WORK AUTHORIZATION NO. 4 CONTRACT FOR PROFESSIONAL ACCOUNTING SERVICES

Size: px
Start display at page:

Download "WORK AUTHORIZATION NO. 4 CONTRACT FOR PROFESSIONAL ACCOUNTING SERVICES"

Transcription

1 WORK AUTHORIZATION NO. 4 CONTRACT FOR PROFESSIONAL ACCOUNTING SERVICES THIS WORK AUTHORIZATION is made pursuant to the terms and conditions of Article 5 of the Professional Accounting Services Contract No. 601CT (the Agreement ) entered into by and between the State of Texas on September 15, 2015, acting by and through the Texas Department of Transportation (the State), and Deloitte & Touche LLP (Deloitte & Touche). PART I. Vendor will perform professional services as specifically described in Exhibit B, which is attached hereto and made a part of this Work Authorization. In addition to any other responsibilities of the State set forth in the Agreement, State shall perform those responsibilities and activities detailed in Exhibit A, which is attached hereto and made a part of this Work Authorization. PART II. The Not to Exceed Amount payable under this Work Authorization, as defined in Section 5.4 of the Agreement, is $129, The pricing model for this work authorization is time and materials, based upon loaned staff for 689 hrs. as follows: Resource Rate Hours Total #1 Manager $220 6 weeks * 40 hrs./week = 240 hrs. $52,800 #2 Senior Consultant $170 6 weeks * 40 hrs./week= 240 hrs. $40,800 #3 Consultant $150 4 weeks * 40 hrs./week= 160 hrs. $24,000 #4 Senior Manager $240 7 weeks * 5 hrs./week = 35 hrs $8,400 #5 Principal $280 7 weeks * 2 hrs./week = 14 hrs $3,920 Total 689 hrs. $129,920 PART III. Payment to Vendor for services established under this Work Authorization shall be made in accordance with Articles 3 thru 5 of the Agreement. PART IV. This Work Authorization shall become effective on the date of the final acceptance of the parties hereto and shall terminate on October 19, PART V. This Work Authorization does not waive the parties responsibilities and obligations provided under the Agreement.

2 IN WITNESS WHEREOF, this Work Authorization is executed in duplicate counterparts and hereby accepted and acknowledged below. DELOTTE & TOUCHE LLP THE STATE OF TEXAS (Signature) (Signature) Michael Wyatt Linda Sexton (Printed Name) (Printed Name) Principal, Cyber Risk Depty Dir Toll Operations Div, (Title) (Title) /29/2018 (Date) (Date) LIST OF EXIBITS Exhibit A Services to be provided by the State Exhibit B Services to be provided by the Vendor

3 EXHIBIT A SERVICES TO BE PROVIDED BY THE STATE The following are services and/or resources the Department of Transportation will provide to support the execution of the Work Authorization No 4 (PO 601CT ): Direct oversight and guidance of Deloitte & Touche LLP personnel Review and approval of contractor applications reviews performed by Deloitte & Touche LLP personnel Provide Deloitte & Touche personnel to access the facility, as necessary, to execute the scope of work as outlined in EXHIBIT B Provide Deloitte & Touche access to TXDOT systems and tools, as needed, to execute the scope of work as outlined in EXHIBIT B Identify the TXDOT and third party stakeholders who need to participate in this assessment Obtain approval from the third party organization to allow Deloitte & Touche perform the assessment Identify a TXDOT personnel to function as the trusted agent. The "trusted agent" is expected to o Identify and prioritize target servers, network ranges and web applications, including those of third party systems o Make decisions to proceed with applicable vulnerability scans and other assessment activities, including coordination with third parties o Work with stakeholders to gather information and details required for the execution of the scans, including credentials, server, database and application access o Review the assessment reports and control as needed distribution of the reports. The sensitive nature of information contained in the reports requires a key stakeholder being responsible for managing the communication aspects o Identify time period for communication to the appropriate stakeholders for high severity gaps identified in production environment o Coordinate and authorize Deloitte s engagement staff access to TXDOT and third party IT components considered for vulnerability testing o Review and attest the systems testing agreement prior to performing the initial vulnerability scanning activity o Approving the time window for performing the vulnerability scans. In order to avoid interruptions, approve testing windows during non business hours unless TXDOT requires such testing during business hours. Review and approve the system testing agreement prior to Deloitte & Touche performing the vulnerability scanning activity

4 EXHIBIT B SERVICES TO BE PROVIDED BY VENDOR The following outlines the services and scope of work to be performed by Deloitte & Touche LLP in support of Work Authorization No 4 (PO 601CT ): Provide security risk assessment of the TXDOT systems (TxTag and Vector), and it s underlying server infrastructure. This security risk assessment will include: o Understand business and system landscape Define the systems and data sources that contain cardholder information Document business requirements that support the systems and processes with cardholder information Review data paths and integration with other systems where cardholder information is exchanged Obtain and review the last annual PCI assessment report, in addition to the current remediation plan. o Conduct vulnerability scanning Obtain and review the last four quarters of vulnerability scan findings Conduct a vulnerability assessment of the two web applications (TxTag and Vector containing around 100 web pages) and its support server infrastructure (a total of 14 servers). The vulnerability assessment will be conducted using automated testing tools like IBM AppScan and Tenable Nessus. The vulnerability assessment will be performed on the non production test environment Depending on the gaps identified, conduct a security configuration review of selected IT infrastructure components. o Perform safeguards review Conduct a workshop with system stakeholders to review the network and application architecture Conduct 8 10 workshops with system stakeholders to review implementation Payment Card Industry (PCI) Data Security Standards (DSS) v3.2.1 safeguards on the in scope IT infrastructure (described in the vulnerability scanning task). The following areas will be reviewed: Build and Maintain a Secure Network and Systems Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy. o Report Findings Conduct two workshops with systems stakeholders to review gaps and severity Work with the systems stakeholders to document and submit the gap analysis report.

5 Perform the security risk assessment during from the hours of 8:00 am to 5:00 pm or as agreed to, Monday thru Friday, for seven weeks. The proposed timeline is illustrated in the below figure: A progress report will accompany each invoice showing the percentage of Work Completed to date under the applicable Work Authorization. Provide TxDOT trusted agent with the following work products o Weekly progress reports indicating the accomplishments for that week, planned activities for the next two weeks, risks and issues o Interim reports vulnerability scan report and safeguards review report provided to TxDOT as the outcome of those activities o Final gap analysis report describing the findings and potential risk levels. We will use TxDOT s risk rating criteria for the identified gaps.

6 Certificate Of Completion Envelope Id: D1DDF1A AB2B719294F6B9FF8 Status: Completed Subject: Please DocuSign: Security Risk Assesment W A 4.pdf Source Envelope: Document Pages: 5 Signatures: 1 Envelope Originator: Certificate Pages: 1 Initials: 0 Andy Juarez AutoNav: Enabled EnvelopeId Stamping: Enabled 125 E. 11th Street Austin, TX Time Zone: (UTC-06:00) Central Time (US & Canada) andy.juarez@txdot.gov IP Address: Record Tracking Status: Original 8/29/2018 8:11:56 AM Holder: Andy Juarez andy.juarez@txdot.gov Location: DocuSign Signer Events Signature Timestamp Linda Sexton Linda.Sexton@txdot.gov Depty Dir, Toll Operations Div Texas Department of Transportation Security Level: , Account Authentication (None) Electronic Record and Signature Disclosure: Not Offered via DocuSign Signature Adoption: Uploaded Signature Image Using IP Address: Sent: 8/29/2018 8:15:49 AM Viewed: 8/29/2018 8:27:36 AM Signed: 8/29/2018 8:30:46 AM In Person Signer Events Signature Timestamp Editor Delivery Events Status Timestamp Agent Delivery Events Status Timestamp Intermediary Delivery Events Status Timestamp Certified Delivery Events Status Timestamp Carbon Copy Events Status Timestamp Notary Events Signature Timestamp Envelope Summary Events Status Timestamps Envelope Sent Hashed/Encrypted 8/29/2018 8:15:50 AM Certified Delivered Security Checked 8/29/2018 8:27:36 AM Signing Complete Security Checked 8/29/2018 8:30:46 AM Completed Security Checked 8/29/2018 8:30:46 AM Payment Events Status Timestamps

DocuSign Envelope ID: C5E21E95-3DB6-4C6D-9F B6F0E

DocuSign Envelope ID: C5E21E95-3DB6-4C6D-9F B6F0E City of Denton Project Mgr. Approval: James Mays 8/22/2018 Construction Admin City of Denton Purchasing Approval: Cindy Alonzo 8/22/2018 Senior Buyer Certificate Of Completion Envelope Id: C5E21E953DB64C6D9F702026587B6F0E

More information

Docusign City Council Transmittal Coversheet

Docusign City Council Transmittal Coversheet DocuSign Envelope 6A521068-9405-4D18-801B-6AE198DE37CB Docusign City Council Transmittal Coversheet File Name Purchasing Contact City Council Target Date Granicus # Ordinance # DocuSign Envelope 6A521068-9405-4D18-801B-6AE198DE37CB

More information

Docusign City Council Transmittal Coversheet

Docusign City Council Transmittal Coversheet DocuSign Envelope 5E7084FE-449B-4F7E-9BA2-E97F6B8812A8 Docusign City Council Transmittal Coversheet File Name Purchasing Contact City Council Target Date Contract Value Piggy Back Option Contract Expiration

More information

Docusign City Manager Approval Transmittal Coversheet

Docusign City Manager Approval Transmittal Coversheet DocuSign Envelope 026E97DB-DD7F-4B98-A30E-EFF489D41228 Docusign City Manager Approval Transmittal Coversheet File Name Purchasing Contact DocuSign Envelope 026E97DB-DD7F-4B98-A30E-EFF489D41228 Request

More information

OffshoreEnergy. Integrated Management System Policy

OffshoreEnergy. Integrated Management System Policy DocuSign Envelope ID: A22FF702-D432-4AEA-AB59-D8CFE9C9EEEF OffshoreEnergy Ground Floor 15 Bowling Green Lane London EC1R 0BD E: admin@offshore-energy.co W: www.offshore-energy.co T: +44 (0) 203 478 3968

More information

OffshoreEnergy. Environmental Policy

OffshoreEnergy. Environmental Policy DocuSign Envelope ID: EDDEC625-2677-4A9C-88FF-2A81777C3FFD OffshoreEnergy Ground Floor 15 Bowling Green Lane London EC1R 0BD E: admin@offshore-energy.co W: www.offshore-energy.co T: +44 (0) 203 478 3968

More information

CONTRACT SUMMARY. This contract action has completed the Department s routing process and has received the required approvals for execution.

CONTRACT SUMMARY. This contract action has completed the Department s routing process and has received the required approvals for execution. DocuSign Envelope ID: 1082EDA1-414C-4383-BD0F-225D53E4A007 CONTRACT SUMMARY This contract action has completed the Department s routing process and has received the required approvals for execution. Division/CHD/Office:

More information

THE UNIVERSITY OF TENNESSEE Purchasing Department 5723 Middlebrook Pike Knoxville, TN 37921

THE UNIVERSITY OF TENNESSEE Purchasing Department 5723 Middlebrook Pike Knoxville, TN 37921 DocuSign Envelope ID: 835F4F2C-A64C-4E4B-AD22-9C9FE6F0409E THE UNIVERSITY OF TENNESSEE Purchasing Department 5723 Middlebrook Pike Knoxville, TN 37921 Page 1 of 2 Ship To: C/O Department All University

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Academic Affairs Degree Planning Improvement Program Interactive Degree Mapping Tool, Partnership Exploration Phase

Academic Affairs Degree Planning Improvement Program Interactive Degree Mapping Tool, Partnership Exploration Phase DocuSign Envelope ID: B37A65AD-CE16-4A77-9D8E-162C732D55F8 Academic Affairs Degree Planning Improvement Program Interactive Degree Mapping Tool, Partnership Exploration Phase Project Charter P a g e 1

More information

Mr. Russell James Irby Utilities 7125 Belton Street Fort Worth, TX 76118

Mr. Russell James Irby Utilities 7125 Belton Street Fort Worth, TX 76118 MATERIALS MANAGEMENT DIVISION 901B TEXAS STREET DENTON, TEXAS 76201 940.349.7100 FAX 940.293.1837 May 26, 2017 Mr. Russell James Irby Utilities 7125 Belton Street Fort Worth, TX 76118 Ref: RFP 6005 Supply

More information

Dedicated to Quality and Service

Dedicated to Quality and Service DocuSign Envelope ID: 16A227B7-BD49-423B-9963-44990F79E363 MATERIALS MANAGEMENT DIVISION 901B TEXAS STREET DENTON, TEXAS 76201 940.349.7100 FAX 940.293.1837 March 8, 2016 Mr. David Price Anixter Power

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

CERTIFICATE OF LEVEL OF SERVICE (CLOS) EXTENSION SUBMISSION REQUIREMENTS FOR COMPLETENESS REVIEW

CERTIFICATE OF LEVEL OF SERVICE (CLOS) EXTENSION SUBMISSION REQUIREMENTS FOR COMPLETENESS REVIEW Building and Development Services Department 1112 Manatee Ave West, Suite 408 Bradenton, FL 34205 Phone: (941) 749 3070 www.mymanatee.org A 12 CERTIFICATE OF LEVEL OF SERVICE (CLOS) EXTENSION SUBMISSION

More information

Code of Ethics Certification 2018 CHECKLIST

Code of Ethics Certification 2018 CHECKLIST Code of Ethics Certification 2018 CHECKLIST Medical technology companies (both AdvaMed members and non-members) may participate in this certification program. The certification affirms that the company

More information

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING, dated, is between the Davie County North Carolina Register of Deeds office ( COUNTY ), and ( COMPANY ) with offices located

More information

Request for Proposal for Technical Consulting Services

Request for Proposal for Technical Consulting Services Request for Proposal for Technical Consulting Services The Node.js Foundation is requesting proposals from highly qualified consultants with demonstrated expertise in providing Node.js technical consultation

More information

Request for Proposal (RFP)

Request for Proposal (RFP) Request for Proposal (RFP) BOK PENETRATION TESTING Date of Issue Closing Date Place Enquiries Table of Contents 1. Project Introduction... 3 1.1 About The Bank of Khyber... 3 1.2 Critical Success Factors...

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

CSWIP Program. The following documents are included in this package. Please scroll down to view all documents or click on the BLUE link.

CSWIP Program. The following documents are included in this package. Please scroll down to view all documents or click on the BLUE link. CSWIP Program The following documents are included in this package. Please scroll down to view all documents or click on the BLUE link. TABLE OF CONTENTS CSWIP Program Information CSWIP Application Body

More information

China Code of Ethics Certification 2018 CHECKLIST

China Code of Ethics Certification 2018 CHECKLIST China Code of Ethics Certification 2018 CHECKLIST Medical technology companies in China (both AdvaMed members and non-members) may participate in this certification program. T he certification affirms

More information

Service Description: Advanced Services Fixed Price

Service Description: Advanced Services Fixed Price Page 1 of 1 Service Description: Advanced Services Fixed Price Cisco ACI Advise and Implement Service - Large (ASF-DCV1-ACI-PDV- L) This document describes Advanced Services Fixed Price: Cisco ACI Advise

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

Development Authority of the North Country Governance Policies

Development Authority of the North Country Governance Policies Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

IBM Managed Security Services - Vulnerability Scanning

IBM Managed Security Services - Vulnerability Scanning Service Description IBM Managed Security Services - Vulnerability Scanning This Service Description describes the Service IBM provides to Client. 1.1 Service IBM Managed Security Services - Vulnerability

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

Payment Card Industry (PCI) 3-D Secure (PCI 3DS) Qualification Requirements for 3DS Assessors

Payment Card Industry (PCI) 3-D Secure (PCI 3DS) Qualification Requirements for 3DS Assessors Payment Card Industry (PCI) 3-D Secure (PCI 3DS) Qualification Requirements for 3DS Assessors Version 1.0 November 2017 Document Changes Date Version Description November 2017 1.0 Initial Release of the

More information

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives As companies extend their online

More information

Magento Enterprise Edition Customer Support Guide

Magento Enterprise Edition Customer Support Guide Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part

More information

Information Technology Procedure IT 3.4 IT Configuration Management

Information Technology Procedure IT 3.4 IT Configuration Management Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance Card-not-present Merchants, All Cardholder Data Functions Fully Outsourced For use with

More information

Cisco Data Center Accelerated Deployment Service for Nexus 9000 (ASF-DCV1-NEX-ADS)

Cisco Data Center Accelerated Deployment Service for Nexus 9000 (ASF-DCV1-NEX-ADS) Page 1 of 6 Service Description: Advanced Services Fixed Price Cisco Data Center Accelerated Deployment Service for Nexus 9000 (ASF-DCV1-NEX-ADS) This document describes Advanced Services Fixed Price:

More information

PCI Compliance. Network Scanning. Getting Started Guide

PCI Compliance. Network Scanning. Getting Started Guide PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the

More information

PCI DSS 3.2 AWARENESS NOVEMBER 2017

PCI DSS 3.2 AWARENESS NOVEMBER 2017 PCI DSS 3.2 AWARENESS NOVEMBER 2017 1 AGENDA PCI STANDARD OVERVIEW PAYMENT ENVIRONMENT 2ACTORS PCI ROLES AND RESPONSIBILITIES MERCHANTS COMPLIANCE PROGRAM PCI DSS 3.2 REQUIREMENTS 2 PCI STANDARD OVERVIEW

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK GOODS AND SERVICES CONTRACTS Page 1 of 5 RFP 16-PR-DEM-33 Comprehensive All-Hazards

More information

Payment Card Industry (PCI) Qualified Integrator and Reseller (QIR)

Payment Card Industry (PCI) Qualified Integrator and Reseller (QIR) Payment Card Industry (PCI) Qualified Integrator and Reseller (QIR) Implementation Instructions Version 4.0 March 2018 Document Changes Date Version Description August 2012 1.0 Original Publication November

More information

Service Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE)

Service Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE) Page 1 of 1 Service Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE) This document describes Advanced Services Fixed Price: Cisco UCCE Branch

More information

ISACA Cincinnati Chapter March Meeting

ISACA Cincinnati Chapter March Meeting ISACA Cincinnati Chapter March Meeting Recent and Proposed Changes to SOC Reports Impacting Service and User Organizations. March 3, 2015 Presenters: Sayontan Basu-Mallick Lori Johnson Agenda SOCR Overview

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Document Details Title Description Version 1.1 Author Classification Technical Vulnerability and Patch Management Policy

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING, dated, is between Caldwell County, North Carolina ( COUNTY ), and COMPANY ) with offices at. Caldwell County desires to

More information

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design

The Internet Society. on behalf of. The IETF Administrative Oversight Committee. Request for Proposal. RFC Editor RFC Format CSS Design The Internet Society on behalf of The IETF Administrative Oversight Committee Request for Proposal RFC Editor RFC Format CSS Design Date of Issuance: July 22, 2016 Proposal Submission Deadline: September

More information

Federal Vendor Portal & e-invoicing User Guide. January 2018

Federal Vendor Portal & e-invoicing User Guide. January 2018 Federal Vendor Portal & e-invoicing User Guide January 2018 Federal Vendor Portal IMPORTANT NOTICE TO: Deloitte s Federal Practice Suppliers As part of our due diligence to pre-qualify suppliers for potential

More information

POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS

POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS APRIL 4, 2016 VAT ID FI0103579 1 (10) Contents 1 General... 2 2 P.O. Box... 2 2.1 Service content... 2 2.2 Service level agreement... 2 2.3 Delivery of keys...

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

CIP Standards Development Overview

CIP Standards Development Overview CIP Standards Development Overview CSSDTO706 Meeting with FERC Technical Staff July 28, 2011 Objectives Historical Timeline CIP-002-4 CIP-005-4 CIP Version 5 2 Project 2008-06 Overview FERC Order 706 SDT

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Merchants Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission This

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

SPECIFIC PROCUREMENT NOTICE IT SERVICES

SPECIFIC PROCUREMENT NOTICE IT SERVICES SPECIFIC PROCUREMENT NOTICE IT SERVICES Funding source: Sector: Asian Infrastructure Investment Bank (AIIB) Information Technology Project Name: On-site IT Security Service Project No. AIIB CP - 00043

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance No Electronic Storage, Processing, or Transmission of Cardholder Data Version 1.2 October

More information

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase Advanced Certifications PA-DSS and P2PE Erik Winkler, VP, ControlCase ControlCase Annual Conference Miami, Florida USA 2017 PCI Family of Standards Ecosystem of payment devices, applications, infrastructure

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

SAN FRANCISCO PUBLIC UTILITIES COMMISSION INFRASTRUCTURE CONSTRUCTION MANAGEMENT PROCEDURES

SAN FRANCISCO PUBLIC UTILITIES COMMISSION INFRASTRUCTURE CONSTRUCTION MANAGEMENT PROCEDURES SAN FRANCISCO PUBLIC UTILITIES COMMISSION INFRASTRUCTURE CONSTRUCTION MANAGEMENT PROCEDURES SECTION: SFPUC INFRASTRUCTURE CONSTRUCTION MANAGEMENT PROCEDURE NO: 048 TITLE: NEW AND REVISED TASK ORDER PROCESSING

More information

Site Data Protection (SDP) Program Update

Site Data Protection (SDP) Program Update Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape

More information

HIPAA Privacy, Security and Breach Notification

HIPAA Privacy, Security and Breach Notification HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

Self-Assessment Questionnaire A

Self-Assessment Questionnaire A Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance All cardholder data functions outsourced. No Electronic Storage, Processing, or Transmission

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Service Description: Identity Services Engine Implementation-Subscription Service

Service Description: Identity Services Engine Implementation-Subscription Service Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.

More information

Request for Proposals for Data Assessment and Analysis

Request for Proposals for Data Assessment and Analysis Request for Proposals for Data Assessment and Analysis Introduction The Center for NYC Neighborhoods requires the services of a consultant to create a data architecture with the overall goal of assessing

More information

Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE)

Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) Page 1 of 9 Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) This document describes Advanced Services Fixed Price Cisco

More information

Data Security Standard

Data Security Standard Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.2 April 2016 2006-2016 PCI Security Standards Council, LLC. All Rights Reserved.

More information

Texas Commission on Fire Protection

Texas Commission on Fire Protection 2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing

More information

IAB DIGITAL DATA SOLUTIONS CERTIFICATION. RECERTIFICATION HANDBOOK August 2016

IAB DIGITAL DATA SOLUTIONS CERTIFICATION. RECERTIFICATION HANDBOOK August 2016 IAB DIGITAL DATA SOLUTIONS CERTIFICATION RECERTIFICATION HANDBOOK August 2016 Contents Recertification Handbook... 1 1 Introduction... 3 2 Philosophy of Recertification... 3 3 Qualifying Recertification

More information

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business Comodo HackerGuardian PCI Security Compliance The Facts What PCI security means for your business Overview The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 requirements intended

More information

SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1

SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1 2000 Powell Street, Ste. 600 Emeryville, CA 94608 USA +1.510.452.8000 main +1.510.452.8001 fax www.scsglobalservices.com SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD-40-003

More information

Standard CIP Cyber Security Systems Security Management

Standard CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Certified Commissioning Technician (CxT) Application

Certified Commissioning Technician (CxT) Application 1518 K Street NW Washington, DC 20005 Tel: (202) 737-7775 Fax: (202) 638-4833 Email: info@commissioning.org Website: www.commissioning.org Certified Commissioning Technician () Application First Name Middle

More information

APPLICATION FOR AIR EMISSION TESTING BODY (AETB) ACCREDITATION

APPLICATION FOR AIR EMISSION TESTING BODY (AETB) ACCREDITATION APPLICATION FOR AIR EMISSION TESTING BODY (AETB) ACCREDITATION Source Emission Measurement Quality Assurance Programs (SEMQAP) Stack Testing Accreditation Council (STAC) A. Purpose of Application: Mark

More information

Guide to Simple Network Design PCATS Recommendation, April 14, 2011

Guide to Simple Network Design PCATS Recommendation, April 14, 2011 Guide to Simple Network Design PCATS Recommendation, April 14, 2011 Abstract This document provides guidance on simple network design for typical C-Store environments. In addition, this document provides

More information

Navigating the PCI DSS Challenge. 29 April 2011

Navigating the PCI DSS Challenge. 29 April 2011 Navigating the PCI DSS Challenge 29 April 2011 Agenda 1. Overview of Threat and Compliance Landscape 2. Introduction to the PCI Security Standards 3. Payment Brand Compliance Programs 4. PCI DSS Scope

More information

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority Procurement and Contracts Dept., MA-29 2733 Crystal Drive

More information

National Association of Steel Pipe Distributors Scholarship Program

National Association of Steel Pipe Distributors Scholarship Program Frequently Asked Questions National Association of Steel Pipe Distributors Scholarship Program Who is eligible to apply? When is the application deadline? When is the recommendation deadline? Should I

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-1 3. Purpose: Standard CIP-005 requires the identification and protection of the Electronic Security Perimeter(s)

More information

Requirements & Potential Costs for SAQ D

Requirements & Potential Costs for SAQ D Requirements & Potential Costs for SAQ D The University of Utah prefers to use vendors who provide web host based (Cloud) payment card processing or who will redirect the payment portion of the software

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3)

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) Page 1 of 8 Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) This document describes Cisco Technical Services Advantage support services. Related Documents: This document

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

PCI DSS Compliance and the Cloud

PCI DSS Compliance and the Cloud PCI DSS Compliance and the Cloud Daniel Farr, Managing Consultant CyberSecurity Consulting PCI & Compliance Services DF&IR Risk Reduction Solutions www.foregenix.com A Brief History of Foregenix Foregenix

More information

Summary. Program Overview. Notice Type: Request for Proposal. Short Title: CEI Industrial Refrigeration Technical Support

Summary. Program Overview. Notice Type: Request for Proposal. Short Title: CEI Industrial Refrigeration Technical Support Notice Type: Request for Proposal Short Title: CEI Industrial Refrigeration Technical Support Posted date: December 1, 2015 E-mail response date: December 31, 2015 Point of contact at VEIC: Greg Baker

More information

Application for Social Entrepreneurship Legal Services Clinic 1

Application for Social Entrepreneurship Legal Services Clinic 1 Application for Social Entrepreneurship Legal Services Clinic 1 Application deadline: Please sign (1) this application, (2) the attached acknowledgement and waiver, and (3) the attached name, likeness

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

Service Description of Advanced Services: Focused Technical Support and Network Optimization Support

Service Description of Advanced Services: Focused Technical Support and Network Optimization Support Back to Table of Contents Service Description of Advanced Services: Focused Technical Support and Network Optimization Support This document describes Focused Technical Support (FTS) and Network Optimization

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.2 April 2016 Section 1: Assessment Information Instructions for Submission

More information

Section 1: Assessment Information

Section 1: Assessment Information Section 1: Assessment Information Instructions for Submission This document must be completed as a declaration of the results of the merchant s self-assessment with the Payment Card Industry Data Security

More information

REQUEST FOR DRI RECERTIFICATION BY CONTINUING EDUCATION UNITS

REQUEST FOR DRI RECERTIFICATION BY CONTINUING EDUCATION UNITS REQUEST FOR DRI RECERTIFICATION BY CONTINUING EDUCATION UNITS DRI recertification may be accomplished through continuing education units or reexamination. To request recertification by CEU s, DRI s must

More information

SECTION 10 CONTRACTING FOR PROFESSIONAL SERVICES CONSULTANT COMPETITIVE NEGOTIATION ACT (CCNA)

SECTION 10 CONTRACTING FOR PROFESSIONAL SERVICES CONSULTANT COMPETITIVE NEGOTIATION ACT (CCNA) SECTION 10 CONTRACTING FOR PROFESSIONAL SERVICES CONSULTANT COMPETITIVE NEGOTIATION ACT (CCNA) 10.0 INTRODUCTION The purpose of this procedure is to provide guidance for hiring professional firms for architectural,

More information

Spillemyndigheden s Certification Programme. Instructions on Penetration Testing SCP EN.1.1

Spillemyndigheden s Certification Programme. Instructions on Penetration Testing SCP EN.1.1 SCP.04.00.EN.1.1 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 1.3 Applicability... 3 2 Certification... 4 2.1 Certification frequency...

More information