SOFTWARE DEVELOPMENT, PROGRAMMING AND IMPLEMENTATION

Size: px
Start display at page:

Download "SOFTWARE DEVELOPMENT, PROGRAMMING AND IMPLEMENTATION"

Transcription

1 Class 42 Scientific and technological services and research and design relating ereto; industrial analysis and research services; design and development of computer hardware and software. Explanatory Note Class 42 includes mainly services provided by persons, individually or collectively, in relation to e eoretical and practical aspects of complex fields of activities; such services are provided by members of professions such as chemists, physicists, engineers, computer programmers, etc. This Class includes, in particular: - e services of engineers and scientists who undertake evaluations, estimates, research and reports in e scientific and technological fields (including technological consultancy); - computer and technology services for securing computer data and personal and financial information and for e detection of unauorized access to data and information; - scientific research services for medical purposes. This Class does not include, in particular: - business research and evaluations (Cl. 35); - word processing and computer file management services (Cl. 35); - financial and fiscal evaluations (Cl. 36); - mining and oil extraction (Cl. 37); - computer (hardware) installation and repair services (Cl. 37); - services provided by e members of professions such as medical doctors, veterinary surgeons, psychoanalysts (Cl. 44); - medical treatment services (Cl. 44); - garden design (Cl. 44); - legal services (Cl. 45). Basic No. Indication IT SERVICES computer system analysis data security consultancy internet security consultancy monitoring of computer systems by remote access outsource service providers in e field of information technology technical writing SOFTWARE DEVELOPMENT, PROGRAMMING AND IMPLEMENTATION computer programming computer software design creating and maintaining web sites for oers creating and designing website-based indexes of information for oers [information technology services] Class 42 - Page 1

2 installation of computer software maintenance of computer software updating of computer software COMPUTER HARDWARE DEVELOPMENT consultancy in e design and development of computer hardware HOSTING SERVICES AND SOFTWARE AS A SERVICE AND RENTAL OF SOFTWARE cloud computing rental of computer software electronic data storage hosting computer sites [web sites] off-site data backup providing search engines for e internet server hosting software as a service [SaaS] rental of web servers RENTAL OF COMPUTER HARDWARE AND FACILITIES computer rental rental of web servers IT CONSULTANCY, ADVISORY AND INFORMATION SERVICES computer software consultancy computer security consultancy information technology [IT] consultancy providing information on computer technology and programming via a web site IT SECURITY, PROTECTION AND RESTORATION computer virus protection services electronic monitoring of personally identifying information to detect identity eft via e internet electronic monitoring of credit card activity to detect fraud via e internet monitoring of computer systems to detect breakdowns monitoring of computer systems for detecting unauorized access or data breach recovery of computer data unlocking of mobile phones Class 42 - Page 2

3 DATA DUPLICATION AND CONVERSION SERVICES, DATA CODING SERVICES conversion of data or documents from physical to electronic media conversion of computer programs and data, oer an physical conversion data encryption services digitization of documents [scanning] duplication of computer programs SCIENCE AND TECHNOLOGY SERVICES calibration [measuring] cartography services computer technology consultancy construction drafting consultancy in e field of energy-saving cosmetic research energy auditing engineering handwriting analysis [graphology] mechanical research quality evaluation of standing timber quality evaluation of wool research and development of new products for oers scientific laboratory services scientific research technical research conducting technical project studies technical writing technological consultancy telecommunications technology consultancy water analysis clinical trials MEDICAL AND PHARMACOLOGICAL RESEARCH SERVICES ENGINEERING SERVICES Class 42 - Page 3

4 SURVEYING AND EXPLORATION SERVICES analysis for oil-field exploitation geological surveys geological prospecting geological research land surveying oil prospecting oil-field surveys oil-well testing surveying underwater exploration ARCHITECTURAL AND URBAN PLANNING SERVICES architectural services architectural consultancy urban planning NATURAL SCIENCE SERVICES bacteriological research biological research chemical analysis chemical research chemistry services physics [research] EARTH SCIENCE SERVICES cloud seeding meteorological information research in e field of environmental protection provision of scientific information, advice and consultancy in relation to carbon offsetting weaer forecasting TESTING, AUTHENTICATION AND QUALITY CONTROL auenticating works of art quality control Class 42 - Page 4

5 material testing textile testing vehicle roadworiness testing water analysis DESIGN SERVICES computer system design construction drafting creating and maintaining web sites for oers creating and designing website-based indexes of information for oers [information technology services] design of interior decor interior design dress designing graphic arts design industrial design packaging design styling [industrial design] web site design consultancy Class 42 - Page 5

Template for data breach notifications I

Template for data breach notifications I Template for data breach notifications I I. Identification of the data controller This information is exclusively for the relevant Data Protection Authority, not to be shared with third-parties. 1. Details

More information

BUSINESS & MARKETING EDUCATION CAREER PATHWAYS

BUSINESS & MARKETING EDUCATION CAREER PATHWAYS CTE CAREER PATHWAYS (Beginning 2019-20) LARRY A. RYLE HIGH SCHOOL Questions about Business, Information Technology, or Marketing? Email Brenda Klaas at brenda.klaas@boone.kyschools.us Questions about Agriculture,

More information

Classifications and correspondence tables

Classifications and correspondence tables Classifications and correspondence tables AMF-WTO Regional Workshop on the Compilation of Trade in Services Statistics, in cooperation with UNSD and UN ESCWA 25-28 January 2015 1 Integrated Classifications

More information

Academy Strand Options Data:

Academy Strand Options Data: CISD Page 1 5/2/2007 Academy Strand Options Data: source: US Dept. of Labor: Bureau of Labor Statistics thttp://www.bls.gov/home.htm 2005 data ARCHITECTURE Options Architect Average 18 $70,000.00 nstruction

More information

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria) Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

Recommendations for Implementing an Information Security Framework for Life Science Organizations

Recommendations for Implementing an Information Security Framework for Life Science Organizations Recommendations for Implementing an Information Security Framework for Life Science Organizations Introduction Doug Shaw CISA, CRISC Director of CSV & IT Compliance Azzur Consulting Agenda Why is information

More information

O&M Service for Sustainable Social Infrastructure

O&M Service for Sustainable Social Infrastructure O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing

More information

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA  Compliance & Privacy What You Need to Know Now HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry

More information

Investor Presentation

Investor Presentation Valued Quality. Delivered. Investor Presentation May 2011 For further information contact: aston.swift@intertek.com sarah.ogilvie@intertek.com +44 (0)20 7396 3400 Cautionary statement regarding forward-looking

More information

Public vs private cloud for regulated entities

Public vs private cloud for regulated entities Public vs private cloud for regulated entities DC2: Restricted use The cloud is for everyone but not for everything 2 Opportunity enabler DC2: Restricted use Flexibility SAAS Public Accessibility Agility

More information

2014 Engineering and High Tech Job Titles

2014 Engineering and High Tech Job Titles 030060 Aerodynamic Engineer Engineering 030070 Aeronautical Engineer Engineering 030050 Aerospace Engineer Engineering 030080 Agricultural Engineer Engineering 221250 Air Quality Director Engineering 221200

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

Security of Information Technology Resources IT-12

Security of Information Technology Resources IT-12 Security of Information Technology Resources About This Policy Effective Dates: 11-28-2007 Last Updated: 10-23-2017 Responsible University Administrator: Office of the Vice President for Information Technology

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Programmes and Activities of the. International Cooperation and Assistance. (ICA) Division

Programmes and Activities of the. International Cooperation and Assistance. (ICA) Division Programmes and Activities of the International Cooperation & Assistance (ICA) Division Presentation for Permanent Representatives to the based in Brussels 5 November 2015 Mark Albon Director, Division

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

AGENDA TOWN OF FLOWER MOUND SMARTGROWTH COMMISSION MEETING NOVEMBER 12, 2018 FLOWER MOUND TOWN HALL 2121 CROSS TIMBERS ROAD FLOWER MOUND, TEXAS

AGENDA TOWN OF FLOWER MOUND SMARTGROWTH COMMISSION MEETING NOVEMBER 12, 2018 FLOWER MOUND TOWN HALL 2121 CROSS TIMBERS ROAD FLOWER MOUND, TEXAS AGENDA TOWN OF FLOWER MOUND SMARTGROWTH COMMISSION MEETING NOVEMBER 12, 2018 FLOWER MOUND TOWN HALL 2121 CROSS TIMBERS ROAD FLOWER MOUND, TEXAS AN AGENDA INFORMATION PACKET IS AVAILABLE FOR PUBLIC INSPECTION

More information

2017 SaaS Security Study ABSTRACT

2017 SaaS Security Study ABSTRACT 2017 SaaS Security Study ABSTRACT Data security is a key element of selecting any SaaS provider. Qualtrics surveyed over 200 SaaS security and privacy officers to understand which security and privacy

More information

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA AND  SECURITY. For Healthcare Organizations HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08

More information

$2,500,000 LAND FOR SALE. 375 Drozdyk Drive, Groton CT

$2,500,000 LAND FOR SALE. 375 Drozdyk Drive, Groton CT LAND FOR SALE 375 Drozdyk Drive, Groton CT $2,500,000 Groton Senior Living at Windham Falls Estates Judy Walsh jwalsh@pequotcommercial.com Heather Gianacoplos heatherg@pequotcommercial.com PEQUOT 15 Chesterfield

More information

Mining Engineering Technician: Speciality Mine Exploitation

Mining Engineering Technician: Speciality Mine Exploitation Mining Engineering Technician: Speciality Mine Exploitation FIRST YEAR PHYSICAL BASES OF ENGINEERING 9220001 Core 1st 1st semester 6 7.2 Mechanics. Electricity. Thermodynamics. Fluid mechanics. Classes

More information

Table 5.5. Industry Employment Opportunity Grades, 2012: Native Americans

Table 5.5. Industry Employment Opportunity Grades, 2012: Native Americans 5) American Table 5.5 ranks all industries in terms of their overall grade on American employment opportunity. For each industry we also display their grades for the four dimensions of employment opportunity.

More information

FRAUD-RELATED INTERNAL CONTROLS

FRAUD-RELATED INTERNAL CONTROLS GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. THE NEED FOR INTERNAL CONTROLS Example... 1 Threats to an Organization s Internal Control Environment...

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Measuring and Comparing Achievements of Learning Outcomes in Higher Education in Europe (CALOHEE)

Measuring and Comparing Achievements of Learning Outcomes in Higher Education in Europe (CALOHEE) Measuring and Comparing Achievements of Learning Outcomes in Higher Education in Europe (CALOHEE) CALOHEE Questionnaires on typical degree programmes and typical occupations and tasks Responses of the

More information

Overview. A suite of exceptionally well equipped laboratories;

Overview. A suite of exceptionally well equipped laboratories; Overview A suite of exceptionally well equipped laboratories; More than 3 million of cutting edge equipment available for high end laboratory sample preparation and analysis; Support from STFCs highly

More information

KuppingerCole Whitepaper. by Dave Kearns February 2013

KuppingerCole Whitepaper. by Dave Kearns February 2013 KuppingerCole Whitepaper by Dave Kearns February 2013 KuppingerCole Whitepaper Using Information Stewardship within by Dave Kearns dk@kuppingercole.com February 2013 Content 1. Summary... 3 2. Good information

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

KantanMT.com. Security & Infra-Structure Overview

KantanMT.com. Security & Infra-Structure Overview KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...

More information

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12 SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12 Copyright School Curriculum and Standards Authority, 2015 This document apart from any third party copyright material contained in it may

More information

Notice Basic Information Estimated Contract Value (USD) $400, (Not shown to suppliers) Reference Number Issuing Organization

Notice Basic Information Estimated Contract Value (USD) $400, (Not shown to suppliers) Reference Number Issuing Organization Notice Basic Information Estimated Contract Value (USD) $400,000.00 (Not shown to suppliers) Reference Number 0000213543 Issuing Organization Colorado Mesa University Owner Organization Colorado Mesa University

More information

Autobot - IoT enabled security. For Private circulation only October Risk Advisory

Autobot - IoT enabled security. For Private circulation only October Risk Advisory For Private circulation only October 2018 Risk Advisory Table of contents Background 02 Common Challenges 03 About the AutoBot 04 Capabilities of the AutoBot 05 Future of Autobot 06 The success story

More information

DRAFT 2012 UC Davis Cyber-Safety Survey

DRAFT 2012 UC Davis Cyber-Safety Survey DRAFT 2012 UC Davis Cyber-Safety Survey UNIT INFORMATION Enter the following information. Person completing report Email Phone Unit (include sub-unit information, if appropriate) College/School/Office

More information

Lab Quality Management System- Technical Manager

Lab Quality Management System- Technical Manager TIPS ONLINE TRAINING & CERTIFICATION Information Brochure Training On Lab Quality Management System- Technical Manager Training Code: TIPS/T/LQMS/TM Page 1 of 7 Training Program On Laboratory Quality Management

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Zycus Supplier Network (ZSN) Supplier guide

Zycus Supplier Network (ZSN) Supplier guide Zycus Supplier Network (ZSN) Supplier guide TABLE OF CONTENTS Chapter 1. Register as a potential supplier on Zycus Supplier Network (ZSN)... 3 1.1 Assigning isource Access to Specific Contacts... 9 Chapter

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

Information security in general practice

Information security in general practice Information security in general practice Prevention Protection Preservation racgp.org.au Healthy Profession. Healthy Australia. Information security in general practice Disclaimer The information set out

More information

TECNOPOLO D ABRUZZO TECHNOLOGY S BEST SITE Tel / Fax /

TECNOPOLO D ABRUZZO TECHNOLOGY S BEST SITE Tel / Fax / TECNOPOLO D ABRUZZO TECHNOLOGY S BEST SITE Tel. +39 0862/350931 Fax +39 0862/325327 www.tecnopolodabruzzo.it TECNOPOLO D ABRUZZO TECHNOLOGY S BEST SITE Tecnopolo d Abruzzo is the place where entrepreneurs,

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

s, Texts and Social Media: What Physicians Need to Know

s, Texts and Social Media: What Physicians Need to Know Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text

More information

No June IMMIGRATION ACT, 2002 (Act No. 13 of 2002) [Sections 19(4), read with Regulation 19(5)]

No June IMMIGRATION ACT, 2002 (Act No. 13 of 2002) [Sections 19(4), read with Regulation 19(5)] 12 No. 37716 GOVERNMENT GAZETTE, 3 JUNE 2014 No. 459 3 June 2014 IMMIGRATION ACT, 2002 (Act No. 13 of 2002) [Sections 19(4), read with Regulation 19(5)] SKILLS OR QUALIFICATIONS DETERMINED TO BE CRITICAL

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Data Management Dr Evelyn Flanagan

Data Management Dr Evelyn Flanagan Data Management Dr Evelyn Flanagan e.flanagan@ucc.ie DATA MANAGEMENT OVERVIEW Role of the Data Manager in Clinical Trials General understanding of the principles underpinning data management for clinical

More information

TO THE IMMIGRATION NEW ZEALAND OPERATIONAL MANUAL

TO THE IMMIGRATION NEW ZEALAND OPERATIONAL MANUAL 14 February 2018 IMMIGRATION NEW ZEAL INSTRUCTIONS: Amendment Circular No. 2018/02 To: All Manual Holders AMENDMENTS TO THE IMMIGRATION NEW ZEAL OPERATIONAL MANUAL Introduction This circular outlines changes

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Introduction to SURE

Introduction to SURE Introduction to SURE Contents 1. Introduction... 3 2. What is SURE?... 4 3. Aim and objectives of SURE... 4 4. Overview of the facility... 4 5. SURE operations and design... 5 5.1 Logging on and authentication...

More information

Minnesota Supercomputing Institute Regents of the University of Minnesota. All rights reserved.

Minnesota Supercomputing Institute Regents of the University of Minnesota. All rights reserved. Minnesota Supercomputing Institute MSI Mission MSI is an academic unit of the University of Minnesota under the office of the Vice President for Research. The institute was created in 1984, and has a staff

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

CERT Computed Tomography Specialist 100.0% 100.0% 85.7% 100.0%

CERT Computed Tomography Specialist 100.0% 100.0% 85.7% 100.0% PLACEMENT RATES BY LEVEL: AY13 - AY16 LEVEL MAJOR 2015-16 2014-15 2013-14 2012-13 AAS Accounting 100.0% 85.1% 97.4% 100.0% DIP Accounting 100.0% 90.9% 98.0% 100.0% CERT Administrative Support Assistant

More information

Appendix 2. Capital Funding Source Summary Table of Contents

Appendix 2. Capital Funding Source Summary Table of Contents Capital Source Summary Table of Contents 2016 Corporate Services APP 2-3 Mayor and Council APP 2-5 Office of the Chief Administrative Officer APP 2-5 Office of the Chief Operating Officer APP 2-5 Planning

More information

University of Pittsburgh

University of Pittsburgh University of Pittsburgh Office of the Controller General Accounting Department SUBJECT: PRISM SUBCODE GUIDELINES The PRISM General Ledger Subcode Listing provides the four-digit codes used to record financial

More information

efolder White Paper: HIPAA Compliance

efolder White Paper: HIPAA Compliance efolder White Paper: HIPAA Compliance November 2015 Copyright 2015, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

ACCAB. Accreditation Commission For Conformity Assessment Bodies

ACCAB. Accreditation Commission For Conformity Assessment Bodies ACCAB Accreditation Commission For Conformity Assessment Bodies ACCAB Platinum Plus Accreditation For Certification Bodies, Inspection Bodies, Testing & Calibration Laboratories and Medical Laboratories

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)

More information

Situation and response of JAEA to the Earthquake in Northeastern Japan (Outline of activities on March 11-15)

Situation and response of JAEA to the Earthquake in Northeastern Japan (Outline of activities on March 11-15) As of 20:00, March 15, 2011 Japan Atomic Energy Agency Situation and response of JAEA to the Earthquake in Northeastern Japan (Outline of activities on March 11-15) Summary Situation of each site Commercial

More information

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies: Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense

More information

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No PROPOSAL FORM Cyber Insurance Underwritten by The Hollard Insurance Co. Ltd, an authorised Financial Services Provider www.itoo.co.za @itooexpert ITOO is an Authorised Financial Services Provider. FSP.

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Aquantify System Overview Version 2.7

Aquantify System Overview Version 2.7 System Overview Version 2.7 Table of Contents 1. INTRODUCTION 1 2. TECHNICAL DETAILS AND ARCHITECTURE 1 3. USAGE SCENARIOS 2 4. FLEXIBLE AND CUSTOMISABLE CONFIGURATION 2 4.1 SAMPLE POINTS 2 4.2 PARAMETERS

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

University of Minnesota Twin Cities Degrees Awarded by Major - Five Years

University of Minnesota Twin Cities Degrees Awarded by Major - Five Years Carlson School of Management Accounting 99 - - 72 - - 103 11-82 26-96 20 - Carlson School of Management Actuarial Science 5 - - 5 - - 7 - - 13 - - 11 - - Carlson School of Management Business Administration

More information

A Bill Regular Session, 2017 HOUSE BILL 1259

A Bill Regular Session, 2017 HOUSE BILL 1259 Stricken language would be deleted from and underlined language would be added to present law. 0 State of Arkansas st General Assembly A Bill Regular Session, HOUSE BILL By: Representative Fortner For

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

Graphical System Design

Graphical System Design Graphical System Design Nancy Dib Marketing Manager 21 st Century Challenges Engineering Grand Challenges, NAE Advance health informatics Engineer the tools of scientific discovery Reverse-engineer the

More information

How To Close Or Transfer Accounts & Services After A Death

How To Close Or Transfer Accounts & Services After A Death How To Close Or Transfer Accounts & Services After A Death Getting Started After a death, you may need to cancel or transfer accounts, memberships, and credit cards of the deceased to avoid incurring charges

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity

Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity The U.S. Commercial Service Janice Corbett Acting Senior Commercial Officer U.S. Embassy Ottawa, Canada Building Bridges to Prosperity Los Angeles, CA October March 3-5, 14, 2009 2010 Why Canada? Largest

More information

School of Engineering and Technology. Department of Engineering

School of Engineering and Technology. Department of Engineering 1 2 School of Engineering and Technology Department of Engineering 3 Bachelor of Science in Communication Engineering The program focuses on the technical aspects of digital and analog communications,

More information

Document Title: IT Security Assessment Questionnaire

Document Title: IT Security Assessment Questionnaire Page 1 of 5 Complete all required fields to the best of your knowledge; incomplete forms will not be reviewed. Project Summary Subject Matter Expert (SME) Information Name: Telephone Number: Email: Job

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS MSP SOLUTIONS BY BARRACUDA HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and Intronis Cloud Backup and

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

G R E E N PLUMBING D E S I G N Candidate Bulletin

G R E E N PLUMBING D E S I G N Candidate Bulletin GREEN PLUMBING DESIGN Candidate Bulletin PROGRAM OVERVIEW The Green Plumbing Design (GPD) certificate program, sponsored by the American Society of Plumbing Engineers and the International Association

More information

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description:

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description: UCOP ITS Systemwide CISO Office Systemwide IT Policy UC Event Logging Standard Revision History Date: By: Contact Information: Description: 05/02/18 Robert Smith robert.smith@ucop.edu Approved by the CISOs

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

Closing on: Open Until Filled

Closing on: Open Until Filled REQ-0000000026 ENGINEER ASSISTANT Central Engineering April 9, 2019 Open Until Filled Participate in water/wastewater design projects in support of an assigned area under the direction of a Professional

More information

Automating Security Administration Are We There Yet? John Phelan, Ph.D. HIPAA Summit XIII September 26, 2006

Automating Security Administration Are We There Yet? John Phelan, Ph.D. HIPAA Summit XIII September 26, 2006 Automating Security Administration Are We There Yet? John Phelan, Ph.D. HIPAA Summit XIII September 26, 2006 Session Agenda The Problem Options What is an administrative system? Selection criteria Case

More information

A Glance at Becoming a CR in Presented By: Shawn Silliman CR WLS

A Glance at Becoming a CR in Presented By: Shawn Silliman CR WLS A Glance at Becoming a CR in 2017 Presented By: Shawn Silliman CR WLS A Glance at Becoming a CR in 2017 Shawn Silliman CR #563 WLS #121 Lorne McIntyre, CR #630 WLS #152 History of RIA 1946 the RIA was

More information

Collaborations and Partnerships. John Broome CODATA-International

Collaborations and Partnerships. John Broome CODATA-International Collaborations and Partnerships John Broome CODATA-International 1 CODATA-International One of the fundamental roles of CODATA is to facilitate collaboration and partnerships in the management of research

More information

2/9/2016. Session Agenda: Implementing new Geospatial Technologies for more efficient data capture

2/9/2016. Session Agenda: Implementing new Geospatial Technologies for more efficient data capture Implementing new Geospatial Technologies for more efficient data capture Jay Haskamp Applied Geospatial Engineer Steve Richter VP Sales Session Agenda: Today s changing technologies and what lies ahead

More information

KYAUK PHYU SPECIAL ECONOMIC ZONE DEVELOPMENT. Kyauk Phyu, Rakhine State, MYANMAR

KYAUK PHYU SPECIAL ECONOMIC ZONE DEVELOPMENT. Kyauk Phyu, Rakhine State, MYANMAR KYAUK PHYU SPECIAL ECONOMIC ZONE DEVELOPMENT Kyauk Phyu, Rakhine State, MYANMAR OUR CONSORTIUM Master Planning Real Estate Market Analysis Maritime and Port Specialist Financial Planning Project Township

More information

Business Continuity Planning

Business Continuity Planning Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more

More information

COURSES AND ENTRY REQUIREMENTS FOR ITE NITEC HOLDERS

COURSES AND ENTRY REQUIREMENTS FOR ITE NITEC HOLDERS COURSES AND ENTRY REQUIREMENTS FOR ITE NITEC HOLDERS All eligible ITE Nitec holders must have a GPA of 3.5 or above (inclusive of CCA bonus points) for admission to the various 3 years full-time diploma

More information

The University of Adelaide. Maritime Capability

The University of Adelaide. Maritime Capability The University of Adelaide Maritime Capability Introduction The University of Adelaide is a world-class institution committed to delivering high quality education, research and mutually rewarding industry

More information

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology

More information

TERMS OF REFERENCE FOR AUDITS WASTE ELECTRICAL AND ELECTRONIC EQUIPMENT COMPLIANCE SCHEME [UPDATED 11 APRIL 2016]

TERMS OF REFERENCE FOR AUDITS WASTE ELECTRICAL AND ELECTRONIC EQUIPMENT COMPLIANCE SCHEME [UPDATED 11 APRIL 2016] TERMS OF REFERENCE FOR AUDITS BY AN AUTHORISED WASTE ELECTRICAL AND ELECTRONIC EQUIPMENT COMPLIANCE SCHEME [UPDATED 11 APRIL 2016] The auditor shall be independent, certified, and approved by the Environment

More information

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision

More information

Investigating Microbial Data Deviations

Investigating Microbial Data Deviations Microrite, Inc. brings you this unique learning experience in Investigating Microbial Data Deviations; Part of Microrite s step-by-step webinar series. Investigating Microbial Data Deviations Since the

More information

APPENDIX ONE: TABLE 15-1 HUNTSVILLE TOWN ACCEPTABLE USES BY ZONE N N N N N N N

APPENDIX ONE: TABLE 15-1 HUNTSVILLE TOWN ACCEPTABLE USES BY ZONE N N N N N N N APPENDIX ONE: TABLE 15-1 HUNTSVILLE TOWN ACCEPTABLE USES BY ZONE Use R-1 C-1 A-3 CR1 S O RC Additional Reference Accessory Building, Private P C P C C C C Adult/sex oriented facilities and businesses Agriculture

More information