization does the company have for software contained in distributed products? Light Ideal 21. Remediation: once this policy is established, what are the remediation requirements with respect to existing products that incorporate open source software?, grandfathered in Existing products with OSS must be inventoried (e.g., scanned, audited) within X days 22. OSS architecture: for open source software to be brought into the company for use in distributed products, is there a minimum technical standard that must be met? developers take all the responsibility, use at own risk Project must be considered stable in SourceForge/Freshmeat and/or community must be considered stable (subject to approval by OSRB) Must have significant widespread adoption as measured by downloads Must have significant commercial base, i.e. MySQL dual-license 23. Forking/community abandonment: How will the company deal with project forking or abandonment of open source software used in company products? Are there alternate vendors/suppliers available? Will deal with it when it happens Must have alternate vendor/suppliers listed or identified prior to committing to incorporate the software within company products Must have active written response plan Open Source Policy Builder PAGE 3

5 24. Certification: do OSS components have to be certified before they can be implemented or deployed? If so, who must certify and what kinds of certification must be done? When can OSS be deployed to production?, no certification needed Locally certified by owner or end-user Formal certification by central IT staff External certification Commercial certification 25. Will OSS be distributed in company products?, all use is internal, but will be used in customer-facing environments Yes, will distribute unmodified OSS externally Yes, will distribute modified OSS externally Yes, will integrate and distribute OSS with proprietary IP 26. Can OSS that is to be used in company products be modified?, must be used in native form Can be modified with approval Can be modified in specified ways Can be modified in any way if not distributed Can be modified without restriction 27. Who is responsible for maintaining inventory, usage and other metadata related to OSS component, including licenses? Individual developer Company legal department Each OSS component has a named owner (can be used in 20 divisions) One central person or central body/team, e.g., Open Source Review Board 28. Security: who will be responsible for overseeing security of OSS components? Who will check if the code contains vulnerabilities? Who is responsible for applying security patches? Individual end-user One central person or central body/team, e.g. Open Source Review Board Team to be named IT security staff 29. Are contributions to open source projects allowed? Yes, but only indirectly via use of a proxy (e.g., supplier) Yes, with valid business need and/or approval from management / Open Source Review Board Yes, but only on employees own time Yes, but employees must use non-corporate addresses for interacting with the community Yes, totally unregulated 30. Under what circumstance can an employee make a contribution to an OSS project if it is not related to company business? Under no circumstance possible violation of employment contracts Yes, without attribution to company name and on employee s personal time and no requirement to inform the company of such activity Open Source Policy Builder PAGE 4

6 31. communication: Under what circumstances can employees communicate with OSS communities (with company attribution)? Never When business need dictates but subject to approval/oversight of Open Source Review Board along with Company Communications Department Freely for any reason subject to employment guidelines 32. Are company employees allowed to speak publicly about the company s use of open source software in products? Yes, with prior management approval Yes, with specified approved topics Yes, under any circumstance 33. Support: What level of technical support must be in place prior to implementing open source software in company products? Individual developer responsibility Provided by formal internal team, development or central IT Combination internal with external provider Must have SLA signed with business partner 34. Where should OSS used in distributed company products be housed? Developer responsibility Centrally-managed repository Vendor-managed repository (e.g., OpenLogic) 35. Are source code and binary code scanning of all software in a distributed product required to avoid IP infringement? Yes, source code and binary code must be fingerprinted upon initial acquisition only Yes, source code and binary code must be scanned periodically Yes, source code and binary code must be scanned prior to company s product being commercially shipped 36. Repository tracking: how are open source software components/projects tracked within the company? special project tracking of the repository Custom-built project tracking tool Yes, with vendor-provided tool (e.g., OpenLogic.) 37. What are the requirements for software delivered to the company from a supplier?, responsibility of contractor to make sure they are adhering to any and all OSS or proprietary licenses Supplier must detail all software in their components, including the specific licenses under which the software is being made available Supplier must provide a contractual bill of lading that includes detailed list of software, license(s) along with test results from a code scan (e.g., OpenLogic) About OpenLogic OpenLogic is a leading provider of enterprise open source solutions for the cloud and the data center. OpenLogic helps hundreds of leading enterprise across a wide range of industries to safely acquire, support, and control open source software. OpenLogic offers certification, commercial-grade technical support and indemnification for 600 open source packages backed by the OpenLogic Expert Community. OpenLogic also offers CloudSwing, a complete open PaaS solution for enterprises seeking to deploy applications and customized open source stacks in the cloud, and OLEX Enterprise Edition, a SaaS solution for open source scanning and governance. Open Source Policy Builder PAGE 5

Open Source Policy Builder

Open Source Policy Builder Open Source Policy Builder Effective and comprehensive open source policies are based on a thorough and unbiased organizational assessment. You can start building your organization s open source policy

More information

Open Source Policy Builder

Open Source Policy Builder Open Source Policy Builder The following questions represent components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open

More information

FOSS Governance Fundamentals

FOSS Governance Fundamentals FOSS Governance Fundamentals HP Part Number: 5992-4059 Published: January 2008 Edition: 1.0 Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notice Confidential computer software. Valid license

More information

BOM based on what they input into fossology.

BOM based on what they input into fossology. SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org

More information

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive

More information

How To Use Open Source Software

How To Use Open Source Software Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and

More information

How To Manage An Open Source Software

How To Manage An Open Source Software Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Sr. Director OSS Management Olliance Group Speaker Greg Olson Sr. Director, Open Source Management Over 30 years of

More information

FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle

FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why

More information

Contract and Vendor Management Guide

Contract and Vendor Management Guide Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

agility made possible

agility made possible SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

Getting Started with Open Source Compliance

Getting Started with Open Source Compliance Getting Started with Open Source Compliance August 9, 2006 www.hro.com Denver Boulder Colorado Springs London Los Angeles Munich Salt Lake City San Francisco Copyright 2006 Holme, Roberts & Owen LLP Where

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ISM Online Course Offerings

ISM Online Course Offerings CERTIFICATION (CPSM and CPSD ) ISM Online Course Offerings 3968 Bridge Review Online Course 21 CEHs This course is designed as a review for current C.P.M. holders as part of their preparation for taking

More information

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

Security Controls in Service Management

Security Controls in Service Management Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

Rational Asset Manager 7.2 Editions and Licensing

Rational Asset Manager 7.2 Editions and Licensing Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, [email protected] Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

Introduction to OVAL: A new language to determine the presence of software vulnerabilities

Introduction to OVAL: A new language to determine the presence of software vulnerabilities Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction

More information

HIT System Procurement Issues and Pitfalls Session 2.03

HIT System Procurement Issues and Pitfalls Session 2.03 HIT System Procurement Issues and Pitfalls Session 2.03 Presented by: Gerry Hinkley Davis Wright Tremaine LLP and Joseph M. DeLuca IT Optimizers Session Goals Provide you with A best practices approach

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

JBoss Enterprise MIDDLEWARE

JBoss Enterprise MIDDLEWARE JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen

Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen White paper Reducing Software Costs While Increasing Cost Predictability and Control Mikko Marttinen Abstract Effective software procurement addresses contractual and overall cost of ownership through

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

OPEN SOURCE SECURITY

OPEN SOURCE SECURITY OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Nexus Professional Whitepaper. Repository Management: Stages of Adoption

Nexus Professional Whitepaper. Repository Management: Stages of Adoption Sonatype Nexus Professional Whitepaper Repository Management: Stages of Adoption Adopting Repository Management Best Practices SONATYPE www.sonatype.com [email protected] +1 301-684-8080 12501 Prosperity

More information

Availability of Services in the Era of Cloud Computing

Availability of Services in the Era of Cloud Computing Availability of Services in the Era of Cloud Computing Sanjay P. Ahuja 1 & Sindhu Mani 1 1 School of Computing, University of North Florida, Jacksonville, America Correspondence: Sanjay P. Ahuja, School

More information

ORACLE IT SERVICE MANAGEMENT SUITE

ORACLE IT SERVICE MANAGEMENT SUITE ORACLE IT SERVICE MANAGEMENT SUITE ITIL COMPATIBLE PINKVERIFY ORACLE IT SERVICE MANAGEMENT SUITE HAS BEEN CERTIFIED BY PINK ELEPHANT THROUGH THE PINKVERIFY PROCESS TO BE ITIL COMPATIBLE IN SIX PROCESS

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Cracking the Code on Software License Management

Cracking the Code on Software License Management Cracking the Code on Software License Management Overview of IT Asset Management Integration Integration of the physical, financial, and contractual attributes of IT assets Enables the delivery of timely

More information

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures? SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling

More information

RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network

RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network HRG Insight: Subscription Services - The concept of Subscription Services in software is not new but has become a front-and-center topic recently. Microsoft s recent announcement that it will bundle the

More information

White Paper. Managed IT Services as a Business Solution

White Paper. Managed IT Services as a Business Solution White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...

More information

Schedule 14 CDS Data Center Hosting Agreement

Schedule 14 CDS Data Center Hosting Agreement Schedule 14 This Hosting Agreement ( Agreement ) for the Central Data System is made as of, 2012 (the Effective Date ) by and between the Washington Metropolitan Area Transit Authority (the "Authority"

More information

Content Protection & Security (CPS) Certification Program Overview

Content Protection & Security (CPS) Certification Program Overview Content Protection & Security (CPS) Certification Program Overview GOVERNANCE & SECURITY CULTURE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS BUSINESS RESILIENCE

More information

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business

More information

Best Practices of Securing Your Software Intellectual Property Integrity...

Best Practices of Securing Your Software Intellectual Property Integrity... January 31, 2005. Best Practices of Securing Your Software Intellectual Property Integrity.......... Palamida, Inc. 612 Howard Street, Suite 100 San Francisco, CA 94105 [email protected] 415-777-9400 www.palamida.com

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

SoJware as a Service Agreements

SoJware as a Service Agreements SoJware as a Service Agreements William J. Walsh Derek E. Karchner mccandlishlawyers.com (703) 273-2288 Disclaimers We are not giving legal advice. Legal advice is fact driven and furnished to clients

More information

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services / BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment

More information

Software License Asset Management (SLAM) Part 1

Software License Asset Management (SLAM) Part 1 LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying

More information

Your Content refers to the information that you wish to transfer using our Services.

Your Content refers to the information that you wish to transfer using our Services. Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure

More information

Intellectual Property& Technology Law Journal

Intellectual Property& Technology Law Journal Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open

More information

5 Steps for a Winning Open Source Compliance Program

5 Steps for a Winning Open Source Compliance Program 5 Steps for a Winning Open Source Compliance Program Kellan Ponikiewicz Peter Vescuso @black_duck_sw Black Duck 2013 Speakers Peter Vescuso EVP of Marketing Black Duck Software Kellan Ponikiewicz IP Counsel

More information

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

Total Cost of Ownership for Enterprise Content Management

Total Cost of Ownership for Enterprise Content Management Total Cost of Ownership for Enterprise Content Management Discover how to cut through the complexity of the ECM technology stack, avoid proprietary lock-ins and significantly reduce costs by using Open

More information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

NeXUS REPOSITORY managers

NeXUS REPOSITORY managers PRODUCT OVERVIEW NeXUS REPOSITORY managers Nexus OSS, Nexus Pro and Nexus Pro+ Nexus repository managers help organizations build better software, faster. Like a supply chain, applications are built by

More information

Asset management guidelines

Asset management guidelines Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential

More information

Software Asset Management High Risk, High Reward

Software Asset Management High Risk, High Reward Software Asset Management High Risk, High Reward January 2014 Andy Deas [email protected] Travis Markowitz [email protected] Eli Black [email protected] Contents What is Software Asset Management

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan [email protected] Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES

MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES MASTER SERVICES AGREEMENT This Master Services Agreement (the Agreement ) shall govern the provision of services to the undersigned client (the

More information

Cloud Computing for Architects

Cloud Computing for Architects Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood

More information

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction

More information

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.

Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc. Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178

More information