Establishment of National Agricultural Bioinformatics Grid in ICAR

Size: px
Start display at page:

Download "Establishment of National Agricultural Bioinformatics Grid in ICAR"

Transcription

1 आई. ए. एस. आर. आई./ट. ब. 05/2014 I.A.S.R.I/T.B. 05/2014 भ. क. अन. प. म र ष ट र य क ष ज व - स चन ग र ड क स थ पन Establishment of National Agricultural Bioinformatics Grid in ICAR न ग र और स स धन क आव टन दस व ज़ Ñf"k ts o lw p uk ds U nz Hkkjrh; Ñf"k lkaf[;dh vuqla/kku laléku ykbcszjh,osu;w] iwlk] uã fnyyh& HkkjrÀ Centre for Agricultural Bioinformatics Indian Agricultural Statistics Research Institute Library Avenue, Pusa, New Delhi , India 2014

2 POLICY AND RESOURCE ALLOCATION DOCUMENT IASRI, New Delhi Anil Rai K. K. Chaturvedi S. B. Lal Anu Sharma C-DAC, Pune Sanjay Wandhekar Ashish Ranjan Gourav Chaudhari Abhishek Sharma Tarun Singh

3 Table of Contents 1 Data Center Security Policy Introduction Management Responsibilities Policy Physical Access Control Access to Network and communication devices Access to HPC Datacenter facilities BMS room UPS room Visitors Facilities maintenance personnel Food, Drink, Tobacco and Inflammable Products Photography/Videography Logical Access Control User Creation Procedure to get a new account: Modification of user rights: Account locking Unlocking or resetting of password User deletion Application Access and Installation Physical Access to Data Centre Facility Administrator rights User ID Reviews: Storage Allocation Storage Summary:... 9

4 6.2 Type of users: Storage quota Limits for home storage 250T: Limits for scratch (Parallel) storage 200T: scratch Policy Limits for archive storage 200T: Automatic File Deletion Policy CLUSTER RESOURCE ALLOCATION Types of cluster: Available Cluster Resources: BACKUP AND RESTORE Procedure Backup Content Backup Approaches Database Back-up Data Backup policy: Restore Procedure Deleted User Account Best Practices for User... 17

5 Tables Table 1: Management Responsibilities... 2 Table 2: Storage Summary... 9 Table 3: Limits for Home Storage Table 4: Limits for Scratch Storage Table 5: Limits for Archive Storage Table 6: Automatic File Deletion Policy Table 7: Available Cluster Resources Table 8: Allocation of Resources... 14

6 Abbreviations HPC Lead Centre Domain Centres NFS SMP CABin IASRI PFS High Performance Computing (HPC) is a system having high processing and computing capability to carryout complex calculations. IASRI, New Delhi NBPGR, New Delhi, NBAGR, Karnal, NBFGR, Lucknow, NBAIM Mau and NBAII, Bangalore. Network File System is a distributed file system protocol allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed. Symmetrical Multiprocessing involves a multiprocessor computer hardware and software architecture where two or more identical processors are connected to a single shared main memory, have full access to all I/O devices, and are controlled by a single OS instance, and in which all processors are treated equally, with none being reserved for special purposes. Centre for Agricultural Bioinformatics Indian Agricultural Statistics Research Institute Parallel File System

7 1 DATA CENTER SECURITY POLICY 1.1 INTRODUCTION This document covers data center security, allocation of storage, allocation of cluster resources and data backup requirements. Data center security is about physical and logical security of data center resources. Allocation of storage and cluster resources is about allocation of limited amount of storage, cores and memory among different user category. Data backup requirement describes how to protect data, what approach to use for backing up important data, how often to take backup and how to restore data. The implementation of policy mentioned in this document will increase the security and efficient use of HPC system and help to safeguard HPC resources. The physical and logical access to data and information processing resources are covered in this document. 1

8 2 MANAGEMENT RESPONSIBILITIES There is two level of user authentication implemented to avoid the unauthorized access of the resources. The level of authentication will initially be approved by the Centre Head. The login credentials will be created by the System Administrator. The Centre Head will be responsible to grant the physical and logical access of the resources. The role of the manager type is shown in table 1. Two manager positions are proposed and are responsible for providing the authentication of the available resources to the intended user Table 1: Management Responsibilities Manager Type Centre Head System Administrator Role Identifying physical and logical access rights to be granted to the users. 1. Creation / Deletion of User IDs. 2. Granting / Revoking of access rights 3. Review and report 2

9 3 POLICY Access control is a mechanism to ensure that authorized personnel have access to the information and information processing resources that are assigned to them. It also helps to track the accountability. Access controls are mainly two types namely physical access control and logical access control. Physical access control ensures that authorized personnel can have access to the physical assets that are assigned to them. This would include physical access to HPC Data center. Logical access control ensures that only authorized personnel have access to the information or data in electronic form. This includes access to the Operating system, application and associated information. 3.1 Physical Access Control Access to Network and communication devices The network devices on all the floors should be housed in secure cabinets that can be locked and access should be restricted to network administrators or authorized personnel only Access to HPC Datacenter facilities A valid ID card is mandatory for system administrators or maintenance personnel for accessing the service to co-located equipment. These cards need to be checked into entry and out at exit of/from the facility. IASRI staff will escort them to their equipment in HPC Data center. As HPC systems shall be operational 24X7, support provided by a vendor should be identified in advance so that vendor representatives can get necessary access to the system. System administrator should notify staff as soon as possible when they are notified that a vendor support visit is planned. Vendor representatives will be escorted in the facility. Biometric device is installed to control the access to the HPC data center. CCTV cameras are installed in the HPC Data center to monitor activities of the server room. No person is allowed to enter into the HPC Data center unless authorized person accompanies him/her. Entry and exit time for visitor must be logged in the system or in entry log book BMS room Biometric device is installed to control the access to the BMS room. Only authorized staff or person who monitors alert generated by security devices is allowed to enter BMS room. 3

10 3.1.4 UPS room Biometric device is installed to control the access to the UPS room. Only authorized person is allowed to enter the UPS room Visitors All IASRI staff, students, and third-parties who are visiting the facility are required to present their ID cards or valid government-issued identification which will be checked while entering in and out of/from the facility. General visitors to the HPC Data center must be escorted by IASRI staff during their visit to the facility Facilities maintenance personnel Maintenance of equipment and the facility by IASRI staff and third parties are essentially required. Maintenance may include but is not limited to general cleaning, raised floor space cleaning, and maintenance on electrical and mechanical systems. Maintenance visits by non- IASRI staff must be scheduled in advance and informed to the System administrator. Maintenance staff will be escorted at all times and/or under surveillance. All maintenance personnel must carry an approved identification credential and adhere to IASRI policies and procedures Food, Drink, Tobacco and Inflammable Products Food, drinks, tobacco and inflammable products shall not be allowed in the HPC Data center area. Smoking shall be strictly prohibited in the HPC Data center facility Photography/Videography Taking of pictures and/or video, including by cell phones equipped with cameras, is prohibited unless a valid approval from the competent authority is presented. 3.2 Logical Access Control The login credentials can be created by the system administrator to access the computing resources or information/data User Creation A unique Identifier (User ID) should be created for every individual who is given access to the HPC facilities at IASRI. The ID creation naming convention would be decided by the system administrator. The system administrator will create a new user-id and provide the access rights as recommended by the CABin head. 4

11 3.2.2 Procedure to get a new account: 1. Fill up the registration/login form available at webapp.cabgrid.res.in/biocomp portal. 2. Fill the form online 3. The credentials will be verified. 4. After verification, get the approval of the Centre head. 5. Submit the request to HPC system administrator to get the account created. 6. Send the to the concern user Modification of user rights: In case of any modification in user access rights, the request should be submitted to CABin Head for approval. The approved request should be submitted to the system administrator who will do the necessary changes. If the rights are often modified on temporary basis then it is very important to review the user rights on regular basis so that misuse of elevation of rights can be avoided Account locking Account will be locked if number of wrong password attempt is made. Account would be locked if user is not going to use the account for a long period of time Unlocking or resetting of password If an account is locked or a user has forgotten his/her password then he/she needs to send a request mail request to the system administrator who will then unlock the account or reset the password User deletion Information regarding the user deletion should be sent to CABin Head who will notify the system administrator for disabling / deleting the user-id of the user. This would be required in case of the user has been resigeds / suspended / terminated from the service or left (for any other reason) the institute. On receipt of notification, the system administrator would carry out the requested action before the specified period of time. User-ids of retired personnel must be deleted within 15 days, unless explicitly advised by the CABin head. It is better to retain deleted user data in archive storage for a certain period of time. 5

12 3.3 Application Access and Installation User can access all the available applications through web portal. Users are not supposed to install any application in their home directory without prior permission from system administrator/ CABin Head. In case any specific application is not installed and it is required by the user then he may send a request to the system administrator. This application will be installed if CABin Head approves the request. 6

13 4 PHYSICAL ACCESS TO DATA CENTRE FACILITY 1. If a person wants physical access to the data center, he would need to submit a written request to system administrator/ CABin head for permission. 2. Once the permission is granted, the user needs to contact the system administrator who will then create an account in the biometric software. 3. After creation of the account, the user can get entry in the data center through finger scan device. 7

14 5 ADMINISTRATOR RIGHTS Administrator logins and privileged access rights allow users to override HPC system controls. Users must not be allowed to work with administrator credentials or with privileged rights, unless it is very much required, it must be done in the presence of system administrator. 5.1 User ID Reviews: Access requests must be renewed annually to maintain approved access. Access permissions should be reviewed periodically. Users shall notify the system administrator immediately if the access is no longer required due to an employee s termination or a change in responsibilities. 8

15 6 STORAGE ALLOCATION Each individual user/researcher is assigned a standard storage allocation or quota on each type of storage namely /home, /scratch and /archive. Researchers/users are allowed to use home storage according to soft limit, hard limit and grace period, scratch storage according to fixed space and fixed time period. The chart below shows the general view of types of storage will be provided to the users. 6.1 Storage Summary: Table 1 shows the different type of file systems with their purpose of use, total size and file system used. Table 2: Storage Summary Storage Purpose Size Back up File System /home Space where users have their Yes, but for NFS home directories, users can keep their files as long as they want but must be kept under soft limit. 250 TB particular user account /scratch Computational work space 200 TB No PFS /archive Long-term storage 200 TB No NFS Important: Of all the space, only /scratch should be used for computational purposes. 6.2 Type of users: The users are grouped based on the resources and application usage. There are three types of users in the HPC system. 1. Registered User (RU) 2. Centre Normal User (CNU) 3. Centre Main User (CMU) The registered users (RU) profile will be created through web based registration process and is available to any user whose request is approved by the Centre Head. Center Normal User (CNU) category is the type of user category which is capable of using fair amount of cluster resources. Center Main Users are those who will utilize the huge amount of cluster resources frequently. There will be approximately 1200 users in all categories initially i.e. 100 in CMU, 100 in CNU and 1000 in RU category. 9

16 6.3 Storage quota The storage quota is assigned based on the types of users. There are three types of storage namely home, scratch and archive. The storage is allocated based on soft limit, hard limit and grace period. Soft Limit: Soft limit in quota is defined as the limit which can be exceeded for a particular time i.e. grace period. Hard Limit: Hard limit in quota is defined as the limit which cannot be exceeded. Grace Period: Time period for which a user can keep its space usage above the soft limit Limits for home storage 250T: Main purpose of home storage is keep home directory of users where users will keep their files as long as they want. Table 2 shows the assigned soft limit, hard limit and grace period to each category with total number of users in each category. Table 3: Limits for Home Storage SOFT HARD GRACE Total No. USER TYPE LIMIT LIMIT PERIOD of users Registered User 20G 25G 60 Days 1000 CNU 500G 600G 30 Days 100 CMU 750G 900G 40 Days 100 Maximum home space used by all users 60T 175T Above mentioned home storage limit can be varied according to number of users in future Limits for scratch (Parallel) storage 200T: Scratch storage is used here to keep the data which is either required as input or produced as an output during the execution of parallel application. Table 3 shows the assigned soft limit, hard limit and grace period to each category with total number of users in each category. Table 4: Limits for Scratch Storage USER TYPE HARD TIME Total no. of LIMIT PERIOD users Registered User 25G 25 Days 1000 CNU 600G 40 Days 100 CMU 900G 50 Days 100 Maximum scratch space used by all users 175T

17 Above mentioned scratch storage limits can be varied according to the number of users in future. If a user wants more space (greater than hard limit), he/she can make a request to exceed the hard limit for some time /scratch Policy The /scratch storage system is a shared resource that needs to run as efficiently as possible for the benefit of all users. There is no system backup for data in /scratch, it is the user's responsibility to back up their data frequently. All files which are older then allowed time period to a particular user will be removed on the regular basis as a part of the cleaning process. It is strongly suggested to the user that they do regular cleaning of their data in /scratch to decrease /scratch usage by backing up files they need to retain either on /archive or elsewhere. Administrator has reserved the rights to clean up files on /scratch at any time if it is needed to improve the performance of the system.. Some precautions for the users: Do not put important source code, scripts, libraries, executables in /scratch. These important files should be stored in /home. Do not make soft link for the folders in /scratch to /home for /scratch access Limits for archive storage 200T: Archive storage is a low cost storage which is used to store data for longer period of time and it can only be used by CMU. 40% i.e..8tb will be kept of database and application archiving. Table 4 shows the assigned limit of archive storage to users. Table 5: Limits for Archive Storage USER TYPE HARD LIMIT TIME PERIOD Registered User 0 0 CNU 0 0 CMU 1.2T None Above mentioned archive storage limit can be varied according to number of users in future. 6.4 Automatic File Deletion Policy The table below describes the policy concerning the automatic deletion of files from home, scratch and archive storage. 11

18 Table 6: Automatic File Deletion Policy Space /home /archive /scratch ALL Automatic File Deletion Policy None None Files will be deleted after the expiry of allowed time period. Files may be deleted as needed without warning if required for system productivity. ALL /home and /archive files associated with expired accounts will be automatically deleted after 90 days. The /scratch files will automatically be deleted according to time period assigned to each user. 12

19 7 CLUSTER RESOURCE ALLOCATION Resource allocation is an important process to ensure efficient and fair use of the cluster. Following section describes the different types of cluster available and allocation of resources to a particular user type with respect to a particular cluster. 7.1 Types of cluster: 1. Linux cluster having 256 nodes 2. Windows cluster having 16 nodes 3. Linux based GPU cluster having 16 nodes 4. Linux cluster at each of the five domain center 5. SMP 7.2 Available Cluster Resources: Following table provides the information about the cores and RAM in each cluster and their individual nodes. Column Cores tells the number of cores in the cluster and its nodes and column memory gives the total amount memory in the cluster and its nodes. Table 7: Available Cluster Resources Cluster Type Cores Memory PER NODE CORES PER NODE 256 Nodes Linux Cluster 12 12*256= G 16 Nodes Windows Cluster 12 12*16=192 96G 16 Node GPU based Linux Cluster* 12 12*16= G SMP T *Each GPU node contains two GPU cards and the memory of each GPU card is 6 GB. Allocation of Resources: Following tables shows allocation of cores to CMU (Center Main User), CNU (Center Normal User) and RU (registered user) from all the available users 13

20 Table 8: Allocation of Resources Cluster Type Max Cores/User Total Cores Assigned CMU CNU RU to User Category Total Cores Under Use 256 Nodes Linux Cluster Nodes Windows Cluster 16 Node GPU based Linux Cluster* 8 4 NA NA NA NA 256 SMP NL NL NA NL NL NA 64 *32 GB RAM is set as a limit to the registered user *NA stands for Not Allowed and NL stands for No Limit 14

21 8 BACKUP AND RESTORE The importance of data and unprecedented growth in data volumes has necessitated an efficient approach to data backup and recovery. This document is intended to provide details of data backup and retrieval operations. The purpose of back and restore policy is as follows: To safeguard the information assets of IASRI To prevent the loss of data in the case of an accidental deletion or corruption of data, system failure, or disaster. To permit timely restoration of information if some unwanted event occur. To manage and secure backup and restoration processes and the media employed in the process. 8.1 Procedure The Archive storage currently deployed for backup has 200 TB of disk-based storage. 60% of storage is reserved for user data and rest is for database, application data and other data. The backup software used to control the backup processes is HP ibrix. The Systems Support team ensures that all backups are completed successfully and reviews the backup process daily. Logs are maintained to verify the amount of data backed up and the unsuccessful backup occurrences. 8.2 Backup Content The primary data that will be backed up are: Data files of Center Main User, Database files, application installed on the cluster and common application data required by users. Data to be backed up will be listed by location and specified data sources. 8.3 Backup Approaches 1. Data accessed 24x7 should backed up with full back-up most of the time as restore process will take less time to make data back online again. It is important to decide how many days you want to keep full backup copy as it will consume lot of backup storage space. If back-up space is constraint then repetition of one full backup followed by several differential backup daily should be carried out. 2. User data back-up should be carried out as differential or incremental backup. Differential back-up should be considered first if there is enough space available, otherwise go for incremental backup. 15

22 3. Installed applications and data used by these applications do not change very often, so incremental backup is the best option. 8.4 Database Back-up 1. Database back-up process needs online database to be offline or locked, so that backup copy contains consistent state of database. 2. If making database offline is not an option than specialized software should be used to carry out periodic backups. 3. Time interval for backup 8.5 Data Backup policy: 1. Full backups are performed weekly. Full backups are retained for 3 months before being overwritten. 2. Incremental backups are performed daily. Incremental backups are retained for 1month before being overwritten. 3. Backups are carried out overnight. 4. Once the Backup process is finished, Backup copy will be copied to remote site for disaster recovery process. 5. Backups are stored securely and only authorized person have access to it. 6. The IT department monitors backup operations and the status for backup jobs is checked on a daily basis during the working week. 7. Re-run of failed backup will be done next day. 8.6 Restore Procedure 1. Data for restoration will be available once the ongoing backup is done or required backup copy already exist i.e. older backup. 2. Backup data will only be available for restoration during retention period. 3. Request for data restoration/recovery must be sent to backup/it administrator or HEAD of IASRI datacenter. 16

23 8.7 Deleted User Account In case of any user account is deleted, backup will be kept for some limited period of time. But user must be made aware of the fact that IASRI is not responsible of the data one account is deleted as in case of shortage of backup space user might get deleted. 8.8 Best Practices for User 1. Always have backup of your data on your personal device. 2. For better use of backup storage, please remove the backed up data that you will never need in the future. 3. Do not let the multimedia files backed up which are not at all related to your HPC work. 17

Establishment of National Agricultural Bioinformatics Grid in ICAR

Establishment of National Agricultural Bioinformatics Grid in ICAR आई. ए. एस. आर. आई./ट. ब. 03/2014 I.A.S.R.I/T.B. 03/2014 भ. क. अन. प. म र ष ट र य क ष ज व - स चन ग र ड क स थ पन Establishment of National Agricultural Bioinformatics Grid in ICAR ग च छ व स त कल अग रभकल

More information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

स चन औ दस ज- म नक क क टल क प रस व

स चन औ दस ज- म नक क क टल क प रस व व य पक पर च लन म मस द स दर भ ददन क सर सदस य प रल खन औ स चन व षय सवमव, एमएसड 5 प रक शन औ ग र द क प र द य व क व षय सवमव, एम एस ड 6 प रब ध औ त र पर षद, एमएसड स अन य इच छ क एमएसड 5/ ट 134 01-01-2018 वप रय

More information

ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD.

ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD. ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD. Page 1 of 14 Contents 1. OVERVIEW... 3 2. USER REGISTRATION PROCESS... 3 STEP 1: USER LOGIN... 3 STEP 2:

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

OBTAINING AN ACCOUNT:

OBTAINING AN ACCOUNT: HPC Usage Policies The IIA High Performance Computing (HPC) System is managed by the Computer Management Committee. The User Policies here were developed by the Committee. The user policies below aim to

More information

क न द र य सम द र म त स ययक अन स ध न स स थ न

क न द र य सम द र म त स ययक अन स ध न स स थ न F. No. 41-2/2014-P Dated: 11.12.2014 Addendum In continuation of this office tender Notice of even no dated 20.11.2014 for installation and Commissioning of Security Surveillance System at CMFRI, Hqrs.

More information

Digital MLS. A Quick Start Guide for Respected Members of Legislative Assembly and Council to submit devices online into MKCL s Digital MLS

Digital MLS. A Quick Start Guide for Respected Members of Legislative Assembly and Council to submit devices online into MKCL s Digital MLS Digital MLS A Quick Start Guide for Respected Members of Legislative Assembly and online into MKCL s Version 1.0 THIS QUICK START GUIDE WILL EXPLAIN IN SHORT ABOUT: HOW TO LOG INTO DIGITAL-MLS SYSTEM,

More information

3 Maintaining User Accounts in CCQAS 2.8

3 Maintaining User Accounts in CCQAS 2.8 3 Maintaining User Accounts in CCQAS 2.8 The maintenance of user accounts is the joint responsibility of the account holder and the CC/MSSP/CM who is responsible for managing user accounts. Over time,

More information

UITS Data Center Access Policies and Procedures

UITS Data Center Access Policies and Procedures UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...

More information

ELECTION PERSONNEL DEPLOYMENT SYSTEM

ELECTION PERSONNEL DEPLOYMENT SYSTEM ELECTION PERSONNEL DEPLOYMENT SYSTEM (EPDS) Uttar Pradesh Vidhan Sabha General Election 2017 By National Informatics Centre UP State Unit, Lucknow User Manual (Version 1.0.01) ELECTION PERRSONNEL RSONNEL

More information

SECTION 15 KEY AND ACCESS CONTROLS

SECTION 15 KEY AND ACCESS CONTROLS 15.1 Definitions A. The definitions in this section shall apply to all sections of the part unless otherwise noted. B. Definitions: Access Badge / Card a credential used to gain entry to an area having

More information

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

Information Security Key Elements. for. irunway. Information Security. May 31, Public

Information Security Key Elements. for. irunway. Information Security. May 31, Public Information Security Key Elements for irunway Information Security May 31, 2010 Contents 1 Introduction... 3 2 Key Elements of Controls for Information Security... 4 2.1 Physical Elements... 4 2.2 System

More information

FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center

FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center FACILITY USER GUIDE Colocation in Key Info s Agoura Court Data Center Page 1 of 11 Key Info Facilities User Guide v2.4 Table of Contents Welcome... 3 GETTING STARTED... 4 Colocation Access... 4 Proof of

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

NSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System

NSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System NSIF APPROVED DOCUMENT NSIF-037-2000 (NSIF Document #NSIF-CA-9910-110R3) WORK GROUP: Security TITLE: Common Applications Requirements for SONET NE Security System DATE: EDITOR: Name: Ron Roman Voice: (732)

More information

INDIAN AGRICULTURAL STATISTICS RESEARCH INSTITUTE LIBRARY AVENUE: NEW DELHI WALK- IN- INTERVIEW. Qualifications

INDIAN AGRICULTURAL STATISTICS RESEARCH INSTITUTE LIBRARY AVENUE: NEW DELHI WALK- IN- INTERVIEW. Qualifications INDIAN AGRICULTURAL STATISTICS RESEARCH INSTITUTE LIBRARY AVENUE: NEW DELHI-110012 WALK- IN- INTERVIEW A walk-in interview will be held for the post of One(01) Young Professionals-II at ICAR-IASRI, Pusa,

More information

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process... TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process

More information

Important points of Information Technology (Guidelines for Cyber Cafe) Rules, 2011

Important points of Information Technology (Guidelines for Cyber Cafe) Rules, 2011 Important points of Information Technology (Guidelines for Cyber Cafe) Rules, 2011 Log Register 1. A Cyber Cafe will maintain a Digital or Physical Log Register for a minimum period of 1 Year 2. The Log

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost effective BMR functionality with onsite disk image backup for SMBs. Store entire data of hard disks including the operating system (OS) and application

More information

User Guide. for. Control Table Management Web Application

User Guide. for. Control Table Management Web Application User Guide for Control Table Management Web Application National Electoral Roll Management System (ERMS) Phase-I TABLE OF CONTENTS Sr. No. Topic Page No. 1 How to Login 1 2 Main Menu 2 3 Change Password

More information

INSTRUCTION MANUAL. Rajiv Gandhi Institute of Petroleum Technology, Jais ONLINE APPLICATION FORM FOR ADMISSIONS. Version 1.0. Designed & Developed By:

INSTRUCTION MANUAL. Rajiv Gandhi Institute of Petroleum Technology, Jais ONLINE APPLICATION FORM FOR ADMISSIONS. Version 1.0. Designed & Developed By: INSTRUCTION MANUAL ONLINE APPLICATION FORM FOR ADMISSIONS Rajiv Gandhi Institute of Petroleum Technology, Jais Designed & Developed By: Index Sr.no Content Page No 1 Student Login 3 2 Registration Page

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Data Lifecycle Management No: Effective: OSC-1 May 1, 2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

KHEDS Account Creation and Maintenance URL:

KHEDS Account Creation and Maintenance URL: KHEDS Account Creation and Maintenance URL: www.kansasregents.org The KBOR website has both a public and private section. Aggregate reports appropriate for public viewing can be found on the website without

More information

Encl: as above र ष ट र य क व और ग र म ण ववक स ब क National Bank for Agriculture and Rural Development ववत त य सम व शन और ब कक ग प र द य गगक ववभ ग

Encl: as above र ष ट र य क व और ग र म ण ववक स ब क National Bank for Agriculture and Rural Development ववत त य सम व शन और ब कक ग प र द य गगक ववभ ग Ref No. NB.HO.DFIBT/ 10585-11043 / DFIBT-70/ 2016-17 16 November 2016 Circular No. 271 / DFIBT- 37 / 2016 The Chairman / Managing Director/Chief Executive Officer Regional Rural Banks / State Co-operative

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

University of Hawaii Hosted Website Service

University of Hawaii Hosted Website Service University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

University Health Network (UHN)

University Health Network (UHN) University Health Network (UHN) RESOURCE MATCHING AND REFERRAL (RM&R) AND ONLINE REFERRAL BUSINESS INTELLIGENCE TOOL (ORBIT) Policy Governing User Account Management Version: 4.0 Date: Last modified on

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

XLink EzRollBack Pro User Manual Table Contents

XLink EzRollBack Pro User Manual Table Contents XLink EzRollBack Pro User Manual Table Contents Chapter 1 Welcome to XLink's EzRollback... 2 1.1 System Requirements... 4 1.2 Installation Guide... 5 1.3 License Information... 9 1.4 How To Get Help From

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Box Competitive Sheet January 2014

Box Competitive Sheet January 2014 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when

More information

Server Security Policy

Server Security Policy Server Security Policy Date: Januray 2016 Policy Title Server Security Policy Policy Number: POL 029 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

BeAware Corporate Edition Admin Console. User Manual. BeAware Corporate Edition Admin Console Version 7.1. Ascentive LLC.

BeAware Corporate Edition Admin Console. User Manual. BeAware Corporate Edition Admin Console Version 7.1. Ascentive LLC. User Manual BeAware Corporate Edition Admin Console Version 7.1 Ascentive LLC User Manual 1 Copyright Notice Copyright 2008 Ascentive LLC All Rights Reserved This document is protected by copyright law

More information

21 CFR Part 11 Module Design

21 CFR Part 11 Module Design 21 CFR Part 11 Module Design email: info@totallab.com web: www.totallab.com TotalLab Ltd Keel House Garth Heads Newcastle upon Tyne NE1 2JE UK Trademarks The following are either registered trademarks

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Providing a first class, enterprise-level, backup and archive service for Oxford University

Providing a first class, enterprise-level, backup and archive service for Oxford University Providing a first class, enterprise-level, backup and archive service for Oxford University delivering responsive, innovative IT 11th June 2013 11 th June 2013 Contents Service description Service infrastructure

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

Address Change Process Related Documents

Address Change Process Related Documents Address Change Process Documents Back ground and Requirement of Policy-: RKCL is running its operations through its ITGKs. These ITGKs are working on certain premises, some of them in rented premise and

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE...

CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE... CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE...4 LOCAL AREA NETWORK...4 WIDE AREA NETWORK...4 CHAPTER 3 - SECURITY...5

More information

EasiShare ios User Guide

EasiShare ios User Guide Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties

More information

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2.

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2. Page 1 /15 System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11 System: tiamo (Software Version 2.5) Page 2 /15 1 Procedures and Controls for Closed Systems

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

2 Creating New CCQAS 2.8 User Accounts

2 Creating New CCQAS 2.8 User Accounts 2 Creating New CCQAS 2.8 User Accounts The deployment of CCQAS 2.8 which introduced the online privilege application, review, and approval functionality, significantly expanded the number of CCQAS users

More information

Isi Net User Manual for Bank customers

Isi Net User Manual for Bank customers 1 Table of Contents 1 Introduction and overview... 4 1.1 Isi Net User Types... 4 1.2 Accessing the Isi Net service... 5 1.2.1 User Login... 5 1.2.2 User Logout... 7 1.3 User Interface... 7 1.3.1 Menus...

More information

Wood Based Industries MIS Uttar Pradesh Forest Department

Wood Based Industries MIS Uttar Pradesh Forest Department Wood Based Industries MIS Uttar Pradesh Forest Department New License User Interface Design Document Version 1.0 1 1.0 REGISTRATION AND LOGIN 1.1 REGISTRATION प ज करण User: For submitting the proposal,

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

CTS performs nightly backups of the Church360 production databases and retains these backups for one month. Church360 is a cloud-based application software suite from Concordia Technology Solutions (CTS) that is used by churches of all sizes to manage their membership data, website, and financial information.

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Select Agents and Toxins Security Plan Template

Select Agents and Toxins Security Plan Template Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

AgentWorks Administrator and Manager User Guide - Release 12.5

AgentWorks Administrator and Manager User Guide - Release 12.5 AgentWorks Administrator and Manager User Guide - Release 12.5 March 21, 2013 2012 MoneyGram InternationalAll rights reserved. Table of Contents Registration Overview... 2 1. Initial Log In AgentWorks

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Cisco Unity Connection uses separate databases to store the system configuration and the information in voic s.

Cisco Unity Connection uses separate databases to store the system configuration and the information in voic s. , on page 1 Overview Cisco Unity Connection uses separate databases to store the system configuration and the information in voicemails. About Mailbox Stores Consider the following points to understand

More information

Contents GENERAL OVERVIEW 3. User Profile and Permissions... 3 Regional Manager... 3 Manager... 3 User... 4 Security... 4

Contents GENERAL OVERVIEW 3. User Profile and Permissions... 3 Regional Manager... 3 Manager... 3 User... 4 Security... 4 SYNERGY USER GUIDE Contents GENERAL OVERVIEW 3 User Profile and Permissions... 3 Regional Manager... 3 Manager... 3 User... 4 Security... 4 Budgets... 4 Spending Limits... 5 PO Hold Review... 5 Regional

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Release Personnel Module Guide

Release Personnel Module Guide Release 2.10 Personnel Module Guide November 2016 SATEON Release 3.0 Personnel Module Guide Issue 0.1, released November 2016 Disclaimer Copyright 2016, Grosvenor Technology. All rights reserved. SATEON

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Madhya Pradesh Bhoj (Open) University, Bhopal

Madhya Pradesh Bhoj (Open) University, Bhopal Subject- Management Information Systems Maximum Marks: 30 Q.1 What do you mean by Information System? Explain its categories. Q.2 Briefly describe what is ERP? Q.3 What is basic component of any software?

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

It is an entirely new way of typing and hence please go through the instructions to experience the best usability.

It is an entirely new way of typing and hence please go through the instructions to experience the best usability. Panini Keypad allows you to write in all languages of India on the phone, fast and easily without the need of printed characters on the keypad. It is based on a patented invention of statistical predictive

More information

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice

More information

ClientNet. Portal Admin Guide

ClientNet. Portal Admin Guide ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0

ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0 ARADIAL TECHNOLOGIES Aradial Enforcer Manual Version 7.0 Administration Guide A R A D I A L E N F O R C E R Administration Guide Aradial Technologies Ltd. Information in this document is subject to change

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

(Self-Study) Identify How to Back Up and Restore NetWare Systems

(Self-Study) Identify How to Back Up and Restore NetWare Systems SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore

More information

Online Backup Manager v7 Office 365 Exchange Online Backup & Restore Guide for Windows

Online Backup Manager v7 Office 365 Exchange Online Backup & Restore Guide for Windows Online Backup Manager v7 Office 365 Exchange Online Backup & Restore Guide for Windows Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

Advanced Supercomputing Hub for OMICS Knowledge in Agriculture. Help to Access Discovery Studio v- 4.1

Advanced Supercomputing Hub for OMICS Knowledge in Agriculture. Help to Access Discovery Studio v- 4.1 Advanced Supercomputing Hub for OMICS Knowledge in Agriculture Help to Access Discovery Studio v- 4.1 Centre for Agricultural Bioinformatics ICAR - Indian Agricultural Statistics Research Institute Library

More information

CIVIL AVIATION REQUIREMENT SECTION 2 - AIRWORTHINESS SERIES E PART XII EFFECTIVE : FORTHWITH

CIVIL AVIATION REQUIREMENT SECTION 2 - AIRWORTHINESS SERIES E PART XII EFFECTIVE : FORTHWITH GOVERNMENT OF INDIA OFFICE OF THE DIRECTOR GENERAL OF CIVIL AVIATION TECHNICAL CENTRE, OPP SAFDURJUNG AIRPORT, New Delhi CIVIL AVIATION REQUIREMENT SECTION 2 - AIRWORTHINESS SERIES E PART XII, 2017 EFFECTIVE

More information

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...

More information