CFT Provision of a common data transmission system. Questions/Responses
|
|
|
- Priscilla Agatha Goodwin
- 10 years ago
- Views:
Transcription
1 CFT Provision of a common data transmission system Questions/Responses 20 November Assumption 9: There shall be an agreed upon set of security rules and procedures for background investigations of persons administering the CTS. We are struggling to understand this requirement and how it relates to system functionality. Can some clarity be provided? 2 Article 4, point 4, 5 and 6, along with several others further on in the document, suggest rules and enforcement of a common format, metadata, schemas, etc.. However, Article 3, assumption 7, and Article suggest that the data will be encrypted outside the system and therefore any access to the data (or its format), by the system for the purposes of validation, would not be possible. Please clarify. 3 Further to the above, the implications of the data files being encrypted and decrypted outside of the system by the sender and recipient are: 1. The system will be unable to validate any files/data (other than nonencrypted information, such as potentially the metadata). 2. Since the system cannot read the data This assumption relates to internal administrative policies and procedures rather than the system functionality. It can instead be viewed as a non-system requirement with respect to the security procedures in relation to personnel that could impact the successful operation of the system. The financial and other personal information exchanged will need to be encrypted prior to entry into the system, and will be decrypted after exiting the system. The system will therefore only be able to validate that the data has been prepared correctly (e.g. meeting the size limits, encrypted and with the correct meta-data). There will also be agreed upon common formats for the encrypted data. The system will not be able to validate this. It will be validated by the receiving jurisdiction with any resulting feedback sent through the system to the sender. The encrypted data will have to be wrapped into messages, the structure of which is not yet defined (e.g. the metadata with information on the sender and the recipient); the structure of other messages also will also have to be defined (e.g. feedback from the recipient to the sender, the notifications are after successful transmissions and logging possible errors). The detailed specification for these protocols should be included as part of the CTS Design (sub-task 2.1). You are correct. These will be part of the requirements for the sender, prior to using the system to transmit the data. As set out in the Call for Tenders, additional suggestions may be proposed in addition to providing a proposal that meets the requirements as specified. These may or may not be deemed relevant during the selection process.
2 in the files, the system would be unable to split a single consolidated file representing all of a sender s data into many files, each of which represent a single recipient. The implications of this are that the data must be uploaded in files that are at the level of granularity of the recipient i.e. one file per onward jurisdiction so that the file download can be achieved without the system needing to access the data. 4 Article 5.1.6: in combination with the assumption that the system cannot read the data file as it has been encrypted outside the system, this requirement would result in the sender having to do the following for each destination/recipient: 1. Prepare data in the correct format that is for a single recipient/jurisdiction 2. Encrypt the data using the recipients public key 3. Upload the encrypted file to the CTS This puts complexity on the sender s systems. Can it be confirmed that this has been considered and this is indeed the correct model? 5 Has the notification of file and record-level errors been considered? Some could potentially be generated by the CTS, whilst others would need to be generated by the recipient (i.e. relating to any data that is contained within the data file). How would these be channelled through the system? There appear to be no specific requirements around this. 6 Can you confirm that it is envisaged that the supplier would host the system? E.g. Article says the data should be encrypted and that the Supplier should not have access to the data. If the Supplier is expected to host the system, what are the requirements around this hosting? 7 We are concerned that there is much complexity that will become apparent as You are correct. These will be part of the requirements for the sender, prior to using the system to transmit the data. The encrypted data will have to be wrapped into messages, the structure of which is not yet defined (e.g. the metadata with information on the sender and the recipient); the structure of other messages also will also have to be defined (e.g. feedback from the recipient to the sender, the notifications are after successful transmissions and logging possible errors). The detailed specification for these protocols should be included as part of the CTS Design (sub-task 2.1). This is contained in Article 4.6. A standard schema and file preparation rules will be agreed for the provision of feedback. This schema would also be exchanged through the system. The Supplier will indeed host the encrypted data during the retention period (see Article 5.2/15). In Task 2 of the Terms of Reference in Part II of the Call for Tenders, Tenderers must also include the details of where, if applicable, the physical database would be located. This includes any options in relation to the location of the database and the implications of those options, including in relation to cost. As set out in section 6.2 of Part II of the Call for Tenders, the development and testing of
3 requirements are elaborated. 8 We understand that cloud infrastructure is required in the CFT? Could you confirm that point? 9 Is there any restriction for the localization of cloud infrastructure and data (even nonpermanent)? for example (Amzon Services is an authorized cloud partner?) 10 What is the nature of the Pilot referenced in Sub-Task 2.3, including expected duration and scope of participants? 11 Who are the users referenced in Sub-Task 2.3 with regard to User Training and Support Services? the system, prior to users accessing the system, is expected to take place between May 2016 and December The CTS Design (sub-task 2.1) phase will be critical to the success of the project, as it will set out the detailed functional vision as well as the technical architecture. The way this phase is managed by the Supplier, in conjunction with the project governance (as decisions and prioritisations will have to be made) is therefore of utmost importance. As set out in the Call for Tenders (e.g. at the end of Sub-Task 2.1) a cloud infrastructure is not a requirement. While some form of temporary data retention will be necessary for the system to fulfil the requirements, such as where the recipient opts for the pull model of data receipt, the Call for Tenders does not specific how this should happen (i.e. cloudbased versus specifically identified computing infrastructure). Instead Tenderers are asked to set out the possible options and the costs, benefits and other relevant implications of those options. Specifying the location of the cloud infrastructure/specifically identified computing infrastructure and data may ultimately be a requirement and the option to do so should be included in the response, including the options and the costs, benefits and other relevant implications of those options. The pilots would need to be sufficient in duration and number of participating jurisdictions to demonstrate the functioning of the system with actual users as opposed to in an internal testing environment. While the precise timetable is for bidders to specify, the pilots would ideally take place in Q4 of 2016 and Q1 of 2017, and will need to be completed in time to make any necessary adjustments to the system and then link up users in around 50 jurisdictions to the system by the end of August 2017 for exchanges in September They are the officials from the tax administrations, initially focused on the participants in the pilots, but then extended to users in about 50 jurisdictions in 2017 and jurisdictions by 2018.
4 Are there any restrictions related to the hosting of CTS related to geography or otherwise? Has a common data storage agreement been negotiated? 12 With regard to OECD Questionnaire Reference: 5.2 System Requirements, : The CTS shall have the capacity of being interoperable with other IT-networks, for example a regional hub. In this scenario the operator of the hub would be responsible for sending and receiving the information between the users of the hub, via the CTS, to other users of the CTS. The hub operator would have no access to tax information. All of the file preparation requirements, such as the file encryption, would remain with the sending jurisdiction. Can you provide a detailed use case to better understand this scenario? Is the EU regional hub referenced currently in production or not? If not, when is it schedule to come online? 13 We understand from the document that production environment of CTS should be ready by September 2017 and around 58 jurisdictions would be using CTS in Please confirm if all 58 jurisdictions need to be on-boarded, tested and enabled by September 2017 or they will be on-boarded, tested and enabled starting from September 2017 onwards. 14 It is mentioned that 94 jurisdictions would be using CTS in 2018, do we have a time frame by when they need to be completely enabled in CTS 15 We understand that there could be additional transmissions taking place as other types of exchanges are incorporated. Could you please provide information on the other types of exchanges: Some form of temporary data retention will be necessary for the system to fulfil the requirements, such as where the recipient opts for the pull model of data receipt. This would need to be part of the bidder s proposal. The Call for Tenders does not specify how or where this should happen (i.e. cloudbased versus specifically identified computing infrastructure). Specifying the location of the cloud infrastructure/specifically identified computing infrastructure may ultimately be a requirement and the option to do so should be included in the response, including the options and the costs, benefits and other relevant implications of those options. In practice the use of the regional hub will allow EU Member States to continue to use the same EU system already used to exchange tax information in Europe (CCN) for 3rd countries as well, with the same CTS functionality as non-european countries. While the existing EU system is a closed network a gateway has been put in place (Speed 2) which provides an interface between the EU system and other systems (in this case the CTS). Both the EU system and Speed 2 are in production. All 58 jurisdictions will need to be fully onboarded by August 2017 in time for exchanges to take place by the end of September All remaining jurisdictions will need to be fully on-boarded by August 2018 in time for exchanges to take place by the end of September The data for the other exchanges, at least in the immediate term, would also be tax data prepared in accordance with similar requirements as that for the Common Reporting Standard (i.e. based on XML
5 a) The type of data exchange b) The data exchange mechanism c) Volumetric details like size and number of exchanges 16 We understand that there is the requirement for Helpdesk support. Could you please provide the below details around the support. a) Is there a requirement to have a toll free number and receive phone calls for support? b) What languages are expected to be supported? c) Is there a need for support staff to be present in particular geographical location? 17 Will the tenderer be responsible for the contractual agreement between sender and receiver of the data for legal protection of the data 18 This clarification is specifically regarding data encryption and NOT pathway or transmission channel encryption. It is mentioned that the data would be encrypted and encryption/decryption happens outside of the CTS. Will it be safe to assume that CTS will not responsible for the encryption/decryption of the data, need not have the same capabilities, need not to store and manage the keys for encryption Schema etc.). The exchanges would therefore take place in the same manner as for the Common Reporting Standard. At this moment we would expect the immediate increase in volume to be less that for the Common reporting Standard but these estimates will be refined in due course. Eventually the users will likely wish to transmit other types of documents using the Common Transmission System on an ad hoc basis (e.g. pdf formats, s etc.). This is not anticipated to occur in the immediate term. Any additional information or suggestions, even for additional or alternative functionalities, should be set out by the tenderer in its offer alongside their proposal that fulfils all the requirements. Such items may or may not be deemed relevant during the selection process. There is not a requirement to have a toll-free number. Only English will require to be supported in the immediate term, although the business model used should allow the provision of support in other languages in due course. There is no need for the support staff to be present in a particular geographical location. Support must, however, be available 24 hours a day 7 days a week. Any additional information or suggestions, even for additional or alternative functionalities, should be set out by the tenderer in its offer alongside their proposal that fulfils all the requirements. Such items may or may not be deemed relevant during the selection process. There would be no direct contractual link between the selected supplier and users. The OECD would conclude a central agreement with a supplier for CTS and then the OECD would conclude agreements with CTS users. The CTS will not responsible for the encryption/decryption of the data (and therefore will not need those capabilities). Aside from needing to provide a depository for the senders of the data to identify the public encryption key for the recipients, it will not need to store and manage the keys for encryption. Any additional information or suggestions, even for additional or alternative functionalities, should be set out by the
6 19 Apart from the production system, how many non production environments (like Development, QA, UAT) are required 20 Please confirm that it will be the responsibility of the tenderer to procure and provide the hardware and all the necessary software for the CTS system 21 Could you please confirm your preference to have an "On-Premise" solution or to have an external hosted system. If externally hosted, please provide details whether it could be a public cloud, private cloud etc. tenderer in its offer alongside their proposal that fulfils all the requirements. Such items may or may not be deemed relevant during the selection process. Provided the requirements as set out in the Call for Tenders is met it will be up to the tender to set out the environment required to manage its development cycle (development, technical and functional testing, preproduction, etc.). From the perspective of OECD and the users, the environments required are: A- Production environment, including pilot scopes (which are production environments) B- Training and capacity building environment, including a sandbox for fake exchanges of information. C- UAT environment, specifically for OECD and users to carry out user oriented tests before a new version of the software is released. The way these environments are put in place is up to the provider to propose in its proposal (it could be for example that A and B reside on the same platform, but correspond to different interfaces/functions). This is the case. Please note that each jurisdiction will be responsible for the set up and management of their own system, including in the machine-tomachine exchanges with the CTS; while the provider will be tasked to support the jurisdictions to establish and troubleshoot such paths, it is not responsible for them. Any additional information or suggestions, even for additional or alternative functionalities, should be set out by the tenderer in its offer alongside their proposal that fulfils all the requirements. Such items may or may not be deemed relevant during the selection process. The Call for Tenders does not specify how or where the location of the system should be (i.e. cloud-based versus specifically identified computing infrastructure). Specifying the location of the cloud infrastructure/specifically identified computing infrastructure may ultimately be a requirement and the option to do so should be included in the response, including the options and the costs, benefits and other relevant implications of those options.
7 22 Does further detail exist on the specific requirements for security protocols / standards of encryption/decryption expected to be adhered to by the solution? 23 Can you please clarify and provide further details on what is meant by system to system uploading and downloading? 24 Is it anticipated that the solution would be hosted and that the transfer of data would take place over a secure intranet or is it anticipated that files will be transmitted over the external web? 25 What is the anticipated period of time data may need to be held in the CTS solution during transmission (on the basis you have requested an on-demand pull facility)? 26 Can you please provide further detail on the OECD preference for funding construct for the project: CAPEX (upfront) / OPEX (support)? 27 Does the OECD expect that whilst a solution can be made scalable that there would need to be additional costs associated with bringing on-board new additional jurisdictions over and above the stated numbers in the tender document? 28 Can you elaborate on your thoughts about a 'regional hub' for CTS and how it is anticipated this would work (how many potential regional hubs has OECD considered in its evaluation phase )? The technical specifications are intentionally not set out in the requirements in order to allow the tenderers to propose a solution that meets the requirements. Information security will or course play a significant role in any selection process and any solution will need to be appropriate for the large scale transfer of personal financial data. This would allow tax authorities to directly link their database to the CTS platform, through APIs (Application Programmable Interfaces) for prescheduled transfers of data, whether sending or receiving (as opposed to a manual process by a human operator, through a browser based mechanism). Given there will be nearly 100 jurisdictions needing to exchange data by September 2018 it is likely any solution would use the external web, as putting in place a secure intranet may take too long. However, any suggestions may be proposed that meet the requirements as specified. It would be anticipated that this would not be a significant period of time (i.e. possibly around 7 days). Any funding which it is essential to be received by the tenderer prior to users linking into the system in order to use it would be paid up front. The rest would be paid as the system is used. In the immediate term at least the number of users is unlikely to rise significantly (although could increase by a modest amount), even in the event the CTS is also used for the exchange of additional types of data. As present we are only actively considering the hub already operating in the European Union. In practice the use of the regional hub will allow EU Member States to continue to use the same EU system already used to exchange tax information in Europe (CCN) for 3rd countries as well, with the same CTS functionality as non-european countries. While the existing EU system is a closed network a gateway has been put in place (Speed 2) which provides an interface between the EU system and other systems (in this case the CTS). 29 What are your expectations around service The service management of the CTS will be
8 management of the operational system, and especially how this will interface with local systems? 30 Is the use of the CTS mandatory for all participating jurisdictions or can participating jurisdictions use an alternative method of transmission? 31 In reference to requirement , what is the timeline for requiring additional languages be supported by CTS? What languages are expected to be added? the responsibility of the tenderer. It is expected that support is provided for users to link into the system (whether through human interface or API). The service management of local systems (e.g. on the jurisdiction s premise) is outside of the scope of the current tender although additional suggestions may be proposed which may or may not be deemed relevant during the selection process. The Common Reporting Standard (CRS) does require any particular transmission methods to be used, provided any alternative methods meet the necessary security requirements. Having said that, we intend and expect the CTS to be used by most if not all committed jurisdictions (as well as those adopting future information exchange standards). The feasibility study recommending a single common system be put in place was endorsed by all 46 member countries of the Forum for Tax Administration and significant support has already been publically expressed in relation to the project as seen in paragraph 6 of the Statement of Outcomes from the recent Global Forum plenary meeting, which incorporates almost all committed jurisdictions (i.e. over 90 potential users). The Multilateral Competent Authority Agreement implementing the CRS, now signed by 74 jurisdictions, also contains a commitment to work towards common transmission solution(s). The requirements do not specify a timeline nor which additional languages are expected. Tenderers can set out the possibilities (which could focus on the main international languages) and associated costs in their proposals.
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update April 2015 IDES Implementation Developments 2 The IRS has made significant progress in developing and deploying technology capabilities
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
PUR1308/11. Pre-qualification Questionnaire (PQQ) ------------------------------------------------------------
PUR1308/11 Pre-qualification Questionnaire (PQQ) ------------------------------------------------------------ Provision of E-Mail and File Encryption Technologies ------------------------------------------------------------
Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.
Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change
Invitation to Tender Document Supply of Content Management Service (Websites and Social Media) Chamber International
1. Introduction & Overview a. Company background delivers international trade support on behalf of Chambers of Commerce. Further information can be found at www.chamber-international.com b. Background
FATCA Reporting. Initiative summary. March 2015
FATCA Reporting Initiative summary March 2015 Who is Fundsquare? A market utility built by and for the Fund Industry Started in 2010, the Fund Market Infrastructure project has been piloted by a Super
Solution & Design Architecture
Solution & Design Architecture Agenda Key Requirements Independence to ULBs Workflow : Administrator Activities Solution To Address Key Requirements Flexibility in selection of services Application Usage
Town of Needham Document Management Storage and Retrieval Solution RFP14NEE272G
Notice to All Prospective Bidder Deadline for written questions 4:00 p.m. Friday, May 9, 2014 ADDENDUM #2 RELEASED (WEDNESDAY, MAY 14, 2014) We are issuing this addendum to provide more information with
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
ANNEX F. London Focus Group Tender - Commissioning Support Services ITT Clarification Questions: FINAL Summary7
ANNEX F London Focus Group Tender - Commissioning Support Services ITT Clarification Questions: FINAL Summary7 Srl. Question Response 1 According to the memorandum of information, the draft ITT was supposed
CRM Phase 3 Development, support and maintenance - Questions and Answers
No. Question Answer 1. 2. 3. 4. 5. 6. 7. Are we able to discuss the requirements of this tender with the UKCES prior to submitting our proposal? Can we be placed on a list to be notified of future opportunities
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
SERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
How To Write An Inspire Directive
INSPIRE Infrastructure for Spatial Information in Europe Detailed definitions on the INSPIRE Network Services Title Detailed definitions on the INSPIRE Network Services Creator Date 2005-07-22 Subject
Email Encryption Made Simple
Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal
SAP Product Stewardship Network Supplier Enablement Service Description (English)
SAP PRODUCT STEWARDSHIP NETWORK - SUPPLIER ENABLEMENT - SERVICE DESCRIPTION SAP Product Stewardship Network Supplier Enablement Service Description (English) Table of Content 1 Definitions... 3 2 Introduction...
ODPS/BMV RFP QUESTIONS AND ANSWERS. October 5, 2015
ODPS/BMV RFP QUESTIONS AND ANSWERS October 5, 2015 1. We planned on submitting our response just through email. Do we also have to send the pricing on a CD? No, the pricing can be sent by email also. However,
Inventory Management and Tracking System. Frequently Asked Questions
Inventory Management and Tracking System System Information Frequently Asked Questions 1. What is IMATS? 2. What is IMATS Connect? 3. How was IMATS developed? 4. I already have an inventory management
National Institute for Health Research Coordinated System for gaining NHS Permission (NIHR CSP)
National Institute for Health Research Coordinated System for gaining NHS Permission (NIHR CSP) Operating Manual Please check the CRN Website for the latest version. Version: 6.0 Status: Consultation in
Secure Electronic Voting RFP Kit
Secure Electronic Voting RFP Kit The purpose of this document is to assist election officials in jurisdictions with DRE voting systems in identifying and selecting qualified independent security experts
SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS
SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS Cyber Security Overview About FDM Management Structure Relating to this Offering Your Responsibilities Other Key Points Relating to this Offering SFIA
Get Significant Application Quality Improvement Without Major Investment. Performance driven. Quality assured.
Testing Platform-as-a-Service Get Significant Application Quality Improvement Without Major Investment. Performance driven. Quality assured. TPaaS a complete testing service, on demand, using the Capgemini
Email Encryption Made Simple
White Paper For organizations large or small Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user
NATO UNCLASSIFIED. : Amendment 2 to RFQ-CO-13778-TIP Performance, Measurement, Analysis, Reporting & Benchmarking and Enterprise Control Room
NATO UNCLASSIFIED ACQUISITION [email protected] Telephone: +32 (0)2 707 8233 Fax: +32 (0)2 707 8770 NCIA/ACQ/2015/734 12 January 2015 To Subject : Prospective Bidders : Amendment 2 to RFQ-CO-13778-TIP
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact
Chapter 6 Implementation Planning
Chapter 6 Planning Planning- Division into Work Packages The following are the recommended Work Packages Overall Change Programme Work Package 1 E-Cabinet Model Work Package 2 Security Policy Design Work
Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, 2012. Questions and Responses
Request for Proposals Statewide Two Factor Authentication Solution Addendum #2 October 5, 2012 Questions and Responses NOTE: NYeC responses to the questions are in red. Licensing Entity 1. Will the Licensing
CITY OF HIGHLAND PARK
REQUEST FOR PROPOSALS CONSULTING SERVICES FOR THE PROCUREMENT OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM CITY OF HIGHLAND PARK PLEASE COMPLETE ATTACHMENT 1 RFP ACKNOWLEDGEMENT FORM AND RETURN TO THE CITY
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
Cloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
DATABASE VIRTUALIZATION AND INSTANT CLONING WHITE PAPER
DATABASE VIRTUALIZATION AND INSTANT CLONING TABLE OF CONTENTS Brief...3 Introduction...3 Solutions...4 Technologies....5 Database Virtualization...7 Database Virtualization Examples...9 Summary....9 Appendix...
Portfolio: Transformation, Modernisation and Regulation
Portfolio: Transformation, Modernisation and Regulation Procurement Committee 19 October 2006 Procurement of E-mail, Calendar and Archiving System Report by: Ward Implications: Head of City Service and
CLOUD CONTRACTS WHAT PROVIDERS AND CUSTOMERS SHOULD DISCUSS
CLOUD CONTRACTS WHAT PROVIDERS AND CUSTOMERS SHOULD DISCUSS Catalogue of recommended contractual components in General Terms and Conditions of Business (AGB) and Service Level Agreements (SLA) for Cloud
December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
Client Communication Portal Project
Client Communication Portal Project In 2014 Sunnyfield was awarded a grant by the Organisation Transition Fund to develop a Client Communication Portal. The aim of the project was to enhance person centred
Document Archiving White Paper. Secure. Accessible. Reliable
Document Archiving White Paper Secure Accessible Reliable Table of Contents IS THERE A SIMPLE WAY TO ARCHIVE PAPER DOCUMENTS ELECTRONICALLY?... 3 HOW IT WORKS... 3 WHAT PROCESSES CAN YOU AUTOMATE?... 6
1.) Would it be possible to receive an extension of at least 2 weeks for the proposal due date?
Questions & Answers for Request for Proposal Software Solutions for Home and Building Performance: Program Management, Comprehensive Energy Assessment, and Home Energy Scoring July 18, 2013 Questions from
EARSC Views on the. Procurement of the Copernicus Services
EARSC Views on the Procurement of the Copernicus Services EARSC, the European Association of Remote Sensing Companies represents the Earth Observation geoinformation services sector in Europe. Today EARSC
RightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
The SME Engagement Handbook
The SME Engagement Handbook The purpose of this document is to help microbusinesses and small to medium enterprises ( SMEs ) interact more effectively when bidding to supply goods or services to larger
Code of Practice on Electronic Invoicing in the EU
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
User Guide of edox Archiver, the Electronic Document Handling Gateway of
User Guide of edox Archiver, the Electronic Document Handling Gateway of project v0.7 SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI-283481 Table of Contents 1 INTRODUCTION...
Regular data supply and partner data management in the cloud
Strategies for controlling the flood of development data: Regular data supply and partner data management in the cloud Ralf Luithardt (SSC-Services GmbH), Dr. Anna Wasmer (PDTec AG) Globalisation and the
ExtremeWorks Managed Services Frequently Asked Questions
1. What are the ExtremeWorks Managed Services? MonitoringPLUS and ResponsePLUS are scalable and flexible offerings combining continuous remote network monitoring with complete maintenance support available
Appendix D Programme Stream 6 CRM Procurement. Programme Stream 6 Remodelling of Customer Services Programme CRM Procurement
Programme Stream 6 Remodelling of Customer Services Programme CRM Procurement Recommendations That the Executive note CRM procurement will be put out to tender in 2010/11 and note the proposed phasing
Taking the Migraine Out of Migrations
Taking the Migraine Out of Migrations In our recent meeting with a senior IT executive, she shared that she accepted her current position a few years ago with the caveat, I ll do anything except data migrations.
Document control for sensitive company information and large complex projects.
Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive
Date: 7 February 2013
Item No. Report title: Classification: Open Ward(s) or groups affected: From: Date: 7 February 2013 Meeting Name: Deputy Leader and Cabinet Member for Housing Management GW2: Leasehold and Ancillary Properties
How To Write An Oor Ebusiness Ebusiness Solution
Q1. Is it a mandatory requirement to be an Oracle ebusiness Certified Partner or will you accept proof of successful implementations with Oracle, i.e., can use pre-existing setups and application security
White Paper Security. Data Protection and Security in School Management Systems
White Paper Security Data Protection and Security in School Management Systems This paper clarifies the roles and responsibilities of those dealing with the data that is central to school management systems.
Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
ROYAL AUSTRALASIAN COLLEGE OF SURGEONS
1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal
Frequently Asked Questions regarding European Innovation Partnerships
May 2012 Frequently Asked Questions regarding European Innovation Partnerships 6 December 2010 FAQs 1. What are the objectives behind European innovation partnerships? 2. What concrete benefits can be
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Enterprise Architecture (EA) Principles
FINAL January 2016 Enterprise Architecture (EA) Principles Introduction The Enterprise Architecture principles express how Highways England needs to design and deploy information systems across the organisation.
Mapping of outsourcing requirements
Mapping of outsourcing requirements Following comments received during the first round of consultation, CEBS and the Committee of European Securities Regulators (CESR) have worked closely together to ensure
REQUEST FOR PROPOSAL RFP 2009-041
REQUEST FOR PROPOSAL RFP 2009-041 SUBJECT: Purchase of (1) Video Conferencing system & Terms of Reference for services related to video conferences gateway (H.320 H.323) Secretariat of the Convention on
Astaro Mail Archiving Service Version 1.0
Astaro Mail Archiving Service Version 1.0 Process documentation Table of Contents 1. Introduction... 2 2. Overview... 2 2.1 Production Cloud... 3 2.2 Backup Cloud... 3 2.3 Control Cloud... 3 2.4 Access
THE LE@RNING FEDERATION
THE LE@RNING FEDERATION Project Management Framework VERSION: 5.0 DATE: 26 JUNE 2007 Table of Contents 1 INTRODUCTION... 1 2 PRODUCTION PROCESS... 2 2.1 Operational support for the Project Management Framework...
ICT Advice Note - Procurement of Open Source
ICT Advice Note - Procurement of Open Source October 2011 1. Objectives and Context The objective of this document is to provide high level advice on how to ensure open source software is fairly considered
Job Title Customer Operations Manager Organisation World Masters Games 2017 Division Marketing Communications
JOB DESCRIPTION Job Title Customer Operations Manager Organisation World Masters Games 2017 Division Marketing Communications Location 9 Nelson Street, Auckland CBD Introduction Reports To General Manager
City of Houston HITS Cloud Strategy and Body Worn Camera Project. Tina Carkhuff CIO/Interim Director
City of Houston HITS Cloud Strategy and Body Worn Camera Project 1 Tina Carkhuff CIO/Interim Director Agenda 2 Overall HITS Goals Definitions On-Premise Storage Cloud-based Storage Advantages and Disadvantages
HIGHLANDS AND ISLANDS PATHFINDER BROADBAND PROCUREMENT: APPOINTMENT OF PREFERRED SUPPLIER
ARGYLL AND BUTE COUNCIL STRATEGIC POLICY COMMITTEE CHIEF EXECUTIVE 20 JULY 2006 HIGHLANDS AND ISLANDS PATHFINDER BROADBAND PROCUREMENT: APPOINTMENT OF PREFERRED SUPPLIER 1 SUMMARY This report updates the
ITSM Software: Is SaaS the Model for You?
ITSM Software: Is SaaS the Model for You? By Kai Holthaus, ITIL v3 Expert and Director for Third Sky, Inc. Software as a Service (SaaS) has gotten a lot of attention recently. Many companies and IT organizations
Governance of the Business Transformation Partnership Responsible Officer: Executive Director (Business Development)
Meeting: Cabinet Date: 6 October 2005 Subject: Governance of the Business Transformation Partnership Responsible Officer: Executive Director (Business Development) Contact Officer: Portfolio Holder: Key
ECM AS A CLOUD PLATFORM:
ECM AS A CLOUD PLATFORM: KEEP IT SIMPLE TABLE OF CONTENTS ECM as a Cloud Platform 2 What is a Cloud Platform? 2 What is a Cloud Application? 3 SpringCM The World s Leading ECM Cloud Platform Provider 6
Fax Services. Fax Automation as a Cloud Service. Integrated with ERP Solutions. www.esker.com ESKER ON DEMAND
Services Automation as a Cloud Service Integrated with Solutions www.esker.com ESKER ON DEMAND Why is Moving to the Cloud as a service Adoption of cloud services for fax communication has steadily increased
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES PO Box 45811, Olympia WA 98504-5811
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES PO Box 45811, Olympia WA 98504-5811 DATE: March 2, 2015 TO: FROM: SUBJECT: RFP# 1556-535 Bidders Q+A Sarah MacLean, RFP Coordinator DSHS Central
Highlands and Islands Broadband Pathfinder Project - Background
ITEM: 22(a) PAGE: 1 REPORT TO: The Moray Council on 5 July, 2006 SUBJECT: BY: Highlands and Islands Broadband Pathfinder Project - Background Chief Executive 1. Reason for Report 1.1 The Pathfinder Broadband
PUBLIC. Response to consultation on EMR data flows
PUBLIC Response to consultation on 28 April 2014 CONTENTS INTRODUCTION... 3 1. Background... 3 2. ELEXON s proposal to the CfD Counterparty... 3 RECOMMENDATION TO DECC ON MECHANISMS FOR PARTIES TO EXCHANGE
Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case
Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case Introduction Stop. Think. Ok, in the meanwhile 2 seconds has passed and 250 messages more were processed by a mission critical
UoD IT Job Description
UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management
REQUEST FOR PROPOSALS RFP #: EKACDM 1.2.1/YR3 DISASTER RISK REDUCTION CENTRE INSTITUTE FOR SUSTAINABLE DEVELOPMENT THE UNIVERSITY OF THE WEST INDIES
REQUEST FOR PROPOSALS RFP #: EKACDM 1.2.1/YR3 DISASTER RISK REDUCTION CENTRE INSTITUTE FOR SUSTAINABLE DEVELOPMENT THE UNIVERSITY OF THE WEST INDIES ENHANCING KNOWLEDGE AND APPLICATION OF COMPREHENSIVE
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Group Member Access LCH.Clearnet Ltd Network Connectivity Guide (BT Radianz)
Group Member Access LCH.Clearnet Ltd Network Connectivity Guide () Owner: Director, Commercial Services Document Version Number: 1.0 Issue Date: 22 June 2009 COPYRIGHT The copyright in this work is vested
