General Content Security & Service Implementation

Size: px
Start display at page:

Download "General Content Security & Service Implementation"

Transcription

1 SCHEDULE C [VOD-EST-PAYTV] CONTENT PROTECTION REQUIREMENTS AND OBLIGATIONS This Schedule C is attached to and a part of that certain [ Agreement, dated (the Agreement ), between/among ]. All defined terms used but not otherwise defined herein shall have the meanings given them in the Agreement. General Content Security & Service Implementation Content Protection System. All content delivered to, output from or stored on a device must be protected by a content protection system that includes digital rights management, conditional access systems and digital output protection (such system, the Content Protection System ). The Content Protection System shall: (i) be approved in writing by Licensor (including any upgrades or new versions, which Licensee shall submit to Licensor for approval upon such upgrades or new versions becoming available), (ii) be fully compliant with all the compliance and robustness rules associated therewith, and (iii) use only those rights settings, if applicable, that are approved in writing by Licensor. (iv) be considered to meet sections 1 ( Encryption ), 2 ( Key Management ), 3 ( Integrity ), 5 ( Digital Rights Management ), 10 ( Protection against hacking ), 11 ( License Revocation ), 12 ( Secure Remote Update ), 16 ( PVR Requirements ), 17 ( Copying ) of this schedule if the Content Protection System is an implementation of one the content protection systems approved by the Digital Entertainment Content Ecosystem (DECE), and said implementation meets the compliance and robustness rules associated with the chosen DECE approved content protection system. The DECE approved content protection systems are: a. Marlin Broadband b. Microsoft Playready c. CMLA Open Mobile Alliance (OMA) DRM Version 2 or 2.1 d. Adobe Flash Access 2.0 (not Adobe s Flash streaming product) e. Widevine Cypher 1. Encryption The Content Protection System shall use cryptographic algorithms for encryption, decryption, signatures, hashing, random number generation, and key generation and the utilize time-tested cryptographic protocols and algorithms, and offer effective security equivalent to or better than AES 128 (as specified in NIST FIPS-197) or ETSI DVB CSA The content protection system shall only decrypt streamed content into memory temporarily for the purpose of decoding and rendering the content and shall never write decrypted content (including, without limitation, portions of the decrypted content) or streamed encrypted content into permanent storage Keys, passwords, and any other information that are critical to the cryptographic strength of the Content Protection System ( critical security parameters, CSPs) may never be transmitted or permanently or semipermanently stored in unencrypted form. Memory locations used to

2 temporarily hold CSPs must be securely deleted and overwritten as soon as possible after the CSP has been used If the device hosting the Content Protection System allows download of software then decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment and decrypted content must be encrypted during transmission to the graphics card for rendering 1.5. The Content Protection System shall encrypt the entirety of the A/V content, including, without limitation, all video sequences, audio tracks, sub pictures, menus, subtitles, and video angles. Each video frame must be completely encrypted. 2. Key Management The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System CSPs shall never be transmitted in the clear or transmitted to unauthenticated recipients (whether users or devices. 3. Integrity The Content Protection System shall maintain the integrity of all protected content. The Content Protection System shall detect any tampering with or modifications to the protected content from its originally encrypted form Each installation of the Content Protection System on an end user device shall be individualized and thus uniquely identifiable. [For example, if the Content Protection System is in the form of client software, and is copied or transferred from one device to another device, it will not work on such other device without being uniquely individualized.] 4. The Licensed Service shall prevent the unauthorized delivery and distribution of Licensor s content (for example, user-generated / user-uploaded content) and shall use reasonable efforts to filter and prevent such occurrences. Digital Rights Management 5. Any Digital Rights Management used to protect Licensed Content must support the following: 5.1. A valid license, containing the unique cryptographic key/keys, other necessary decryption information, and the set of approved usage rules, shall be required in order to decrypt and play each piece of content Each license shall bound to either a (i) specific individual end user device or (ii) domain of registered end user devices in accordance with the approved usage rules Licenses bound to individual end user devices shall be incapable of being transferred between such devices Licenses bound to a domain of registered end user devices shall ensure that such devices are only registered to a single domain at a time. An online registration service shall maintain an accurate count of the number of devices

3 in the domain (which number shall not exceed the limit specified in the usage rules for such domain). Each domain must be associated with a unique domain ID value If a license is deleted, removed, or transferred from a registered end user device, it must not be possible to recover or restore such license except from an authorized source Secure Clock. For all content which has a time-based window (e.g. VOD, catch-up, SVOD) associated with it, the Content Protection System shall implement a secure clock. The secure clock must be protected against modification or tampering and detect any changes made thereto. If any changes or tampering are detected, the Content Protection System must revoke the licenses associated with all content employing time limited license or viewing periods. Conditional Access Systems 6. Any Conditional Access System used to protect Licensed Content must support the following: 6.1. Content shall be protected by a robust approved scrambling or encryption algorithm in accordance section 1 above ECM s shall be required for playback of content, and can only be decrypted by those Smart Cards or other entities that are authorized to receive the content or service. Control words must be updated and re-issued as ECM s at a rate that reasonably prevents the use of unauthorized ECM distribution, for example, at a rate of no less than once every 7 seconds Control Word sharing shall be prohibited, The Control Word must be protected from unauthorized access. Streaming 7. Generic Streaming Requirements The requirements in this section 7 apply in all cases where Internet streaming is supported Streams shall be encrypted using AES 128 (as specified in NIST FIPS-197) or other robust, industry-accepted algorithm with a cryptographic strength and key length such that it is generally considered computationally infeasible to break Encryption keys shall not be delivered to clients in a cleartext (un-encrypted) state The integrity of the streaming client shall be verified by the streaming server before commencing delivery of the stream to the client Licensee shall use a robust and effective method (for example, short-lived and individualized URLs for the location of streams) to ensure that streams cannot be obtained by unauthorized users. 8. Flash Streaming Requirements The requirements in this section 8 only apply if the Adobe Flash product is used to provide the Content Protection System.

4 8.1. Adobe RTMPE is approved for streaming using the following Adobe product versions or later: Client side: Flash Player Server side: FMS 3.51 and FMS Licensee will make reasonable commercial efforts to stay up to date with the then current versions of the above Adobe products Progressive downloading of licensed content is prohibited Flash Encoded Content (including FLV and F4V file formats) must be streamed using Adobe RTMP-E protocol Flash servers shall be configured such that RTMP-E is enabled, and RTMP is disabled. No content shall be available through both RTMP and RTMP-E Flash Media Servers shall be configured such that SWF Verification is enabled Licensee s and/or its designated CDN shall implement Token Authentication, i.e. mechanism that creates a short-lived URL (approx 3-5 minutes) for content by distributing a token to the client only at such a time it is authorized to receive the VOD Stream Licensee must migrate from RTMP-E (stream encryption) to Adobe DRM i.e. Flash Media Rights Management Server successor Flash Access 2.0 (filebased encryption) or other DRM approved by Licensor in writing within 6 months of the commercial launch of Flash Access 2.0 on the relevant platforms (or within 4 months of the commencement of this Agreement if Flash Access 2.0 is already commercially available on the relevant platforms) and be in full compliance with all content protection provisions herein; Licensee must make reasonable commercial efforts to comply with Adobe compliance and robustness rules for Flash Server products at such a time when they become commercially available. 9. Microsoft Silverlight The requirements in this section 9 only apply if the Microsoft Silverlight product is used to provide the Content Protection System Microsoft Silverlight is approved for streaming if using Silverlight 2 or later version When used as part of a streaming service only (with no download), Playready licenses shall only be of the the SimpleNonPersistent license class Within 46 months of the commercial launch of Silverlight 4commencement of this Agreement, Licensee shall migrate to Silverlight 4 and be in full compliance with all content protection provisions herein or; Within 64 months of the commercial launch of Silverlight 4commencement of this Agreement, Licensee shall migrate to alternative, Licensor-approved DRM/streaming protection technology in full compliance with content protection requirements herein.

5 Protection Against Hacking 10. Any system used to protect Licensed Content must support the following: Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected against tampering, forging, and spoofing The Content Protection System shall employ industry accepted tamperresistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers) The Content Protection System shall be designed, as far as is commercially and technically reasonable, to be resistant to break once, break everywhere attacks Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering Integrity detection: Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime Anti-debugging: The decryption engine prevents the use of common debugging tools Red herring code: The security modules use extra software routines that mimic security modules but do not have access to CSPs The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). REVOCATION AND RENEWAL 11. License Revocation. The Content Protection System shall provide mechanisms that revoke, upon written notice from Licensor of its exercise of its right to require such revocation in the event any CSPs are compromised, (a) the instance of the Content Protection System with the compromised CSPs, and (b) any and all playback licenses issued to (i) specific individual end user device or (ii) domain of registered end user devices. 12. Secure remote update. The Content Protection System shall be renewable and securely updateable in event of a breach of security or improvement to the Content Protection System. 13. The Licensee shall have a policy which ensures that clients and servers of the Content Protection System are promptly and securely updated in the event of a

6 security breach (that can be rectified using a remote update) being found in the Content Protection System and/or its implementations in clients and servers. Licensee shall have a policy which ensures that patches received from content protection technology providers (e.g. DRM providers) are promptly applied to clients and servers. ACCOUNT AUTHORIZATION 14. Content Delivery. Content, licenses, control words and ECM s shall only be delivered from a network service to registered devices associated with an account with verified credentials. Account credentials must be transmitted securely to ensure privacy and protection against attacks. 15. Services requiring user authentication: The credentials shall consist of at least a User ID and password of sufficient length to prevent brute force attacks. Licensee shall take steps to prevent users from sharing account credentials. In order to prevent unwanted sharing of such credentials, account credentials may provide access to any of the following (by way of example): purchasing capability (e.g. access to the user s active credit card or other financially sensitive information) administrator rights over the user s account including control over user and device access to the account along with access to personal information. RECORDING 16. PVR Requirements. Any device receiving playback licenses must not implement any personal video recorder capabilities that allow recording, copying, or playback of any protected content except as explicitly allowed elsewhere in this agreement. 17. Copying. The Content Protection System shall prohibit recording of protected content onto recordable or removable media, except as such recording is explicitly allowed elsewhere in this agreement. Outputs 18. Analogue Outputs. If the licensed content can be delivered to a device which has analog outputs, the Content Protection System must ensure that the devices meet the analogue output requirements listed in this section The Content Protection System shall enable Macrovision content protection technology on all analog outputs from end user devices. Licensee shall pay all royalties and other fees payable in connection with the implementation

7 and/or activation of such content protection technology allocable to content provided pursuant to the Agreement The Content Protection System shall enable CGMS-A content protection technology on all analog outputs from end user devices. Licensee shall pay all royalties and other fees payable in connection with the implementation and/or activation of such content protection technology allocable to content provided pursuant to the Agreement. 19. Digital Outputs. If the licensed content can be delivered to a device which has digital outputs, the Content Protection System must ensure that the devices meet the digital output requirements listed in this section The Content Protection System shall prohibit digital output of decrypted protected content. Notwithstanding the foregoing, a digital signal may be output if it is protected and encrypted by High-Bandwidth Definition Digital Copy Protection ( HDCP ) or Digital Transmission Copy Protection ( DTCP ). Defined terms used but not otherwise defined in this Digital Outputs Section shall have the meanings given them in the DTCP or HDCP license agreements, as applicable A device that outputs decrypted protected content provided pursuant to the Agreement using DTCP shall: Deliver system renewability messages to the source function; Map the copy control information associated with the program; the copy control information shall be set to copy never in the corresponding encryption mode indicator and copy control information field of the descriptor; Map the analog protection system ( APS ) bits associated with the program to the APS field of the descriptor; Set the image_constraint_token field of the descriptor as authorized by the corresponding license administrator; Set the eligible non-conditional access delivery field of the descriptor as authorized by the corresponding license administrator; Set the retention state field of the descriptor as authorized by the corresponding license administrator; Deliver system renewability messages from time to time obtained from the corresponding license administrator in a protected manner; and Perform such additional functions as may be required by Licensor to effectuate the appropriate content protection functions of these protected digital outputs A device that outputs decrypted protected content provided pursuant to the Agreement using HDCP shall:

8 If requested by Licensor, at such a time as mechanisms to support SRM s are available, deliver a file associated with the protected content named HDCP.SRM and, if present, pass such file to the HDCP source function in the device as a System Renewability Message; and Verify that the HDCP Source Function is fully engaged and able to deliver the protected content in a protected form, which means: HDCP encryption is operational on such output, Processing of the System Renewability Message associated with the protected content, if any, has occurred as defined in the HDCP Specification, at such a time as mechanisms to support SRM s are available, and There is no HDCP Display Device or Repeater on such output whose Key Selection Vector is in such System Renewability Message at such a time as mechanisms to support SRM s are available. 20. Exception Clause for Standard Definition, Uncompressed Digital Outputs on Windows-based PCs and Macs running OS X or higher): HDCP must be enabled on all uncompressed digital outputs (e.g. HDMI, Display Port), unless the customer s system cannot support HDCP (e.g., the content would not be viewable on such customer s system if HDCP were to be applied) 21. Upscaling: Device may scale Included Programs in order to fill the screen of the applicable display; provided that Licensee s marketing of the Device shall not state or imply to consumers that the quality of the display of any such upscaled content is substantially similar to a higher resolution to the Included Program s original source profile (i.e. SD content cannot be represented as HD content). Embedded Information 22. Watermarking. The Content Protection System or playback device must not remove or interfere with any embedded watermarks in licensed content. 23. Embedded Information. Licensee s delivery systems shall pass through any embedded copy control information without alteration, modification or degradation in any manner; 24. Notwithstanding the above, any alteration, modification or degradation of such copy control information and or watermarking during the ordinary course of Licensee s distribution of licensed content shall not be a breach of this Embedded Information Section.

9 Geofiltering 25. The Content Protection System shall take affirmative, reasonable measures to restrict access to Licensor s content to within the territory in which the content has been licensed. 26. Licensee shall periodically review the geofiltering tactics and perform upgrades to the Content Protection System to maintain state of the art geofiltering capabilities. 27. Without limiting the foregoing, Licensee shall utilize geofiltering technology in connection with each Customer Transaction that is designed to limit distribution of Included Programs to Customers in the Territory, and which consists of (i) IP address look-up to check for IP address within the Territory and (ii) either (A) with respect to any Customer who has a credit card on file with the Licensed Service, Licensee shall confirm that the country code of the bank or financial institution issuing such credit card corresponds with a geographic area that is located within the Territory, with Licensee only to permit a delivery if the country code of the bank or financial institution issuing such credit card corresponds with a geographic area that is located within the Territory or (B) with respect to any Customer who does not have a credit card on file with the Licensed Service, Licensee will require such Customer to enter his or her home address (as part of the Customer Transaction) and will only permit the Customer Transaction if the address that the Customer supplies is within the Territory. Network Service Protection Requirements. 28. All licensed content must be received and stored at content processing and storage facilities in a protected and encrypted format using a state of the art protection system. 29. Document security policies and procedures shall be in place. Documentation of policy enforcement and compliance shall be continuously maintained. 30. Access to content in unprotected format must be limited to authorized personnel and auditable records of actual access shall be maintained. 31. Physical access to servers must be limited and controlled and must be monitored by a logging system. 32. Auditable records of access, copying, movement, transmission, backups, or modification of content must be securely stored for a period of at least three years. 33. Content servers must be protected from general internet traffic by state of the art protection systems including, without limitation, firewalls, virtual private networks, and intrusion detection systems. All systems must be regularly updated to incorporate the latest security patches and upgrades. 34. All facilities which process and store content must be available for Motion Picture Association of America and Licensor audits upon the request of Licensor. 35. At Licensor s written request, security details of the network services, servers, policies, and facilities that are relevant to the security of the Licensed Service (together, the Licensed Service Security Systems ) shall be provided to the Licensor, and Licensor reserves the right to subsequently make reasonable requests for improvements to the Licensed Service Security Systems. Any substantial changes to the Licensed Service Security Systems must be submitted to Licensor for approval, if Licensor has made a prior written request for such approval rights.

10 36. Content must be returned to Licensor or securely destroyed pursuant to the Agreement at the end of such content s license period including, without limitation, all electronic and physical copies thereof. High-Definition Restrictions & Requirements In addition to the foregoing requirements, all HD content is subject to the following set of restrictions & requirements: 37. Personal Computers HD content is expressly prohibited from being delivered to and playable on General Purpose Computer Platforms (e.g. PCs) unless explicitly approved by Licensor. If approved by Licensor, the additional requirements for HD playback on PCs will include the following: Secure Video Paths: Digital Outputs: The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. For avoidance of doubt, HD content may only be output in accordance with Section 22 and Section 23section Digital Outputs above. Further, by downloading a script of other investigation method, Licensee shall determine unequivocally before offering HD content to the user that the user s PC supports digital output control in compliance with section Digital Outputs of this schedule. HD content shall NOT be offered to the user or delivered to the user if this test determines the user s PC does not support digital output control in compliance with section Digital Outputs of this schedule Hardware Root of Trust Or State of the Art Software Tamper Resistant The Content Protection System (CPS) and/or the Approved Device on which the CPS executes shall use a hardware means ("Hardware Root of Trust") which prevents compromise via software attacks, of the Content Protection System. For example, the Hardware Root of Trust may provide some or all of the following functions: hardware defences against reverse engineering of software hardware assisted software tamper resistance hardware secure key storage (and or key use) hardware assisted verification of software Alternatively, the Content Protection System (CPS) and/or the Approved Device on which the CPS executes shall use software obfuscation or other method of software tamper resistance (as described in clause 10.4, Software Tamper Resistance ) from a recognized, state of the art provider that is approved by Licensor Secure Content Decryption.

11 Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment. Decrypted content must be encrypted during transmission to the graphics card for rendering HD Day & Date Requirements In addition to the foregoing requirements, all HD content is subject to the following set of content protection requirements: 38. Analogue Sunset. After December 31, 2011, all Approved Devices shall limit (e.g. down-scale) analog outputs for decrypted protected Included Programs to standard definition at a resolution no greater than 720X480 or 720 X Additional Watermarking Requirements. At such time as physical media players manufactured by licensees of the Advanced Access Content System are required to detect audio and/or video watermarks during content playback (the Watermark Detection Date ), Licensee shall require, within two (2) years of the Watermark Detection Date, that any new devices capable of receiving and decrypting protected high definition content from the Licensed Service that can also receive content from a source other than the Licensed Service shall detect and respond to the embedded state and comply with the corresponding playback control rules.

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

DIRECTV Set Top Box and Content Protection Description

DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Boxes There are tens of millions of active DIRECTV set-top boxes (STBs). All DIRECTV STBs receive 100% digital input signals. The

More information

Live Guide System Architecture and Security TECHNICAL ARTICLE

Live Guide System Architecture and Security TECHNICAL ARTICLE Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network

More information

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SILVERLIGHT 5 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them.

More information

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview Digital Transmission Content Protection (DTCP) Technical and Licensing Overview 1 Overview DTCP as part of Home Network Protection Framework Link Protection Technology and Licensing Chain DTCP Technical

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Adobe Access April 2014. Version 4.0. Overview

Adobe Access April 2014. Version 4.0. Overview Adobe Access April 2014 Version 4.0 Overview Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law, furnished for informational use only, is subject

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Using the Adobe Access Server for Protected Streaming

Using the Adobe Access Server for Protected Streaming Adobe Access April 2014 Version 4.0 Using the Adobe Access Server for Protected Streaming Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law,

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

IPTV Primer. August 2008. Media Content Team IRT Workgroup

IPTV Primer. August 2008. Media Content Team IRT Workgroup TV Primer August 2008 Media Content Team IRT Workgroup What Is TV? TV is the delivery of video and audio programming via Internet Protocol () over a broadband network TV can run on a converged network

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

DVCrypt Conditional Access System

DVCrypt Conditional Access System DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

THIS PRODUCT DOES NOT TRANSMIT ANY PERSONALLY IDENTIFIABLE INFORMATION FROM YOUR COMPUTER TO MICROSOFT COMPUTER SYSTEMS WITHOUT YOUR CONSENT.

THIS PRODUCT DOES NOT TRANSMIT ANY PERSONALLY IDENTIFIABLE INFORMATION FROM YOUR COMPUTER TO MICROSOFT COMPUTER SYSTEMS WITHOUT YOUR CONSENT. Microsoft Windows XP Media Center Edition 2005 SUPPLEMENTAL END-USER LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This supplemental end-user license agreement ( Supplemental EULA ) is a legal agreement

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included

More information

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events.

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events. Deciding what event you want to stream live that s the easy part. Figuring out how to stream it? That s a different question, one with as many answers as there are options. Cameras? Encoders? Origin and

More information

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation. eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Using the Adobe Access Server for Protecting Content

Using the Adobe Access Server for Protecting Content Adobe Access April 2014 Version 4.0 Using the Adobe Access Server for Protecting Content Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law,

More information

Terms of Service. Your Information and Privacy

Terms of Service. Your Information and Privacy These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital

More information

HDCP White Paper: How DigitalMedia TM Switchers Handle HDCP

HDCP White Paper: How DigitalMedia TM Switchers Handle HDCP HDCP White Paper: How DigitalMedia TM Switchers Handle HDCP HDCP Whitepaper HDMI and HDCP are new to the Pro-AV industry, and as a system designer it is very important to understand the implications of

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014

4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014 4K Network Security Proposal Discussion with Studios UXTC - Technical Planning Group Sony Electronics 8/10/2014 Overview Sony s 4K Network Security Proposal: Our authentication protocol uses certificates

More information

mobile payment acceptance Solutions Visa security best practices version 3.0

mobile payment acceptance Solutions Visa security best practices version 3.0 mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid

More information

Certification Practice Statement (ANZ PKI)

Certification Practice Statement (ANZ PKI) Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

MOBILE GAMING SYSTEM POLICIES

MOBILE GAMING SYSTEM POLICIES MOBILE GAMING SYSTEM POLICIES This document is intended to provide further clarification on applicable mobile gaming Technical Standards and additionally to define policies associated with the manufacturing

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011 Transmission Security (TRANSEC) in an IP-based VSAT Architecture February 2011 As the ability to monitor satellite transmissions grows more sophisticated, the need to implement increased levels of security

More information

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

Privacy Policy and Notice of Information Practices

Privacy Policy and Notice of Information Practices Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Fragmented MPEG-4 Technology Overview

Fragmented MPEG-4 Technology Overview Fragmented MPEG-4 Technology Overview www.mobitv.com 6425 Christie Ave., 5 th Floor Emeryville, CA 94607 510.GET.MOBI HIGHLIGHTS Mobile video traffic is increasing exponentially. Video-capable tablets

More information

Compliance and Security Challenges with Remote Administration

Compliance and Security Challenges with Remote Administration Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Ocularis Media Server Installation & Administration Guide

Ocularis Media Server Installation & Administration Guide Ocularis Media Server Installation & Administration Guide 2013 On-Net Surveillance Systems Inc. On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone:

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

E-Book Security Assessment: NuvoMedia Rocket ebook TM

E-Book Security Assessment: NuvoMedia Rocket ebook TM E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual

WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual User s manual version 0.1 (January 2013) This manual applied to program version 3.0.0.xxx Table of contents The table of contents is empty because

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

YAMAHA ASIO DirectKS Driver for Windows Owner's Manual

YAMAHA ASIO DirectKS Driver for Windows Owner's Manual YAMAHA ASIO DirectKS Driver for Windows Owner's Manual ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

the device manufacturer that distributes the software with the device, or the software installer that distributes the software with the device.

the device manufacturer that distributes the software with the device, or the software installer that distributes the software with the device. MICROSOFT SOFTWARE LICENSE TERMS WINDOWS VISTA HOME BASIC WINDOWS VISTA HOME PREMIUM WINDOWS VISTA ULTIMATE These license terms are an agreement between you and the device manufacturer that distributes

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Computer and Network Security Policy

Computer and Network Security Policy Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville

More information

United States Trustee Program s Wireless LAN Security Checklist

United States Trustee Program s Wireless LAN Security Checklist United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT Last Updated: 10 June 2015 This Hosting Services Addendum to the Master Software Licence Agreement ( Addendum ) will only apply to the extent

More information

Is your data safe out there? -A white Paper on Online Security

Is your data safe out there? -A white Paper on Online Security Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements / WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION These license terms are an agreement between you and

More information