Data Centre Colocation Service. Request for Proposal
|
|
|
- Elijah Jefferson
- 10 years ago
- Views:
Transcription
1 Data Centre Colocation Service Request for Proposal Version 1.5 Date: 8 May 2009 Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong. Tel.: Fax: [email protected] Website: 1
2 Table of Contents 1. Summary Definitions About HKIRC Information Security Background of the Project Background Scope of Service Server Colocation Service Implementation Services Information Security Service Acceptance Contractual Consideration Limitation of Liability and Indemnity Project Schedule Payment Schedule Elements of a Strong Proposal Service agreement negotiation and signature HKIRC Contacts...13 Appendix A HKDNR Information Security Policy and Guidelines: An Extract Relevant to Outsourcing...14 Appendix B HKIRC Proposal Requirements Proposal Deadline Proposal Content Cover Page Executive Summary Conflict of Interest Declaration Company Background Facilities standard and management practice related to colocation service Proposed Costs of Service Implementation Time Table Support Arrangement and Services Commercial and Payment Terms
3 1. Summary HKIRC is going to commission an external Service Provider to provide Data Centre Colocation Service for the Company. The service shall provide four 42U rack space, power for all racks and environment, security protection as well as remote hand support for server support. It shall also include all services required for the implementation of the Project. The period of the contract will be 24 months. 2. Definitions The following terms are defined as in this section unless otherwise specified. The Contractor means the company delivering the Project. HKIRC means Hong Kong Internet Registration Corporation Limited. HKDNR means Hong Kong Domain Name Registration Company Limited, a wholly-owned subsidiary of HKIRC, the company requesting the proposal for the Project. The Project means the Data Centre Colocation project with requirements stipulated in Section 5 of this document, the Background of the Project. remote hand means physical access to and operation of the equipment on the rack by qualified technical personnel of the Contractor under the direction of HKIRC s technical staff. RFP means this Request for Proposal 3. About HKIRC Hong Kong Internet Registration Corporation Limited (HKIRC) is a non-profit-making and non-statutory corporation responsible for the administration of Internet domain names under '.hk' country-code top level domain. HKIRC provides registration services through its wholly-owned subsidiary, Hong Kong Domain Name Registration Company Limited (HKDNR), for domain names ending with '.com.hk', '.org.hk', '.gov.hk', '.edu.hk', '.net.hk', '.idv.hk', '. 公 司.hk', '. 組 織.hk', '. 政 府.hk', '. 教 育.hk', '. 網 絡.hk', '. 個 人.hk' and '.hk'. 3
4 HKIRC endeavours to be: Cost-conscious but not profit-orientated Customer-orientated Non-discriminatory Efficient and effective Proactive and forward-looking More information about HKIRC can be found at 4. Information Security The company submitting the proposal ( the company ) shall acknowledge and agree that, if the company is selected as the Contractor, it shall be bounded by our Non-Disclosure Agreement (NDA) and Information Security Policy (highlights of the policies are illustrated in Appendix A). The company shall also comply with the obligations under the Personal Data (Privacy) Ordinance and any other obligations in relation to personal data. The company shall be provided with a set of NDA and Information Security Compliance Statement after HKIRC received the company s Express-of-Interest before the stipulated time. The NDA and the Information Security Compliance Statement shall be signed and returned to HKIRC attached with documents required by the Compliance Statement before the scheduled deadline. HKIRC will only consider proposals from companies which have signed both the NDA and the Information Security Compliance Statement. The proposal should be marked RESTRICTED at the centre-top of each page in black color. It must be encrypted if transmitted electronically. Each proposal will be reviewed under the terms of non-disclosure by the HKIRC s staff and Board of Directors of HKIRC. 4
5 5. Background of the Project 5.1. Background Currently, all our production servers are co-located in a hosting service provider s data centre. Current equipment occupies four 42U Racks. The hosting service provider is responsible for providing power conditioning (main and UPS), environmental control/protection (fire, flood, temperature, humidity etc.), and security and access control. In addition, the service provider also provides remote hand to physically access the servers if needed Scope of Service The following defines the scope of service to be provided by the Contractor: Server Colocation Service 1. Server Racks Requirements a. The Contractor shall provide four 42U racks, 600mm wide and at least 950mm in depth. b. All racks should be located on the same row, next to each other. If for any reason they need to be located in different rows, no less then two racks should be located on the same row next to each other. c. In case where racks are located in different rows, the Contractor shall provide capacity for inter-rack networking d. All racks shall have lockable perforated doors at the back and the front e. Partition shelves should be available if required f. Cabling to each rack should either be fed through using either under floor (in a raised floor facility) or ceiling cable tray or trunking g. Power & data cabling should be in separate tray or trunking 2. Power Supply Requirements a. Duel power feed is required for each rack. b. Each power feed should not come from the same phase c. Each power feed should be fed from independent breaker d. Each power feed should provide at least twenty 13A sockets e. All power feed must be protected from brownout, spike & surge by 5
6 Uninterrupted Power Supply, with capacity to supply stable power up to 30 minutes after power failure f. The Data Centre power should be backed up by a Power Generator, which should be in service within 30 minutes of any power failure. g. Power Generator should have fuel supply for at least 7-day continuous operation. h. The Contractor shall supply three racks with at least 1.5KVA and one rack with 3KVA 3. Environmental Control/Protection:- a. The Data Centre facility shall be protected by gas based fire suppression system with pre-active dry pipe water fire suppression system. b. Fire detection system shall be in place. E.g. smoke and/or heat detector c. Water leakage detection system shall be in place to detect possible water damage due to leakage or flooding d. Temperature, humidity and static control shall be in place. Temperature shall be kept between 15 and 20 degree Celsius. Humidity shall be between 40% and 60% to avoid static electricity. Anti-static flooring should be used to prevent excess static build up. e. Air Conditioning system should provide 24x7 cooling and humidity control with redundancy in case of break down. 4. Security and Access Control a. 24-hour Security monitoring shall be in place. CCTV monitoring and recording on common access area and entrances should be provided. All access doors of entrances shall have a security lock with access control system to record and control access. b. All entries and accesses to the Data Centre shall be logged and can be reviewed by HKIRC c. All equipment delivery and removal from the Data Centre shall be recorded d. Data Centre shall provide Access Control only allowing authorized person to access secured areas. 5. Network and Communication Facilities a. The facility should provide easy access for any major telecom company to provide data communication infrastructure for HKIRC 6
7 b. Shareable Internet access shall be provided by the facility. 100Mb/s sharable bandwidth should be provided within the facility and 10Mb/s bandwidth for local access (within Hong Kong, preferable with HKIX connection) and 5Mb/s bandwidth for International. Optional temporary expandable bandwidth for International access is desirable. c. The Contractor s network infrastructure shall have process, procedure and capacity to mitigate Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks originated outside of the facility. Suitable technology/technique, e.g. Routing blackhole should be pre-configured and employed to limit or stop such attack. In case of such attack targeting HKIRC/HKDNR, the Contractor shall be able to provide temporary burstable bandwidth to cater for such attack, should it be required. d. The Contractor shall be able to provide and manage multi-home, WAN access e.g. router with BGP and AS Number with different telecom supplier. e. Network performance reports/tools shall be available for monitoring the shared network. f. Data Centre shall provide a direct fax/data line access to the racks. 6. Miscellaneous a. The facility shall provide on site remote hand for physical access to the HKIRC equipment, eg. Power cycle equipment, remove/insert CD or other media, report on status of equipment (warning lights & status light), report on physical state of equipment etc. b. The Contractor shall have proven process and procedure for tracking issues and requests from HKIRC. c. Location of the Data Centre facility should be easily accessible by public transports and should not be located near HKIRC office, ideally in the Kowloon area. d. The Contractor shall be subject to HKIRC Security Audit as and when required by HKIRC or HKIRC external auditor. 7. Service Levels The Contractor shall guarantee the following service levels in addition to the above Technical Requirements: a. Data Centre uptime of 99.98% per year. A service is deemed failed if any of the following conditions is not met: 7
8 Power: Nominal Out Voltage 230V with less then 5% distortion at full load. Frequency for 50 Hz nominal +/- 3Hz Network: Internal network within datacenter, response time <3ms to any IP within datacentre. Ping time to local network (HKIX) <50ms. Cooling and humidity control: Temperature should be kept within 15 to 20 degree Celsius. Humidity shall be between 40% and 60%. b. A penalty of at least one month service charge will be imposed if the above uptime is not met. c. 24x7 round the clock on-site NOC support and monitoring are required. d. For any security breaches like break-in to data centre, racks, un-authorized access or vandalisation to HKDNR equipment etc, the customer should be notified within 15 minutes according to the escalation list provided by HKIRC. e. Incident reports for all reported incidents shall be available within 48 hour from the report of incident f. All schedule maintenance period shall be pre-notified by at least 10 days, and for major service interruption at least 4 week notice is needed. 8. Relocation Services (Optional) a. In case where HKIRC is going to relocate to a new Data Centre, the new service provider shall provide an optional relocation service including: i. Physical relocation of existing HKIRC s infrastructure to the new data centre ii. Re-racking of all HKIRC s infrastructure to new racks iii. Relocation of HKIRC s multi-home WAN networks iv. Re-cabling of HKIRC s infrastructure b. Detail information on relocation requirement will be given after the signing of NDA Implementation Services The professional services for this Project should cover the following: Basic hardware and network setup 8
9 Documentation for the processes and procedures like NOC Support procedures, Incident Report procedures, Incident Handling Process etc Information Security The Contractor shall follow HKDNR Information Security Policy and Guidelines set out by HKDNR on personal and co-operation data security. Contractor s Information Security Policy is subject to HKIRC review if needed Service Acceptance The overall project acceptance can be broken down into acceptances at various levels:- 1. Delivery, setup of racks 2. Services provided like optional relocation services 3. Functionality of the integrated system like networks, NOC operation 4. Performance of monitoring system & reporting system 5. Quality of service provided Under this acceptance framework, the vendor should fulfill the scope of services described in section In addition, interested vendors may provide additional acceptance criteria and the related plan in detail in their proposals Contractual Consideration Although the contract period is 24 month, HKIRC will start the new contract re-tendering process at month 21. In case the re-tendering process did not complete at the end of the current contract, HKIRC reserves the right to extend the current contracts for another 3 months, with the same terms and conditions. Also, if for any reason the contract is to be terminated before the completion of the contract period, the initiating party should give a 3-month notice in advance of the early termination date. 6. Limitation of Liability and Indemnity The company submitting the proposal agrees that if the company becomes the 9
10 Contractor of the Project, it shall indemnify HKIRC and HKDNR against any claim, demand, loss, damage, cost, expense or liability which the company may suffer from. 10
11 7. Project Schedule Project schedule Tasks To be Completed by Remark 1 Publish RFP 8/5/ Express of interest 15/5/2009 Sign NDA and InfoSec 3 Compliance Statement with all 29/5/2009 interested vendors Deadline for vendors to submit 29/5/2009, 4 proposal and quotation 5:30pm 5 Selection of vendor by panel 19/6/2009 Conclude final decision and 6 appoint the vendor 2/7/2009 Prepare service agreement 7 contract 4/7/2009 Sign service agreement 8 contract with the appointed 9/7/2009 vendor 9 Service implementation 8/8/2009 If relocation needed Service commencement 9/7/ /8/2009 If relocation needed 8. Payment Schedule The following payment schedule is recommended but interested vendors may propose their own in their proposals. Milestone/Acceptance Expected Payment duration 1 (a) Completion of Service Implementation 4 weeks One time setup charge 11
12 2 (a) Start of Colocation Service 24 month Monthly charge TOTAL 24 month & 4 weeks 100% 9. Elements of a Strong Proposal All submitted proposal must following the format as stated in Appendix B - HKIRC Proposal Requirements. Successful vendor is the one who submitted a clearly worded proposal that shows the following attributes: a persuasive section on the company background international recognize certification for IT facility management & IT Security Management a strong and flexible product meeting HKIRC requirements with minimum customization high level of interaction between HKIRC and the vendor excellent fit with the capabilities and facilities of HKIRC strong company and project management team Proposals are evaluated based on major criteria as follows (the percentages given are the weighting) Company Background (10%) Quality of facilities (30%) Facility management competency (20%) Understanding of our requirements (10%) Knowledge and advices on projects (10%) Proposed cost of the project and its flexibility (20%) 10. Service agreement negotiation and signature The service agreement will be drawn up between the selected vendor and HKDNR, the wholly-owned subsidiary of HKIRC. HKIRC welcomes the vendor s proposal on a suitable service agreement for the project. The service agreement must be signed by both parties within three weeks from the project award date. If the agreement is not signed within the said period, HKIRC will 12
13 start the negotiation with the next qualified vendor on the selection list. 11. HKIRC Contacts HKIRC Contacts information Contacts Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong telephone fax If you are not sure about the appropriate person to call, the receptionist can help you. IT Manager Ben Lee Project Manager Benjamin Choy CEO Jonathan Shea
14 Appendix A HKDNR Information Security Policy and Guidelines: An Extract Relevant to Outsourcing This document provides an extract of the HKDNR Information Security Policy and Guidelines with the purposes of (a) introducing various measures and controls to be executed by HKDNR regarding outsourcing and (b) setting the expectation of any potential contractors that their participation and conformance in these measures and controls are essential contractual obligations. The original Policy and Guidelines applies to HKDNR s employees, contractors and third party users. However, a potential contractor may interpret the clauses up to their roles and responsibilities only. Nonetheless, the keyword contractors hereby refers to all relevant staff members of the contractor and those of any other subcontractors under the contractor s purview. Herein, HKDNR would also set the expectation of any potential contractors that upon their express-of-interest to the project, they shall be required in the subsequent stages (a) to sign off a non-disclosure agreement (NDA) on all information to be provided and (b) to sign off a Compliance Statement where compliance requirements are specified in more details. (A) Extract from the HKDNR Information Security Policy In the following, the organization means Hong Kong Domain Name Registration Company Limited, the company requesting the proposal for the Project. 8. Human resources security 8.1 Security objective: To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities Security roles and responsibilities of employees, contractors and third party users shall be defined and documented in accordance with the organization s information security policy Background verification checks on all candidates for employment, contractors, 14
15 and third party users shall be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks As part of their contractual obligations, employees, contractors and third party users shall agree and sign the terms and conditions of their employment contract, which shall state their and the organization s responsibilities for information security. 8.2 During employment Security objective: To ensure that all employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error Management shall require employees, contractors and third party users to apply security measures in accordance with established policies and procedures of the organization All employees of the organization and, where relevant, contractors and third party users shall receive appropriate awareness training and regular updates on organizational policies and procedures, as relevant to their job functions. 8.3 Termination or change of employment Security objective: To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner All employees, contractors and third party users shall return all of the organization s assets in their possession upon termination of their employment, contract or agreement The access rights of all employees, contractors and third party users to information and information processing facilities shall either be removed upon termination of their employment, contract or agreement, or adjusted upon change. 12. Information systems acquisition, development and maintenance Outsourced software development shall be supervised and monitored by the organization 15
16 13. Information security incident management 13.1 Reporting information security events and weaknesses Security objective: To ensure information security events and weaknesses associated with information systems are communicated in a manner allowing timely corrective action All employees, contractors and third party users of information systems and services shall be required to note and report any observed or suspected security weaknesses in systems or services. (B) Extract from the HKDNR Information Security Guidelines 6. ORGANIZING INFORMATION SECURITY 6.2 EXTERNAL PARTIES Identification of Risks Related to External Parties The risks to the organization s information and information processing facilities from business processes involving external parties should be identified and appropriate controls implemented before granting the access Addressing Security in Third Party Agreements Agreements with third parties involving accessing, processing, communicating or managing the organization s information or information processing facilities, or adding products or services to information processing facilities should cover all relevant security requirements. 7. ASSET MANAGMENT Acceptable Use of Assets Rules for the acceptable use of information and assets associated with information processing facilities shall be identified, documented, and implemented. 8. HUMAN RESOURCE SECURITY Roles and Responsibilities Security roles and responsibilities of employees, contractors and third party users shall be defined and documented in accordance with the organization s information security policy Screening Background verification checks on all candidates for employment, contractors, and 16
17 third party users shall be conducted in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks Terms and Conditions of Employment As part of their contractual obligation, employees, contractors and third party users shall agree and sign the terms and conditions of their employment contract, which shall state their and the organization s responsibilities for information security Management Responsibilities Management shall require employees, contractors and third party users to apply security measures in accordance with established policies and procedures of the organization. 12. Information systems acquisition, development and maintenance Outsourced Software Development Outsourced software development shall be supervised and monitored by the organization. 17
18 Appendix B HKIRC Proposal Requirements 1.1 Proposal Deadline All proposals must reach HKIRC as stated in Section 7, Project Schedule, item no Proposal Content The proposal should contain the following: Cover Page Executive Summary Conflict of Interest Declaration Company Background o o o o o o Financial Situation Track Records Organization and management team Project team with credentials Company credentials Staff credentials Facilities standard and management practice related to colocation service Knowledge and Advices on Projects o o o Understanding of our requirements Colocation experience Certification in the future Deliverable Services & Facilities Proposed Cost of Services and Payment Schedule Implementation Time Table Support Arrangement and Services Commercial and Payment Terms. e.g. Compensation for delay. 18
19 Proposal requirements Submission deadline Delivery address Hard copies Please refer to Section 7 - Project Schedule, item no. 4 for the proposal submission deadline. Hong Kong Internet Registration Corporation Limited Unit , 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan, Hong Kong 2 copies of the full proposal are required. Electronic copy Electronic copy, if available, on disk or by to [email protected] and [email protected] ; also cc [email protected] and [email protected]. This is not a substitute for the physical copies mentioned above. Proposal format Specified in this document Page count 30 pages or fewer. Stapled. Do not bind. Font Electronically published or typed. Times New Roman 12 point font. 1.3 Cover Page Prepare a non-confidential cover page with the following information in the order given. Cover Page Project Title Data Centre Colocation Service project Project Manager Name: Title: Mailing address: Phone: 19
20 Fax: Company Contact person: Title: Company name: Mailing address: Phone: Fax: Website: 1.4 Executive Summary The executive summary provides a brief synopsis of the commercial and technical solution the vendor proposed for the project. This summary must be non-confidential. It should fit on a single page. The executive summary should be constructed to reflect the merits of the proposal and its feasibility. It should also clearly specify the project s goals and resource requirements. It should include: Rationale for pursuing the project, the technology needed and the present state of the relevant technology. Brief description of the vendor s financial situation. Brief description of the vendor s facilities and experience on colocation services 1.5 Conflict of Interest Declaration Declare any conflict of interest in relation to the Data Centre Colocation Service project and the.hk cctld registry HKIRC. 1.6 Company Background The vendor must describe its company background. Major activities, financial situation, organizational structure, management team and achievements in software development or service outsourcing of the company should be elaborated. Tracked records are preferred. 20
21 1.7 Facilities standard and management practice related to colocation service The vendor should describe the company s strengths in colocation facilities management and how they will be applied to the project. Track records are preferred. List the key technical and management personnel in the proposal. Provide a summary of the qualifications and role of each key member. 1.8 Proposed Costs of Service Such costs include: Fixed setup cost Labour unit costs for additional requirements. They are typically quoted in unit man day. Quoted in normal working hour, non-working hour and in emergency. Equipment that is permanently placed or purchased for HKIRC, if any. Subsequent support or maintenance service. Other direct costs including services, materials, supplies, postage, etc. 1.9 Implementation Time Table The vendor should present in this section the implementation schedule of the project. The schedule should be realistic and achievable by the vendor Support Arrangement and Services The vendor must provide support to the database and storage system enhancement project with respect to the preparation, implementation, monitoring and review of the new framework. The vendor must describe the support arrangement and services. E.g. availability, local/remote, time to on/off site support, etc Commercial and Payment Terms The vendor should describe the commercial and payment terms of the services e.g. compensation for the delay of the project. 21
Request for Proposals on Security Audit Services
Request for Proposals on Security Audit Services Version 1.0 Date: 16 December 2011 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung
Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal
Data Centre Relocation, Colocation Service and Internet Service Request for Proposal Version 1.0 Date: 23 July 2014 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial
Data Centre Relocation, Colocation Service and Internet Service. Request for Proposal
Data Centre Relocation, Colocation Service and Internet Service Request for Proposal Version 1.1 Date: 20 February 2014 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial
Request for Proposals on Firewall Replacement
Request for Proposals on Firewall Replacement Version 1.0 Date: 07 Aug 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central, Sheung
Request for Proposals on DDoS Mitigation Service
Request for Proposals on DDoS Mitigation Service Version 1.1 Date: 18 September 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central,
Request for Proposals on IDS/IPS System
Request for Proposals on IDS/IPS System Version 1.0 Date: 11 February 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial Centre, 308 Des Voeux Road Central, Sheung
Request for Proposals on Backup Service Enhancement
Request for Proposals on Backup Service Enhancement Version 1.1 Date: 4 Sep 2012 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F ING Tower, 308 Des Voeux Road Central, Sheung Wan,
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Domain Name System Security Extensions (DNSSEC) Implementation Project. Request for Proposal
Domain Name System Security Extensions (DNSSEC) Implementation Project Request for Proposal Version 1.1 Date: 1 April 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Hong Kong, China. We can colocate standard rack-mountable servers or
SERVICE SCHEDULE CO-LOCATION SERVICES
SERVICE SCHEDULE CO-LOCATION SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
COLOCATION SERVICE SCHEDULE
COLOCATION SERVICE SCHEDULE 1. DEFINITIONS AND INTERPRETATION 1.1 Definitions Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Master Services Agreement:
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
COLOCATION SERVICE SCHEDULE
COLOCATION SERVICE SCHEDULE 1. DEFINITIONS AND INTERPRETATION 1.1 Definitions Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:
Colocation Service Definition. SD008 v1.3 Issue Date 19 Feb 09
Colocation Service Definition SD008 v1.3 Issue Date 19 Feb 09 Colocation Service Definition Service Overview InTechnology offers secure data centre environments for your business critical systems, applications
Any other capitalised terms have the meanings set out in Schedule 1.
1. SERVICE DESCRIPTION The Interoute Co-location Service will comprise of the installation and support services associated with the provision of co-location facilities at Interoute Premises. 2. DEFINITIONS
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12
Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk
Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Ykoon B.V. Kruisstraat 2 2312 BH Leiden P +31 (0) 71 513 58 58 F +31 (0) 71 513 58 56 http://www.ykoon.nl
Ykoon Co-location Service Level Agreement... - 1 - ART 1. SUBJECT AND SCOPE...- 2 - ART 2. SERVICE LEVELS...- 2 - ART 3. NOTIFICATION AND LOGGING OF FAILURES...- 3 - ART 4. RESPONSE TIMES...- 4 - ART 5.
Network Router Monitoring & Management Services
Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
DATACENTER COLOCATION. Flexible, Secure and Connected
DATACENTER COLOCATION Flexible, Secure and Connected Flexible Solutions for Your Requirements Contents Your Goals 2 Compound and Buildings 4 Security 6 Infrastructure 8 Free Choice 10 Good Reasons 12 Our
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Administration and Dispute Resolution of.hk Domain Names. By: Jonathan Shea CEO of HKIRC/HKDNR
Administration and Dispute Resolution of.hk Domain Names By: Jonathan Shea CEO of HKIRC/HKDNR Outline Administration of the.hk Domain Name About HKIRC and HKDNR.hk Domain Name Categories Chinese Domain
HealthcareBookings.com Security Set Up
HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of
DATA CENTRE DATA CENTRE
DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
Upgrading the PRS datacentres: space requirement. S. S. Mathur, GM-IT, CRIS
Upgrading the PRS datacentres: space requirement S. S. Mathur, GM-IT, CRIS PRS / UTS scenario: then and now Year 2000 PRS: 600 locations UTS: 0 locations Year 2008 PRS 1600 locations E-ticketing Passengers
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Powerful Dedicated Servers
Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,
South Datacentre Studley
South Datacentre Studley Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. With 15 years of continual operational life, the Studley
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Data Center Overview Document
Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building
Server Monitoring & Management Services
Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI
Rules of Conduct and Safety
Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...
Data Center Presentation
Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.
SOC 2 Report Seattle, WA (SEF)
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
REQUEST FOR PROPOSALS PINE CREST DEVELOPMENT CORPORATION COLOCATION DATA CENTER OPERATOR
I. INTRODUCTION REQUEST FOR PROPOSALS PINE CREST DEVELOPMENT CORPORATION COLOCATION DATA CENTER OPERATOR The Pine Crest Development Corporation, herein after referred to as Pine Crest, is in the process
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for Shared IT Infrastructure Global competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building their own
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.
We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
CITY OF BONITA SPRINGS, FLORIDA RFP # 14-019
CITY OF BONITA SPRINGS, FLORIDA RFP # 14-019 Pursuant to Florida Statutes, Chapter 287, The City of Bonita Springs hereinafter referred to as the City, will accept sealed Responses for Qualifications and
Data Centre Services. JT Rue Des Pres Data Centre Facility Product Description
JT Rue Des Pres Data Centre Facility Product Description JT s Data Centre Hosting Service provides a secure computer room environment with protected and backup power, security and bandwidth. Data Centre
MARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
Building tomorrow s solutions.
Building tomorrow s solutions. We manage passive infrastructure networks round the clock. from our echo centre, we keep track of your network and take remedial steps to ensure network reliability and efficiency.
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
DATAMENA COLOCATION SERVICE SCHEDULE
DATAMENA COLOCATION SERVICE SCHEDULE This Schedule is applicable to a Service Order for datamena Colocation Service(s) which has been submitted by Customer, and accepted by Supplier, in accordance with
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING
4887 EOI REQUEST FOR EXPRESSIONS OF INTEREST 4887 EOI NETWORK BACKUP/EMAIL ARCHIVING Expressions of Interest will be received at the Information Counter, Main Floor, Richmond City Hall, addressed to the
- 1 - "Activation Date" for a Domain Name means the date on which we notify you we have approved the Domain Name registration.
- 1 - Hong Kong Domain Name Registration Company Limited Domain Name Registration Agreement for.hk and 香 港 Domain Names Version 6.2 Effective 26 October 2015 Applicants applying for.hk and. 香 港 domain
Response to Queries Received for RFP of Security Integrator - Tender No. 63
Sr.N RFP Clause Original Query Reply/Remark o. 1. Perform Incident Management with respect to the following: For Forensic Analysis of logs Please clarify the systems/devices Contain attacks through for
CSLOXINFO IDC@Exchange
CSLOXINFO IDC@Exchange IDC@Exchange - Secure and Connected Get your business protected and connected : IDC@Exchange - CSLOXINFO Internet Data Center (IDC) with direct connection to our self-managed internet
High Speed Internet Deployment In the Back of the Yards Neighborhood
High Speed Internet Deployment In the Back of the Yards Neighborhood For Back of the Yards Neighborhood Council 1 P a g e Table of Contents 1 General Invitation to Respond... 4 2 General Terms and Conditions...
SERVICE SCHEDULE PUBLIC CLOUD SERVICES
SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract
Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200. Call for Quotations
Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) 21220619 Fax: (356) 22955200 Call for Quotations Closing Date: 7 th October 2014 at 10:00 am Date Published: 16
1.1 An initial request to enter into a contractual arrangement may be initiated by either Massey University or another party (Other Party).
CONTRACT MANAGEMENT PROCEDURE Section Risk Management Contact Risk Manager Last Review February 2013 Next Review February 2016 Approval Not required Procedures Contract Initiation Request Mandatory Guidance
-17 2015 OUTSOURCING POLICY
Outsourcing Policy TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Aim & Introduction... 3 POLICY PARAMETERS... 4 Key Terms... 4 Outsourcing Agreement Requirements... 5 MATERIAL OUTSOURCING AGREEMENTS... 6 Board
III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:
TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is
