Transforming Source Data to Critical Information and Insight. Global Standards: Information Quality Story

Size: px
Start display at page:

Download "Transforming Source Data to Critical Information and Insight. Global Standards: Information Quality Story"

Transcription

1 Transforming Source Data to Critical Information and Insight Global Standards: Information Quality Story

2 You use IHS Standards information every day to make critical decisions that impact your business Rapid design of innovative and safe products for market Complying with mandatory and voluntary requirements Selecting materials, parts and processes that will meet strict design requirements Ensuring workplace and consumer safety Identifying and evaluating potential engineering changes Providing continuous quality improvement while driving down costs Leveraging best practice for efficient design, manufacturing, distribution, and disposal 2

3 Making the right decisions requires access to the right Critical Information and Insight Are my teams all working with the same standards? Do I have the right version of the standard? What if a standard updates and we don t know about it? Are there more standards that are relevant to our work? What will we do if we need a standard urgently? Do different markets require different standards? Does everyone know what standards are available and how? Can I find the right standard when I need it? How can I be sure we are using the standards legally? 3

4 IHS brings 50 years of experience in transforming source data into Critical Information and Insight Core competency is creating Critical Information and Insight needed to power growth and value Industry expertise adds significant value while transforming source data into Critical Information and Insight Dedicated to providing information you need to make decisions critical to your success 4

5 Transformation begins with Sourcing Source Data Sourcing T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE We seek & gather data in different formats from various sources Locating & evaluating hundreds of outside data sources Vetting sources to ensure data consistency over time Auditing processes to insure 100% effectiveness Establishing and maintaining long-term relationships and processes 5

6 We source Standards from 370+ Standards Developing Organizations (SDOs) and have formal agreements with 130+ SDOs Errata Addenda New Standards Revisions Cancellations Amendments Re-approvals Drafts Supplements Corrigenda Superseded 6

7 During the Capture step we load data in many formats from established sources Source Data T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Sourcing Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE Processing the collected data into objects and metadata Aggregating, extending and normalizing new created information into our proprietary databases Validating accuracy quality checks 7

8 We capture and normalize metadata to support robust search and uniform view of Standards Specifications Established capture procedures for each source and document type Capture multiple relevant attributes Normalize and prepare object files for distribution Committed to: Priority documents available within 2 hours of receipt 98% of all documents available within 24 hours of receipt 99% correctness 8

9 Matching applies the framework to connect information over time Source Data T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Sourcing Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE Ensuring new data is properly associated with applicable existing data Keeping revisions and updates together Matching on identifiers, metadata, and data sets 9

10 Incoming Standards are matched by many factors Incoming Standards matched to identify document status, revision history, addenda, corrigenda, and alternate document names Complete Document History 10

11 The Identification step makes each document unique in IHS systems Source Data T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Sourcing Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE Assigns unique IHS identifiers Confirms industry standard identifiers used by customers to find, categorize, and analyze information Provides traceability and connectivity throughout systems 11

12 Both unique IHS and industry standard identifiers are assigned IHS uses unique identifiers so each piece of content (document, part, manufacturer, SDO, etc.) can be tracked Industry standard identifiers are used to ensure content usability 12

13 Building Relationships locates and creates associations across information Source Data T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Sourcing Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE Joining together logical relationships such as: References and applicable documents (including test specs, procurement specs, finishing specs, etc.) Replaced and superseded documents Equivalent documents 13

14 We capture relationships between documents Document relationships such as cross-references and superseded, co-copyrighted, and replacement documents Cross-reference links support easy access to related documents Bi-directional links between superseded & superseding documents make it easy to find the right document 14

15 We capture relationships between documents Document relationships such as equivalencies, cross-references and co-copyright documents Cross-reference links support easy access to related documents Bi-directional links between interrelated documents make it easy to find the right document 15

16 Throughout, this Process we establish goals and measure against them Source Data T R A N S F O R M A T I O N CRITICAL INFORMATION INSIGHT Sourcing Capture Matching Identification Relationships Analysis Modeling Forecasting DATA GOVERNANCE Correctness Currency Completeness Consistency 16

17 Throughout, we establish goals and measure against them Currency Sourcing processes emphasize Currency and Completeness Completeness We complete 295 standards suppliers audits annually while maintaining a 90% average on all audit currency. 17

18 Throughout, we establish goals and measure against them Correctness We focus on Correctness and Consistency in our CAPTURE processes We maintain 98% accuracy for the document attributes of new content added when compared to standards supplier-provided source data Consistency 18

19 Throughout, we establish goals and measure against them Our MATCHING and IDENTIFICATION processes drive Currency We partner with our sources to have 98% of content published within 24 hours of receipt at the same time tracking changes and making alerts available for up-to-the-moment updates Currency 19

20 Throughout, we establish goals and measure against them We build STRUCTURE that makes our information Complete and Consistent We bring disparate sources into consistent format and create metadata tags to facilitate search. We are working to create abstracts for 90% of the top 50,000 documents used. Completeness Consistency 20

21 Our Vision is to deliver the Critical Information and Insight that powers growth and value for you 21

How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation

How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation Paper DH05 How a Metadata Repository enables dynamism and automation in SDTM-like dataset generation Judith Goud, Akana, Bennekom, The Netherlands Priya Shetty, Intelent, Princeton, USA ABSTRACT The traditional

More information

About the Digital Bible Library

About the Digital Bible Library About the Digital Bible Library The Digital Bible Library (DBL) is an online digital asset and licensing management platform developed and maintained by the United Bible Societies. DBL gathers, validates,

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

FileMaker Business Alliance. Program Guide

FileMaker Business Alliance. Program Guide FileMaker Business Alliance Program Guide FileMaker Business Alliance Program Guide Get Started... 3 FBA Business Types and Requirements... 4 Partner Levels... 7 FBA Six Pillars of Excellence... 10 Contact

More information

IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002)

IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002) 2002-09-26 IEEE 802.16-02/47 IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002) For a review of the Standards Development Process (designed to assist the Working Group, Working Group

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association)

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association) SCHEME OF DELEGATION (Based on the model produced to the National Association) THE PURPOSE OF A SCHEME OF DELEGATION: A scheme of delegation (SoD) is the key document defining which functions have been

More information

WAKEFLY WEBSITE USER EXPERIENCE AUDIT

WAKEFLY WEBSITE USER EXPERIENCE AUDIT WAKEFLY WEBSITE USER EXPERIENCE AUDIT Is your website properly optimized to provide the best user experience? BEYOND EXPECTATION USER EXPERIENCE AUDIT SUMMARY The user experience audit provides insight

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

Progress Report National Information Assurance Partnership

Progress Report National Information Assurance Partnership Progress Report 2012-2015 National Information Assurance Partnership Executive Summary The National Information Assurance Partnership (NIAP) has made significant progress in three primary mission areas:

More information

PRINCIPLES AND FUNCTIONAL REQUIREMENTS

PRINCIPLES AND FUNCTIONAL REQUIREMENTS INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER

More information

IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002)

IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002) 2002-09-26 IEEE 802.16-02/48 IEEE-SA Standards Board Project Authorization Request (PAR) Form (2002) For a review of the Standards Development Process (designed to assist the Working Group, Working Group

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice Domino s Pizza Enterprises Ltd The Business Partner Code of Practice INTRODUCTION At Domino s we are committed to living our brand ethos of People Powered Pizza. This includes the people who work with

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Deliver robust products at reduced cost by linking model-driven software testing to quality management.

Deliver robust products at reduced cost by linking model-driven software testing to quality management. Quality management White paper September 2009 Deliver robust products at reduced cost by linking model-driven software testing to quality management. Page 2 Contents 2 Closing the productivity gap between

More information

(The mandatory fields are marked with an * asterix)

(The mandatory fields are marked with an * asterix) Welcome, You have received a link so you can register on The Finning Supplier Portal. This link will take you straight to the first step of the pre-qualification questionnaire page. There are 4 steps in

More information

ARC BRIEF. ISA100 and Wireless Standards Convergence. By Harry Forbes

ARC BRIEF. ISA100 and Wireless Standards Convergence. By Harry Forbes ARC BRIEF OCTOBER 1, 2010 ISA100 and Wireless Standards Convergence By Harry Forbes ISA100 is one of three standards competing in industrial wireless sensing. What is distinctive about ISA100? What are

More information

Polycom Global Services

Polycom Global Services SUPPORT SERVICES OVERVIEW Polycom Global Services Support Services Polycom Global Services wants to help you select the best support option for your needs. We understand your decision will be based on

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

ConCert FAQ s Last revised December 2017

ConCert FAQ s Last revised December 2017 ConCert FAQ s Last revised December 2017 What is ConCert by HIMSS? ConCert by HIMSS is a comprehensive interoperability testing and certification program governed by HIMSS and built on the work of the

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

Data Governance. Mark Plessinger / Julie Evans December /7/2017

Data Governance. Mark Plessinger / Julie Evans December /7/2017 Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements

More information

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES OUR MISSION Promote the highest level of safety for the U.S. offshore oil and natural gas industry through effective leadership, communication, teamwork, utilization of disciplined management systems and

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

Understanding the Open Source Development Model. » The Linux Foundation. November 2011

Understanding the Open Source Development Model. » The Linux Foundation. November 2011 » The Linux Foundation Understanding the Open Source Development Model November 2011 By Ibrahim Haddad (PhD) and Brian Warner, The Linux Foundation A White Paper By The Linux Foundation This paper presents

More information

The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director

The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director IAEA, 14 th May 2014 Key Messages The Nuclear Sector is a long way behind other

More information

Incident Response. Is Your CSIRT Program Ready for the 21 st Century?

Incident Response. Is Your CSIRT Program Ready for the 21 st Century? Incident Response Is Your CSIRT Program Ready for the 21 st Century? Speaker Bio Traditional Response Concepts Technical Incidents Requiring Technical Responses Virus/ Malware Network Intrusion Disaster

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

ITIL overview Service Delivery. Jaroslav Procházka

ITIL overview Service Delivery. Jaroslav Procházka ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management

More information

Case Study: Security Implementation for a Pharmaceutical Company

Case Study: Security Implementation for a Pharmaceutical Company Case Study: Security Implementation for a Pharmaceutical Company The Story Security Challenges and Analysis The Case The SmartPoint Guard Solution The Results The Story About the Pharmaceutical Provider

More information

Oracle Copy Inventory Organization

Oracle Copy Inventory Organization Oracle Copy Inventory Organization Implementation Guide Release 11i October 2001 Part No. A95116-01 Oracle Copy Inventory Organization Implementation Guide, Release 11i Part No. A95116-01 Copyright 1996,

More information

RCP2 Portfolio Overview Document

RCP2 Portfolio Overview Document RCP2 Portfolio Overview Document Portfolio: Expenditure Class: Base Capex Expenditure Category: Grid Replacement & Refurbishment As at date: 15 November 2013 Expenditure Forecast Real 2012/13 NZ$ (m) 2015-2016

More information

Business Processes for Managing Engineering Documents & Related Data

Business Processes for Managing Engineering Documents & Related Data Business Processes for Managing Engineering Documents & Related Data The essence of good information management in engineering is Prevention of Mistakes Clarity, Accuracy and Efficiency in Searching and

More information

IHS Standards Expert Collection Add-On Tool

IHS Standards Expert Collection Add-On Tool IHS Standards Expert Collection Add-On Tool Customer Tools to Add Documents to Licensed Collections Collection Administrator Training Account Requirements / Validation An Account must have at least one

More information

unite.un.org/office365

unite.un.org/office365 GETTING TO KNOW unite.un.org/office365 The new way to get things done Your complete Office in the cloud Office 365 is your personal Office and more. It lets you work from anywhere, on any device, whether

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6:

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6: TECHNICAL SPECIFICATION ISO/IEC TS 17021-6 First edition 2014-12-01 Conformity assessment Requirements for bodies providing audit and certification of management systems Part 6: Competence requirements

More information

Enhanced management of TECOM Group communities

Enhanced management of TECOM Group communities Enhanced management of TECOM Group communities Dr Amina Al Rustamani Group CEO TECOM Group Over the past 16 years, TECOM Group has championed the creation of vibrant, collaborative communities and work

More information

Track 1 // Collaboration & Partnerships

Track 1 // Collaboration & Partnerships Track 1 // Collaboration & Partnerships 1.1 Designate Single Point of Contact to serve as an consistent entry point for companies seeking to deploy in San Francisco. There is often a lack of trust and

More information

Targeted Interactive Advertising

Targeted Interactive Advertising The Smart Way to Recruit Life & Health Producers Targeted Interactive Advertising In today s fast-paced, ever changing E mail is the fastest, most flexible, cost insurance marketplace, interactive efficient,

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

Partner Premier Service Program

Partner Premier Service Program SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &

More information

CABINET PLANNING SYSTEM PROCUREMENT

CABINET PLANNING SYSTEM PROCUREMENT Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy We are very sensitive to privacy issues. The purpose of this Website Privacy Policy is to let you know how Associated Underwriters Insurance, but not limited to, Associated Underwriters

More information

Record Lifecycle Modeling Tasks

Record Lifecycle Modeling Tasks Lifecycle Modeling Tasks 2014 Capture Process Use Store Dispose Lifecycle of a /Information Set: AHIMA: The cycle of gathering, recording, processing, sharing, transmitting, retrieving, storing and deleting

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0 Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in

More information

Santa Barbara County Assessor Business Property Statement E-Filing User Guide

Santa Barbara County Assessor Business Property Statement E-Filing User Guide Santa Barbara County Assessor Business Property Statement E-Filing User Guide This guide will provide you with instructions to assist you in utilizing the Santa Barbara County Assessor E-Filing system.

More information

CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS

CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS WHAT IS CPD? Continuing Professional Development (CPD) is an ongoing requirement to undertake education, maintain a current knowledge base and improve skills

More information

Information Bulletin

Information Bulletin Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...

More information

Continuing Professional Development (CPD)

Continuing Professional Development (CPD) Government of Nepal Continuing Professional Development (CPD) Rural Access Programme (RAP) Phase 3 November 2014 Continuing Professional Development, 1. What is Continuing Professional Development?...

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

RevStream Case Study: LANDESK

RevStream Case Study: LANDESK RevStream Case Study: LANDESK LANDESK empowers people and IT organizations to serve and secure all types of users on multiple devices, using an end-to-end IT service management solution With RevStream,

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

Oracle Field Sales/Laptop

Oracle Field Sales/Laptop Oracle Field Sales/Laptop Concepts and Procedures Release 11i May 2002 Part No. A95947-02 Oracle Field Sales/Laptop Concepts and Procedures, Release 11i Part No. A95947-02 Copyright 2002 Oracle Corporation.

More information

IT Accessibility

IT Accessibility Objective: The University of Tennessee (UT) strives to deploy information, materials, and technology that have been designed, developed, or procured to be accessible to individuals with disabilities, including

More information

Response to the Validation Panel for the DIT Foundation Programmes

Response to the Validation Panel for the DIT Foundation Programmes Response to the Validation Panel for the DIT Foundation Programmes Condition: The programme should be presented as two separate programmes with separate programme documentation, including programme aims,

More information

OMNIS TRACKING TECHNOLOGY TAMED PUTTING CUSTOMS IN CONTROL OF CARGO

OMNIS TRACKING TECHNOLOGY TAMED PUTTING CUSTOMS IN CONTROL OF CARGO OMNIS TRACKING TECHNOLOGY TAMED PUTTING CUSTOMS IN CONTROL OF CARGO 2 OUR NEW VISION FOR BETTER, FASTER CARGO CONTROL Cross-border trade is vital for a nation s well-being. However, as trade volumes grow

More information

University of Texas Arlington Data Governance Program Charter

University of Texas Arlington Data Governance Program Charter University of Texas Arlington Data Governance Program Charter Document Version: 1.0 Version/Published Date: 11/2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE OF THIS DOCUMENT... 3 1.2 SCOPE...

More information

ISA 800/805. Proposed changes to ISA 800/ 805 were limited in nature

ISA 800/805. Proposed changes to ISA 800/ 805 were limited in nature ISA 800/805 Prof. Annette Köhler, IAASB Member and Drafting Team Chair Agenda Item 4 New York, USA June 16, 2015 Page 1 Proprietary and Copyrighted Information Background and Introduction Proposed changes

More information

Accessibility Implementation Plan

Accessibility Implementation Plan Accessibility Implementation Plan Introduction 1 Scope 1 Benchmarks for Accessibility 2 Policies & Procedures 2 Corrective Action/Remediation New Content 3 Equally Effective Alternate Access 4 Quality

More information

CITY OF VANCOUVER ADMINISTRATIVE REPORT

CITY OF VANCOUVER ADMINISTRATIVE REPORT CITY OF VANCOUVER A11 ADMINISTRATIVE REPORT Report Date: May 3, 2007 Author: Dale Bracewell Phone No.: 604.871.6440 RTS No.: 06720 VanRIMS No.: 03-1200-11 Meeting Date: May 15. 2007 TO: FROM: SUBJECT:

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Voluntary Product Accessibility Template

Voluntary Product Accessibility Template Voluntary Product Accessibility Template Starfish & Degree Planner May 1, 2017 Prepared by: Joe Karschnik, Compliance Engineer 50 E-Business Way, Suite 300, Cincinnati, OH 45241 Voluntary Product Accessibility

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Request for Information Strategies to Improve Maritime Supply Chain Security and Achieve 100% Overseas Scanning

Request for Information Strategies to Improve Maritime Supply Chain Security and Achieve 100% Overseas Scanning Request for Information Strategies to Improve Maritime Supply Chain Security and Achieve 100% Overseas Scanning May 2, 2016 1 STRATEGIES TO IMPROVE MARITIME SUPPLY CHAIN SECURITY AND ACHIEVE 100% OVERSEAS

More information

The Business Case for a Web Content Management System. Published: July 2001

The Business Case for a Web Content Management System. Published: July 2001 The Business Case for a Web Content Management System Published: July 2001 Contents Executive Summary... 1 The Business Case for Web Content Management... 2 The Business Benefits of Web Content Management...

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Cyber Security Reliability Standards CIP V5 Transition Guidance: Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible

More information

Public Safety Canada. Audit of the Business Continuity Planning Program

Public Safety Canada. Audit of the Business Continuity Planning Program Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely

More information

United Kingdom Accreditation Service

United Kingdom Accreditation Service United Kingdom Accreditation Service ACC REDITATION C ERTI FIGATE CERTIFICATION BODY No.4718 lnterface NRM Limited is accredited in accordance with the recognised lnternational Standard ISO/lEC 17021:2011

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document

More information

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created> Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

Oracle Copy Inventory Organization

Oracle Copy Inventory Organization Oracle Copy Inventory Organization Implementation Guide Release 11i Part No. A95116-02 March 2003 Oracle Copy Inventory Organization Implementation Guide, Release 11i Part No. A95116-02 Copyright 1996,

More information

11/14/2018. Istanbul Governance, risk, and compliance (GRC)

11/14/2018. Istanbul Governance, risk, and compliance (GRC) 11/14/2018 Governance, risk, and compliance (GRC) Contents Contents... 4 Policy and Compliance Management...5 Activate Policy and Compliance Management... 6 Dependency modeling and mapping...13 Compliance...

More information

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments 1 ID.AM-1: Physical devices and systems within the organization are inventoried Asset Management (ID.AM): The

More information

Guidance article: How to achieve ISO compliance with Comala Workflows

Guidance article: How to achieve ISO compliance with Comala Workflows Guidance article: How to achieve ISO 13485 compliance with Comala Workflows This article explains how compliance with sections and 4.2.5 can be achieved when using with Comala Workflows. It also provides

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources

More information

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V. Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher

More information

Open Data Policy City of Irving

Open Data Policy City of Irving Open Data Policy City of Irving 1. PURPOSE: The City of Irving is committed to fostering open, transparent, and accessible city government, and recognizes that by sharing data freely, the city will generate

More information

What is PayTix? No App Usage Fee Commitment Why use PayTix?

What is PayTix? No App Usage Fee Commitment Why use PayTix? PayTix What is PayTix? PayTix has partnered with cities across the US to enable users to pay for parking tickets in a safe and secure mobile environment without any added usage fee other than a member

More information

[your name] [your job title]

[your name] [your job title] by: [your name] [your job title] XXX@sqlview.com +65 9XXX XXXX 1 Mission Statement 3 2003-2005 2006 2009 2010 2011 2014 1992 1993 2000 1996 2001 The SQL View s Journey Founded SQL View Developed expertise

More information