Q-CERT Incident Reporting Guidelines

Size: px
Start display at page:

Download "Q-CERT Incident Reporting Guidelines"

Transcription

1 Classificatin : Public Q-CERT Incident Reprting Guidelines Q-CERT prvides limited incident handling services t its cnstituents, which include Qatar's gvernment, business, and educatinal institutins as well as the general ppulatin f Qatar. This dcument utlines suggested steps fr reprting incidents t Q-CERT. System administratrs can use this infrmatin t reprt incidents effectively t Q-CERT, ther cmputer security incident respnse teams (CSIRTs), r ther sites. I. What type f activity shuld I reprt? A. Q-CERT's incident definitin B. Q-CERT's incident pririties II. Why shuld I reprt an incident? A. Yu may receive technical assistance. B. We may be able t assciate activity with ther incidents. C. Yur reprt will allw us t prvide better incident statistics. D. Cntacting thers raises security awareness. E. Yur reprt helps us t prvide yu with better dcuments. F. Yur rganizatin's plicies may require yu t reprt the activity. G. Reprting incidents is part f being a respnsible site n the Internet. III. Wh shuld I reprt an incident t? A. Yur site security crdinatr B. Yur representative CSIRT C. Q-CERT D. Other sites invlved in the incident E. Law enfrcement IV. What shuld I include in my incident reprt? A. When reprting an incident t Q-CERT B. When reprting t ther sites and CSIRTs 1. Incident reference numbers 2. Infrmatin abut hw t cntact yu 3. Disclsure infrmatin 4. A summary f hsts invlved 5. A descriptin f the activity 6. Lg extracts shwing the activity 7. Yur time zne and the accuracy f yur clck

2 8. Clarificatin abut what yu wuld like frm the recipient V. Hw shuld I reprt an incident t Q-CERT? A. B. Telephne htline C. Fax D. Encrypting reprts t Q-CERT VI. When shuld I reprt an incident? I. What type f activity shuld I reprt? The type f activity yu shuld reprt, and the level f detail included in yur reprt, depends n t whm yu are reprting. Yur lcal plicies and prcedures may have detailed infrmatin abut what types f activity shuld be reprted and the apprpriate persn t whm yu shuld reprt. A. Q-CERT's incident definitin Q-CERT is interested in receiving reprts f security incidents invlving the Internet. A gd but fairly general definitin f an incident is "The act f vilating an explicit r implied security plicy." Unfrtunately, this definitin relies n the existence f a security plicy that, while generally understd, varies between rganizatins. We have attempted t characterize belw the types f activity we believe are widely recgnized as being in vilatin f a typical security plicy. These activities include but are nt limited t attempts (either failed r successful) t gain unauthrized access t a system r its data unwanted disruptin r denial f service the unauthrized use f a system fr the prcessing r strage f data changes t system hardware, firmware, r sftware characteristics withut the wner's knwledge, instructin, r cnsent We encurage yu t reprt any activities that yu feel meet these criteria fr being an incident. Nte that ur plicy is t keep any infrmatin specific t yur site cnfidential unless we receive yur permissin t release that infrmatin. B. Q-CERT's incident pririties Due t limited resurces and the grwing number f incident reprts, we may nt be able t respnd t every incident reprted t us. We must

3 priritize ur respnses t have the greatest impact t the Qatar cmmunity. The fllwing type f reprts receive the highest pririty and are cnsidered emergencies: pssible life-threatening activity attacks n the Internet infrastructure, such as rt name servers dmain name servers majr archive sites netwrk access pints (NAPs) widespread autmated attacks against Internet sites new types f attacks r new vulnerabilities II. Why shuld I reprt an incident? There are several reasns t reprt an incident t Q-CERT: A. Yu may receive technical assistance. A primary part f ur missin is t prvide a reliable, trusted, 24-hur, single pint f cntact fr security emergencies invlving the Internet. We facilitate cmmunicatin amng experts wrking t slve security prblems and serve as a central pint fr identifying and crrecting vulnerabilities in cmputer systems. When yu reprt an incident t us, we can prvide pinters t technical dcuments, ffer suggestins n recvering the security f yur systems, and share infrmatin abut recent intruder activity. In ur rle as a crdinatin center, we may have access t infrmatin that is nt yet widely available t assist in respnding t yur incident. Unfrtunately, ur limited resurces and the increasing number f incidents reprted t us may prevent us frm respnding t each reprt individually. We must priritize ur respnses t have the greatest impact n the Internet cmmunity. B. We may be able t assciate activity with ther incidents. Q-CERT receives reprts f security incidents frm all ver the wrld. In many cases, these incidents have similar characteristics r invlve the same intruders. By reprting yur incident, yu allw us t cllect infrmatin abut recent activity in the intruder cmmunity as it relates t yur incident. We may als be able t put yu in tuch with ther sites wh are pursuing legal actins against the intruder. C. Yur reprt will allw us t prvide better incident statistics.

4 Q-CERT cllects statistics n the incidents reprted t us. Yur reprts help identify vulnerabilities that are being actively explited in the intruder cmmunity, prvide infrmatin abut the frequency f these attacks, and identify areas where greater cmmunity awareness is needed. D. Cntacting thers raises security awareness. When yu reprt an incident t Q-CERT, we suggest that yu cntact the ther sites invlved in the activity, and that yu include us in thse messages. This benefits the ther sites by alerting them t pssible intruder activity n their systems. In many cases, unsuccessful prbes yu reprt may identify mre serius security issues at the riginating site. Additinally, cntacting ther sites may help yu respnd t yur security cncerns by prviding mre infrmatin, a different perspective, r even by identifying the intruder. E. Yur reprt helps us t prvide yu with better dcuments. The cmments and suggestins that yu prvide while invlved in the handling f an incident allws us t imprve ur cmputer security publicatins. Yur questins help us t understand what subjects require greater attentin in future dcuments. And taken as a whle, yur reprts allw us t understand the current state f the cmputer security practice. F. Yur rganizatin's plicies may require yu t reprt the activity. Yur rganizatin's plicies may require that yu reprt this activity t Q- CERT r anther CSIRT. On the ther hand, yur plicy may require that yu nt reprt r discuss this activity with anyne ther than yur site security crdinatr. Befre reprting activity t Q-CERT r anyne else, check yur lcal plicies and prcedures n hw t prceed. G. Reprting incidents is part f being a respnsible site n the Internet. There is a strng histrical precedent fr cmmunicating with ther sites abut security incidents. The Request fr Cmments dcument "Guidelines fr the Secure Operatin f the Internet" (RFC1281) reads: The Internet is a cperative venture. The culture and practice in the Internet is t render assistance in security matters t ther sites and netwrks. Each site is expected t ntify ther sites if it detects a penetratin in prgress at the ther sites, and all sites are expected t help ne anther respnd t security vilatins. This assistance may include tracing cnnectins, tracking vilatrs and assisting law enfrcement effrts.

5 III. Wh shuld I reprt an incident t? T determine wh yu shuld reprt a security incident t, first cnsult yur lcal security plicies and prcedures. If the prcedures d nt explicitly identify wh yu shuld reprt an activity t, yu shuld discuss the incident with yur management and legal cunsel befre prceeding. A. Yur site security crdinatr Many security prcedures identify a site security crdinatr wh serves as a central resurce fr handling vilatins f yur security plicies. This persn may crdinate and handle all cmmunicatins with ther CSIRTs, law enfrcement and ther sites. B. Yur representative CSIRT Many cmpanies, universities, and cuntries have a cmputer security incident respnse team (CSIRT) dedicated t handling incidents invlving their cnstituency. The Frum f Incident Respnse and Security Teams (FIRST) is a calitin f such CSIRTs. FIRST aims t fster cperatin and crdinatin in incident preventin, t prmpt rapid reactin t incidents, and t prmte infrmatin sharing amng members and the cmmunity at large. Mre infrmatin abut FIRST can be fund n their web page: T determine if yur site is represented by a member f FIRST, yu may want t review the list f FIRST teams, which includes addresses, telephne numbers, and brief descriptins f each team's cnstituency. C. Q-CERT Q-CERT welcmes reprts frm any site in Qatar r the regin experiencing a cmputer security prblem invlving the Internet. We encurage yu t include Q-CERT n any messages yu send t ther sites r CSIRTs (within the limits f yur site's security plicies and prcedures). This infrmatin will enable us t better meet ur incident crdinatin bjectives. Infrmatin abut hw t cntact Q-CERT is available in sectin V f this dcument. D. Other sites invlved in the incident Since intruders frequently use cmprmised hsts r accunts t attack ther systems, we encurage yu t reprt any intruder activity directly t the registered pint f cntact(s) f the riginating hst. They may be unaware f the activity invlving their systems, and yur nte will prvide the incentive t check fr signs f intrusin.

6 We wuld appreciate being included n the "cc:" line f any messages yu may send t ther sites regarding intruder activity. Infrmatin abut finding cntact infrmatin fr sites invlved in incidents is available at E. Law Enfrcement Q-CERT is nt an investigative r law enfrcement agency. We d nt investigate (r maintain r disclse infrmatin abut) individual intruders, and we d nt cnduct criminal investigatins. Our activities fcus n prviding technical assistance and facilitating cmmunicatins in respnse t cmputer security incidents invlving hsts n the Internet. If yu are interested in cntacting law enfrcement t cnduct a legal investigatin, we encurage yu review yur lcal plicies and prcedures fr guidance n hw t prceed. We als encurage yu t discuss the intruder's activity with yur management and legal cunsel befre cntacting law enfrcement. Yur legal cunsel can prvide yu with legal ptins and curses f actin based n yur r yur rganizatin's needs. We d nt have legal expertise and cannt ffer legal advice r pinins. IV. What shuld I include in my incident reprt? When reprting intruder activity, it is imprtant t ensure that yu prvide enugh infrmatin fr the ther site r CSIRT t be able t understand and respnd t yur reprt. A. When reprting an incident t Q-CERT: Q-CERT has adapted an Incident Reprting Frm (IRF) designed t assist yu in reprting an incident. This frm is available at This frm prmpts fr all f the infrmatin discussed belw in an rganized manner. Cmpleting the frm may help yu have a mre cmplete understanding f the intruder's activity, even if yu d nt send it t Q-CERT. Many f the questins are ptinal, but having the answers t all the questins enables us t prvide the best assistance. Cmpleting the frm can als help avid delays intrduced when we request the additinal infrmatin needed t assist yu. The Q-CERT IRF is nt intended fr reprting activity t ther sites r CSIRTs. Sme f the infrmatin requested n the frm may be sensitive in nature and is requested fr Q-CERT's internal use nly. Nte that ur plicy is t keep any infrmatin specific t yur site cnfidential unless we receive yur permissin t release that infrmatin.

7 B. When reprting t ther sites and CSIRTs: 1. Incident reference numbers Q-CERT and many ther CSIRTs assign incident reference numbers t reprted activity. These numbers help us t track crrespndence and identify related activity. Please be sure t include all incident reference numbers that have been assigned t the incident, either by Q-CERT r ther CSIRTs. Each CSIRT has its wn prcedures regarding the assignment f incident tracking numbers. Q-CERT attempts t assign a single number t all activity invlving ne intruder. We encurage yu t reference this number when crrespnding with ther sites r CSIRTs that are invlved in the incident. When reprting activity that may be the wrk f multiple intruders, we request that yu reprt each incident separately. (A cmmn example wuld be tw prbes riginating frm different sites, with n ther indicatins that the prbes are related.) Mst CSIRTs, including Q-CERT, request that the incident reference number be clearly displayed in the "Subject:" line f any mail messages regarding the incident. 2. Infrmatin abut hw t cntact yu When cntacting ther sites, remember that they may nt be able t cntact yu as easily as yu might think. Perhaps they discnnected frm the Internet immediately after yu alerted them t the intruder's activity and are nw unable t respnd t yur message. Als, sme cmpanies limit lng distance r internatinal dialing frm cmpany telephnes. T ensure that ther are able t respnd, prvide as much cntact infrmatin as yu are willing t disclse. In mst cases, this shuld include at least an address and a telephne number. Yu may als wish t include a pager number, a fax number, r even a cellular telephne number. A traditinal mail address may help the ther site understand where yu are lcated gegraphically. It is als a gd idea t specify an alternate cntact at yur site in case yu are unavailable. Similar cntact infrmatin shuld be prvided fr the alternate cntact. 3. Disclsure infrmatin Q-CERT's plicy is t nt release any infrmatin abut a site's invlvement in an incident, withut the site's explicit permissin t

8 d s. While this plicy ensures that yu can reprt intruder activity t us in cnfidence, it als hinders ur ability t put yu in cntact with ther sites invlved in the incident. If we are authrized t ffer infrmatin abut yur invlvement in an incident t the ther sites invlved, ther CSIRTs, r law enfrcement, please state this clearly in the incident reprt. Mst CSIRTs have nn-disclsure plicies, and many sites will respect yur nn-disclsure requests as well. In general, a shrt statement describing yur cncerns (r lack theref) shuld be included in any incident reprt t help the recipient understand and respect yur wishes. Keep in mind, hwever, that there is n way t ensure that ther sites invlved in the activity will cmply with yur request. 4. A summary f hsts invlved In many incidents, the mst bvius indicatin f related activity is the hsts invlved. Fr example, several f the hsts used t attack yur site may have been used t attack anther cmprmised hst last week. Fr this reasn, it is a gd idea t include a brief summary f the hstnames and IP addresses knwn t be invlved and their relatinship t the incident. Hwever, yu may want t exercise cautin in identifying cmprmised hsts at yur site, particularly befre recvering the security f these systems. Yur plicies and prcedures fr handling cmputer security incidents may specify hw much infrmatin yu are able t release abut the hsts invlved at yur site. 5. A descriptin f the activity One f the mst imprtant parts f any incident reprt is a descriptin f the intruder's activity. Mentin any vulnerabilities which were explited, mdificatins that were made t the system, r sftware that was installed. When reprting t a CSIRT, this infrmatin will allw the incident handler t prvide assistance specific t the activity at yur site. When reprting t anther site, it helps the recipient understand what kind f intruder activity t lk fr n their systems. When describing intruder activity, it is imprtant t remember that ther administratrs may have mre r less experience with cmputer security. Yu may want t include references t advisries r ther dcuments which describe the activity in mre detail.

9 6. Lg extracts shwing the activity Whenever pssible, yu shuld include lg entries shwing the activity with yur reprt, particularly when the lgs prvide significantly mre detail than yur descriptin. Lg entries may als be mre easily understd by sites that d nt speak yur language fluently. Lg entries that are nt related t the intruder activity shuld be remved t help avid cnfusin. What yu immediately recgnize as nrmal entries may appear t be intruder activity t smene else. If the intruder's activity generated a large number f very similar entries, it is usually sufficient t extract a sample prtin f the lg and indicate this in the message. A quick estimate f the number f lg entries is useful as well. A descriptin f the lg frmat may als be helpful t system administratrs wh are nt familiar with the lgs prvided. This is very imprtant fr lg entries that d nt include descriptive text, r are generated by tls that are nt widely distributed. When sending lg entries t ther sites, take care t ensure that yu d nt vilate any nn-disclsure plicies yu may have. Sensitive infrmatin can be remved by replacing it with X's. Yu may want t make a nte f this in yur reprt t ensure that the ther site is aware f the changes. If yu d nt have lgs shwing the intruder's activity (perhaps because they were deleted by the intruder), then state this clearly in yur reprt t help minimize requests fr this infrmatin. Even if yu d nt include lg entries shwing the activity, we encurage yu t describe the date and time when the events ccurred. This allws the ther site t review their lgs when lking fr related activity at their site. 7. Yur time zne and the accuracy f yur clck Since the recipient may be in a different time zne, yu shuld clearly identify the time zne fr yur cmments and lgs. A time zne reference relative t GMT, such as GMT+3 is preferred, since less frmal time zne designatins can be misinterpreted. If the times recrded in the lg entries are knwn t be inaccurate by mre than a minute r tw, yu may want t include a statement warning the recipient f this inaccuracy. On the ther hand, if the

10 system was synchrnized with a natinal time server via NTP (Netwrk Time Prtcl), then yu may want t mentin this as well. 8. Clarificatin abut what yu wuld like frm the recipient If yu are reprting intruder activity slely fr the ther site's benefit, let them knw that yu d nt expect a respnse frm them regarding yur reprt. If yu wuld like them t take a specific actin, such as acknwledging yur message r prviding yu with additinal infrmatin regarding the activity, request this plitely in yur message. Keep in mind that the ther site's incident handling plicies and prcedures may prevent them frm respnding as yu have requested. Internet service prviders frequently have plicies prtecting the identity f their custmers, and they will nt release this infrmatin withut a subpena. If a site requests infrmatin r an actin frm yu that vilates yur site's security plicy, plitely explain that yu are unable t respnd as they requested. Finally, when requesting assistance frm Q-CERT r anther CSIRT, remember that resurce limitatins may prevent them frm respnding as yu have requested. V. Hw shuld I reprt an incident t Q-CERT? Yu can reprt intruder activity t Q-CERT via , telephne htline, r fax. We encurage yu t encrypt yur reprts t ensure yur privacy, and t authenticate yur identity. A. Q-CERT's preferred mechanism fr receiving incident reprts is thrugh . allws us t priritize the incidents reprted t us and t reply t thse messages quickly and efficiently. als prvides an accurate and efficient medium fr exchanging infrmatin t cmplex t discuss ver the telephne, such as packet dumps r large lg files. Finally, prvides a reliable lg f cmmunicatins that we may refer t in the prcess f respnding t an incident. Our address fr crrespndence regarding incidents is incidents@qcert.rg. B. Telephne htline

11 If yu have discnnected frm the Internet t recver frm a cmprmise, r if yu are unable t send mail due t a denial-f-service attack, yu can cntact Q-CERT n ur telephne htline. Our telephne htline number is Occasinally, a cmprmised system's will be mnitred by the intruder. If yu are unable t btain access frm a secure system, and yu d nt want t alert the intruder by using n the cmprmised system, yu may als want t cntact us n the telephne. Please keep in mind that while the Q-CERT htline is staffed 24 hurs a day, utside f nrmal wrking hurs incident handlers are available nly fr emergency calls. Nrmal wrking hurs are frm 8:00am t 4:00pm GMT+3, Sunday thrugh Thursday. Hurs may vary n hlidays r under ther special circumstances. C. Fax When is nt available r prvides inadequate security, and yu have lgs r ther infrmatin that is nt easily cnveyed n the telephne, yu may want t send that infrmatin t us via fax. The Q-CERT fax machine is checked regularly during nrmal wrking hurs. Faxes received during the evenings, weekends, and hlidays will be reviewed n the next business day. Our fax number is D. Encrypting reprts t Q-CERT prvides little r n privacy fr the infrmatin yu send acrss the Internet. If yu wish t ensure that mail sent t Q-CERT is nt read by unauthrized peple while in transit, we encurage yu t use a strng encryptin algrithm. Q-CERT currently supprts a public key based n the Pretty Gd Privacy (PGP) prduct. PGP is Q-CERT's preferred encryptin mechanism. It prvides authenticatin and privacy. N special arrangements have t be made with us in advance in rder t cmmunicate securely via PGP. Yu can btain ur public key by visiting ur Sending Sensitive Infrmatin page. This key will allw yu t ensure the privacy f messages sent t us and verify the authenticity f messages yu receive frm us. If yu encrypt messages yu send t Q-CERT, we will respnd with encrypted messages whenever pssible. Since it can be difficult fr us t cnfirm the validity f yur public PGP key, please be sure t include yur public key in the bdy f any encrypted messages yu send t us. Q-CERT signs all utging mail with ur PGP key. If yu receive any cmmunicatin frm us withut a PGP signature, r with an invalid PGP

12 signature, please cnsider the message suspect and let us knw. We encurage all sites cmmunicating with us t encrypt and sign their messages with PGP. Mre infrmatin abut PGP is available frm VI. When shuld I reprt an incident? Incident reprts that are sent shrtly after the incident ccurred are the mst likely t be valuable t the recipient and t us. This des nt imply that an incident reprt becmes useless after sme perid f time. We encurage yu t reprt all activity yu discver, even if the intruder's activity is quite ld by the time yu reprt it. Other than being extra careful t ensure that the date f the activity is clearly identified, we encurage yu t reprt the incident as yu wuld any ther incident, since ther sites may nt yet be aware f the incident.

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board

ONTARIO LABOUR RELATIONS BOARD. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Ontario Labour Relations Board ONTARIO LABOUR RELATIONS BOARD Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Ontari Labur Relatins Bard This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

HP MPS Service. HP MPS Printer Identification Stickers

HP MPS Service. HP MPS Printer Identification Stickers HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

Author guide to submission and publication

Author guide to submission and publication Authr guide t submissin and publicatin Cntents Cntents... 1 Preparing an article fr submissin... 1 Hw d I submit my article?... 1 The decisin prcess after submissin... 2 Reviewing... 2 First decisin...

More information

PRIVACY AND E-COMMERCE POLICY STATEMENT

PRIVACY AND E-COMMERCE POLICY STATEMENT PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday

APPLICATION FORM. CISAS opening hours: 9:00am to 5:00pm, Monday to Friday Enquiry reference number: (Office use nly) Administered by the Centre fr Effective Dispute Reslutin (CEDR) APPLICATION FORM What is this Applicatin fr? What d I need t d? This applicatin frm is fr custmers

More information

EUROPEAN IP NETWORK NUMBER APPLICATION FORM & SUPPORTING NOTES

EUROPEAN IP NETWORK NUMBER APPLICATION FORM & SUPPORTING NOTES EUROPEAN IP NETWORK NUMBER APPLICATION FORM & SUPPORTING NOTES T whm it may cncern. Thank yu fr yur request fr an IP netwrk number. Please ensure that yu read the infrmatin belw carefully befre submitting

More information

Type: System Enhancements ID Number: SE 93. Subject: Changes to Employee Address Screens. Date: June 29, 2012

Type: System Enhancements ID Number: SE 93. Subject: Changes to Employee Address Screens. Date: June 29, 2012 Type: System Enhancements ID Number: SE 93 Date: June 29, 2012 Subject: Changes t Emplyee Address Screens Suggested Audience: Human Resurce Offices Details: On July 14, 2012, Peple First will implement

More information

Aras Innovator Viewer Add-Ons

Aras Innovator Viewer Add-Ons Aras Innvatr Viewer Add-Ons Aras Innvatr 9.2 Dcument #: 9.2.02232009 Last Mdified: 4/1/2010 Aras Crpratin ARAS CORPORATION Cpyright 2010 All rights reserved Aras Crpratin 300 Brickstne Square Suite 904

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy)

Data Processing Information for Users of the Career and Alumni Portal of HTW Berlin (Data Privacy Policy) Data Prcessing Infrmatin fr Users f the Career and Alumni Prtal f HTW Berlin (Data Privacy Plicy) The prtectin f yur data is imprtant t us. In view f this and in rder t cmply with all f ur statutry disclsure

More information

How to use DCI Contract Alerts

How to use DCI Contract Alerts Hw t use DCI Cntract Alerts Welcme t the MyDCI Help Guide series Hw t use DCI Cntract Alerts In here, yu will find a lt f useful infrmatin abut hw t make the mst f yur DCI Alerts which will help yu t fully

More information

Requesting Service and Supplies

Requesting Service and Supplies HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

DELL EMC PERSONALIZED SUPPORT SERVICES

DELL EMC PERSONALIZED SUPPORT SERVICES DELL EMC PERSONALIZED SUPPORT SERVICES Optimize yur Dell EMC investment based n yur unique requirements ESSENTIALS Dell EMC Persnalized Supprt Services: Custmize and enhance yur Dell EMC Custmer Service

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

Cityspan Database Instructions

Cityspan Database Instructions T all Measure Z Grantees: Official training vide is available nline. Yu can find the link by ging t the Oakland Unite website [www.aklandunite.rg] and lking under the tab Grantee Crner Tls fr Grantees.

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information

Faculty Textbook Adoption Instructions

Faculty Textbook Adoption Instructions Faculty Textbk Adptin Instructins The Bkstre has partnered with MBS Direct t prvide textbks t ur students. This partnership ffers ur students and parents mre chices while saving them mney, including ptins

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Town of Warner, New Hampshire Information Security Policy

Town of Warner, New Hampshire Information Security Policy Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use

More information

HireRight: Step-by-Step Guide

HireRight: Step-by-Step Guide HireRight: Step-by-Step Guide Using HireRight fr Frm I-9 and E-Verify This guide prvides step-by-step prcedures fr using HireRight t cmplete the Emplyment Eligibility Verificatin Frm I-9 and E-Verify check

More information

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start AT&T Crprate Vice Mail Unified Messaging (CVM-UM) Quick Start 2011 AT&T Intellectual Prperty. All rights reserved. AT&T the lg and all ther AT&T marks cntained herein are trademarks f AT&T Intellectual

More information

Independent Adjudication for Customers. Royal Institution of Chartered Surveyors (RICS) Application Form

Independent Adjudication for Customers. Royal Institution of Chartered Surveyors (RICS) Application Form Independent Adjudicatin fr Custmers Ryal Institutin f Chartered Surveyrs (RICS) Applicatin Frm What is this Applicatin fr? This applicatin frm is fr a custmer t bring a claim against a cmpany r an individual

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

DNS (Domain Name Service)

DNS (Domain Name Service) mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Customer Upgrade Checklist

Customer Upgrade Checklist Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

You may receive a total of two GSA graduate student grants in your entire academic career, regardless of what program you are currently enrolled in.

You may receive a total of two GSA graduate student grants in your entire academic career, regardless of what program you are currently enrolled in. GSA Research Grant Applicatin GUIDELINES & INSTRUCTIONS GENERAL INFORMATION T apply fr this grant, yu must be a GSA student member wh has renewed r is active thrugh the end f the award year (which is the

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE

Net1 Mobile Solutions (Pty) Ltd COMPLAINT HANDLING PROCEDURE Net1 Mbile Slutins (Pty) Ltd Name: Cmplaint Handling Prcedure Net1 Mbile Slutins (Pty) Ltd COMPLAINT HANDLING PROCEDURE I. General Purpse It is the prcedure f Net1 Mbile Slutins (Pty) Ltd (the Cmpany )

More information

Sircon User Guide A Guide to Using the Vertafore Sircon Self-Service Portal

Sircon User Guide A Guide to Using the Vertafore Sircon Self-Service Portal Sircn User Guide A Guide t Using the Vertafre Sircn Self-Service Prtal September 2016 Versin 16.8 Cntents Cntents Using the Vertafre Sircn Self-Service Prtal... 3 Lg In... 3 Hme Page... 4 Lg New Cases...

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

Public Documents Registration of authorities in IMI Guide for Access managers

Public Documents Registration of authorities in IMI Guide for Access managers Public Dcuments Registratin f authrities in IMI Guide fr Access managers 6th August 2018 Versin 2 PUBLIC DOCUMENTS -REGISTRATION GUIDE Dcument revisins Date Versin number Dcument changes 29/06/2018 0.1

More information

Privacy Policy concerning the use of the website and the use of cookies

Privacy Policy concerning the use of the website and the use of cookies Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling

More information

HOW TO APPLY In rder t apply fr a CT1 training pst fr 2016/17 yu are required t cmplete and submit an applicatin using the nline recruitment system, please see link belw: https://www.sctmt.sct.nhs.uk/dental/lgin.aspx

More information

Enrolling onto the Open Banking Directory How To Guide

Enrolling onto the Open Banking Directory How To Guide Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

App Center User Experience Guidelines for Apps for Me

App Center User Experience Guidelines for Apps for Me App Center User Experience Guidelines fr Apps fr Me TABLE OF CONTENTS A WORD ON ACCESSIBILITY...3 DESIGN GUIDELINES...3 Accunt Linking Prcess... 3 Cnnect... 5 Accept Terms... 6 Landing Page... 6 Verificatin...

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

Reviewer Information Sheet for Committee Members

Reviewer Information Sheet for Committee Members Reviewer Infrmatin Sheet fr Cmmittee Members OSIRIS is a web-based applicatin that was created t imprve human subject prtectins and t enable the IRB t better serve the research cmmunity. The applicatin

More information

VISITSCOTLAND - TOURS MANAGEMENT SYSTEM Manual for Tour Operators

VISITSCOTLAND - TOURS MANAGEMENT SYSTEM Manual for Tour Operators VISITSCOTLAND - TOURS MANAGEMENT SYSTEM Manual fr Tur Operatrs 1 CONTENTS GETTING STARTED... 3 REGISTER AND CREATE YOUR ACCOUNT... 3 OPERATOR PROFILE... 4 Create yur Operatr Prfile... 4 ADD A TOUR LISTING...

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

Regroup Quick Start User Guide

Regroup Quick Start User Guide Regrup Quick Start User Guide Ver 1.0 Table f Cntents Hme Screen... 2 Change Hw Yu Receive Grup Cmmunicatin... 2 Pst Annuncements t Yur Grups... 3 Add Optinal Phne and Emails... 4 Regrup Sftware User Infrmatin

More information

ComplyWorks Subscription User Guide. October 6, 2011

ComplyWorks Subscription User Guide. October 6, 2011 CmplyWrks Subscriptin User Guide Octber 6, 2011 Cntents 1. Register... 3 2. Get cmpliant... 3 a) Pay fr yur accunt... 3 b) Cllect the dcuments yu ll need... 4 c) Enter yur infrmatin... 4 d) Publish yur

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

Registering for FEMA assistance

Registering for FEMA assistance Skagit Cunty Emergency Management Registering fr FEMA assistance What Infrmatin d I Need t Apply? Whether applying nline (www.disasterassistance.gv ) OR ver the phne 1-800-621-FEMA (3362), yu shuld have

More information

Online Image Viewing Agent User Guide. Texas FAIR Plan Association 1

Online Image Viewing Agent User Guide. Texas FAIR Plan Association 1 Online Image Viewing gent User Guide Texas FIR Plan ssciatin 1 Table f Cntents 1. Online Image Viewing... 4 2. Frequently sked uestins (F)... 15 TFP Online Image Viewing Guide 2 Table f Figures Figure

More information

STUDENTS/STAFF MANAGEMENT -SUMMATIVE

STUDENTS/STAFF MANAGEMENT -SUMMATIVE SUMMATIVE AND STATE-LEVEL TESTING STUDENTS/STAFF MANAGEMENT -SUMMATIVE This Students/Staff Management Guide is written fr leaders at schls r the district wh: Prepare and uplad a rster f students and staff

More information

If you have any questions that are not covered in this manual, we encourage you to contact us at or send an to

If you have any questions that are not covered in this manual, we encourage you to contact us at or send an  to Overview Welcme t Vercity, the ESS web management system fr rdering backgrund screens and managing the results. Frm any cmputer, yu can lg in and access yur applicants securely, rder a new reprt, and even

More information

All members of the UNNC Community and users of the University network.

All members of the UNNC Community and users of the University network. Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized

More information

Investor Services Online Quick Reference Guide FTP Delivery

Investor Services Online Quick Reference Guide FTP Delivery The File Transfer Prtcl (FTP) feature f Investr Services Online enables yu t autmatically transmit any reprt frm Investr Services Online n t yur cmpany s FTP servers thrugh a secure methd f cmmunicatin

More information

Internet/Intranet Publishing Guidelines

Internet/Intranet Publishing Guidelines Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls

More information

USING THE ACCOUNT MANAGER. Getting started. Logging in and out. Welcome screen

USING THE ACCOUNT MANAGER. Getting started. Logging in and out. Welcome screen USING THE ACCOUNT MANAGER Use the Accunt Manager t request the fllwing accunt types: Guest (up t 5 accunts) 1 External External + SharePint Prject Fr a full descriptin f these accunt types and what yu

More information

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to: Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at

USD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at 8-14-08 District Web Pages USD 373 s General Guidelines fr Web Page Publishing General Guidelines The purpse f any USD 373 publicatin is t share infrmatin regarding issues, events, persnnel, students and

More information

MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS

MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS MARYLAND PHYSICIANS CARE (00247) ERA ENROLLMENT INSTRUCTIONS WHICH FORM(S) SHOULD I DO? Emden EnrllNw (Click here) NOTE: This is cmpleted nline. Office Ally supprts nly the payers listed n the Emden ERA

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

Project Extranet User Guide

Project Extranet User Guide Prject Extranet User Guide Drafted by: Francisc Galleg (fgalleg@ua.es) - UA Pedr Caselles (pcaselles@ua.es) - UA Raul Pamplega (rpamplega@ua.es) - UA 1 Table f cntents: 1. EXTRANET USER GUIDE 3 2. INTRODUCTION

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

Draft of 22 April 2013 REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION

Draft of 22 April 2013 REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION REGISTRATION DATA DIRECTORY SERVICE (WHOIS) SPECIFICATION [Nte: ICANN will be prpsing updated language regarding the term Whis t cmply with SSAC recmmendatins. The updated language will nt represent a

More information

Transferring dongle licenses online

Transferring dongle licenses online Transferring dngle licenses nline This pages prvides infrmatin n hw t transfer yur dngle licenses nline. Overview The License Server versin 4.5.0 intrduces the ability t migrate yur licenses frm a physical

More information

Report Writing Guidelines Writing Support Services

Report Writing Guidelines Writing Support Services Reprt Writing Guidelines Writing Supprt Services Overview The guidelines presented here shuld give yu an idea f general cnventins fr writing frmal reprts. Hwever, yu shuld always cnsider yur particular

More information

Users, groups, collections and submissions in DSpace. Contents

Users, groups, collections and submissions in DSpace. Contents Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...

More information

How is my book published by the AMS?

How is my book published by the AMS? Hw is my bk published by the AMS? Publishing yur bk is a team effrt that starts with the Acquisitins, and invlves the Prductin, and Sales, Custmer Supprt, Print Shp, and Distributin departments. This dcument

More information

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS)

SchoolMessenger School Notification is a product of Henrico County Public Schools (HCPS) 1 SchlMessenger: Staff and Parent Cmmunicatin Henric Cunty, Virginia Shrt Overview SchlMessenger Schl Ntificatin is a prduct f Henric Cunty Public Schls (HCPS) that assists the schl divisin with simplifying

More information

Independent Arbitration for Customers. Application Form

Independent Arbitration for Customers. Application Form Independent Arbitratin fr Custmers Cavity Insulatin Guarantee Agency (CIGA) Applicatin Frm What is this Applicatin fr? This applicatin frm is fr the custmer t bring a claim against a CIGA Registered Installer

More information

User Guide. Table Of Contents. Logging In. Job Search. Job Information. Site Search & Logging A Job. Customer Search. Job Dashboard.

User Guide. Table Of Contents. Logging In. Job Search. Job Information. Site Search & Logging A Job. Customer Search. Job Dashboard. User Guide Weblgic allws yu t access jb infrmatin via a web page. Giving yu real time updates, with the ptin t print reprts and infrmatin n/fr the jb. Table Of Cntents Lgging In Jb Search Jb Infrmatin

More information

Employee Self Service (ESS) Quick Reference Guide ESS User

Employee Self Service (ESS) Quick Reference Guide ESS User Emplyee Self Service (ESS) Quick Reference Guide ESS User Cntents Emplyee Self Service (ESS) User Quick Reference Guide 4 Intrductin t ESS 4 Getting Started 5 Prerequisites 5 Accunt Activatin 5 Hw t activate

More information

My Performance Management User Guide

My Performance Management User Guide My Perfrmance Management User Guide Overview The accesshr website huses perfrmance management. As an emplyee, yu have the ability t review and acknwledge perfrmance plans and perfrmance evaluatins that

More information

NOTE: The three-paragraph letter format may be changed, if you feel you need four paragraphs. Date. Paragraph #1. Paragraph #2. Paragraph #3.

NOTE: The three-paragraph letter format may be changed, if you feel you need four paragraphs. Date. Paragraph #1. Paragraph #2. Paragraph #3. J Dran 1 Crrespndence Frmats/Guidelines Please use these guidelines as just that guidelines. Please amend these frmats using yur wn discretin based n cntext, audience, and ther rhetrical needs. Fr all

More information

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 Chapter 1 v5.03 Exam Answers 2016 CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security

More information

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

A introduction to GNH Community

A introduction to GNH Community A intrductin t GNH Cmmunity What is GNH Cmmunity? The basics: - An nline cmmunity fr nn-prfits in the Greater New Haven area - A tl t cmmunicate and share infrmatin: Prgrams Available resurces Cntact details

More information

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation. CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet

More information

Instruction Guide. General Information Services (GIS) equest+ Ordering and Viewing Process. Client Name Here. Account Manager s Info:

Instruction Guide. General Information Services (GIS) equest+ Ordering and Viewing Process. Client Name Here. Account Manager s Info: Instructin Guide General Infrmatin Services (GIS) equest+ Ordering and Viewing Prcess Client Name Here Accunt Manager s Inf: Every applicant n which yu are running a backgrund must fill ut an authrizatin.

More information

Guidance for Submitting an application or Nomination in AAS Ishango Online System

Guidance for Submitting an application or Nomination in AAS Ishango Online System Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General

More information

Customer Self-Service Center Migration Guide

Customer Self-Service Center Migration Guide Custmer Self-Service Center Migratin Guide These instructins intrduce yu t the new Custmer Prtal, which is replacing the lder Custmer Self-Service Center, and guides yu thrugh the migratin. Dn t wrry:

More information

Name of School. Date of next Review. Who reviewed this policy?

Name of School. Date of next Review. Who reviewed this policy? Name f Schl Gverning Bdy Ratified Plicy, 08.12.11 Date f next Review Wh reviewed this plicy? The Jenny Hammnd Primary Schl Signed Chair f Gvernrs As Apprpriate Stephné Hpe-ICT Curriculum Lead Leadership

More information

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is

More information

Getting started. Roles of the Wireless Palette and the Access Point Setup Utilities

Getting started. Roles of the Wireless Palette and the Access Point Setup Utilities Getting started The Wireless Palette is a sftware applicatin fr mnitring the cmmunicatin status between the Wireless LAN PC Card and the Wireless LAN Access Pint (hereinafter referred t as the Access Pint).

More information

istartsmart 3.5 Upgrade - Installation Instructions

istartsmart 3.5 Upgrade - Installation Instructions istartsmart 3.5 Upgrade - Installatin Instructins Minimum System Requirements: Hatch All-In-One istartsmart Cmputer Learning Center v1.0 r v1.1 Internet access - either hard-wired r wireless cnnectin is

More information

Area Governors Module

Area Governors Module 1. General Overview Welcme t Assistant/Area Gvernrs Mdule, this well structured sectin f the District Organizatin Chart will assist yu in rganizing the club lists fr all yur Assistant/Area Gvernrs 2. Getting

More information

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes:

Privacy Policy. We may collect information about you in a variety of ways. The information we collect on the Site includes: Privacy Plicy BHIP Glbal, Inc. ( BHIP, we r us ) respects the privacy f ur users ( User r Yu ). This Privacy Plicy explains hw Pruvit cllects, uses, and disclses, and safeguards Yur Infrmatin when yu visit

More information

Password Management Guidelines

Password Management Guidelines Unified Cntract System Passwrd Management Guidelines Versin 2.5 Revisin date: 26-06-2006 Authr:J.Thiyagarajan Cpyright 2006 by Hexaware Technlgies Limited All rights reserved. All text and figures included

More information

Security of Information Technology Resources

Security of Information Technology Resources CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December

More information

Part E - Contact Details

Part E - Contact Details Part E - Cntact Details Cmplete the sectin belw *ONLY IF* yu are making an applicatin n behalf f anther rganisatin. This applicatin is made by: name: rganisatin: cuntry: phne: fax-n: e-mail: On behalf

More information

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin

More information

Anonymous User Manual

Anonymous User Manual Annymus User Manual esuppliercnnect Versin 9.4 January 15 th, 2017 Page 1/32 January 15 th, 2017 v9.4 Table f cntents: 1 Intrductin 3 2 Abut esuppliercnnect 5 2.1 Prtal Access 6 2.1 Prtal Structure 7 2.2

More information

FIRST Volunteer Management System Quickstart

FIRST Volunteer Management System Quickstart FIRST Vlunteer Management System Quickstart https://my.usfirst.rg/vms/lgin.aspx FIRST Vlunteer Resurces Department Questins? Cmments? Cncerns? vlunteer@usfirst.rg 1 P a g e updated 8/25/2014 - TD Cntents

More information

Adobe Connect 8 Event Organizer Guide

Adobe Connect 8 Event Organizer Guide Adbe Cnnect 8 Event Organizer Guide Questins fr Meeting HOST t ask at rganizatin meeting: Date (r dates) f event including time. Presenting t where Lcal ffice cubicles, reginal r glbal ffices, external

More information