eps Network Services ASP Certificate

Size: px
Start display at page:

Download "eps Network Services ASP Certificate"

Transcription

1 08/2006 ASP Certificate eps Network Services ASP Certificate Description of Performance Valid for Software Software Version eps Network Services 4.2 eps Network Services, Description of Performance (LB) 08/2006 Edition 1

2 ASP Certificate 08/2006 Contents 1 General Information Scope of Service Service Level Agreement Description of Functions Overview of Functions Organization-related services Machine-related services eps Network Services, Description of Performance (LB) 08/2006 Edition

3 08/2006 ASP Certificate 1 General Information Purpose This document, the Description of Performance, describes the hosting service of Siemens AG. The Description of Performance is an annex to the ASP Certificate and subsequent individual orders between the customer and Siemens AG. Siemens is authorized to change this Description of Performance in accordance with the General Conditions for Application Service Providing (ASP) of Siemens AG, Automation and Drives. Provisions deviating from those in this ASP Certificate must be made in writing. eps Network Services, Description of Performance (LB) 08/2006 Edition 3

4 ASP Certificate 08/ Scope of Service Customer care and invoicing Customer care Customer care is effected through the Technical Support of the Automation and Drives group of Siemens AG. The Technical Support of the Automation and Drives group of Siemens AG is the customer s sole contact in the case of problems and questions relating to the product. Our employees are available to answer questions on invoicing during regular business hours (CET). Siemens monitors the performance of the service in accordance with the Service Level Agreement (SLA) If the customer detects a problem, it must reported to the Technical Support of the Automation and Drives group of Siemens AG. Technical Support will immediately create a service request, notify the customer of the number of the service request for subsequent contacts, and initiate fault rectification. The customer can obtain information about the current status of processing during the standard business hours of Technical Support. You can contact Technical Support on: Phone: ++49 (0) Fax: ++49 (0) ad.support@siemens.com Internet: FAQ Also use the support application under contact via the above Internet link. 4 eps Network Services, Description of Performance (LB) 08/2006 Edition

5 08/2006 ASP Certificate Service management Data backup Basic service management: Technical Support business hours: Monday to Friday, except for legal holidays, 8:00 17:00 Reaction time to a call: within 8 working hours Start of processing after the reaction time: no later than on the next working day Performing updates and patches according to expenditure Data backup, restoration according to expenditure (see data backup) No external storage of tapes Data backup: The customer data are backed up on magnetic tape so that the data can be restored in case of loss or damage to data. Backup is performed according to a standard schedule and at regular intervals (see dates below). After completion of the services, the data backup tapes are re-used and not made available to the customer. Deadlines: Data backup is performed between the hours of 23:00 and 05:00 CET. A full backup is performed once a week. On the other 6 days only an incremental backup is performed. The magnetic tapes with the incremental backups and the last complete backup are kept locally in the computer center and re-used after the next full backup. After data backup has been performed for a month, only one complete backup is retained and the tapes of the other 3 (or 4) backups are re-used. The monthly backups are retained for 3 months, then these tapes are also re-used. Restoring data: A customer can request the restoration of single files from the backup tapes. Restoration can be ordered from Technical Support by phone or . The restoration of data can only be ordered via Technical Support within Technical Support s business hours (see Service management above). Start of processing after ordering: no later than on the next working day. eps Network Services, Description of Performance (LB) 08/2006 Edition 5

6 ASP Certificate 08/2006 The actual time required until restoration is completed depends on the consequences of deletion and on the volume of data to be restored. Requests for restoration are invoiced per event according to expenditure at the current rates. The minimum expenditure per event is one hour. Security Firewall: To the extent that is possible with reasonable economic and technical effort, Siemens shall ensure that unauthorized access to the customer s data are prevented using firewalls. The firewalls are examined for attacks and attempts of tampering. Where necessary, suitable countermeasures will be taken. These are not described here for security reasons. Virus scanning: To the extent that is possible with reasonable economic and technical effort, Siemens shall ensure that the transfer of noxious code (especially, viruses, Trojans, etc.) is prevented using virus scanners. The virus signatures are updated automatically as soon as they become available from the vendor of the product used. This statement does not apply to eps Network Services ep Access for technical reasons. SSL encryption: The entire inward and outward flow of data to the eps Network Servers of Siemens AG is coded via forced 128-bit SSL encryption. Please observe any country-specific restrictions in the use of cryptographic technologies. Network link IP link to the backbone: The necessary maintenance work for importing new software versions and security patches is performed after prior announcement. The speed of the Ethernet interfaces is 100 Mbps. The eps Network Servers of Siemens AG are connected to the backbone with a bandwidth of up to 2 Mbps. 6 eps Network Services, Description of Performance (LB) 08/2006 Edition

7 08/2006 ASP Certificate 3 Service Level Agreement Provision of services The eps Network Services are provided in accordance with this Service Level Agreement. Siemens coordinates the provision of the services with the customer s contact. The customer is obligated to cooperate to the necessary degree. Siemens shall communicate to the customer the user IDs and passwords required to use the services for passing on to the authorized users by . SMS transmission Siemens uses the telecommunications infrastructure of external network operators for sending SMS s. Siemens protects delivery of the messages to the network operator but not from the operator to the recipient. If an SMS is undeliverable, notification will be by . Siemens reserves the right to change the network operator at any time. Standard time window for maintenance Declarations Maintenance work: The necessary maintenance work for importing new software versions and security patches is performed after prior announcement. The period of notice is usually 2 working days. In the case of security patches, this period does not need to be complied with. The standard time window for maintenance is usually up to 2 hours per month. System downtimes due to maintenance work are not included in the system down times. Item Warranted Measurement [unit] value Processing time on order 5 max. Working days Reaction time on detection of faults 8 max. Hours Service availability 97.5 min. % availability per month Note: The availability of the IP network links is measured over calendar months. Downtime due to routine maintenance is not taken into account. eps Network Services, Description of Performance (LB) 08/2006 Edition 7

8 ASP Certificate 08/ Description of Functions Overview The eps Network Services support machine tool manufacturers and manufacturing companies with maintenance and services. This is done using software services that are available both on the CNC machine and on the PC. This requires both a control on the CNC machine that complies with the specifications and Internet access. Condition Monitoring Services: Circularity test Equability axis test Universal axis test Load monitor Measurement and documentation of the current machine status on the basis of predefined, standardized tests and continuous recording of status parameters (traverse path, traverse time and traverse operations for one axis). The test parameters can be defined centrally and configured with appropriate warning limits. Using series of measurements, it is also possible to identify trends and apply them as a basis for optimizing maintenance and service activities. The machine operator can then carry out these predefined tests quickly and easily and without additional test equipment. Ticket Services: Processing and administration of service cases Request support Assign service case to servicing engineer Service case history Planning of maintenance activities When a fault occurs, the machine operator can request support from the service organization by activating the "Request fault processing" function. When this type of request is made, fault-relevant data from the control system, such as the NC monitor and HMI action log and any other user-specific files, can be transferred from the file system on the control to the eps Network servers. When the machine operator contacts the service engineer by telephone, the engineer can also set up a service case. An exact description of the fault gives the manufacturer's service organization or end customer the chance to react quickly to the request. eps Network Services can be used to assign the service case to a service engineer and to prepare a service report. 8 eps Network Services, Description of Performance (LB) 08/2006 Edition

9 08/2006 ASP Certificate The integrated service case history of individual machines enables the service organization to gain an overview of previously recorded faults and, in the event of new ones, to refer back to solutions which have been applied and documented in the past. The ticket services function is an additional tool for planning, monitoring and documenting maintenance activities on the machine. The planning of condition monitors plays a particularly important role for this service. The ticket services can be used to plan the timing and content of condition monitors and to monitor how they are processed. Should it be necessary to perform other operations before a condition monitor is created, the operator can access detailed instructions (also available in graphic form in file attachments). Notification Services: Alarm notification Automatically via SMS Automatically via Automatically by means of trouble tickets The service engineer can configure certain alarms according to alarm number, alarm group or alarm category, such as PLC or NCK alarms. When these alarms are generated, the service engineer (and possibly other specified personnel) can be notified by SMS, or by means of the trouble ticket system. When trouble tickets are generated, it is possible to load additional information (control monitors and any desired files) from the machine to the eps Network server. It is not necessary to access the machine in order to configure alarms. Control Monitor Services: Support for fault diagnostics Alarm monitor HMI action log NC monitor PLC monitor Data comparisons Transfer eps settings Robust operation The service organization can choose from a range of powerful tools for fault diagnostics support the alarm monitor which records the alarm event and enters it in the machine's event list, the HMI action log, the NC monitor and the PLC monitor, which begin recording data about the control system status as soon as a particular trigger event occurs. These status data are saved to the eps Network servers and can be accessed at any time for fault analysis or comparison purposes. PLC data blocks can also be saved cyclically to the eps Network servers and exported. The HMI action log records a log of operational sequences, e.g. key inputs. The NC monitor acquires particular NC status data and machine data. The PLC monitor allows the service engineer to obtain information about I/Os and system variables from the PLC program from data sources on the PLC such as counters, timers, memories, etc. eps Network Services, Description of Performance (LB) 08/2006 Edition 9

10 ASP Certificate 08/2006 This information from the PLC refers to the time period preceding the trigger events. The service engineer can be informed about the occurrence of trigger events by means of the alarm notification function (see 'Alarm notification' above). The service engineer can also transfer the configurations of an existing machine to another machine. Data Services: Back up, restore and compare archives with control data The data services enable the user to create NC and PLC archives so that the machine-specific settings can be restored if data are lost or hardware components are replaced. The archives are stored on the eps Network servers from where they can be downloaded back to the control system. As part of the fault diagnostics process, eps Network Services provide the option of comparing the data on the machine with the data in the archives. Remote Access Services: Teleservice Chat Remote control Teleconference link Data transfer Session recording Remote printing Video Remote access to the control device via a safe Internet infrastructure. This service permits remote access to the control. Administration Services: Machine and user management Machine and location names Cooperation areas User roles The machine administration function can be used by authorized administrators to set up machines and to assign and modify machine and location names. The machines of one organization can be shared with other organizations for joint processing in cooperation areas. This function allows the implementation of partnership service networks between machine manufacturers, users and external specialists. The control over a machine always remains with the organization for which it was set up originally. This organization decides which other organizations may have access to the data of a particular machine. The user management system offers administrators a range of functions, such as the ability to create users, change their names and assign new passwords for them. This system can also be used to assign one of the following roles to a user: Administrator, service engineer or machine operator. In other words, users registered with the system have access only to those program functions which are permanently assigned to particular user roles. 10 eps Network Services, Description of Performance (LB) 08/2006 Edition

11 08/2006 ASP Certificate 5 Overview of Functions 5.1 Organization-related services The following user roles exist with different rights: Administrator (Admin), Service Engineer (SE), Run-off Engineer (RE) and Machine Operator (MO) (For more details, see Function Manual) Functions AS SE RE Admin Administration Services: Create machines and users Define user roles Download use statistics Download security patches Release machines Address administration Use machine-related services Administering machine-related services Note: The user statistics are only available to the administrator who has been communicated as the registered administrator at eps & RTS. 5.2 Machine-related services Functions Condition Monitoring Services: Continuous acquisition of the machine state Performance tests (KFT, GLT, UAT) NC monitor PLC monitor Measuring series Test series Test automation with prolog/epilog ep- Performance ep-dynamic ep-access eps Network Services, Description of Performance (LB) 08/2006 Edition 11

12 ASP Certificate 08/2006 Functions Control Monitoring Services: Event-controlled recording of data Prepare control monitors from triggers and actions ep- Performance ep-dynamic Define trigger events Save diagnostics information (traces, files upload) Use event history ep-access Workflow Services: Control of processes in service and maintenance Set up maintenance schedules and orders Use service case history Assign service case to servicing engineer Set up notification Data Services: Back up, restore, compare archives with control system data Remote Access Services: Teleservice Chat Remote control Teleconference link Data transfer Session recording Remote printing Video 12 eps Network Services, Description of Performance (LB) 08/2006 Edition

SERVICE LEVEL AGREEMENT (SLA)

SERVICE LEVEL AGREEMENT (SLA) SERVICE LEVEL AGREEMENT (SLA) This SLA is governed by this Agreement in conjunction with the Company s Privacy Policy. The following has been designed to protect the privacy, security and best interests

More information

Siemens Automation Products

Siemens Automation Products Preface Fundamental safety instructions 1 SINUMERIK SINUMERIK Integrate Manual Introduction 2 Logging on to SINUMERIK Integrate 3 Filtering machines 4 Establishing a connection and diagnostics 5 Machine

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

SINUMERIK 840Di/840D. eps Network Services. Preface. Introduction. Machine information. Setting up functions. Organizationaltasks.

SINUMERIK 840Di/840D. eps Network Services. Preface. Introduction. Machine information. Setting up functions. Organizationaltasks. Preface Introduction 1 SINUMERIK 840Di/840D Machine information 2 eps Network Services Setting up functions 3 Function Manual Organizationaltasks 4 Statistics/export 5 Management 6 Establishing a connection

More information

ICT Security Policy. ~ 1 od 21 ~

ICT Security Policy. ~ 1 od 21 ~ ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...

More information

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified

More information

Status: February IT Security Directive External Service Providers

Status: February IT Security Directive External Service Providers Status: February 2016 IT Security Directive External Service Providers 1. Scope and purpose This safety directive is obligatory for all external service providers who work for a HYDAC affiliate. The stipulations

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

IBM Sterling B2B Services File Transfer Service

IBM Sterling B2B Services File Transfer Service Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Service Level Agreement Research Computing Environment and Managed Server Hosting

Service Level Agreement Research Computing Environment and Managed Server Hosting RCE SLA 2013 Service Level Agreement Research Computing Environment and Managed Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard- MIT Data Center (HMDC) August 1, 2013 1. Overview

More information

IBM Content Manager OnDemand on Cloud

IBM Content Manager OnDemand on Cloud Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION

CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between CDS Office Technologies

More information

Fxhoster VPS Agreement

Fxhoster VPS Agreement Fxhoster VPS Agreement The Fxhoster VPS Agreement governs the terms and conditions in which You ( Client, You or Your ) purchase a new VPS through Fxhoster. You hereby agreed to this Agreement. The terms

More information

Managed Security Services - Event Collector Implementation, Configuration and Management

Managed Security Services - Event Collector Implementation, Configuration and Management Service Description Managed Security Services - Event Collector Implementation, Configuration and Management The services described herein are governed by the terms and conditions of the agreement specified

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement governs the use of the Services under the terms of the Master Service Agreement (the Agreement ) between CODEBLUE TECHNOLOGY

More information

SLA. Service Level Agreement v1.0. Published: September 2014

SLA. Service Level Agreement v1.0. Published: September 2014 SLA Service Level Agreement v1.0 Published: September 2014 The information contained in this document represents the current view of Circuit ID on the issues discussed as of the date of publication. Because

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

CERANET SERVICE LEVEL AGREEMENT

CERANET SERVICE LEVEL AGREEMENT Page 1 of 5 CERANET SERVICE LEVEL AGREEMENT This CeraNet Service Level Agreement ("SLA") applies to all dedicated servers and Co-location services. The Client agrees that CeraNet internal measurements

More information

IBM Emptoris Managed Cloud Delivery

IBM Emptoris Managed Cloud Delivery Service Description IBM Emptoris Managed Cloud Delivery This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

Managed WAN SLA. Contents

Managed WAN SLA. Contents Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet

More information

IBM Managed Security Services for Security

IBM Managed Security Services for  Security Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus

More information

ONE OFFICE LITE - PRODUCT SPECIFICATION

ONE OFFICE LITE - PRODUCT SPECIFICATION 1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your

More information

Managed WAN SLA. Contents

Managed WAN SLA. Contents Managed WAN SLA Contents Terminology... 2 Service Description... 2 General... 2 Levels and Offerings... 2 Private Network Services... 2 Features... 2 Internet Access... 3 Features... 3 Service Level Metrics...

More information

IBM PureApplication Service

IBM PureApplication Service Service Description IBM PureApplication Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

IBM Cloud Video Streaming

IBM Cloud Video Streaming Service Description IBM Cloud Video Streaming This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

EU Data Protection Agreement

EU Data Protection Agreement EU Data Protection Agreement This Data Protection Agreement ("Agreement") is entered into by and between TechTarget, Inc., a Delaware corporation with a principle place of business at 275 Grove Street,

More information

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Security. ITM Platform

Security. ITM Platform Security ITM Platform Contents Contents... 0 1. SaaS and On-Demand Environments... 1 1.1. ITM Platform configuration modes... 1 1.2. Server... 1 1.3. Application and Database... 2 1.4. Domain... 3 1.5.

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

Schedule Document. Managed Firewall Services. Public. Node4 Limited 10/12/2010

Schedule Document. Managed Firewall Services. Public. Node4 Limited 10/12/2010 Schedule Document Managed Firewall Services Public Node Limited 0//00 Node Limited Millennium Way Pride Park Derby DE 8HZ Tel: 08 3 fax: 08 3 info@node.co.uk www.node.co.uk SCHEDULE Additional terms, Service

More information

PEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels

PEPPOL Transport Infrastructure Agreements Annex 3 Services and service levels Table of contents 1. Scope for this document... 2 2. PEPPOL Services... 2 3. PEPPOL SML Service availability... 4 4. PEPPOL SMP and PEPPOL AP Service availability... 4 5. Performance, Capacity and Scalability...

More information

Some words used in these Hosted Skype for Business Services Terms and Conditions have particular meanings:

Some words used in these Hosted Skype for Business Services Terms and Conditions have particular meanings: Hosted Skype for Business at Rackspace Services Terms and Conditions In addition to the other terms of the Agreement, your use of Hosted Skype for Business Services is subject to the following additional

More information

IBM Commerce Insights

IBM Commerce Insights Service Description IBM Commerce Insights This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

SCHEDULE DOCUMENT MANAGED FIREWALL SERVICES PUBLIC NODE4 LIMITED 17/07/2017

SCHEDULE DOCUMENT MANAGED FIREWALL SERVICES PUBLIC NODE4 LIMITED 17/07/2017 SCHEDULE DOCUMENT MANAGED FIREWALL SERVICES PUBLIC NODE LIMITED 7/07/07 SCHEDULE DOCUMENT MANAGED FIREWALL SERVICES Additional terms, Service Description & Service Level Agreement for the Managed Firewall

More information

The following security and privacy-related audits and certifications are applicable to the Lime Services:

The following security and privacy-related audits and certifications are applicable to the Lime Services: LIME SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: September 26, 2016 FinAccel s Corporate Trust Commitment FinAccel (FinAccel Pte Ltd) is committed to achieving and maintaining the trust of our customers.

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management

More information

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

SPECIFIC TERMS METRO ETHERNET SERVICE

SPECIFIC TERMS METRO ETHERNET SERVICE SPECIFIC TERMS METRO ETHERNET SERVICE This Specific Terms form the Agreement between you and SP Telecommunications Pte Ltd (Reg No. 199700517K) and may be amended by the Application Form. It is agreed

More information

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

ANNEX. Organizational and technical measures

ANNEX. Organizational and technical measures ANNEX Organizational and technical measures The Data Processor has implemented the measures as described in this exhibit insofar as the respective measure contributes or is capable of contributing directly

More information

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK

CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK CSBANK ONLINE ENROLLMENT FORM CITIZENS STATE BANK To sign up for Citizens State Bank s Internet Banking Services, complete all information on this form. Please read the CSBank Online Internet Banking Agreement

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts. Web Email Hosting Agreement 1. General provisions 1. The delivery and the provision of hosting services by WWW INFOTECH is based on the general terms and conditions of WWW INFOTECH LLP and these terms

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

IBM Hosted Application Security Services - Pre-Production Application Scanning

IBM Hosted Application Security Services - Pre-Production Application Scanning IBM Hosted Application Security Services - Pre-Production Application Scanning FR_INTC-8839-02 2-2012 Page 1 of 21 Table of Contents IBM Hosted Application Security Services -...1 Pre-Production Application

More information

Business Lite powered by Microsoft Office 365

Business  Lite powered by Microsoft Office 365 Business Email Lite powered by Microsoft Office 365 Schedule to the General Terms Contents A note on you... 2 1. Service Summary... 2 2. Standard Service Components... 2 3. Service Management Boundary...

More information

IBM Sterling B2B Services

IBM Sterling B2B Services Service Description IBM Sterling B2B Services This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients of

More information

A1 Information Security Supplier / Provider Requirements

A1 Information Security Supplier / Provider Requirements A1 Information Security Supplier / Provider Requirements Requirements for suppliers & providers A1 Information Security Management System Classification: public Seite 1 Version history Version history

More information

PRIVACY POLICY CORPORATE CUSTOMER

PRIVACY POLICY CORPORATE CUSTOMER CORPORATE CUSTOMER PRIVACY POLICY This privacy policy applies when (Telia) supplies products and services to a corporate customer (the customer) and where Telia is the personal data controller. The policy

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018) By using On Schedule web application you are making an agreement with us, code fish, according to the current terms and conditions at the time of use. Upon the terms and conditions changing you will be

More information

SIMATIC. Process Control System PCS 7 SIMATIC Management Console (V9.0) Security information 1. Preface 2. Basics 3

SIMATIC. Process Control System PCS 7 SIMATIC Management Console (V9.0) Security information 1. Preface 2. Basics 3 Security information 1 Preface 2 SIMATIC Process Control System PCS 7 SIMATIC Management Console (V9.0) Operating Manual Basics 3 Installation of the Management Console 4 Operator control 5 Menus and dialog

More information

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure.

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure. Security In today s world, the requirement to focus on building secure solutions and infrastructure has become an important part of the value that businesses deliver to customers and resellers. This document

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

IBM Partner Engagement Manager

IBM Partner Engagement Manager Service Description IBM Partner Engagement Manager This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Master Service Level Agreement

Master Service Level Agreement Master Service Level Agreement Partner - Customer Version 1.0 May 2015 Table of contents Introduction... 2 Abbreviations and definitions... 2 1. General... 3 1.1 Relevance... 3 1.2 Changes to the SLA...

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information