Data Centre Colocation Service. Request for Proposal

Size: px
Start display at page:

Download "Data Centre Colocation Service. Request for Proposal"

Transcription

1 Data Centre Colocation Service Request for Proposal Version 1.5 Date: 8 May 2009 Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong. Tel.: Fax: [email protected] Website: 1

2 Table of Contents 1. Summary Definitions About HKIRC Information Security Background of the Project Background Scope of Service Server Colocation Service Implementation Services Information Security Service Acceptance Contractual Consideration Limitation of Liability and Indemnity Project Schedule Payment Schedule Elements of a Strong Proposal Service agreement negotiation and signature HKIRC Contacts...13 Appendix A HKDNR Information Security Policy and Guidelines: An Extract Relevant to Outsourcing...14 Appendix B HKIRC Proposal Requirements Proposal Deadline Proposal Content Cover Page Executive Summary Conflict of Interest Declaration Company Background Facilities standard and management practice related to colocation service Proposed Costs of Service Implementation Time Table Support Arrangement and Services Commercial and Payment Terms

3 1. Summary HKIRC is going to commission an external Service Provider to provide Data Centre Colocation Service for the Company. The service shall provide four 42U rack space, power for all racks and environment, security protection as well as remote hand support for server support. It shall also include all services required for the implementation of the Project. The period of the contract will be 24 months. 2. Definitions The following terms are defined as in this section unless otherwise specified. The Contractor means the company delivering the Project. HKIRC means Hong Kong Internet Registration Corporation Limited. HKDNR means Hong Kong Domain Name Registration Company Limited, a wholly-owned subsidiary of HKIRC, the company requesting the proposal for the Project. The Project means the Data Centre Colocation project with requirements stipulated in Section 5 of this document, the Background of the Project. remote hand means physical access to and operation of the equipment on the rack by qualified technical personnel of the Contractor under the direction of HKIRC s technical staff. RFP means this Request for Proposal 3. About HKIRC Hong Kong Internet Registration Corporation Limited (HKIRC) is a non-profit-making and non-statutory corporation responsible for the administration of Internet domain names under '.hk' country-code top level domain. HKIRC provides registration services through its wholly-owned subsidiary, Hong Kong Domain Name Registration Company Limited (HKDNR), for domain names ending with '.com.hk', '.org.hk', '.gov.hk', '.edu.hk', '.net.hk', '.idv.hk', '. 公 司.hk', '. 組 織.hk', '. 政 府.hk', '. 教 育.hk', '. 網 絡.hk', '. 個 人.hk' and '.hk'. 3

4 HKIRC endeavours to be: Cost-conscious but not profit-orientated Customer-orientated Non-discriminatory Efficient and effective Proactive and forward-looking More information about HKIRC can be found at 4. Information Security The company submitting the proposal ( the company ) shall acknowledge and agree that, if the company is selected as the Contractor, it shall be bounded by our Non-Disclosure Agreement (NDA) and Information Security Policy (highlights of the policies are illustrated in Appendix A). The company shall also comply with the obligations under the Personal Data (Privacy) Ordinance and any other obligations in relation to personal data. The company shall be provided with a set of NDA and Information Security Compliance Statement after HKIRC received the company s Express-of-Interest before the stipulated time. The NDA and the Information Security Compliance Statement shall be signed and returned to HKIRC attached with documents required by the Compliance Statement before the scheduled deadline. HKIRC will only consider proposals from companies which have signed both the NDA and the Information Security Compliance Statement. The proposal should be marked RESTRICTED at the centre-top of each page in black color. It must be encrypted if transmitted electronically. Each proposal will be reviewed under the terms of non-disclosure by the HKIRC s staff and Board of Directors of HKIRC. 4

5 5. Background of the Project 5.1. Background Currently, all our production servers are co-located in a hosting service provider s data centre. Current equipment occupies four 42U Racks. The hosting service provider is responsible for providing power conditioning (main and UPS), environmental control/protection (fire, flood, temperature, humidity etc.), and security and access control. In addition, the service provider also provides remote hand to physically access the servers if needed Scope of Service The following defines the scope of service to be provided by the Contractor: Server Colocation Service 1. Server Racks Requirements a. The Contractor shall provide four 42U racks, 600mm wide and at least 950mm in depth. b. All racks should be located on the same row, next to each other. If for any reason they need to be located in different rows, no less then two racks should be located on the same row next to each other. c. In case where racks are located in different rows, the Contractor shall provide capacity for inter-rack networking d. All racks shall have lockable perforated doors at the back and the front e. Partition shelves should be available if required f. Cabling to each rack should either be fed through using either under floor (in a raised floor facility) or ceiling cable tray or trunking g. Power & data cabling should be in separate tray or trunking 2. Power Supply Requirements a. Duel power feed is required for each rack. b. Each power feed should not come from the same phase c. Each power feed should be fed from independent breaker d. Each power feed should provide at least twenty 13A sockets e. All power feed must be protected from brownout, spike & surge by 5

6 Uninterrupted Power Supply, with capacity to supply stable power up to 30 minutes after power failure f. The Data Centre power should be backed up by a Power Generator, which should be in service within 30 minutes of any power failure. g. Power Generator should have fuel supply for at least 7-day continuous operation. h. The Contractor shall supply three racks with at least 1.5KVA and one rack with 3KVA 3. Environmental Control/Protection:- a. The Data Centre facility shall be protected by gas based fire suppression system with pre-active dry pipe water fire suppression system. b. Fire detection system shall be in place. E.g. smoke and/or heat detector c. Water leakage detection system shall be in place to detect possible water damage due to leakage or flooding d. Temperature, humidity and static control shall be in place. Temperature shall be kept between 15 and 20 degree Celsius. Humidity shall be between 40% and 60% to avoid static electricity. Anti-static flooring should be used to prevent excess static build up. e. Air Conditioning system should provide 24x7 cooling and humidity control with redundancy in case of break down. 4. Security and Access Control a. 24-hour Security monitoring shall be in place. CCTV monitoring and recording on common access area and entrances should be provided. All access doors of entrances shall have a security lock with access control system to record and control access. b. All entries and accesses to the Data Centre shall be logged and can be reviewed by HKIRC c. All equipment delivery and removal from the Data Centre shall be recorded d. Data Centre shall provide Access Control only allowing authorized person to access secured areas. 5. Network and Communication Facilities a. The facility should provide easy access for any major telecom company to provide data communication infrastructure for HKIRC 6

7 b. Shareable Internet access shall be provided by the facility. 100Mb/s sharable bandwidth should be provided within the facility and 10Mb/s bandwidth for local access (within Hong Kong, preferable with HKIX connection) and 5Mb/s bandwidth for International. Optional temporary expandable bandwidth for International access is desirable. c. The Contractor s network infrastructure shall have process, procedure and capacity to mitigate Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks originated outside of the facility. Suitable technology/technique, e.g. Routing blackhole should be pre-configured and employed to limit or stop such attack. In case of such attack targeting HKIRC/HKDNR, the Contractor shall be able to provide temporary burstable bandwidth to cater for such attack, should it be required. d. The Contractor shall be able to provide and manage multi-home, WAN access e.g. router with BGP and AS Number with different telecom supplier. e. Network performance reports/tools shall be available for monitoring the shared network. f. Data Centre shall provide a direct fax/data line access to the racks. 6. Miscellaneous a. The facility shall provide on site remote hand for physical access to the HKIRC equipment, eg. Power cycle equipment, remove/insert CD or other media, report on status of equipment (warning lights & status light), report on physical state of equipment etc. b. The Contractor shall have proven process and procedure for tracking issues and requests from HKIRC. c. Location of the Data Centre facility should be easily accessible by public transports and should not be located near HKIRC office, ideally in the Kowloon area. d. The Contractor shall be subject to HKIRC Security Audit as and when required by HKIRC or HKIRC external auditor. 7. Service Levels The Contractor shall guarantee the following service levels in addition to the above Technical Requirements: a. Data Centre uptime of 99.98% per year. A service is deemed failed if any of the following conditions is not met: 7

8 Power: Nominal Out Voltage 230V with less then 5% distortion at full load. Frequency for 50 Hz nominal +/- 3Hz Network: Internal network within datacenter, response time <3ms to any IP within datacentre. Ping time to local network (HKIX) <50ms. Cooling and humidity control: Temperature should be kept within 15 to 20 degree Celsius. Humidity shall be between 40% and 60%. b. A penalty of at least one month service charge will be imposed if the above uptime is not met. c. 24x7 round the clock on-site NOC support and monitoring are required. d. For any security breaches like break-in to data centre, racks, un-authorized access or vandalisation to HKDNR equipment etc, the customer should be notified within 15 minutes according to the escalation list provided by HKIRC. e. Incident reports for all reported incidents shall be available within 48 hour from the report of incident f. All schedule maintenance period shall be pre-notified by at least 10 days, and for major service interruption at least 4 week notice is needed. 8. Relocation Services (Optional) a. In case where HKIRC is going to relocate to a new Data Centre, the new service provider shall provide an optional relocation service including: i. Physical relocation of existing HKIRC s infrastructure to the new data centre ii. Re-racking of all HKIRC s infrastructure to new racks iii. Relocation of HKIRC s multi-home WAN networks iv. Re-cabling of HKIRC s infrastructure b. Detail information on relocation requirement will be given after the signing of NDA Implementation Services The professional services for this Project should cover the following: Basic hardware and network setup 8

9 Documentation for the processes and procedures like NOC Support procedures, Incident Report procedures, Incident Handling Process etc Information Security The Contractor shall follow HKDNR Information Security Policy and Guidelines set out by HKDNR on personal and co-operation data security. Contractor s Information Security Policy is subject to HKIRC review if needed Service Acceptance The overall project acceptance can be broken down into acceptances at various levels:- 1. Delivery, setup of racks 2. Services provided like optional relocation services 3. Functionality of the integrated system like networks, NOC operation 4. Performance of monitoring system & reporting system 5. Quality of service provided Under this acceptance framework, the vendor should fulfill the scope of services described in section In addition, interested vendors may provide additional acceptance criteria and the related plan in detail in their proposals Contractual Consideration Although the contract period is 24 month, HKIRC will start the new contract re-tendering process at month 21. In case the re-tendering process did not complete at the end of the current contract, HKIRC reserves the right to extend the current contracts for another 3 months, with the same terms and conditions. Also, if for any reason the contract is to be terminated before the completion of the contract period, the initiating party should give a 3-month notice in advance of the early termination date. 6. Limitation of Liability and Indemnity The company submitting the proposal agrees that if the company becomes the 9

10 Contractor of the Project, it shall indemnify HKIRC and HKDNR against any claim, demand, loss, damage, cost, expense or liability which the company may suffer from. 10

11 7. Project Schedule Project schedule Tasks To be Completed by Remark 1 Publish RFP 8/5/ Express of interest 15/5/2009 Sign NDA and InfoSec 3 Compliance Statement with all 29/5/2009 interested vendors Deadline for vendors to submit 29/5/2009, 4 proposal and quotation 5:30pm 5 Selection of vendor by panel 19/6/2009 Conclude final decision and 6 appoint the vendor 2/7/2009 Prepare service agreement 7 contract 4/7/2009 Sign service agreement 8 contract with the appointed 9/7/2009 vendor 9 Service implementation 8/8/2009 If relocation needed Service commencement 9/7/ /8/2009 If relocation needed 8. Payment Schedule The following payment schedule is recommended but interested vendors may propose their own in their proposals. Milestone/Acceptance Expected Payment duration 1 (a) Completion of Service Implementation 4 weeks One time setup charge 11

12 2 (a) Start of Colocation Service 24 month Monthly charge TOTAL 24 month & 4 weeks 100% 9. Elements of a Strong Proposal All submitted proposal must following the format as stated in Appendix B - HKIRC Proposal Requirements. Successful vendor is the one who submitted a clearly worded proposal that shows the following attributes: a persuasive section on the company background international recognize certification for IT facility management & IT Security Management a strong and flexible product meeting HKIRC requirements with minimum customization high level of interaction between HKIRC and the vendor excellent fit with the capabilities and facilities of HKIRC strong company and project management team Proposals are evaluated based on major criteria as follows (the percentages given are the weighting) Company Background (10%) Quality of facilities (30%) Facility management competency (20%) Understanding of our requirements (10%) Knowledge and advices on projects (10%) Proposed cost of the project and its flexibility (20%) 10. Service agreement negotiation and signature The service agreement will be drawn up between the selected vendor and HKDNR, the wholly-owned subsidiary of HKIRC. HKIRC welcomes the vendor s proposal on a suitable service agreement for the project. The service agreement must be signed by both parties within three weeks from the project award date. If the agreement is not signed within the said period, HKIRC will 12

13 start the negotiation with the next qualified vendor on the selection list. 11. HKIRC Contacts HKIRC Contacts information Contacts Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong telephone fax If you are not sure about the appropriate person to call, the receptionist can help you. IT Manager Ben Lee Project Manager Benjamin Choy CEO Jonathan Shea

14 Appendix A HKDNR Information Security Policy and Guidelines: An Extract Relevant to Outsourcing This document provides an extract of the HKDNR Information Security Policy and Guidelines with the purposes of (a) introducing various measures and controls to be executed by HKDNR regarding outsourcing and (b) setting the expectation of any potential contractors that their participation and conformance in these measures and controls are essential contractual obligations. The original Policy and Guidelines applies to HKDNR s employees, contractors and third party users. However, a potential contractor may interpret the clauses up to their roles and responsibilities only. Nonetheless, the keyword contractors hereby refers to all relevant staff members of the contractor and those of any other subcontractors under the contractor s purview. Herein, HKDNR would also set the expectation of any potential contractors that upon their express-of-interest to the project, they shall be required in the subsequent stages (a) to sign off a non-disclosure agreement (NDA) on all information to be provided and (b) to sign off a Compliance Statement where compliance requirements are specified in more details. (A) Extract from the HKDNR Information Security Policy In the following, the organization means Hong Kong Domain Name Registration Company Limited, the company requesting the proposal for the Project. 8. Human resources security 8.1 Security objective: To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities Security roles and responsibilities of employees, contractors and third party users shall be defined and documented in accordance with the organization s information security policy Background verification checks on all candidates for employment, contractors, 14

15 and third party users shall be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks As part of their contractual obligations, employees, contractors and third party users shall agree and sign the terms and conditions of their employment contract, which shall state their and the organization s responsibilities for information security. 8.2 During employment Security objective: To ensure that all employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error Management shall require employees, contractors and third party users to apply security measures in accordance with established policies and procedures of the organization All employees of the organization and, where relevant, contractors and third party users shall receive appropriate awareness training and regular updates on organizational policies and procedures, as relevant to their job functions. 8.3 Termination or change of employment Security objective: To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner All employees, contractors and third party users shall return all of the organization s assets in their possession upon termination of their employment, contract or agreement The access rights of all employees, contractors and third party users to information and information processing facilities shall either be removed upon termination of their employment, contract or agreement, or adjusted upon change. 12. Information systems acquisition, development and maintenance Outsourced software development shall be supervised and monitored by the organization 15

16 13. Information security incident management 13.1 Reporting information security events and weaknesses Security objective: To ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action All employees, contractors and third party users of information systems and services shall be required to note and report any observed or suspected security weaknesses in systems or services. (B) Extract from the HKDNR Information Security Guidelines 6. ORGANIZING INFORMATION SECURITY 6.2 EXTERNAL PARTIES Identification of Risks Related to External Parties The risks to the organization s information and information processing facilities from business processes involving external parties should be identified and appropriate controls implemented before granting the access Addressing Security in Third Party Agreements Agreements with third parties involving accessing, processing, communicating or managing the organization s information or information processing facilities, or adding products or services to information processing facilities should cover all relevant security requirements. 7. ASSET MANAGMENT Acceptable Use of Assets Rules for the acceptable use of information and assets associated with information processing facilities shall be identified, documented, and implemented. 8. HUMAN RESOURCE SECURITY Roles and Responsibilities Security roles and responsibilities of employees, contractors and third party users shall be defined and documented in accordance with the organization s information security policy Screening Background verification checks on all candidates for employment, contractors, and 16

17 third party users shall be conducted in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks Terms and Conditions of Employment As part of their contractual obligation, employees, contractors and third party users shall agree and sign the terms and conditions of their employment contract, which shall state their and the organization s responsibilities for information security Management Responsibilities Management shall require employees, contractors and third party users to apply security measures in accordance with established policies and procedures of the organization. 12. Information systems acquisition, development and maintenance Outsourced Software Development Outsourced software development shall be supervised and monitored by the organization. 17

18 Appendix B HKIRC Proposal Requirements 1.1 Proposal Deadline All proposals must reach HKIRC as stated in Section 7, Project Schedule, item no Proposal Content The proposal should contain the following: Cover Page Executive Summary Conflict of Interest Declaration Company Background o o o o o o Financial Situation Track Records Organization and management team Project team with credentials Company credentials Staff credentials Facilities standard and management practice related to colocation service Knowledge and Advices on Projects o o o Understanding of our requirements Colocation experience Certification in the future Deliverable Services & Facilities Proposed Cost of Services and Payment Schedule Implementation Time Table Support Arrangement and Services Commercial and Payment Terms. e.g. Compensation for delay. 18

19 Proposal requirements Submission deadline Delivery address Hard copies Please refer to Section 7 - Project Schedule, item no. 4 for the proposal submission deadline. Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong 2 copies of the full proposal are required. Electronic copy Electronic copy, if available, on disk or by to [email protected] and [email protected] ; also cc [email protected] and [email protected]. This is not a substitute for the physical copies mentioned above. Proposal format Specified in this document Page count 30 pages or fewer. Stapled. Do not bind. Font Electronically published or typed. Times New Roman 12 point font. 1.3 Cover Page Prepare a non-confidential cover page with the following information in the order given. Cover Page Project Title Data Centre Colocation Service project Project Manager Name: Title: Mailing address: Phone: 19

20 Fax: Company Contact person: Title: Company name: Mailing address: Phone: Fax: Website: 1.4 Executive Summary The executive summary provides a brief synopsis of the commercial and technical solution the vendor proposed for the project. This summary must be non-confidential. It should fit on a single page. The executive summary should be constructed to reflect the merits of the proposal and its feasibility. It should also clearly specify the project s goals and resource requirements. It should include: Rationale for pursuing the project, the technology needed and the present state of the relevant technology. Brief description of the vendor s financial situation. Brief description of the vendor s facilities and experience on colocation services 1.5 Conflict of Interest Declaration Declare any conflict of interest in relation to the Data Centre Colocation Service project and the.hk cctld registry HKIRC. 1.6 Company Background The vendor must describe its company background. Major activities, financial situation, organizational structure, management team and achievements in software development or service outsourcing of the company should be elaborated. Tracked records are preferred. 20

21 1.7 Facilities standard and management practice related to colocation service The vendor should describe the company s strengths in colocation facilities management and how they will be applied to the project. Track records are preferred. List the key technical and management personnel in the proposal. Provide a summary of the qualifications and role of each key member. 1.8 Proposed Costs of Service Such costs include: Fixed setup cost Labour unit costs for additional requirements. They are typically quoted in unit man day. Quoted in normal working hour, non-working hour and in emergency. Equipment that is permanently placed or purchased for HKIRC, if any. Subsequent support or maintenance service. Other direct costs including services, materials, supplies, postage, etc. 1.9 Implementation Time Table The vendor should present in this section the implementation schedule of the project. The schedule should be realistic and achievable by the vendor Support Arrangement and Services The vendor must provide support to the database and storage system enhancement project with respect to the preparation, implementation, monitoring and review of the new framework. The vendor must describe the support arrangement and services. E.g. availability, local/remote, time to on/off site support, etc Commercial and Payment Terms The vendor should describe the commercial and payment terms of the services e.g. compensation for the delay of the project. 21

Request for Proposals on Security Audit Services

Request for Proposals on Security Audit Services Request for Proposals on Security Audit Services Version 1.0 Date: 16 December 2011 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung

More information

Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal

Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal Data Centre Relocation, Colocation Service and Internet Service Request for Proposal Version 1.0 Date: 23 July 2014 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial

More information

Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal

Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal Data Centre Relocation, Colocation Service and Internet Service Request for Proposal Version 1.1 Date: 20 February 2014 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial

More information

Request for Proposals on Firewall Replacement

Request for Proposals on Firewall Replacement Request for Proposals on Firewall Replacement Version 1.0 Date: 07 Aug 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central, Sheung

More information

Request for Proposals on DDoS Mitigation Service

Request for Proposals on DDoS Mitigation Service Request for Proposals on DDoS Mitigation Service Version 1.1 Date: 18 September 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central,

More information

Request for Proposals on IDS/IPS System

Request for Proposals on IDS/IPS System Request for Proposals on IDS/IPS System Version 1.0 Date: 11 February 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central, Sheung

More information

Request for Proposals on Backup Service Enhancement

Request for Proposals on Backup Service Enhancement Request for Proposals on Backup Service Enhancement Version 1.1 Date: 4 Sep 2012 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan,

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Domain Name System Security Extensions (DNSSEC) Implementation Project. Request for Proposal

Domain Name System Security Extensions (DNSSEC) Implementation Project. Request for Proposal Domain Name System Security Extensions (DNSSEC) Implementation Project Request for Proposal Version 1.1 Date: 1 April 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence

hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Hong Kong, China. We can colocate standard rack-mountable servers or

More information

SERVICE SCHEDULE CO-LOCATION SERVICES

SERVICE SCHEDULE CO-LOCATION SERVICES SERVICE SCHEDULE CO-LOCATION SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

COLOCATION SERVICE SCHEDULE

COLOCATION SERVICE SCHEDULE COLOCATION SERVICE SCHEDULE 1. DEFINITIONS AND INTERPRETATION 1.1 Definitions Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Master Services Agreement:

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

COLOCATION SERVICE SCHEDULE

COLOCATION SERVICE SCHEDULE COLOCATION SERVICE SCHEDULE 1. DEFINITIONS AND INTERPRETATION 1.1 Definitions Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

Colocation Service Definition. SD008 v1.3 Issue Date 19 Feb 09

Colocation Service Definition. SD008 v1.3 Issue Date 19 Feb 09 Colocation Service Definition SD008 v1.3 Issue Date 19 Feb 09 Colocation Service Definition Service Overview InTechnology offers secure data centre environments for your business critical systems, applications

More information

Any other capitalised terms have the meanings set out in Schedule 1.

Any other capitalised terms have the meanings set out in Schedule 1. 1. SERVICE DESCRIPTION The Interoute Co-location Service will comprise of the installation and support services associated with the provision of co-location facilities at Interoute Premises. 2. DEFINITIONS

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12 Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk

Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Ykoon B.V. Kruisstraat 2 2312 BH Leiden P +31 (0) 71 513 58 58 F +31 (0) 71 513 58 56 http://www.ykoon.nl

Ykoon B.V. Kruisstraat 2 2312 BH Leiden P +31 (0) 71 513 58 58 F +31 (0) 71 513 58 56 http://www.ykoon.nl Ykoon Co-location Service Level Agreement... - 1 - ART 1. SUBJECT AND SCOPE...- 2 - ART 2. SERVICE LEVELS...- 2 - ART 3. NOTIFICATION AND LOGGING OF FAILURES...- 3 - ART 4. RESPONSE TIMES...- 4 - ART 5.

More information

Network Router Monitoring & Management Services

Network Router Monitoring & Management Services Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

DATACENTER COLOCATION. Flexible, Secure and Connected

DATACENTER COLOCATION. Flexible, Secure and Connected DATACENTER COLOCATION Flexible, Secure and Connected Flexible Solutions for Your Requirements Contents Your Goals 2 Compound and Buildings 4 Security 6 Infrastructure 8 Free Choice 10 Good Reasons 12 Our

More information

Does it state the management commitment and set out the organizational approach to managing information security?

Does it state the management commitment and set out the organizational approach to managing information security? Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Administration and Dispute Resolution of.hk Domain Names. By: Jonathan Shea CEO of HKIRC/HKDNR

Administration and Dispute Resolution of.hk Domain Names. By: Jonathan Shea CEO of HKIRC/HKDNR Administration and Dispute Resolution of.hk Domain Names By: Jonathan Shea CEO of HKIRC/HKDNR Outline Administration of the.hk Domain Name About HKIRC and HKDNR.hk Domain Name Categories Chinese Domain

More information

HealthcareBookings.com Security Set Up

HealthcareBookings.com Security Set Up HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of

More information

DATA CENTRE DATA CENTRE

DATA CENTRE DATA CENTRE DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service

More information

DATA CENTRE DATA CENTRE MAY 2015

DATA CENTRE DATA CENTRE MAY 2015 DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level

More information

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7 Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.

More information

Upgrading the PRS datacentres: space requirement. S. S. Mathur, GM-IT, CRIS

Upgrading the PRS datacentres: space requirement. S. S. Mathur, GM-IT, CRIS Upgrading the PRS datacentres: space requirement S. S. Mathur, GM-IT, CRIS PRS / UTS scenario: then and now Year 2000 PRS: 600 locations UTS: 0 locations Year 2008 PRS 1600 locations E-ticketing Passengers

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Powerful Dedicated Servers

Powerful Dedicated Servers Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,

More information

South Datacentre Studley

South Datacentre Studley South Datacentre Studley Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. With 15 years of continual operational life, the Studley

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Data Center Overview Document

Data Center Overview Document Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building

More information

Server Monitoring & Management Services

Server Monitoring & Management Services Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI

More information

Rules of Conduct and Safety

Rules of Conduct and Safety Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...

More information

Data Center Presentation

Data Center Presentation Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details

More information

112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100

112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.

More information

SOC 2 Report Seattle, WA (SEF)

SOC 2 Report Seattle, WA (SEF) SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

REQUEST FOR PROPOSALS PINE CREST DEVELOPMENT CORPORATION COLOCATION DATA CENTER OPERATOR

REQUEST FOR PROPOSALS PINE CREST DEVELOPMENT CORPORATION COLOCATION DATA CENTER OPERATOR I. INTRODUCTION REQUEST FOR PROPOSALS PINE CREST DEVELOPMENT CORPORATION COLOCATION DATA CENTER OPERATOR The Pine Crest Development Corporation, herein after referred to as Pine Crest, is in the process

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation

Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation Scalable Solutions for Shared IT Infrastructure Global competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building their own

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

CITY OF BONITA SPRINGS, FLORIDA RFP # 14-019

CITY OF BONITA SPRINGS, FLORIDA RFP # 14-019 CITY OF BONITA SPRINGS, FLORIDA RFP # 14-019 Pursuant to Florida Statutes, Chapter 287, The City of Bonita Springs hereinafter referred to as the City, will accept sealed Responses for Qualifications and

More information

Data Centre Services. JT Rue Des Pres Data Centre Facility Product Description

Data Centre Services. JT Rue Des Pres Data Centre Facility Product Description JT Rue Des Pres Data Centre Facility Product Description JT s Data Centre Hosting Service provides a secure computer room environment with protected and backup power, security and bandwidth. Data Centre

More information

MARULENG LOCAL MUNICIPALITY

MARULENG LOCAL MUNICIPALITY MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details

More information

Building tomorrow s solutions.

Building tomorrow s solutions. Building tomorrow s solutions. We manage passive infrastructure networks round the clock. from our echo centre, we keep track of your network and take remedial steps to ensure network reliability and efficiency.

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

DATAMENA COLOCATION SERVICE SCHEDULE

DATAMENA COLOCATION SERVICE SCHEDULE DATAMENA COLOCATION SERVICE SCHEDULE This Schedule is applicable to a Service Order for datamena Colocation Service(s) which has been submitted by Customer, and accepted by Supplier, in accordance with

More information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING

REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING 4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the

More information

- 1 - "Activation Date" for a Domain Name means the date on which we notify you we have approved the Domain Name registration.

- 1 - Activation Date for a Domain Name means the date on which we notify you we have approved the Domain Name registration. - 1 - Hong Kong Domain Name Registration Company Limited Domain Name Registration Agreement for.hk and 香 港 Domain Names Version 6.2 Effective 26 October 2015 Applicants applying for.hk and. 香 港 domain

More information

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Response to Queries Received for RFP of Security Integrator - Tender No. 63 Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for

More information

CSLOXINFO IDC@Exchange

CSLOXINFO IDC@Exchange CSLOXINFO IDC@Exchange IDC@Exchange - Secure and Connected Get your business protected and connected : IDC@Exchange - CSLOXINFO Internet Data Center (IDC) with direct connection to our self-managed internet

More information

High Speed Internet Deployment In the Back of the Yards Neighborhood

High Speed Internet Deployment In the Back of the Yards Neighborhood High Speed Internet Deployment In the Back of the Yards Neighborhood For Back of the Yards Neighborhood Council 1 P a g e Table of Contents 1 General Invitation to Respond... 4 2 General Terms and Conditions...

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200. Call for Quotations

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200. Call for Quotations Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200 Call for Quotations Closing Date: 7 th October 2014 at 10:00 am Date Published: 16

More information

1.1 An initial request to enter into a contractual arrangement may be initiated by either Massey University or another party (Other Party).

1.1 An initial request to enter into a contractual arrangement may be initiated by either Massey University or another party (Other Party). CONTRACT MANAGEMENT PROCEDURE Section Risk Management Contact Risk Manager Last Review February 2013 Next Review February 2016 Approval Not required Procedures Contract Initiation Request Mandatory Guidance

More information

-17 2015 OUTSOURCING POLICY

-17 2015 OUTSOURCING POLICY Outsourcing Policy TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Aim & Introduction... 3 POLICY PARAMETERS... 4 Key Terms... 4 Outsourcing Agreement Requirements... 5 MATERIAL OUTSOURCING AGREEMENTS... 6 Board

More information

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services: TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is

More information