Open Source Policy Builder
|
|
|
- Juliet Kelly
- 9 years ago
- Views:
Transcription
1 Open Source Policy Builder In This Guide: Key issues to consider when formulating an open source policy Characteristics of best-in-class open source policies Sample open source policy statements Helping Enterprises Use Open Source Software
2 The following questions represent key characteristics of best-in-class components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open source policy by answering the questions and formulating language expressing its choices in a policy statement. 1. Which open source software (OSS) licenses are approved for use in company products? All open source licenses OSI-approved licenses only All except reciprocal licenses Company-specified list 2. External acquisition where can a customer obtain source code for products purchased from the company? From the company site e.g., From the Internet, any source (e.g., SourceForge, FreshMeat, GitHub, Google, OSDir, other repositories) From a third party supplier, i.e., Red Hat, IBM 3. Internal acquisition who is authorized to bring in open source software that will be used in the company s products? Any employee Only authorized employee(s) Only Open Source Review Board ( OSRB ) 4. Internal acquisition how do company employees acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the OSRB 5. Partner software acquisition how do partners acquire open source software for use in company products? From the internet regardless of repository From the public repository at OpenLogic Exchange ( Internal, centralized location governed by the partner s OSRB 6. Who in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Legal Audit Engineering Individual developers IT management Open Source Review Board (OSRB) All of the above 7. What level in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Corporate officer Board of directors Company counsel 8. What business justification is required before approval is given for the use of open source software in company products? needed Must meet engineering requirements that specify the use of open source software Must demonstrate business value TCO versus functionally-equivalent commercial software, ROI, etc. Need to demonstrate why OSS was chosen over a commercial solution Open Source Policy Builder PAGE 1
3 9. Who is the owner of open source software that is brought into the company for the express purpose of using in company products? Who is responsible for initial acquisition and lifecycle management of an OSS component? Individual developer Each OSS component has a named owner One person or central body/team, e.g. OSRB 10. How is the acquisition of open source software initiated? Acquisition is the responsibility of the individual developer Acquisition is the responsibility of procurement/supply chain management Acquisition requests are directed to the OSRB 11. Security and Integrity: what kind of security/integrity review is required before open source software is procured? Download from OSRB-approved repository is sufficient MD5 checksum or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 12. Security and integrity: what kind of security/integrity review is required before open source software is incorporated into a company product? Verified download from OSRB-approved repository is sufficient Verified MD5 checksum (against OSRB-registered MD5) or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 13. Security and integrity: what kind of security/integrity review is required before a company product that includes open source software is shipped? Company-conducted complete source code and binary code scanning for security and integrity Certified scan results provided by supply chain vendors that include open source software in the components they supply to the company Manual review 14. Procurement: does the company distinguish between companies that supply open source software and companies that provide proprietary software? Yes 15. Warranty: what warranties must be obtained from vendors that supply software? (e.g., free replacement of IP infringing code) (no warranties) Bare bones all software provided as is Vendor-supplied software includes/does not include open source software (simple yes/no) 16. Damages: what are the minimum damages required when dealing with a vendor that supplies software? (no damages; sufficient to cure the breach in an agreed-to timeframe) Partial (damages only in actual costs incurred by company to address the breach) Full (damages cover the all costs including indirect costs e.g., loss of reputation) Open Source Policy Builder PAGE 2
4 17. Indemnification: what kind of indemnification must be provided by vendors who supply software to the company? software is as is Minimal - terms of license is sufficient Full indemnification 18. Policy scope: what is the scope of the company OSS policy? Company-wide Divisional/line of business Department Product 19. What provisions (if any) are in place for dealing with software license conflicts? Light we only are concerned with product-level licenses and potential conflicts Robust we have the requisite tooling and procedures to identify all licensed software within the product 20. What level of software categorization does the company have for software contained in distributed products? Light Ideal 21. Remediation: once this policy is established, what are the remediation requirements with respect to existing products that incorporate open source software?, grandfathered in Existing products with OSS must be inventoried (e.g., scanned, audited) within X days 22. OSS architecture: for open source software to be brought into the company for use in distributed products, is there a minimum technical standard that must be met? developers take all the responsibility, use at own risk Project must be considered stable in SourceForge/Freshmeat and/or community must be considered stable (subject to approval by OSRB) Must have significant widespread adoption as measured by downloads Must have significant commercial base, i.e. MySQL dual-license 23. Forking/community abandonment: How will the company deal with project forking or abandonment of open source software used in company products? Are there alternate vendors/suppliers available? Will deal with it when it happens Must have alternate vendor/suppliers listed or identified prior to committing to incorporate the software within company products Must have active written response plan Open Source Policy Builder PAGE 3
5 24. Certification: do OSS components have to be certified before they can be implemented or deployed? If so, who must certify and what kinds of certification must be done? When can OSS be deployed to production?, no certification needed Locally certified by owner or end-user Formal certification by central IT staff External certification Commercial certification 25. Will OSS be distributed in company products?, all use is internal, but will be used in customer-facing environments Yes, will distribute unmodified OSS externally Yes, will distribute modified OSS externally Yes, will integrate and distribute OSS with proprietary IP 26. Can OSS that is to be used in company products be modified?, must be used in native form Can be modified with approval Can be modified in specified ways Can be modified in any way if not distributed Can be modified without restriction 27. Who is responsible for maintaining inventory, usage and other metadata related to OSS component, including licenses? Individual developer Company legal department Each OSS component has a named owner (can be used in 20 divisions) One central person or central body/team, e.g., Open Source Review Board 28. Security: who will be responsible for overseeing security of OSS components? Who will check if the code contains vulnerabilities? Who is responsible for applying security patches? Individual end-user One central person or central body/team, e.g. Open Source Review Board Team to be named IT security staff 29. Are contributions to open source projects allowed? Yes, but only indirectly via use of a proxy (e.g., supplier) Yes, with valid business need and/or approval from management / Open Source Review Board Yes, but only on employees own time Yes, but employees must use non-corporate addresses for interacting with the community Yes, totally unregulated 30. Under what circumstance can an employee make a contribution to an OSS project if it is not related to company business? Under no circumstance possible violation of employment contracts Yes, without attribution to company name and on employee s personal time and no requirement to inform the company of such activity Open Source Policy Builder PAGE 4
6 31. communication: Under what circumstances can employees communicate with OSS communities (with company attribution)? Never When business need dictates but subject to approval/oversight of Open Source Review Board along with Company Communications Department Freely for any reason subject to employment guidelines 32. Are company employees allowed to speak publicly about the company s use of open source software in products? Yes, with prior management approval Yes, with specified approved topics Yes, under any circumstance 33. Support: What level of technical support must be in place prior to implementing open source software in company products? Individual developer responsibility Provided by formal internal team, development or central IT Combination internal with external provider Must have SLA signed with business partner 34. Where should OSS used in distributed company products be housed? Developer responsibility Centrally-managed repository Vendor-managed repository (e.g., OpenLogic) 35. Are source code and binary code scanning of all software in a distributed product required to avoid IP infringement? Yes, source code and binary code must be fingerprinted upon initial acquisition only Yes, source code and binary code must be scanned periodically Yes, source code and binary code must be scanned prior to company s product being commercially shipped 36. Repository tracking: how are open source software components/projects tracked within the company? special project tracking of the repository Custom-built project tracking tool Yes, with vendor-provided tool (e.g., OpenLogic.) 37. What are the requirements for software delivered to the company from a supplier?, responsibility of contractor to make sure they are adhering to any and all OSS or proprietary licenses Supplier must detail all software in their components, including the specific licenses under which the software is being made available Supplier must provide a contractual bill of lading that includes detailed list of software, license(s) along with test results from a code scan (e.g., OpenLogic) About OpenLogic OpenLogic is a leading provider of enterprise open source solutions for the cloud and the data center. OpenLogic helps hundreds of leading enterprise across a wide range of industries to safely acquire, support, and control open source software. OpenLogic offers certification, commercial-grade technical support and indemnification for 600 open source packages backed by the OpenLogic Expert Community. OpenLogic also offers CloudSwing, a complete open PaaS solution for enterprises seeking to deploy applications and customized open source stacks in the cloud, and OLEX Enterprise Edition, a SaaS solution for open source scanning and governance. Open Source Policy Builder PAGE 5
Open Source Policy Builder
Open Source Policy Builder Effective and comprehensive open source policies are based on a thorough and unbiased organizational assessment. You can start building your organization s open source policy
Open Source Policy Builder
Open Source Policy Builder The following questions represent components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open
FOSS Governance Fundamentals
FOSS Governance Fundamentals HP Part Number: 5992-4059 Published: January 2008 Edition: 1.0 Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notice Confidential computer software. Valid license
BOM based on what they input into fossology.
SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
How To Use Open Source Software
Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and
How To Manage An Open Source Software
Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Sr. Director OSS Management Olliance Group Speaker Greg Olson Sr. Director, Open Source Management Over 30 years of
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why
Contract and Vendor Management Guide
Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Getting Started with Open Source Compliance
Getting Started with Open Source Compliance August 9, 2006 www.hro.com Denver Boulder Colorado Springs London Los Angeles Munich Salt Lake City San Francisco Copyright 2006 Holme, Roberts & Owen LLP Where
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
ISM Online Course Offerings
CERTIFICATION (CPSM and CPSD ) ISM Online Course Offerings 3968 Bridge Review Online Course 21 CEHs This course is designed as a review for current C.P.M. holders as part of their preparation for taking
The Security Development Lifecycle at SAP How SAP Builds Security into Software Products
SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Security Controls in Service Management
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Cloud App Security. Tiberio Molino Sales Engineer
Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management
White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
Rational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, [email protected] Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
Software as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Legal Issues in the Cloud: A Case Study. Jason Epstein
Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
HIT System Procurement Issues and Pitfalls Session 2.03
HIT System Procurement Issues and Pitfalls Session 2.03 Presented by: Gerry Hinkley Davis Wright Tremaine LLP and Joseph M. DeLuca IT Optimizers Session Goals Provide you with A best practices approach
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
JBoss Enterprise MIDDLEWARE
JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Portland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen
White paper Reducing Software Costs While Increasing Cost Predictability and Control Mikko Marttinen Abstract Effective software procurement addresses contractual and overall cost of ownership through
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
Dynamic Service Desk. Unified IT Management. Solution Overview
I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Nexus Professional Whitepaper. Repository Management: Stages of Adoption
Sonatype Nexus Professional Whitepaper Repository Management: Stages of Adoption Adopting Repository Management Best Practices SONATYPE www.sonatype.com [email protected] +1 301-684-8080 12501 Prosperity
Availability of Services in the Era of Cloud Computing
Availability of Services in the Era of Cloud Computing Sanjay P. Ahuja 1 & Sindhu Mani 1 1 School of Computing, University of North Florida, Jacksonville, America Correspondence: Sanjay P. Ahuja, School
ORACLE IT SERVICE MANAGEMENT SUITE
ORACLE IT SERVICE MANAGEMENT SUITE ITIL COMPATIBLE PINKVERIFY ORACLE IT SERVICE MANAGEMENT SUITE HAS BEEN CERTIFIED BY PINK ELEPHANT THROUGH THE PINKVERIFY PROCESS TO BE ITIL COMPATIBLE IN SIX PROCESS
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Cracking the Code on Software License Management
Cracking the Code on Software License Management Overview of IT Asset Management Integration Integration of the physical, financial, and contractual attributes of IT assets Enables the delivery of timely
SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network
HRG Insight: Subscription Services - The concept of Subscription Services in software is not new but has become a front-and-center topic recently. Microsoft s recent announcement that it will bundle the
White Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
Schedule 14 CDS Data Center Hosting Agreement
Schedule 14 This Hosting Agreement ( Agreement ) for the Central Data System is made as of, 2012 (the Effective Date ) by and between the Washington Metropolitan Area Transit Authority (the "Authority"
Content Protection & Security (CPS) Certification Program Overview
Content Protection & Security (CPS) Certification Program Overview GOVERNANCE & SECURITY CULTURE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND AWARENESS BUSINESS RESILIENCE
Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle
Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business
Best Practices of Securing Your Software Intellectual Property Integrity...
January 31, 2005. Best Practices of Securing Your Software Intellectual Property Integrity.......... Palamida, Inc. 612 Howard Street, Suite 100 San Francisco, CA 94105 [email protected] 415-777-9400 www.palamida.com
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
SoJware as a Service Agreements
SoJware as a Service Agreements William J. Walsh Derek E. Karchner mccandlishlawyers.com (703) 273-2288 Disclaimers We are not giving legal advice. Legal advice is fact driven and furnished to clients
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
Software License Asset Management (SLAM) Part 1
LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying
Your Content refers to the information that you wish to transfer using our Services.
Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure
Intellectual Property& Technology Law Journal
Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open
5 Steps for a Winning Open Source Compliance Program
5 Steps for a Winning Open Source Compliance Program Kellan Ponikiewicz Peter Vescuso @black_duck_sw Black Duck 2013 Speakers Peter Vescuso EVP of Marketing Black Duck Software Kellan Ponikiewicz IP Counsel
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer
BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
Total Cost of Ownership for Enterprise Content Management
Total Cost of Ownership for Enterprise Content Management Discover how to cut through the complexity of the ECM technology stack, avoid proprietary lock-ins and significantly reduce costs by using Open
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
NeXUS REPOSITORY managers
PRODUCT OVERVIEW NeXUS REPOSITORY managers Nexus OSS, Nexus Pro and Nexus Pro+ Nexus repository managers help organizations build better software, faster. Like a supply chain, applications are built by
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
Software Asset Management High Risk, High Reward
Software Asset Management High Risk, High Reward January 2014 Andy Deas [email protected] Travis Markowitz [email protected] Eli Black [email protected] Contents What is Software Asset Management
End-User Software License Agreement
End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation
OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE
OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan [email protected] Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES
MASTER SERVICES AGREEMENT - DIGITAL ADVERTISING SERVICES MASTER SERVICES AGREEMENT This Master Services Agreement (the Agreement ) shall govern the provision of services to the undersigned client (the
Cloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.
Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178
