STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

Size: px
Start display at page:

Download "STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY"

Transcription

1 STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared By: Bureau of Criminal Apprehension Criminal Justice Information Systems 1430 Maryland Avenue East St. Paul, Minnesota Service Visibility Service Description Accessibility Service Inputs Service Outputs SERVICE SUMMARY Public Restricted See Glossary for definitions This service provides users with the capability of retrieving information on vehicle registration BCA Criminal Justice Partners Vehicle Identification Number (VIN) and related information Vehicle License Plate Number (LIC) and related information MN DVS Motor Vehicle Registration

2 Document Revision History Date Version Description Author 02/09/ Initial Document BCA MNJIS 2/10/ :14:49 AM Page 2

3 Table of Contents SERVICE SUMMARY... 1 BUSINESS SERVICE DEFINITION... 4 QUERY MINNESOTA MOTOR REGISTRATION SERVICE... 4 SERVICE OVERVIEW... 4 REAL WORLD EFFECTS... 4 SUMMARY... 4 BUSINESS SCENARIOS... 5 INPUT DETAIL AND BUSINESS VALIDATION RULES... 5 SERVICE CONSUMERS AND ACCESS RIGHTS... 5 SERVICE-LEVEL EXPECTATIONS... 5 SERVICE LOGGING AND AUDITING REQUIREMENTS... 6 TRAINING AND CERTIFICATION... 6 POLICIES... 6 STATUTES AND RULES... 6 RULES... 6 STATUTES... 6 BUSINESS USE-CASE... 7 TECHNICAL SERVICE DEFINITION ACCESSING THE SERVICE PRE-CONDITIONS (TECHNICAL) POST-CONDITIONS (TECHNICAL) SERVICE INTERFACE MESSAGE FORMAT EXCEPTION CONDITIONS AND ERROR HANDLING SECURITY PROFILE APPENDIX A: GLOSSARY /10/ :14:49 AM Page 3

4 Business Service Definition Query Minnesota Motor Registration Service Service Overview The Query Minnesota Motor Registration (QMV) information service is a message key in the Law Enforcement Message Switch (LEMS) system that retrieves information on motor vehicle registration. QMV enables criminal justice personnel to identify the registered owner(s) of a vehicle along with specific information about the vehicle. Specific data retrieved includes MN motor vehicle registration. See the following example: Service Inputs: Vehicle License Number (LIC) with optional Vehicle License Year (LIY) or Vehicle Identification Number (VIN) Consumer of Service: BCA Criminal Justice Partner Provider of Service: DVS Service Outputs: MN Vehicle Registration Real World Effects The following is a list of effects of using this service: Summary A BCA criminal justice partner obtains vehicle s Minnesota vehicle registration. A User s application hub submits a service call to the BCA Enterprise Service Bus (ESB), which authorizes, authenticates, and validates the request. A valid request is then routed through the Law Enforcement Message Switch (LEMS) as a query to the required data source, the MN Driver and Vehicle Services Division (DVS) database. Either a vehicle registration or No Hit 2/10/ :14:49 AM Page 4

5 responses are returned to the BCA via the LEMS, is validated, and stored in the SQL Server database until the User Application Hub requests the response. The BCA ESB sends the vehicle registration response (if any) or No Hit response to the User Application Hub. Business Scenarios This service s resulting vehicle registration information will be used by law enforcement and other BCA criminal justice partners to verify compliance with motor vehicle laws, confirm vehicle and personal information during traffic incidents, conduct other types of investigations where a vehicle is involved, provide assistance and carry out enforcement actions. Input Detail and Business Validation Rules Mandatory QMV input includes the following criteria: Vehicle Identification Number (VIN) or Vehicle License Number (LIC) Optional criteria for QMV include: Vehicle License Year (LIY) The following validation rules apply to QMV service calls: Data inputs must be submitted in upper case alphanumeric characters with special characters as required or permitted for each input field. See Appendix A: Glossary for definitions and business rules. Service Consumers and Access Rights The authorized users of the QMV service are select BCA personnel and BCA criminal justice partners including but not limited to law enforcement officials, courts, probation officers, and parole officers. The QMV service is query-only. No updates occur with this service. Service-Level Expectations Support Availability Telephone and support for this service is available Monday through Friday, 7:00 a.m. to 4:30 p.m., except state holidays, through the BCA Service Desk at telephone number: , or bca.servicedesk@state.mn.us. Service Availability This service is designed to operate 24 hours a day, 7 days a week, 365 days a year. In addition to the support listed in the Support section above, BCA provides on-call 24/7/365 support for this service. After-hours support for high priority incidents can be obtained by calling the BCA Service Desk at or and choosing Option 1. External Service Dependencies The vehicle registration is provided through an interface with MN Driver and Vehicle Services Division (DVS); this service must be available to the BCA ESB via LEMS in order for the service to complete successfully. If DVS services are not available, the call will be repeated until the DVS service is available. 2/10/ :14:49 AM Page 5

6 The Law Enforcement Message Switch (LEMS) must be available in order for the service to complete successfully. Service Maintenance Window The LEMS and the ESB are designed to function 24 hour per day, seven days per week. When LEMS is down, it is for patches or upgrades, usually occurring on Tuesdays or Wednesdays at 11:00 AM and lasting five to ten minutes or longer, depending on the activity. These downtimes are announced and occur on an as-needed basis. Service Downtime Notification The message returned during system downtime and/or unavailability will depend on the source system and the destination system. Messages returned will either indicate the host system is unavailable or the request timed out. Expected Response Times Responses from each system queried are delivered separately to ensure the return of information as it becomes available. Average response times vary depending on the responding system as described below. DVS Responses: Service Logging and Auditing Requirements within one second For this computer-to-computer service, the consuming agency must keep a transaction record that is sufficient to satisfy FBI-CJIS requirements and to permit an audit or investigation of misuse to occur. FBI-CJIS audits occur on a three-year cycle and so the transaction record must be kept for three (3) years. At a minimum, the transaction record must contain the identifier for the individual who entered the query and received the results, when the transaction was done and why it was done. Training and Certification There is no separate training or certification requirement for this service. Individual users must meet FBI and/or MNJIS training and certification requirements for the underlying transaction. Policies There is no specific policy applicable to this service. Statutes and Rules Rules Statutes Minn. Stat classifies datas about motor vehicle registration. Driver s Privacy Protection Act, 18 U.S.C also controls access to and use of driver s license and motor vehicle information. 2/10/ :14:49 AM Page 6

7 Business Use-Case Main Flow Query The Main Flow for this use case is described below. Pre-Conditions The following must occur before the flow begins: 1. The following inputs are known and provided: Vehicle License Number (LIC) with optional Vehicle License Year (LYR), or Vehicle Identification Number (VIN) for a motor vehicle is known. Post-Conditions Success End-Conditions The following have occurred as a result of the successful completion of the main flow: 1. The query results in a hit or NOT ON FILE for MN DVS. 2. Hits collectively reveal the current registered owner(s) of the vehicle and information regarding the vehicle (make, model, VIN, sticker number). 3. Non-hits reveal that the data sources queried have no information on the vehicle in question. Failed End-Conditions The following have occurred as a result of the main flow failing: 1. One or more of the databases queried return an error message indicating information submitted was in some way erroneous. This may be due to a syntax error, missing data, a system failure, or a system being down. 2. The ESB security or archive service returns an error message to the agency hub reporting an error with authentication, authorization, or validation. 2/10/ :14:49 AM Page 7

8 QUERY MOTOR REGISTRATION (QMV) REQUEST INSTANCE Consumer Application HUB ESB LEMS Request Service LEMS, Data Source Data Server M1. Submit Request M2. Authorize, Authenticate, Validate M2.A. Receive Error Message N Pass? Y M3. Translate M4. Place hold in data store M6. Receive Message Receipt M5. Archive Req. Msg. Receipt M7. LEMS Queue M8. Query Data Sources M11. Hold in data store M10. Translate M9. LEMS Queue Request Response M1. Submit Request A law enforcement agent (user) initiates a query from the Consumer Application Hub, or hub. His or her system puts the request in XML format encased in a SOAP envelope, which is sent to the BCA. M2. Authorize, Authenticate, Validate The security service performs an authentication and authorization of the hub s ID and password to confirm whether the consumer application hub may request a QMV query. The message SOAP format is validated against the schema. Pass? If the authentication, authorization, and validation are successful, then the flow continues to M3. Translate. If the authentication, authorization, or validation is unsuccessful, then the flow continues to M2.A. Receive Error Message. M2.A. Receive Error Message The ESB sends an error message to the user, indicating either a failure to authenticate, pass authorization, or validate the schema. 2/10/ :14:49 AM Page 8

9 The user s hub receives the response message including the correlation ID. M3. Translate The XML message is translated to SIF format. M4. Place hold in data store A placeholder is placed in the data store. In this way, the data store is prepared to receive responses. M5. Archive Request Message Receipt The archive service archives the response message with correlation ID being sent to the hub. The full response to the client is archived, including the correlation ID for the request. M6. Receive Message Receipt The Consumer Application Hub receives a message confirming the query has been received, which includes a correlation ID. M7. LEMS Queue The query is placed in the LEMS Queue, where it waits until LEMS is able to process it. LEMS removes the query from its queue and directs it the required data sources. M8. Query Data Source DVS Database. The inquiry is received by Minnesota Drivers and Vehicle Services (DVS) data source. This data source returns vehicle registration information including the identity of its owner(s), past and present. A hit produces the desired information; a no hit produces a NOT ON FILE response. The response NO HIT D.L.REG. BUT M.V.REG ON FILE reveals a person owns a registered motor vehicle but does not have a driver s license. M9. LEMS Queue The query is placed in the LEMS Queue, where it waits until LEMS is able to process it. ESB removes the query result from its queue and directs them to SQL Database. M10. Translate The SIF message is translated into XML. M11. Hold in data store The separate responses received through LEMS from the data sources are held separately, until the user hub retrieves them by correlation ID. Main Flow Request Response The Main Flow for this use case is described below. 2/10/ :14:49 AM Page 9

10 Pre-Conditions The following must occur before the flow begins: 1. The response from the data source is received, translated to XML, validated, and stored in the data store. Post-Conditions Success End-Conditions The following have occurred as a result of the successful completion of the main flow: 1. Parsed XML is returned to the client. 2. The consumer of the service has a drivers license image for the person in question. Failed End-Conditions The following have occurred as a result of the main flow failing: 1. The database queried returns an error message indicating information submitted was in some way erroneous. This may be due to a syntax error, missing data, a system failure, or a system being down. 2. The ESB security or archive service returns an error message to the consumer application hub reporting an error with authentication, authorization, or validation. 2/10/ :14:49 AM Page 10

11 QUERY MOTOR REGISTRATION (QMV) RESPONSE INSTANCE Consumer Application HUB ESB LEMS Request Service Data Server Query Request M12. Request Response M13. Authorize, Authenticate, Validate M13.A. Receive Error Message N Pass? Y M14. Retrieve from data store M16. Validate M15. Create Response Y N All anticipated responses in? M18. Receive Response Message M17. Archive Request and Response M12. Request Response The consumer application hub requests responses for the query, sending the correlation ID as the transaction identifier. M13. Authorize, Authenticate, Validate The ESB authenticates the hub s identity and whether the hub is authorized to request the query results. Pass? If the authentication and authorization is successful, then the flow continues to M14. Retrieve from data store. If the authentication and authorization are not successful, then the results of the inquiry are withheld and an error message is sent to the hub; the flow continues to M13.A. Receive Error Message. M13.A. Receive Error Message The hub receives an error message indicating the ESB rejected the request due to a problem with authorization, authentication, or validation. M14. Retrieve from data store The query results are identified by correlation ID, copied from the data store, and brought into the ESB. M15. Create Response The various responses from the SQL database are formatted into a Response Message instance document. 2/10/ :14:49 AM Page 11

12 M16. Validate The Response Message instance is validated. Pass? If the response message is valid, then the flow continues to M17. Archive Request and Response. If the message is invalid, the results of the inquiry are withheld and an error response message is generated; the flow continues to M17. Archive Request and Response. M17. Archive Request and Response The valid response or error message response is sent to Archive Services. Either response is sent to the hub. M18. Receive Response Message The consumer application hub receives the response from the ESB in XML, in a SOAP envelope. All anticipated responses in? If one or more responses have not been received, the hub will repeat its request. This will continue until each of the message keys and their three data sources have given a valid response. The following fault conditions could exist: 1. One or more systems involved in this service is unavailable. 2. The service query request is unauthorized, fails to authenticate, or is invalid. 3. The data source returns an invalid response. 4. The service results request is unauthorized, fails to authenticate, or is invalid. Alternative Flows No alternative flows exist for this service. 2/10/ :14:49 AM Page 12

13 Technical Service Definition Accessing the Service Accessing the Query Minnesota Motor Registration Information service is restricted to systems on the CJDN network that have access to the BCA s ESB. The Query Minnesota Motor Registration Information Service interface is not discoverable. Once an agency is approved for access to this service, BCA will provide the Detailed Service Description document that includes access details. Pre-Conditions (Technical) MCJE compliant request Request is valid Request contains a valid instance of the BCA Header Access to this service is secured. The agency must have a valid MNJIS System user ID and password Post-Conditions (Technical) This is a read only service; therefore this service will not change the state or data All requests to and responses from this service will be archived Service Interface Provide Justice Partners the ability to submit Query Minnesota Motor Registration requests. Responses from this service are retrieved using the BCA Asynchronous Messaging pattern as follows: 1. Upon submitting a Query Minnesota Motor Registration request operation, the service returns a MessageReceipt that contains a unique correlation ID synchronously. 2. The service consumer will then make a RequestMessage request operation passing in the correlation ID obtained from the initial request. If the responses are available, an MCJE compliant ResponseMessage will be returned. If the responses are not available, an empty response will be returned by the service and the service consumer needs to make another RequestMessage request at a later time. Once an agency is approved for access to this service, BCA will provide the Detailed Service Description document that includes the WSDL. Message Format Communication to and from this service is handled using Simple Object Access Protocol (SOAP). Request and Response messages are XML instances that are embedded in the header and body of the SOAP envelope. Both the Request and Response XML messages conform to the BCA s Schema standards. There are multiple Schema files that define the request and response formats. The sample exchanges 2/10/ :14:49 AM Page 13

14 are meant to demonstrate several but not all possible query/response scenarios and can be used as a basis for understanding how to use this service. Once an agency is approved for access to this service, BCA will provide the Detailed Service Description document that includes the schemas and sample messages. Submission Request/Response Messages The following is a list of the supported request operations (refer to the request message schemas): o QueryMNMotorVehicleRegistrationRequest The response to the above requests is a MessageReceipt (refer to the MessageReceipt schema) that contains a unique correlation ID Retrieve Request/Response Messages The request for retrieving the responses is a RequestMessage (refer to the RequestMessage schema) The following is a list of the responses (refer to the response message schemas) that are wrapped in a ResponseMessage (refer to the ResponseMessage schema): o QueryMNMotorVehicleRegistrationResponse Exception Conditions and Error Handling This service will return a SOAP Fault if there is an error with the Service Consumer initiated calls If the consumer s request contains improper data in the BCA Header or service request, the XML response will contain a FailureReason that describes the error During processing unhandled exceptions happen for unknown and unpredicted reasons. When an unhandled exception occurs, a Fault is returned to the consumer of this service. The Fault element will contain any known information about the unhandled exception. Security Profile Access to this service is limited to criminal justice agencies that are connected to the State of Minnesota Criminal Justice Data Network (CJDN). Workstations and servers that access the services must be granted access by IP address through the BCA s firewall in order to reach the servers where the service is running. The IP addresses of all computers directly accessing the services must be provided to the BCA so that firewall rules can be created. This service operates over HTTPS on TCP/IP port 443. An SSL certificate is required to be installed on any workstation or server consuming this service. SSL certificates can be obtained from the BCA. When configuring the endpoint in a consuming client or service, make sure that https is specified. 2/10/ :14:49 AM Page 14

15 Appendix A: Glossary LIC (License Plate Number) license plate number of vehicle that is the subject of the query FORMAT: Format: alphanumeric, maximum 10 characters. BUSINESS RULES: If the license plate number exceeds ten characters, only the first ten characters should be entered in the LIC Field. LIY (License Year) License plate year of expiration; the highest year for which the license plate is valid FORMAT: numeric or NX for Non-Expiring, two or four characters. BUSINESS RULES: Must be a valid four-character year (YYYY) or the alphabetic NX to represent a nonexpiring registration. Must be greater than equal to the current year minus one and less than For stolen plates the value can be current year, current year minus one, or later than current year. VIN (Vehicle Identification Number) - a unique serial number used by the automotive industry to identify individual motor vehicles. FORMAT: alphanumeric, A-Z excluding the letters I, O, and Q; 0-9, 20 characters maximum. BUSINESS RULES: A single zero only, run of zeros only, single alphabetic only, all alphabetic characters only, or spaces, are prohibited. Vehicles manufactured prior to 1981 may have an alternate format. If the vehicle identification number exceeds 20 characters, only the last 20 characters should be entered in the VIN Field. The following terms are used in this document: Term Public Service Restricted Service Definition A service that it is available for anyone to consume. This includes anyone with access to a computer and the world wide web. A service that can only be consumed after authorization and configuration by the BCA. 2/10/ :14:49 AM Page 15

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION POR Level 3 Offender Information Search Service (PORLevel3) Published On: 10/20/2009 Service Release Version#: 0.7 Prepared

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Information Service (QP) Published On: September 21, 2010 Service Release Version#: 1.0 Prepared By: Bureau of

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Motor Registration Information Service (QMR) Published On: September, 2010 Service Release Version#: 1.0 Prepared By:

More information

State of Minnesota Department of Public Safety Bureau of Criminal Apprehension

State of Minnesota Department of Public Safety Bureau of Criminal Apprehension State of Minnesota Department of Public Safety Bureau of Criminal Apprehension Sharing Bandwidth SERVICE SUMMARY Service Name Sharing Bandwidth Service Visibility Public Restricted Service Description

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Query Criminal History Record (QRN) Published On: September 21, 2010 Service Release Version#: 1.1 Prepared By:

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Driver s License, Driver s History, and Vehicle Registration Information Service Driver s License Query (DQ)

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Gun Check (QPGC) Published On: August 26, 2010 Service Release Version#: 1.4 Prepared By: Bureau of Criminal

More information

UNIFORM GUIDELINES RED LIGHT CAMERA ENFORCEMENT

UNIFORM GUIDELINES RED LIGHT CAMERA ENFORCEMENT UNIFORM GUIDELINES RED LIGHT CAMERA ENFORCEMENT CULVER CITY POLICE DEPARTMENT AUTOMATED ENFORCEMENT DIVISION CITY OF CULVER CITY, CALIFORNIA Table of Contents SECTION 1- Purpose of Uniform Guidelines SECTION

More information

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009)

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Page 1 of 11 Document ID: 2221721 #06-00-89-051B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Subject: Key Code Security Rules and Information on GM KeyCode

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information

More information

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Error Handling Strategy. DCC Guidance Document

Error Handling Strategy. DCC Guidance Document Error DCC Guidance Document Date: June 2016 Classification: DCC Public Table of Contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Scope... 3 1.3 General Provisions... 3 2 Error Management... 4 2.1 Error

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

PII Policies and Procedures

PII Policies and Procedures PII Policies and Procedures HEALTHCARE BENEFIT SERVICES INC. Kirk Peters HEALTHCARE BENEFIT SERVICES INC. 2061 BOCA RATON BLVD. SUITE 202 BOCA RATON, FL Table of Contents What is PII... 2 PII Overview...

More information

Health Care Connectivity Guide

Health Care Connectivity Guide Health Care Connectivity Guide Standard Companion Guide November 2, 2015 Version 2.0 Disclosure Statement The Kansas Department of Health and Environment (KDHE) is committed to maintaining the integrity

More information

Please be aware that you must fill out a separate application for each position for which you would like to be considered.

Please be aware that you must fill out a separate application for each position for which you would like to be considered. This guide will help you through the process of applying for a position online with Jefferson Parish Civil Service. An application can be filled out on any computer with access to the internet. Also, there

More information

CHAPTER 13 Joint Announcement regarding the Central Reader

CHAPTER 13 Joint Announcement regarding the Central  Reader CHAPTER 13 Joint Announcement regarding the Central Email Reader Effective January 18, 2011 Revised October 31, 2013 The Offices of Carl L. Bekofske, Krispen S. Carroll, David Wm. Ruskin and Tammy L. Terry

More information

Kansas ecitation Submission Service Service Description Document

Kansas ecitation Submission Service Service Description Document Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...

More information

IQSweb Reference G. ROSS Migration/Registration

IQSweb Reference G. ROSS Migration/Registration ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface

More information

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM END USER SECURITY POLICY MANUAL 1 INTRODUCTION... 3 2 INFORMATION USAGE AND PROTECTION... 3 2.2 PROTECTED HEALTH INFORMATION...

More information

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Computerized Central Records System

Computerized Central Records System POLICY 111.2 Computerized Central Records System REVISED: 02/07, 09/11, 07/17 RELATED POLICIES: CFA STANDARDS: 34.13 REVIEWED: AS NEEDED A. PURPOSE The purpose of this policy is to establish procedures

More information

SEVIS Release 6.13 Final System Changes. SEVIS Batch. All Users

SEVIS Release 6.13 Final System Changes. SEVIS Batch. All Users May 23, 2013 Production Release Date: May 24, 2013 The following summarizes the final system changes to SEVIS with Release 6.13. SEVIS Batch An overview of the Student and Exchange Visitor Information

More information

Error Handling Strategy

Error Handling Strategy Handling Strategy Draft DCC Guidance Document June 2016 Page 1 of 13 Contents 1. Introduction 3 1.1. Purpose 3 1.2. Scope 3 1.3. General Provisions 3 2. Management 5 2.1. Classification 5 2.2. Handling

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD

VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD September 2016 revision16s13nc The purpose of this document is to describe Vidyo s service and support policies for VidyoCloud

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Supplemental Offer and Acceptance Program (SOAP ): Monitoring a Preference List

Supplemental Offer and Acceptance Program (SOAP ): Monitoring a Preference List Supplemental Offer and Acceptance Program (SOAP ): Monitoring a Preference List Users: Main Residency Match Institutional Officials (IOs) Institutional Administrators (IAs) Program Directors (PDs) Program

More information

Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet

Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet Copyright 2007, 2008 by the State of Minnesota, State Court Administrator's

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

Revised (10/17) ACH Direct User Guide

Revised (10/17) ACH Direct User Guide Revised (10/17) ACH Direct User Guide Table of Contents Page 1. Introduction to ACH Direct 4 1.1 Overview of ACH Direct 4 1.2 Getting Started on ACH Direct 9 2. Corporate Administration 12 2.1 Viewing

More information

Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users

Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users Document No. 04-601161 August 2008 Issue 12 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registration and User Entitlement Guide The OATS Registration and Entitlement Guide provides the following information: o OATS Registration The process and documentation required for a firm or Service

More information

Online Batch Services

Online Batch Services Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online

More information

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...

More information

Operating Level Agreement for NYU Login Service

Operating Level Agreement for NYU Login Service Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for the (Partner Service), which has been

More information

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: 00-62 AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 1.

More information

Privacy Policy and WHOIS Data

Privacy Policy and WHOIS Data Privacy Policy and WHOIS Data Title Page 1. Purpose of Policy 3 2. Principles 3 3. Collection and Use of Personal Information 4 4. Disclosure of Personal Information 4 5. Application for Obtaining, Registering

More information

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)

More information

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

Ministry of Health and Long-Term Care EBS HCV SOAP Specification Version 4.2

Ministry of Health and Long-Term Care EBS HCV SOAP Specification Version 4.2 Technical Specification for Health Card Validation (HCV) Service via Electronic Business Services (EBS) Ministry of Health and Long-Term Care EBS HCV SOAP Specification Version 4.2 Table of Contents Chapter

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

IEC Implementation Profiles for IEC 61968

IEC Implementation Profiles for IEC 61968 IEC 61968-100 Implementation Profiles for IEC 61968 Overview CIM University UCAIug Summit New Orleans, LA 22 October 2012 Agenda Introduction A look at the purpose, scope and key terms and definitions.

More information

Online Batch Services

Online Batch Services Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users log into the main product to access the online

More information

IT Services IT LOGGING POLICY

IT Services IT LOGGING POLICY IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and

More information

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3 Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...

More information

Training Guide for Practitioners. Washington State Department of Health Washington State Prescription Monitoring Program

Training Guide for Practitioners. Washington State Department of Health Washington State Prescription Monitoring Program Training Guide for Practitioners Washington State Department of Health Washington State Prescription Monitoring Program April 2017 Training Guide for Practitioners Contents Contents 1 Document Overview...

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Judicial Inquiry System (JIS)

Judicial Inquiry System (JIS) Judicial Inquiry System (JIS) Jessica Lunsford Act (JLA) First Appearance Calendar User Manual Office of the State Courts Administrator Updated March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3

More information

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

Waste Transportation Safety Program. New and Renewal Act 90 Authorization Online Greenport Application Instructions.

Waste Transportation Safety Program. New and Renewal Act 90 Authorization Online Greenport Application Instructions. Waste Transportation Safety Program New and Renewal Act 90 Authorization Online Greenport Application Instructions www.depgreenport.state.pa.us 1 DEP Greenport Homepage Benefits of Greenport User information

More information

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17, TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Integrated Search Query Service Published On: 10/20/2009 Service Release Version#: 1.4 Prepared By: Bureau of Criminal Apprehension

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

Agency Responsibilities

Agency Responsibilities Agency Responsibilities Agency Contacts Agency Head Point of Contact (POC) Local Agency Security Officer (LASO) Schedule the audit with the auditor Agency Point of Contact (POC) Complete the E- Audit

More information

SERVICE DESCRIPTION. Population Register Centre s online services

SERVICE DESCRIPTION. Population Register Centre s online services SERVICE DESCRIPTION Population Register Centre s online services SERVICE DESCRIPTION [Number] 2 (12) DOCUMENT MANAGEMENT Owner Author Checked by Approved by Pauli Pekkanen Project Working Group Reko-Aleksi

More information

Mississippi Medicaid Companion Guide to the X279A1 Benefit Inquiry and Response Conduent EDI Solutions, Inc. ANSI ASC X12N 270/271

Mississippi Medicaid Companion Guide to the X279A1 Benefit Inquiry and Response Conduent EDI Solutions, Inc. ANSI ASC X12N 270/271 Mississippi Medicaid Companion Guide to the 005010X279A1 Benefit Inquiry and Response Conduent EDI Solutions, Inc. ANSI ASC X12N 270/271 OCT 2017 TABLE OF CONTENTS AT A GLANCE II CHAPTER 1: INTRODUCTION

More information

Implementation Guide for Delivery Notification in Direct

Implementation Guide for Delivery Notification in Direct Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4

More information

Arc Pro. Provisioning Wizard. User Guide. Version 6.1.0

Arc Pro. Provisioning Wizard. User Guide. Version 6.1.0 Arc Pro Provisioning Wizard User Guide Version 6.1.0 2003-2015 Arc Solutions (International) Ltd. All rights reserved No part of this documentation may be reproduced in any form or by any means or used

More information

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Welcome to the new BC Bid!

Welcome to the new BC Bid! BC Bid has a new design, new features and services, but most importantly, a new way of doing business. Beginning in early 2003, suppliers will be able to submit bids and proposals electronically in response

More information

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

Monthly Performance Metrics. December 2018

Monthly Performance Metrics. December 2018 Department of Technology Monthly Performance Metrics December 2018 Compliance Level Legend In Compliance Out of Compliance Within Tolerance Insufficient Data SERVICE AVAILABILITY Target Performance Actual

More information

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview Agilent ICP-MS ChemStation Complying with 21 CFR Part 11 Application Note Overview Part 11 in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting electronic

More information

TREND MICRO PRIVACY POLICY (Updated May 2012)

TREND MICRO PRIVACY POLICY (Updated May 2012) TREND MICRO PRIVACY POLICY (Updated May 2012) Trend Micro Incorporated and its subsidiaries and affiliates (collectively, "Trend Micro") are committed to protecting your privacy and ensuring you have a

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

e-frr SYSTEM USER GUIDE

e-frr SYSTEM USER GUIDE e-frr SYSTEM USER GUIDE for Electronic Submission of Financial Return Version 1.5 Jun 2015 Table of Contents 1. Introduction... 4 2. Background... 4 3. System Purpose... 4 4. Baseline Specification of

More information

Electronic Authentication Steps for Accessing EvaluationWeb

Electronic Authentication Steps for Accessing EvaluationWeb Electronic Authentication Steps for Accessing EvaluationWeb Before EvaluationWeb access is granted, all persons requesting access must be e-authenticated (identity proofed) via the CDC s Secure Access

More information

How to Interact with the Natural and Non-prescription Health Products Directorate Electronically. Guidance Document

How to Interact with the Natural and Non-prescription Health Products Directorate Electronically. Guidance Document How to Interact with the Natural and Non-prescription Health Products Directorate Electronically Guidance Document Table of Contents 1. INTRODUCTION... 3 1.1 System Requirements... 3 2. EPOST CONNECT...

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

INFORMED VISIBILITY. Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method

INFORMED VISIBILITY. Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method INFORMED VISIBILITY Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method January 16, 2018 Discontinued Support for Non-Secure FTP After January 31, 2018, Informed Visibility

More information

esuite Administrator s Guide October 26, 2017

esuite Administrator s Guide October 26, 2017 new world ERP esuite Administrator s Guide October 26, 2017 2017 Tyler Technologies. All Rights Reserved. All rights reserved. Information within this document is the sole property of Tyler Technologies

More information

Training Guide for Practitioners

Training Guide for Practitioners Training Guide for Practitioners Washington State Department of Health Washington State Prescription Monitoring Program July 2014 RxSentry is a proprietary system for prescription monitoring provided by

More information

RESTRICTED INFORMATION-

RESTRICTED INFORMATION- External Law Enforcement Agency REQUEST FOR MAIL COVER Complete all sections of the mail cover template below and attach a cover letter on your agency letterhead with an original signature by your immediate

More information

TIME System Newsletter Volume February 2016

TIME System Newsletter Volume February 2016 Wisconsin Department of Justice Division of Law Enforcement Services Brad D. Schimel Attorney General TIME System Newsletter Volume 2016-1 February 2016 The TIME System processed 53,556,473 transaction

More information

MARKET PROCEDURE: METER DATA SUBMISSIONS

MARKET PROCEDURE: METER DATA SUBMISSIONS MARKET PROCEDURE: METER DATA SUBMISSIONS PREPARED BY: Market Operations (WA) DOCUMENT REF: VERSION: 3.0 EFFECTIVE DATE: 30 November 2015 STATUS: FINAL Approved for distribution and use by: APPROVED BY:

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

Nortel Networks Integrated Call Director

Nortel Networks Integrated Call Director Title page Nortel Networks Communication Server 1000 Release 4.0 Nortel Networks Integrated Call Director User Guide Revision history Revision history July 2004 Standard 1.00. This document is issued

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

BEEDS portal Bank of England Electronic Data Submission portal. User guide. New PRA Authorisations Version 1.1

BEEDS portal Bank of England Electronic Data Submission portal. User guide. New PRA Authorisations Version 1.1 BEEDS portal Bank of England Electronic Data Submission portal User guide New PRA Authorisations Version 1.1 May 2018 Contents Document versions 3 1. Introduction 3 a. Bank of England contact details 4

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information