CSIRT Description for CERT OPL
|
|
|
- Ralph Atkins
- 10 years ago
- Views:
Transcription
1 CSIRT Description for CERT OPL Table of Contents 1. Document Information Date of Last Update Distribution List for Notifications Locations where this Document May Be Found Authentication this Document 2 2. Contact Information Name of the Team Address Time Zone Telephone Number Facsimile Number Other Telecommunication Electronic Mail Address Public Keys and Encryption Information Team Members Points of Customer Contact 3 3. Charter Mission Statement Constituency Sponsorship and/or Affiliation Authority 3 4. Policies Types of Incidents and Level of Support Co-operation, Interaction and Disclosure of Information Communication and Authentication 5 5. Services Incident Response Incident Triage Incident Coordination Incident Resolution Proactive Activities 6 6. Incident Reporting Forms 6 7. Disclaimers 7 1
2 1. Document Information 1.1. Date of Last Update This is version 1.05, published 2014/11/ Distribution List for Notifications None available at this moment Locations where this Document May Be Found The current version of this CSIRT description document is available from the CERT OPL WWW site; its URL is Please make sure you are using the latest version Authentication this Document The text versions of this document have been signed with the CERT OPL's PGP key. The signatures are also on our Web site, under: 2. Contact Information 2.1. Name of the Team "CERT OPL": CERT Orange Polska (Computer Emergency Response Team Orange Polska) 2.2. Address Orange Polska CERT OPL ul. Piotra Skargi Warszawa Poland 2.3. Time Zone GMT Central European Time (CET) GMT Daylight Saving Time (from last Sunday in March to last Sunday in October) 2.4. Telephone Number (ask for the CERT OPL) 2.5. Facsimile Number (this is *not* a secure fax) 2.6. Other Telecommunication None available at this moment Electronic Mail Address <[email protected]> This is a mail alias that relays mail to CERT OPL team members on duty handling all incoming mails Public Keys and Encryption Information The CERT OPL has a PGP key for encryption and signing, whose KeyID is 0xCB779BD0 and whose fingerprint is AFA2 E BCB ED09 E17A DBFC 5A3B CB77 9BD0. The key and its signatures can be found at the usual large public keyservers and also Public PGP key is available from the Web site at: Team Members Krzysztof Bialek is the CERT OPL coordinator. 2
3 General information about the CERT OPL, as well as links to various recommended security resources and services, can be found at Points of Customer Contact The preferred method for contacting the CERT OPL is via at e- mail sent to this address will handled by the responsible human. If it is not possible (or not advisable for security reasons) to use , the CERT OPL can be reached by telephone and fax during regular office hours (please, check Section 2.4 and 2.5). CERT OPL's hours of operation are generally restricted to regular business hours (09:00-17:00 Monday to Friday except holidays). In an emergency, please call to our SOC 24/7 (please, check Section 2.4). If possible, when submitting your report, use the form mentioned in Section Charter 3.1. Mission Statement The main purposes of the CERT OPL are: to assist users of Orange Polska network in implementing proactive measures to reduce the risks of computer security incidents, in particular: o providing a consultancy and education services for users, to assist users of Orange Polska network in responding to such incidents when they occur, in particular: o providing a single point of trusted contact for users to deal with computer security incidents and problems, o a complex coordination of all responses to an incident (handling incidents) with special emphasis on exchanging information between various interested parties, 3.2. Constituency The CERT OPL's constituency is all users and organizations of the Orange Polska (contains all those systems connected to Orange Polska network: AS5617, AS29535, AS33900, AS43447, AS12743) Sponsorship and/or Affiliation The CERT OPL is sponsored by the Orange Polska (Polish Telecom) which is part of Authority The CERT OPL operates under the auspices of, and with authority delegated by, the management of Orange Polska. The CERT OPL expects to work cooperatively with system administrators and users (customers) at Orange Polska network, and, insofar as possible, to avoid authoritarian relationships. However, should circumstances warrant it, the CERT OPL has the authority to take the measures it deems appropriate to properly handle a computer security related incident. 4. Policies 4.1. Types of Incidents and Level of Support The CERT OPL is authorized to address all types of computer security incidents which occur, or threaten to occur, at Orange Polska s constituency (see section 3.2). CERT OPL handles all types of security incidents, that occurred or threaten to its constituency (may act upon request of one of its constituents, or may act if a constituent is, or threatens to be, involved in a computer security incident - see section
4 The level of support given by CERT OPL will vary depending on the type and severity of the incident or issue, the type of constituent, the size of the user community affected, and the CERT OPL's resources at the time. Resources will be assigned according to the following priorities, listed in decreasing order: root or system-level attacks on any Management Information System, or any part of Orange Polska backbone network infrastructure or attacks on any large public service machine; compromise of restricted confidential service accounts or software installations, compromise of confidential data or integrity, also used for system administration; denial of services attacks or any other attempts of limiting availability of service or information (especially massive distributed attacks) on any of the above 3 items; any of the above malicious actions at other sites, originating from the constituency of CERT OPL; large-scale attacks of any kind, e.g. "social engineering" attacks, password cracking attacks; threats, harassment, and other criminal offenses involving individual user accounts; compromise of individual user accounts on multi-user of desktop systems; forgery and misrepresentation, and other security-related violations of local rules and regulations, e.g. forgery, spam ; Types of incidents other than those mentioned above will be prioritized according to their apparent severity and extent. CERT OPL will basically accept any incident report that involves an incident with one of the constituents either as a victim or as a suspect. However, CERT OPL encourages the engagement of qualified security staff at the involved organization in an early stage. Whenever feasible, CERT OPL will contact the relevant Site Security Contact of the organization allegedly involved, even if the end user has chosen not to do so. While the CERT OPL understands that there exists great variation in the level of system administrator expertise at Orange Polska, and while the CERT OPL will endeavor to present information and assistance at a level appropriate to each person, the CERT OPL cannot train system administrators on the fly, and it cannot perform system maintenance on their behalf. In most cases, the CERT OPL will provide pointers to the information needed to implement appropriate measures. The CERT OPL is committed to keeping the Orange Polska system administration community informed of potential vulnerabilities, and where possible, will inform this community of such vulnerabilities before they are actively exploited Co-operation, Interaction and Disclosure of Information While there are legal and ethical restrictions on the flow of information from CERT OPL, many of which are also outlined in the Orange Polska (Polish Telecom), and all of which will be respected, the CERT OPL acknowledges its indebtedness to, and declares its intention to contribute to, the spirit of cooperation that created the Internet. Therefore, while appropriate measures will be taken to protect the identity of members of our constituency and members of neighboring sites where necessary, the CERT OPL will otherwise share information freely when this will assist others in resolving or preventing security incidents. In the paragraphs below, "affected parties" refers to the legitimate owners, operators, and users of the relevant computing facilities. It does not refer to unauthorized users, including otherwise authorized users making unauthorized use of a facility; such intruders may have no expectation of confidentiality from the CERT OPL. They may or may not have legal rights to confidentiality; such rights will of course be respected where they exist. Information being considered for release will be classified as follows: 4
5 Private user information is information about particular users, or in some cases, particular applications, which must be considered confidential for legal, contractual, and/or ethical reasons. Private user information will be not be released in identifiable form outside the CERT OPL. Intruder information is similar to private user information, but concerns intruders. While intruder information, and in particular identifying information, will not be released to the public (unless it becomes a matter of public record, for example because criminal charges have been laid), it will be exchanged freely with system administrators and CSIRTs tracking an incident. Private site information is technical information about particular systems or sites. It will not be released without the permission of the site in question, except (for some special cases) as provided for below. Vulnerability information is technical information about vulnerabilities or attacks, including fixes and workarounds. Vulnerability information will be released freely, though every effort will be made to inform the relevant vendor before the general public is informed. Statistical information is embarrassing information with the identifying information stripped off. Statistical information will be released at the discretion of the Orange Polska IT&N Department Security. Statistical information will be released only after adequate preprocessing in the form of official periodical reports. Contact information explains how to reach system administrators and CSIRTs. Contact information will be released freely, except where the contact person or entity has requested that this not be the case, or where CERT OPL has reason to believe that the dissemination of this information would not be appreciated Communication and Authentication In view of the types of information that the CERT OPL will likely be dealing with, telephones will be considered sufficiently secure to be used even unencrypted. Unencrypted will not be considered particularly secure, but will be sufficient for the transmission of low-sensitivity data. If it is necessary to send highly sensitive data by , PGP will be used. Network file transfers will be considered to be similar to for these purposes: sensitive data should be encrypted for transmission. Where it is necessary to establish trust, for example before relying on information given to the CERT OPL, or before disclosing confidential information, the identity and bona fide of the other party will be ascertained to a reasonable degree of trust. Within Orange Polska, and with known neighbor sites, referrals from known trusted people will suffice to identify someone. Otherwise, appropriate methods will be used, such as a search of FIRST members, the use of WHOIS and other Internet registration information, etc, along with telephone call-back or mail-back to ensure that the party is not an impostor. Incoming whose data must be trusted will be checked with the originator personally, or by means of digital signatures (PGP in particular is supported). For PGP keys of CERT OPL see also section
6 5. Services 5.1. Incident Response CERT OPL will assist system administrators in handling the technical and organizational aspects of incidents. In particular, it will provide assistance or advice with respect to the following aspects of incident management: Incident Triage The main goals of incident triage are: investigating whether indeed an security incident occurred, determining the extent and severity of the incident (including a potential impact on the constituency), etc Incident Coordination The goal follow is to provide a complex coordination incidents with particular emphasis on exchanging information between various involved parties. These include but are not limited to: determining the initial cause of the incident (exploited vulnerability), facilitating contact with other sites which may be involved, facilitating contact with appropriate security teams and/or law enforcement officials if necessary, making reports to other CSIRTs, if applicable composing announcements to users (members of the constituency), if applicable Incident Resolution The incident resolution only is performed in very limited range, mainly due to limited resources. In fact limited to special cases. The actual range of activities in such cases collecting the evidence of the incident, or other disciplinary actions, are contemplated. In addition, CERT OPL will collect statistics concerning incidents which occur within or involve the Orange Polska community, and will notify the community as necessary to assist it in protecting against known attacks. To make use of CERT OPL's incident response services, please fill in the incident report form available at or send as per section 2.11 above. Please remember that the amount of assistance available will vary according to the parameters described in section Proactive Activities The CERT OPL coordinates and maintains the following services to the extent possible depending on its resources: Information services o the official website of CERT OPL is main security point of view and channel for unrestricted distributing information by CERT OPL, as well as the most important pointers to information from other sites that might be important or interesting, protecting your computer etc. Archiving services o recording of security incidents handled will be kept. While the records remain confidential, periodic statistical reports will be made available to the Orange Polska constituency; 6. Incident Reporting Forms If possible, use the following form when reporting a security incident: There are overall guidelines and incident reporting samples available, containing all information that should be included in an incident report, Web site at: 6
7 7. Disclaimers While every precaution will be taken in the preparation of information, notifications and alerts, CERT OPL assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained within. 7
DANCERT RFC2350 Description Date: 10-10-2014 Dissemination Level:
10-10-2014 Date: 10-10-2014 Dissemination Level: Owner: Authors: Public DANCERT DANTE Document Revision History Version Date Description of change Person 1.0 10-10-14 First version issued Jan Kohlrausch
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS]
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS] 1 Document information... 2 1.1 Date of Last Update... 2 1.2 Distribution List for Notifications... 2 1.3 Locations where this Document May Be Found... 2 1.4 Authenticating
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
The current version of this document can always be found at http://www.nic.cz/csirt.
1 RFC 2350 1.1 1. Document Information This document contains a description of CZ.NIC-CSIRT according to RFC 2350. It provides basic information about the CSIRT team, the ways it can be contacted, describes
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Version: 1.2 Date: March, 10 2014. HAN-CERT - RFC 2350 Hogeschool van Arnhem en Nijmegen (HAN University of Applied Sciences)
Version: 1.2 Date: March, 10 2014 HAN-CERT - RFC 2350 Hogeschool van Arnhem en Nijmegen (HAN University of Applied Sciences) CONTENTS 1 Document Information...3 1.1 Date of Last Update...3 1.2 Distribution
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Information Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013
Information Security: Roles, Responsibilities, and Data Classification Technology Services 1/4/2013 Roles, Responsibilities, and Data Classification The purpose of this session is to: Establish that all
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Computer Security Incident Reporting and Response Policy
SECTION: 3.8 SUBJECT: Computer Security Incident Reporting and Response Policy AUTHORITY: Executive Director; Chapter 282.318, Florida Statutes - Security of Data and Information Technology Resources;
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data 1 Table of Contents Executive Summary... 3 Template
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY
CAMPUS SAFETY POLICIES OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY Campus policies regarding the reporting of criminal actions and emergencies: Vantage students and employees will report
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
New River Community College. Information Technology Policy and Procedure Manual
New River Community College Information Technology Policy and Procedure Manual 1 Table of Contents Asset Management Policy... 3 Authentication Policy... 4 Breach Notification Policy... 6 Change Management
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
Computer Security Incident Response Team
University of Scranton Computer Security Incident Response Team Operational Standards Information Security Office 1/27/2009 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0 Establishment
Computer Security Incident Response Team
Computer Security Incident Response Team Operational Standards The University of Scranton Information Security Office August 2014 Table of Contents 1.0 Operational Standards Document Overview... 3 2.0
ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT
ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT This Agreement is entered into between Farmers Trust & Savings Bank (the "Bank") and any customer of the Bank who subscribes to the Bank s Online Express
MYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Online Banking Service Agreement
Online Banking Service Agreement AGREEMENT AND DISCLOSURES Before using Zions Bank's online banking services, you must consent to receive disclosures electronically, either online or via E Mail, and read
The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Online Services terms and conditions
Online Services terms and conditions 1. Who we are 1.1 Your account is with OneSavings Bank plc trading as KRBS and Kent Reliance Banking Services. For information about our Group please visit www.onesavingsbank.com.
The University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 111 Approval Date: June 2008 Last Revision: [2013] Responsible Executive: President Title: Internal Audit, Investigations, and Financial
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Incident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE
1. DISCLAIMER NOTICE UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE The information provided by UGANDA REVENUE AUTHORITY (URA) on the web portal relating to products and services (or
COMPUTER SECURITY INCIDENT MANAGEMENT MANUAL
AMPARO Project COMPUTER SECURITY INCIDENT MANAGEMENT MANUAL LATIN AMERICA AND THE CARIBBEAN Page 1 Introduction This manual was created within the framework of the AMPARO Project, a LACNIC initiative that
CUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
The detailed process of becoming a FIRST member is described at http://first.org/membership/.
FIRST Site Visit Requirements and Assessment Document originally produced by CERT Program at the Software Engineering Institute at Carnegie Mellon University And Cisco Systems PSIRT Revision When Who What
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE
PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE Draft Organization s Bulletin The Secretary-General, for the purpose of preventing and addressing cases of Genderbased Violence (as
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
esnc ACCESS AGREEMENT
FEDERAL RESERVE BOARD Shared National Credit Function esnc ACCESS AGREEMENT A. Introduction This agreement (Agreement) sets forth the terms for your Institution s use of our Electronic Shared National
Business Online Bill Pay Terms and Conditions
Business Online Bill Pay Terms and Conditions This Online Bill Pay Terms and Conditions ("Agreement") is between Customer and Spring Bank for the delivery of Business Online Bill Pay as described below:
Online Banking Agreement
Online Banking Agreement Please read the Terms and Conditions below and "sign" below, by checking the box below and click submit. We recommend that you print a copy of this document and maintain a copy
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
Online Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA
INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA Report of an investigation of a malicious software outbreak affecting health information August 19, 2011 Dr. Cathy MacLean Investigation Report H2011-IR-003
Page 1 of 10. TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010
Page 1 of 10 TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010 This document constitutes an Organization-wide policy intended to allow for the proper use of all Neighbor To Family
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Policy for Social Media Usage in Catawba County
Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes
WASHINGTON STATE EMPLOYEES CREDIT UNION ONLINE BANKING AGREEMENT
WASHINGTON STATE EMPLOYEES CREDIT UNION ONLINE BANKING AGREEMENT This Agreement is the contract which covers your and our rights and responsibilities concerning Online Banking services ("Online Banking")
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
ONLINE BANKING SERVICES AGREEMENT
ONLINE BANKING SERVICES AGREEMENT AGREEMENT AND DISCLOSURES Before using our online banking services, you must consent to receive disclosures electronically, either online or via E-mail, and read and agree
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Rise Broadband Networks, Inc. Privacy Policy and Customer California Privacy Rights. Effective date: January, 2016
Networks, Inc. Privacy Policy and Customer California Privacy Rights Effective date: January, 2016 knows Customers care about how their personally identifiable information ( Personal Information ) is used
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY.
INTERNET BANKING SERVICE AGREEMENT NOTE: BY CLICKING TO AGREE AND BY USE OF THIS SERVICE YOU ARE CONCLUDING A LEGALLY BINDING AGREEMENT. READ CAREFULLY. Introduction. This Internet Banking Service Agreement
.trustwave.com Updated October 9, 2007 TECHNICAL ASSISTANCE CENTER (TAC) SUPPORT GUIDE
.trustwave.com Updated October 9, 2007 TECHNICAL ASSISTANCE CENTER (TAC) SUPPORT GUIDE Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright
