Third party Web hosting services security Policy
|
|
|
- Archibald Hill
- 10 years ago
- Views:
Transcription
1 Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta (Government) requires the secure provision of third party Web hosting services to Government Entities. Web hosting services security requires that a third party Web hosting services provider maintains the integrity of a Government Entity s Web site through physical and logical security at the Data Centre and on the technology deployed. Should the third party Web hosting services provider use the Agent as intermediary, then the third party Web hosting services provider shall access data through the Agent s Demilitarised Zone (DMZ). Web hosting services security requires that a third party Web hosting services provider establishes and maintains its own DMZ. ii) Web hosting server technology Web hosting server technology for third party Web hosting services to a Government Entity shall be subject to the following : (i) the Web hosting server technology shall operate from a Data Centre that is physically located in Malta, that is secure and that guarantees logical information security, based on European recognised standards as specified in the Supporting Documents section of this Policy (ii) the Web hosting server technology shall be equipped for business continuity purposes, and (iii) the administration of the Web hosting Page 1
2 server technology shall require documented security procedures that shall be available for audits. iii) Network The network between the third party Web hosting services provider and the Government Entity shall be secure from unauthorised access. iv) Implementation The target population are : (i) Government Entities and (ii) third party Web hosting services providers. Implementation from a security point of view shall be backed by : (i) A Service Level Agreement, between the third party Web hosting services provider and the Government Entity, that shall comply with this Policy. (ii) A Declaration of Security Conformance, issued by the third party Web hosting services provider to the Government Entity, copied to CIMU. This Declaration shall be used as another reference for the selection of a third party Web hosting services provider. It shall be the responsibility of the third party Web hosting services provider to ensure, on an on-going basis, that services provided via an Internet services provider are subject to the Declaration of Security Conformance. (iii) Internal security audits, by the third party Web hosting services provider on its operations, for Security Conformance purposes. Records shall be maintained in the process. The third party Web hosting services provider shall carry out timely and effective follow-up action to satisfactorily close items arising in the internal security audits. The third party Web hosting services provider shall maintain records of the actions taken. (iv) Security Compliance checks, by CIMU on the third party Web hosting services provider. CIMU shall maintain records in the process. The third party Web hosting services provider shall carry out timely and effective follow-up action to satisfactorily close items arising in the external security audits. The third party Web hosting services provider shall maintain records of the actions taken. Implementation shall be within the context of: (i) CIMU P 0012:2003 Third party Web hosting services Policy (ii) MSA BS 7799 Part 2:2003 (Information security management. Specification with guidance for use), (iii) CIMU P 0016:2003 Information Security Policy (iv) Convention on Cyber Crime ETS No. 185 (signed by Government on , but still to be ratified) and (v) Laws of Malta and regulations by statutory bodies. v) Policy violations Abuse or misuse of third party Web hosting services by the Government Entity and/or the third party Web hosting services provider in terms of the Telecommunications (Regulation) Act, Electronic Commerce Act, the Data Protection Act and the Computer misuse provisions of the Criminal Code shall be treated as an offence. Page 2
3 2. Purpose The objective of this Policy is to ensure that third party Web hosting service providers provide secure third party Web hosting services to Government Entities. 3. Who should know this Policy Knowledge of this Policy should extend up and down the organisations concerned and be wide spread within them. Chief Information Management Officer (CIMO) CIMU Communications Executive Head of Government Entity Head of Third party Web hosting services provider Head of Agent Head of Internet services provider Ministry of Justice and Local Government Information Management Officers (IMOs) Head of MCA 4. Scope of applicability The provisions of this document apply to the security of third party Web hosting services provided to Government Entities by third party Web hosting services providers that (i) operate the services through the Agent or independently and (ii) host Web sites published under the gov.mt domain. 5. Definitions Agent - a trusted organisation that has the mandate by Government to provide Information and Communications services. Computer network - a network of data processing nodes that are interconnected for the purposes of data communication. Data Centre - a facility that includes personnel, hardware and software organised to provide information processing services. Declaration of Security Conformance - a documented statement issued by the third party Web hosting service provider to the Government Entity; by which the third party Web hosting service provider declares, under its sole responsibility, conformance to this Policy. In the event that the third party Web hosting services provider does not act as an Internet services provider, the Declaration of Security Conformance shall also cover the Internet services provider that provides services to the third party Web hosting services provider. The Page 3
4 Declaration shall also include the reference number of registration with the MCA. This Declaration shall be considered as separate from the Declaration of Conformance. Demilitarised Zone (DMZ) - the organisation s "neutral zone" between the organisation s computer network and the external network to prevent outside users from getting direct access to internal computer servers that have data. Outside users can only have access to the DMZ that may typically also have Internet resources that could be served to the outside world. Government Entity - a Government Ministry, Department, Local Government or Public Sector entity. Security Compliance -the process performed by CIMU or by an independent body to check that a service provided satisfies the security criteria set in a referenced document. Security Conformance - the correspondence by a service to the security criteria set in a referenced document. Third party Web hosting service - the process in which a third party services provider furnishes a Government Entity with a Web site presence. Third party Web hosting service provider - a local private organisation having a physical Web hosting presence under Maltese jurisdiction and be compliant with the applicable authorisation requirements of the MCA.. 6. Roles and responsibilities For the purpose of this Policy, the following roles and responsibilities have been identified: Role Responsibility 1. Chief Information Management Officer (CIMO) 2. CIMU Communications Executive i. To maintain this Policy. ii. To audit for security compliance. i. To publish this Policy. ii. To liaise appropriately with the Agent with regards to the publication of this Policy on the CIMU Website. 3. Head of Agent i. To establish and maintain the DMZ. Page 4
5 4. Head of Government Entity i. To direct the Government Entity according to the provisions found in this Policy. ii. To grant access to the Government Entity s Web site once the appropriate controls have been implemented and the terms for connection or access have been defined and agreed upon in a contractual agreement. 5. Head of third party Web hosting services provider i. To have a publicly declared target dates to achieve accredited certification to MSA BS 7799 Part 2:2003 for the scope of applicability of this Policy. ii. To operate Web hosting services according to the provisions of this Policy. iii. To establish and maintain its own DMZ. iv. To audit for Security Conformance. v. To conduct timely and effective follow-up action to satisfactorily close items arising in internal and external security audits. vi. To keep updated on vulnerabilities that effect the Web hosting services environment and have the latest security fixes in place. 6. Head of Internet services provider i. To operate according to the provisions of the Declaration of Security Conformance issued by the third party Web hosting services provider. 7. Supporting Documents In support of this Policy, the following Standard shall apply: 01. MSA BS 7799 Part 2:2003 Information security management. Specification with guidance for use. 8. References 01. The Telecommunications (Regulations) Act Chapter Data Protection Act Chapter Electronic Commerce Act Chapter 426 Page 5
6 04. Article 337 of the Criminal Code Chapter Code of practice for Internet Service Providers Convention on Cyber Crime ETS No Third party Web hosting services Policy 08. Information Security Policy 9. Modification history Version Date Changes Initial release Updated release 10. Maintenance and review cycle Maintenance of this Policy shall be based on a twelve month cycle. Signature and stamp Joseph R. Grima Permanent Secretary, Office of the Prime Minister Page 6
Network Resource Management Policy
Office of the Prime Minister Policy document CIMU P0036:2003 Version: 1.0 Effective date: 10.12.2003 Network Resource Management Policy 1. Policy statement i) General Information and Communications Technology
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Policy. VBA Enterprise Risk Management. Governance Unit
Policy VBA Enterprise Risk Management Governance Unit Keywords: Policy; risk; governance. ID: Version no: Status: VBAPOL-0074 2.0 Final Issue date: Date of effect: Next review date: 14/07/2015 14/07/2015
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999
BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 [Date of Assent 5 August 1999] [Operative Date 4 October 1999] ARRANGEMENT OF SECTIONS 1 Citation PART I PRELIMINARY 2 Definitions 3 Crown to be bound
Merchants and Trade - Act No 28/2001 on electronic signatures
This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26
QUO FA T A F U E R N T BERMUDA ELECTRONIC TRANSACTIONS ACT 1999 1999 : 26 TABLE OF CONTENTS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Citation Definitions Crown to be bound Objects Regulatory policy
CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION
CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION Made by the Secretary of State for the Home Department under sections 39 and 39A of the Police Act 1996 and sections 28, 28A, 73 and 73A of the
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Qualified Electronic Signatures Act (SFS 2000:832)
Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions
[Brought into force by appointed day notice on 16 th June 2003.]
[Brought into force by appointed day notice on 16 th June 2003.] AN ACT TO PROVIDE FOR THE LEGAL RECOGNITION OF ELECTRONIC WRITING, ELECTRONIC CONTRACTS, ELECTRONIC SIGNATURES AND ORIGINAL INFORMATION
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
28400 POLICY IT SECURITY MANAGEMENT
Version: 2.2 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. The objective of this policy is to provide direction and support for IT
Federal law on certification services in the area of the electronic signature
Law on the electronic signature 94.0 Notice This English translation has no official character. The only authentic texts are the German, French and Italian versions published in the Official Compendium
Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions
Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
ELECTRONIC TRANSACTIONS ACT
ELECTRONIC TRANSACTIONS ACT CHAPTER 22:05 Act 6 of 2011 Amended by *4 of 2014 *See Note on page 2 Current Authorised Pages Pages Authorised (inclusive) by L.R.O. 1 10.. 11 24.. 25 32.. L.R.O. 2 Chap. 22:05
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
Rules for Unibz It And eurac.edu
Index 1 Access...2 2 Applications...2 3 Responsibility...2 4 Personal details...2 5 Commercial Activities...2 6 Rules of use... 3 7 System security... 3 8 Safety... 3 9 Software Use... 4 9.1 Legal aspects...
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters.
Electronic Transactions and Electronic Signatures Act Act No. [ ] of [ ] An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters. ENACTED by
TRUST OR COMPANY SERVICE PROVIDER APPLICATION FOR AUTHORISATION
TRUST OR COMPANY SERVICE PROVIDER APPLICATION FOR AUTHORISATION In accordance with the CRIMINAL JUSTICE (MONEY LAUNDERING AND TERRORIST FINANCING) ACT, 2010 as amended by the Criminal Justice Act, 2013.
2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
THE ELECTRONIC TRANSACTIONS LAW,
CAYMAN ISLANDS Supplement No.2 published with Gazette No.19 dated Monday 11 th September, 2000 THE ELECTRONIC TRANSACTIONS LAW, 2000 (LAW 7 OF 2000) 2 THE ELECTRONIC TRANSACTIONS LAW, 2000 ARRANGEMENT
Information Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
Electronic Documents Law
Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or
Electronic Commerce ELECTRONIC COMMERCE ACT 2001. Act. No. 2001-07 Commencement LN. 2001/013 22.3.2001 Assent 14.3.2001
ELECTRONIC COMMERCE ACT 2001 Principal Act Act. No. Commencement LN. 2001/013 22.3.2001 Assent 14.3.2001 Amending enactments Relevant current provisions Commencement date 2001/018 Corrigendum 22.3.2001
INTRODUCTION... 3 OVERSEA COMPANIES... 9
Mdina Malta INTRODUCTION... 3 FORMATION AND REGISTRATION OF COMPANIES... 4 PRIVATE OR PUBLIC COMPANY... 4 MEMORANDUM AND ARTICLES OF ASSOCIATION... 4 WHO MAY INCORPORATE... 5 TIME REQUIRED FOR INCORPORATION...
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework
Department of the Premier and Cabinet Circular PC030 Protective Security Policy Framework February 2012 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK TABLE OF CONTENTS TABLE OF CONTENTS 2 1. PURPOSE 3 2. SCOPE
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT November 2003 Laid before the Scottish Parliament on 10th November 2003 pursuant to section 61(6) of the Freedom of Information
LAW ON ELECTRONIC TRANSACTIONS
Lao People s Democratic Republic Peace Independence Democracy Unity Prosperity National Assembly No 20/NA Vientiane Capital, Date: 7 December 2012 (Unofficial Translation) LAW ON ELECTRONIC TRANSACTIONS
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
Federal Electronic Signature Law. (Signature Law - SigG)
Federal Electronic Signature Law (Signature Law - SigG) Section l Purpose and definitions Purpose and scope 1. (1) The present federal law sets out the legal framework governing the creation and use of
State of Rhode Island and Providence Plantations DEPARTMENT OF BUSINESS REGULATION Division of Insurance 233 RICHMOND STREET PROVIDENCE, RI 02903
State of Rhode Island and Providence Plantations DEPARTMENT OF BUSINESS REGULATION Division of Insurance 233 RICHMOND STREET PROVIDENCE, RI 02903 INSURANCE REGULATION 102 PROMPT CLAIMS PROCESSING Table
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
EARLY CHILDHOOD CARE AND EDUCATION AUTHORITY ACT 2007. Government Gazette of Mauritius No. 119 of 22 December 2007. I assent ARRANGEMENT OF SECTIONS
EARLY CHILDHOOD CARE AND EDUCATION AUTHORITY ACT 2007 Act No. 21 of 2007 Proclaimed by [Proclamation No. 6 of 2008] w.e.f. 16 th June 2008 Government Gazette of Mauritius No. 119 of 22 December 2007 I
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
ANNEXURE - I MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1
MPD/EPC/TIC/201-15 NR logo web application development dated: 20.03.2014 Page 1 PREFACE The Rubber Board a statutory Body under the Ministry of Commerce & Industry, Govt. of India, for the development
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
The lawful monitoring and recording of communications conveyed on the Thames Valley Police telecommunications systems.
Title Lawful Business Practice (Interception of Communications) Regulations CCMT Sponsor Deputy Chief Constable Department/Area Professional Standards Section/Sector Headquarters 1.0 Rationale This policy
GUIDELINES FOR THE ADMINISTRATION OF INSURANCE AGENTS - 2010
GUIDELINES FOR THE ADMINISTRATION OF INSURANCE AGENTS - 2010 PART I - PRELIMINARY Purpose and Authorisation 1. These Guidelines are intended to provide the framework and procedure for the licencing and
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
TITLE 5.1 AND TITLE 5.2 FLAG STATE INSPECTION AND CERTIFICATION AND PORT STATE INSPECTION
SECTION 9 TITLE 5.1 AND TITLE 5.2 FLAG STATE INSPECTION AND CERTIFICATION AND PORT STATE INSPECTION Introduction 10.1 This section seeks your views on the Maritime and Coastguard Agency s proposals for
APPLICATION FOR AFFILIATION TO THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) (DIRECTIVE 1)
APPLICATION FOR AFFILIATION TO THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF) (DIRECTIVE 1) February 2013 Please print and complete the present document fully in printing characters, tick
1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Identity Cards Act 2006
Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
GENERAL TERMS AND CONDITIONS OF BUSINESS ADDITIONAL CONDITIONS FOR INTERNET SERVICES
I. GENERAL 1 Area of Applicability (1) VSX - VOGEL SOFTWARE GmbH (called VSX in the following) specialises in pump construction software and develops and distributes applications for the construction and
Code of Professional Conduct for Accredited Suppliers of Monitored Medical Alarms
Code of Professional Conduct for Accredited Suppliers of Monitored Medical Alarms This Code of Conduct (the Code) applies to all Ministry of Social Development (MSD) accredited suppliers of monitored medical
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.
INFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
www.psa.gov.ie Contents
Contents 1. Introduction 2 2. Licensing the Private Security Industry 3 3. Sectoral Rollout of Licences 3 4. Licence Fees 4 5. The Licence Application Process 4 6. Refusal of Application for a Licence
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Definition of Service Supplier and Related Requirements
Annex 5 Definition of Service Supplier and Related Requirements 1. Pursuant to the Mainland and Hong Kong Closer Economic Partnership Arrangement (hereinafter referred to as the CEPA ), the Mainland and
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
4. Laying of orders and regulations before Houses of Oireachtas.
Number 27 of 2000 ELECTRONIC COMMERCE ACT, 2000 ARRANGEMENT OF SECTIONS PART 1 Preliminary and General Section 1. Short title and commencement. 2. Interpretation. 3. Regulations. 4. Laying of orders and
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
FINANCIAL INTELLIGENCE UNIT MINISTRY OF FINANCE AND THE ECONOMY
GOVERNMENT OF THE REPUBLIC OF TRINIDAD AND TOBAGO FINANCIAL INTELLIGENCE UNIT MINISTRY OF FINANCE AND THE ECONOMY GUIDANCE NOTE AML/CFT PROCEDURES FOR POLITICALLY EXPOSED PERSONS PURPOSE AND CONTENTS The
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
IT Heath Check Scoping guidance ALPHA DRAFT
IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD 1. PURPOSE & SCOPE: The purpose of security initiative is to enlist the procedures and guidelines, which are
PARLIAMENT OF THE DEMOCRATIC SOCIALIST REPUBLIC OF SRI LANKA
PARLIAMENT OF THE DEMOCRATIC SOCIALIST REPUBLIC OF SRI LANKA ELECTRONIC TRANSACTIONS ACT, No. 19 OF 2006 [Certified on 19th May, 2006] Printed on the Order of Government Published as a Supplement to Part
ESKISP6056.01 Direct security testing
Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being
DVLA ELISE GSi Closed User Group Code of Connection
DVLA ELISE GSi Closed User Group Code of Connection Security Warning Notice The following handling instructions apply to this document: - Handle, use and transmit with care - Take basic precautions against
