Registration Data Incident Management Policy

Size: px
Start display at page:

Download "Registration Data Incident Management Policy"

Transcription

1 Registration Data Incident Management Policy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 23

2 Contents 1 Document History Document Location Review Dates Revision History 4 2 Introduction Purpose Scope Principle 5 3 Overview Data Transfer and Ownership Registration Data Incident Types Connection Failure Authentication Failure Authorisation Failure Identification of an Anomaly Validation Failure Other Circumstances Known Delays 8 4 Registration Data Incident Management Raising an Incident DCC Registration Data Provider Required Information Incident Management Log Incident Categorisation Classification Table 10 Page 2 of 23

3 4.4 Timetables Electricity Registration Data Provider Obligations Gas Registration Data Provider Obligations Incident Assignment Communications Incident Escalation RDP Notification Escalation process Major Incident Management DCC Major Incidents Non-DCC Major Incidents Incident Closure Reopening Closed Incidents Repeat Incidents Reporting and Service Measures 16 5 Definitions 17 Page 3 of 23

4 1 Document History 1.1 Document Location The source of this printed document can be found on DCC Sharepoint. 1.2 Review Dates Date of this Revision Date of Next Review 1 st May 2014 Annually 1.3 Revision History Revision Date Revision Number Changed By Summary of Changes 12 th March Nicola Robertson Initial draft 21 st March Nicola Robertson Updates post User Forum 28 th March Nicola Robertson Updates post peer review 01 st April Nicola Robertson Updates post peer review 04 th April Jackie Crouch Updated following meeting 07 th April Jackie Crouch Updated following internal review 16 th April Nicola Robertson Updated post feedback 27 th April Nicola Robertson Updated post feedback 29 th April Nicola Robertson Updated post feedback 1 st May Nicola Robertson Updated post feedback Page 4 of 23

5 2 Introduction 2.1 Purpose The purpose of this document is to describe the DCC Registration Data Incident Management Policy which is to be adhered to by the DCC and Registration Data Providers to manage any Incidents arising from the exchange of Registration Data. This document describes how Registration Data Incident Management will operate across the DCC Systems demonstrating that from a Registration Data Provider s perspective there is a single process, system and function for both the gas and electricity industry, whilst simultaneously allowing the DCC the ability to log and manage the proactive and reactive detection and resolution of issues. 2.2 Scope The scope of this policy covers Incidents that are related to either data held in the DCC Total Systems or the Registration Data File Transfer between the RDP and DCC. Any issues with Data or transfers between the User and RDP are outside the scope of the DCC Services and this policy. 2.3 Principle This document is subsidiary to the obligations in the [SEC] and is for Registration Data Providers and DCC, all Users will adhere to the Incident Management Policy. Page 5 of 23

6 3 Overview This section shows at a high level how the Registration Data transfers between the Registration Data Providers and the DCC. Figure 1 - Registration Data Interfaces 3.1 Data Transfer and Ownership The DCC Data Interfaces enable suitably authenticated and appointed RDPs to interface with the DCC Systems. The Gas and Electricity Registration Data Interfaces enable: The RDPs to send to the DCC up to date Registration Data concerning the Metering Points and supply meter points they administer on behalf of the Network Operator (Registration Data). Registration Data is mastered and managed by the appropriate Registration Data Provider. The DCC to send to the relevant RDP updates as to whether a particular Supply Meter Point or Metering Point has a smart meter that participates in DCC Services or not (DCC Status). DCC Status Files are mastered and managed by the DCC. 3.2 Registration Data Incident Types Connection Failure Connection failures and file transfer failures that occur when the DCC tries to send DCC Status Files to the RDP or when the RDP tries to send Registration Data Files to the DCC shall be handled by trying to reconnect and/or resend the file on 3 further occasions at 5 minute intervals. If the DCC cannot establish a connection with the RDP after the agreed number of retries, the DCC shall raise an Incident in the DCC Service Management System. Page 6 of 23

7 If the RDP fails to establish a connection with DCC after the agreed number of retries the RDP shall contact the DCC to raise an Incident in the DCC Service Management System for the DCC to resolve Authentication Failure If the Transport Authentication fails when the DCC is trying to send a file to the RDP no connection will be established to transmit the data. An entry shall be written to the DCC Security Audit Trail and an Incident shall be raised by the DCC in the DCC Service Management System. If the Transport Authentication fails when the RDP is trying to send a file to the DCC no connection will be established to transmit the data. In this instance the RDP shall contact the DCC to raise an Incident in the DCC Service Management System. If the signature contained in a file fails the Verification Checks, the recipient of the file shall raise a Security Incident in the DCC Service Management System and shall not process the file Authorisation Failure Any attempt by a RDP to access any directories other than its own on the FTP server shall result in an entry written to the DCC Security Audit Trail and an Incident shall be raised by the DCC in the DCC Service Management System. Any attempt by the DCC to access any directories other than its own on the FTP server shall result in an entry written to the DCC Security Audit Trail and an Incident shall be raised by the RDP in the DCC Service Management System Identification of an Anomaly The schedules for sending and receiving of files between the DCC and the RDP are defined in the respective Gas and Electricity Code of Connection documents. The DCC shall perform Anomaly Detection to ensure that these schedules are adhered to. Any exceptions to the agreed schedules shall result in an Incident being raised by the DCC or RDP in the DCC Service Management System for resolution. Anomaly Detection also includes the identification of non-conformity of files. Where the recipient of a non-conforming file is the DCC they shall raise an Incident in the DCC Service Management System, where the recipient is the RDP they shall contact the DCC to raise an Incident Validation Failure There are a number of possible validation errors that could occur during processing of Registration Data Files and DCC Status Files, with a different response file produced for each. These are detailed in the Gas and Electricity Registration Data Interface Specification Documents. Page 7 of 23

8 Where the failure response is received as a result of an RDP file that has been sent to the DCC, the DCC shall raise an Incident in the DCC Service Management System. Where the failure response is received as a result of a DCC file that has been sent to the RDP, the RDP shall contact the DCC to raise an Incident in the DCC Service Management System Other Circumstances In the event of an issue arising that is not covered by the above, and has arisen as a consequence of complying with SEC E2, business processes shall first be reviewed and only if the issue remains outstanding can the DCC or RDP raise an incident in the DCC Service Management System. 3.3 Known Delays In the event that the Registration Data Provider has a known delay to the file transfer they shall inform the DCC so they can manage the situation appropriately. This shall apply to both planned and unplanned delays. In the event that the DCC has a known delay to the file transfer they shall inform the Registration Data Provider so they can manage the situation appropriately. This shall apply to both planned and unplanned delays. Page 8 of 23

9 4 Registration Data Incident Management 4.1 Raising an Incident All Incidents shall be raised and recorded in the Incident Management Log which forms part of the DCC Service Management System. Incidents can only be logged by: the DCC the Registration Data Provider sending or receiving the file DCC The DCC shall identify Incidents through: Event Management business as usual operational processes automated Incidents These Incidents shall be logged by the DCC directly in the DCC Service Management System. If the DCC believe that the Incident meets the criteria for a Major Incident they shall engage the Major Incident Manager Registration Data Provider RDP s shall provide and maintain DCC with a list of nominated individuals from their organisation who are authorised to log Incidents with the DCC. Having first established that the issue does not reside within the Registration Data Provider s own environment the Registration Data Provider can contact the DCC Service Desk via phone or to log an Incident in the DCC Service Management System Required Information In order to log an Incident in the Incident Management Log the following information shall be provided (as a minimum): Name Organisation Contact details Users incident reference number where available Date and time fault occurred Location Nature of fault Business Impact Results of Users initial Triage and diagnosis Page 9 of 23

10 4.2 Incident Management Log The Incident Management Log shall hold records of all Incidents raised within the DCC Total Systems. Once logged each Incident shall be allocated a unique reference number and from then on shall be subject to the DCC s Incident Management process with the log containing all updates on the Incident status. The log shall hold the information as detailed in H Incident Categorisation The initial calculation for categorisation shall be automatically assigned based on the data provided by the RDP at the point of logging the Incident. Incidents shall be categorised using pre-defined categories, types and items within the DCC Service Management System. This categorisation assists with assigning the Incident to the correct Resolver Groups to expedite resolution as well as identifying Interested Party s to notify of updates. Incidents shall be automatically prioritised for resolution within the DCC Resolver Group by the Service Management System based on the Categorisation and the time remaining until SLA breach Classification Table All Incidents logged in the DCC Service Management System shall be classified and resolved within the DCC targets as set out below, the DCC shall operate 24x7: DCC Priority Level Description DCC Response Time DCC SLA 1 An Incident which, in the reasonable opinion of the DCC: prevents a large group of Users from using the DCC Total Systems; has a critical adverse Impact on the activities of the Service Users; causes significant financial loss and/or disruption to the Service User; or results in any material loss or corruption of data 2 An Incident which, in the reasonable opinion of the DCC: Has a major (but not critical) adverse Impact on the activities of the Users but the service is still working at a reduced capacity; or Causes financial loss and/or disruption to the Users which is more than trivial but less severe than the significant financial loss described in the definition of a Priority 1 Incident. 10 minutes 4 hours 20 minutes 24 hours Page 10 of 23

11 3 An Incident which, in the reasonable opinion of the DCC: 4 5 Has a major adverse Impact on the activities of the User but which can be reduced to a moderate adverse Impact due to the availability of a Workaround; Has a moderate adverse Impact on the activities of the Service User. An Incident which, in the reasonable opinion of the DCC has a minor adverse Impact on the activities of the Users An Incident which, in the reasonable opinion of the DCC has minimal Impact to the activities of the User 45 minutes 72 hours 3 hours 5 days 1 day 10 days If the affected RDP believes the Incident has been logged against an incorrect priority their Service Desk Team Leader can escalate to the DCC Service Desk Team Leader. The DCC can change the Priority of an Incident if more information becomes available or if the impact or urgency changes. The Interested Party s shall be provided with details of why it has been changed. 4.4 Timetables Registration Data Providers are nominated and engaged by a Network Operator. As such the DCC has no commercial relationship with the RDP and cannot back off any SLAs. The DCC will measure OLAs to track and report on Incident timelines where the activity that the DCC is dependent on for Incident resolution sits outside the DCC. Where a full set of the Registration Data Provider s Registration Data has been requested each Electricity Network Party and each Gas Network Party shall ensure that its Registration Data Provider shall use all reasonable endeavours (including working outside of normal business hours where reasonably necessary) to provide the DCC with such data as soon as reasonably practicable following such request (and in any event within the shorter of three Working Days or four days [SEC E2.7a] Electricity Registration Data Provider Obligations Type Quantity Time Full Refresh Full refresh of the data fields to the DCC Within the shorter of three Working Days or four days Selective Refresh A selective data refresh is a submission of a subset of the data to the DCC The files will be submitted within the timelines directed in the MRA Page 11 of 23

12 Type Quantity Time File re-submission Re-submission of a file that is not received or is corrupt Within 1 Working Day Table 1 - Timetables - Electricity Page 12 of 23

13 4.4.2 Gas Registration Data Provider Obligations Type Quantity Time Full Refresh Full refresh of the data fields to the DCC Within the shorter of three Working Days or four days Selective Refresh A selective data refresh is a submission of a subset of the data to the DCC Within the shorter of three Working Days or four days File re-submission Re-submission of a file that is not received or is corrupt Within 1 Working Day Table 2 - Timetables - Gas Where omissions or manifest errors are identified in the Registration Data the DCC shall seek to resolve any such omissions or manifest errors. In such circumstances, the DCC will rely upon and use any or all of the Registration Data that existed prior to its receipt of the incremental update that included any such omission or manifest error [SEC E2.12]. 4.5 Incident Assignment All Incidents logged in the DCC Service Management System shall be owned by the DCC and assigned to an appropriate Resolver Group. Resolver Groups could be DCC Operational Teams or the Registration Data Provider. There are scenarios where the DCC shall require activities from the Registration Data Provider in the resolution of the Incident. On these occasions the DCC shall contact the RDP, explain the issue and describe and request that the activity is completed. The RDP shall respond as soon as reasonably practical (within the timeframes above) to the DCC confirming completion. In these instances any DCC metrics will not include the period of time from engagement of the RDP until their Response is received by the DCC. In the event that the incident is raised or escalated at a time which falls outside of the RDP s hours of operation and the DCC Incident Manager deems the incident to be of the appropriately high severity the RDP shall be contacted via their out of hours facility to progress the remedial activities. In the event that the Incident is raised at a time which falls outside of the RDP s hours of operation and the DCC Incident Manager deems the incident to be of the appropriately low severity the incident shall be placed On Hold Page 13 of 23

14 and the RDP shall be contacted when their business operations commence on the next working day. During any part of the duration of the Incident which falls outside the RDP s hours of operation the DCC shall put the Incident in an On Hold Issues that require resolution outside of operational hours will be managed by the organisations out of hour s process, which shall include details of process for overnight feeds re-runs. There may be occasions where Incidents have been logged and investigated and turn out not to sit within the DCC Systems. If it is agreed that this is the case the RDP shall be contacted and provided with details to enable them to raise and manage the Incident within their own system. The Incident with the DCC Service Management System shall then be closed. 4.6 Communications Throughout the lifecycle of the Incident updates shall be communicated to the RDP and other identified Interested party s. All updates shall be included in the DCC Service Management System and available to the instigating RDP and other identified Interested Party s. In the event of a Major Incident the DCC will provide proactive communications through a mechanism appropriate to the situation to share common communications in a timely manner. 4.7 Incident Escalation The DCC shall adopt Escalation Management to ensure that where appropriate structured management attention and/or additional resources are engaged RDP Notification In the event the RDP believes that they have not had an appropriate Response or they are dissatisfied with the progress of the Incident the organisation shall notify the DCC Service Desk. Full details of the escalation will be included in the Incident Management Log Escalation process Day to day issues should be managed between the Service Desks and if the appropriate Response is not being received this will be escalated up through the Service Desk Managers. Any service issues will be referred to the DCC Service Manager via the Users Service Manager. If service continues to be poor or there are continuous failures and there are no agreed rectification plans in place then this can be escalated to the Head of Service by the organisation s Head of Service. If the rectification measures do not significantly improve the service, or there are continuous services failures or issues with individuals this can be escalated to the IT Director by the organisation s IT Director. Page 14 of 23

15 If there is a dispute that cannot be satisfactorily agreed between the party s this can be escalated to the Panel for its determination which shall be final and binding [SEC 9.13] 4.8 Major Incident Management DCC Major Incidents In the event of an issue being identified within the DCC Total Systems, that in the RDP s opinion can reasonably be interpreted to constitute a Priority 1 Incident, the RDP shall call the DCC Service Desk to log the call. The DCC Service Desk shall perform initial triage on the issue and only if the issue meets or is projected to meet the criteria for a Priority 1 Incident shall the DCC Major Incident Manager be engaged to progress and resolve the incident and issue associated communications. In the event of a confirmed Major Incident the DCC shall notify all Interested Party s and advise them of the agreed communications channel. In the event that the issue is not initially identified as a Major Incident but after investigations the DCC confirm that the criteria is met the Incident shall be re-classified and the Major Incident Manager shall be engaged to progress the issue to resolution. There may be occasions where Major Incidents have been logged and investigated but turn out not to sit within the DCC Total Systems. On these occasions the appropriate Party shall be contacted and provided with details to enable them to raise and manage the Incident within their own system. On these occasions the DCC Major Incident Manager shall close the DCC Incident and assist the appropriate Party s Major Incident Manager in seeking a Resolution as reasonably requested. On Resolution of the Incident Problem Management shall be engaged and a Problem Record shall be raised to confirm root cause. Major Incident reports shall be produced and distributed in line with [SEC] H9.11 & H Non-DCC Major Incidents In the event of a major Incident outside of the DCC Systems the DCC shall provide all reasonable assistance to the RDP responsible for resolving that Incident that the RDP may request and which the DCC acting reasonably can provide. 4.9 Incident Closure Incidents shall be resolved in accordance with Resolution targets set out in the classification matrix. Details of steps taken to resolve the Incident shall be included in the DCC Service Management System and the Incident can be re-categorised if appropriate, set to resolved and the user notified. The RDP shall have 3 days to respond if they do not consider that the issue is resolved. The DCC shall attempt to contact the RDP to confirm closure but if no response is received within this time period the Incident shall be closed. Page 15 of 23

16 In the event that an RDP requires Subject Matter Expert advice before confirming closure and the Subject Matter Expert is unavailable they shall contact the DCC and request the Closure period be extended. It may be the position that on resolving the Incident and restoring service a Problem Record is raised and passed to the Problem Management team for progression Reopening Closed Incidents Incidents shall only be re-opened when the Incident has been closed with a Workaround. In these cases Problem Management shall be triggered and either a new Problem Record will be raised or the Incident will be related to an existing Problem Record (the remedy Incident record will be set to resolved and will close when the Problem Record closes) An Incident can only be re-opened by the original raiser in the following circumstances: the Workaround fails the Workaround deteriorates to a point that it affects normal business operations If the linked Problem Record has been closed it shall not be possible to reopen the Incident. On these occasions a new Incident shall be raised by the RDP for Investigations and confirmation of root cause Repeat Incidents Any recurrence of a previous Incident after Closure of the original Incident in line with the Closure criteria in this policy shall require a new Incident to be logged within the DCC Service Management System Reporting and Service Measures The Incident Management Log shall feed into the standard service management reporting process, metrics shall be made available via that process. Trend Analysis shall be performed on the available data and the output shall feed to the Problem Management process. Page 16 of 23

17 5 Definitions Term Anomaly Business Continuity DCC Data Services DCC Operational Team Security Audit Trail DCC Service Management System DCC Service User System DCC Services DCC Status DCC Status File DCC Systems Device Definition Means, in relation to any System, an activity or event that is not expected to occur in the course of the ordinary operation of that System A process and set of procedures to ensure the continuity of Vital Business Functions in the case of disaster events. Means the DCC Systems together with all Communications Hubs provided by the DCC as part of the Communications Hub Service The DCC resources providing technical support in order to resolve Incidents. Means the record containing details of equipment and system access and log-on requests The DCC provided central Service Management system giving a single integrated view of Service Management across the End-to-end Smart Metering System. Means the Systems used by the User in relation to the Services including the HAN and Meter Means the services provided, or to be provided, by the DCC pursuant to Section H (DCC Services) or Section L (Smart Metering Key Infrastructure), including pursuant to Bilateral Agreements The state of devices as documented in the Inventory A file containing the DCC Status Means the Systems used by the DCC and/or the DCC Service Providers in relation to the Services and/or this Code, including the SM WAN but excluding the Communications Hub Functions. One of the following: (a) an Electricity Smart Meter; (b) a Gas Smart Meter; (c) a Communications Hub Function; (d) a Gas Proxy Function; (e) a Pre-Payment Interface; (f) an Auxiliary Load Control; or (g) any Type 2 Device (e.g. IHD). Page 17 of 23

18 Electricity Registration Data Interface Specification Escalate (Incident) FTP Full Refresh Gas Registration Data Interface Specification Incident Means the SEC Subsidiary Document of that name set out in Appendix [TBC].to be incorporated into this Code pursuant to Section X5 (Incorporation of Certain Documents into this Code). An activity that obtains additional resources when these are needed to meet Service Level Targets or customer expectations. Escalation may be needed within any IT Service Management process, but is most commonly associated with Incident Management, Problem Management and the management of Customer complaints. There are two types of Escalation, functional escalation and hierarchical escalation. File Transfer Protocol: A protocol used to transfer files between computer systems over TCP/IP networks. The provision of all data held by a Registration Data Provider for a particular Energy Supplier, used to replace the data held by DCC. Will usually be requested following invocation of the Business Continuity process. Means the SEC Subsidiary Document of that name set out in Appendix [TBC].to be incorporated into this Code pursuant to Section X5 (Incorporation of Certain Documents into this Code). Means an event which causes (or may cause) an interruption to (or a reduction in the quality or security of) the Services, as further described in the Incident Management Policy (excluding Incidents that are subject to the Registration Data Incident Management Policy, but not excluding interruptions to the Services that are consequent on such Incidents). Page 18 of 23

19 Incident Management Log Interested Parties Lifecycle (Incident) Metering Point Metrics (Incident) Network Operator NMC The DCC shall maintain and keep up-to-date an electronic log (the Incident Management Log) that records the following in respect of each Incident: (a) a unique reference number (to be allocated to each Incident that is identified by, or reported to, the DCC); (b) the date and time that the Incident was identified by, or reported to, the DCC; (c) the nature of the Incident and the location at which it occurred; (d) whether the Incident was identified by the DCC, or otherwise the person that reported the Incident to the DCC; (e) the categorisation of the Incident in accordance with the Incident Management Policy; (f) the person to whom the Incident has been allocated for resolution; (g) the course of action to be taken, or taken, to resolve the Incident; (h) the DCC s Good Industry Practice assessment of which Users and/or Services are affected by the Incident; (i) details of any communications with Users in respect of the Incident; (j) comments regarding any mitigating circumstances regarding the Incident; (k) the potential impact of the Incident on the DCC s ability to meet the Target Service Levels; and (l) the current status of the Incident, and (once applicable) the date and time that the Incident was closed. Any of the people or organisations who may be affected by the Incident The end-to-end Lifecycle of an Incident, from initial logging, through investigation and analysis, service recovery, to resolution and closure. Has the meaning given to that expression in the MRA Metrics define what is to be measured and reported to help manage a process or service. An organisation that monitors and maintains the operation of a communications network Network Management Centre Page 19 of 23

20 OLA On Hold (Incident) Priority Matrix (Incident) Problem Problem Management Problem Record RDP Operational Level Agreement. A document that defines and agrees the responsibilities and obligations of internal support teams needed to meet the requirements of the service. An Incident is placed 'On Hold' in the Service Management System when awaiting a Response from the User. This has the effect of pausing the Service Level clock. The Priority Matrix enables an appropriate priority to be assigned to each Incident based on the Impact of an Incident to the organisation and the Urgency by which the Incident needs to be resolved. The higher the Impact and Urgency, the higher the Priority. A Problem is the unknown underlying Root Cause of one of more Incidents. The process that undertakes the management of Problem investigation and resolution related activities, both reactively and proactively. A record created and managed within the Service Management System which records all relevant information and manages the Problem resolution process. Means: (a) in respect of each Electricity Distributor, the person nominated in writing to the DCC from time to time by that Electricity Distributor; or (b) in respect of each Gas Transporter, the person nominated in writing to the DCC from time to time by that Gas Transporter, on the basis that more than one Party may specify the same Registration Data Provider, and that the Electricity Distributor or the Gas Transporter shall be deemed to have so nominated itself in the absence of any other nomination Page 20 of 23

21 RDP System Registration Data Registration Data File Registration Data File Transfer Registration Data Provider Means any Systems: (a) which are operated by or on behalf of an Electricity Distributor or Gas Transporter responsible for providing (or procuring the provision of) Registration Data in respect of a particular MPAN or MPRN; and (b) which are used wholly or partly for the collection, storage, Back-Up, processing or communication of that Registration Data prior to, or for the purposes of, its provision to the DCC over the Registration Data Interface. Has the meaning given to that expression in Section E1 (Reliance on Registration Data). Data file containing updates from the Registration Data Providers. Process for delivering Registration Data File Means: (a) in respect of each Electricity Distributor, the person nominated in writing to the DCC from time to time by that Electricity Distributor; or (b) in respect of each Gas Transporter, the person nominated in writing to the DCC from time to time by that Gas Transporter, on the basis that more than one Party may specify the same Registration Data Provider, and that the Electricity Distributor or the Gas Transporter shall be deemed to have so nominated itself in the absence of any other nomination Resolver Team / Resolver Group Response (Incident) Response Time (Incident) Root Cause The resources providing technical support in order to resolve Incidents. The time taken between an Incident being logged in the Service Management System, and a support resource acknowledging and starting to work on resolving the Incident. This Response time is subject to agreed timescales dependent upon the priority assigned to the Incident. Has the meaning given to that expression in Section H3.20 (Target Response Times) or L8 (SMKI Performance Standards and Demand Management). The underlying reason that an Incident occurred. Page 21 of 23

22 Security Incident Selective Refresh Service Audit Trail Service Continuity Management Service Desk Service Level means, in relation to any System, any event which results, or was capable of resulting, in that System being Compromised to a material extent. The provision of a selection of data held by a Registration Data Provider for a particular Energy Supplier, used to replace the data held by DCC. This could be due to errors in the daily update that require correcting prior to the next daily update. Means the record of all service activity, including details of Service Requests and Service Responses, Proactive process which seeks to ensure the correct level of protection is applied to each service and system. It also provides on-going management for existing services by undertaking regular reviews of test plans and the level of protection offered in line with changing business requirements. Has the meaning given to that expression in Section H (Service Desk). Means, in respect of each Performance Measure: (a) the number of occasions during the Performance Measurement Period on which the DCC performed the activity that is the subject of the Performance Measure in accordance with the Service Level Requirements; expressed as a percentage of (b) the number of occasions during the Performance Measurement Period on which the DCC performed the activity that is the subject of the Performance Measure; provided that the DCC may establish the Service Level for a Performance Measure in accordance with the Performance Measurement Methodology. Service Provider Service Target (Incident) Means an External Service Provider, as defined in the DCC Licence (but always excluding the DCC itself). The agreed time in which certain activities such as Response to, or Resolution of an Incident should be completed. Page 22 of 23

23 SLA Subject Matter Expert Supply Meter Point Transport Authentication Trend Analysis User Service Level Agreement. This is the agreed definition of how all service components should be delivered, including timescales, service quality and availability. A person with expert knowledge in a particular subject area. Is the point at which the meter measuring a customers consumption is located Ensures secure message transmission An activity undertaken by Problem Management whereby information relating to the resolution of multiple similar Incidents is analysed to identify common traits in order to help with identification of the underlying Root Cause. Means a Party that has completed the User Entry Process (and, in respect of Services available in accordance with this Code to Users acting only in one or more User Roles, a Party that has completed the User Entry Process for that User Role). Verification Checks Workaround (Incident) When a Registration Data File is received by DCC, it undergoes Verification Checks to ensure that it conforms to the correct format, is confirmed as a valid file from the provider, and is not corrupted. Once it is verified, the data is integrated into the main Registration Data database. If the underlying Root Cause of an Incident is not known and cannot therefore be fixed, it may be possible to create a 'Workaround' that allows the User to use the service, albeit maybe not in the usual manner. This would ideally be a temporary solution until a permanent fix is identified and implemented. Page 23 of 23

Error Handling Strategy

Error Handling Strategy Error Handling Strategy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 13 Contents 1. Document History 3 1.1 Document Location 3 1.2 Review Dates 3 1.3 Revision History 3

More information

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy

SEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions

More information

Error Handling Strategy

Error Handling Strategy Handling Strategy Draft DCC Guidance Document June 2016 Page 1 of 13 Contents 1. Introduction 3 1.1. Purpose 3 1.2. Scope 3 1.3. General Provisions 3 2. Management 5 2.1. Classification 5 2.2. Handling

More information

Error Handling Strategy. DCC Guidance Document

Error Handling Strategy. DCC Guidance Document Error DCC Guidance Document Date: June 2016 Classification: DCC Public Table of Contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Scope... 3 1.3 General Provisions... 3 2 Error Management... 4 2.1 Error

More information

Electricity Registration Data Interface Code of Connection

Electricity Registration Data Interface Code of Connection Electricity Registration Data Interface Code of Connection Author: DCC Version: v1.2 Date: 04/08/2014 Page 1 of 29 Contents 1 Introduction... 4 1.1 Document Purpose... 4 1.2 Document Scope... 4 1.3 d documents...

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

Smart Meters Programme Schedule 6.3. (Development Process) (CSP North version)

Smart Meters Programme Schedule 6.3. (Development Process) (CSP North version) Smart Meters Programme Schedule 6.3 (Development Process) (CSP North version) Schedule 6.3 (Development Process) (CSP North version) Amendment History Version Date Status v.1 Signature Date Execution copy

More information

Number Portability Testing Specifications Manual

Number Portability Testing Specifications Manual Number Portability Testing Specifications Manual Published: 4 th November 2014 Internal Reference: MCA-OPS/ds/14-2022 Malta Communications Authority Valletta Waterfront, Pinto Wharf, Floriana, FRN 1913,

More information

Security Annex for Firewalls Additional Terms for Firewall Service

Security Annex for Firewalls Additional Terms for Firewall Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable

More information

* - Note: complete submissions are to be submitted at least two weeks before any deadline to ensure timely closure.

* - Note: complete submissions are to be submitted at least two weeks before any deadline to ensure timely closure. PAGE 1 of 11 PROCESS OBJECTIVE : To effectively manage all feedback (as defined in QM-00-01 / 02) and associated correction and corrective action in an effective and objective manner. Feedback includes

More information

REGISTRATION DATA INTERFACE SPECIFICATION

REGISTRATION DATA INTERFACE SPECIFICATION REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS In this document, except where the context otherwise requires: expressions defined in section A of the Code (Definitions and Interpretation) have the

More information

Application Lifecycle Management on Softwareas-a-Service

Application Lifecycle Management on Softwareas-a-Service Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application

More information

Electricity Registration Data Interface Code of Connection

Electricity Registration Data Interface Code of Connection Electricity Registration Data Interface Code of Connection Author: DCC Version: v1.21.21 Date: 04/08/201421/07/201418 July 27 March 2014 Page 1 of 32 Contents 1 Introduction... 4 1.1 Document Purpose...

More information

Axiell ALM Cloud Service - Service Level Agreement

Axiell ALM Cloud Service - Service Level Agreement Axiell ALM Cloud Service - Service Level Agreement 2017 This service level agreement (SLA) applies to the Axiell ALM Cloud services provided by Axiell ALM Netherlands BV ( Service Provider ), and includes

More information

Security Annex for DDoS Additional Terms for DDoS Protection

Security Annex for DDoS Additional Terms for DDoS Protection CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Installation and Service Provision... 2 2.2 Cleaning and Mitigation... 3 2.3 Mitigation Limitations... 3 2.4 DDoS Attack Monitoring...

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Service Level Agreement

Service Level Agreement General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service

More information

WAN/MPLS SLA Fault Reporting

WAN/MPLS SLA Fault Reporting WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name

More information

UK LINK DESCRIPTION UK LINK DESCRIPTION DOCUMENT

UK LINK DESCRIPTION UK LINK DESCRIPTION DOCUMENT DOCUMENT Version Control Version COR Date of Change Changes 1 Draft - June 2017 Update to reflect implementation of UNC Modification 0565A. Author David Addison 1.1.For Approval July 2017 Minor amendment

More information

0522: Governance of the use of as a valid UNC communication

0522: Governance of the use of  as a valid UNC communication Stage 01: Modification 0522: Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate

More information

Threshold Anomaly Detection Procedures (TADP)

Threshold Anomaly Detection Procedures (TADP) Threshold Anomaly Detection Procedures (TADP) DCC Public Page 1 of 14 Contents 1 Introduction... 3 2 DCC Anomaly Detection Threshold Consultation... 4 3 Notification of Anomaly Detection Thresholds...

More information

DESCRIPTION OF UK LINK. July Version 1.1 For Approval. Deleted: June Formatted: Highlight. Formatted: Highlight

DESCRIPTION OF UK LINK. July Version 1.1 For Approval. Deleted: June Formatted: Highlight. Formatted: Highlight DESCRIPTION OF UK LINK July 2017 Version 1.1 For Approval Deleted: June Formatted: Highlight Formatted: Highlight Version Control Version COR Date of Change Changes 1 Draft - June 2017 Update to reflect

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

0522: Governance of the use of as a valid UNC communication

0522: Governance of the use of  as a valid UNC communication Stage 01: Modification 0522: Governance of the use of email as a valid UNC communication At what stage is this document in the process? This Modification proposes business rules to ensure that appropriate

More information

Code Administration Code of Practice

Code Administration Code of Practice Code Administration Code of Practice As part of the energy Codes Governance Review Ofgem proposed that a Code of Practice be established to facilitate convergence and transparency in code Modification

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Office 365. Claranet Service Description

Office 365. Claranet Service Description Claranet Service Description Office 365 Provides a highly configurable Email, Collaboration and Unified Communications platform, hosted by Microsoft, that can be deployed for a customer organisation to

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Stopsley Community Primary School. Data Breach Policy

Stopsley Community Primary School. Data Breach Policy Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk

More information

STCP 18-3 Issue 006 TEC Changes

STCP 18-3 Issue 006 TEC Changes STCP 18-3 Issue 006 TEC Changes STC Procedure Document Authorisation Party Name of Party Representative Signature Date National Grid Electricity Transmission plc SP Transmission plc. Scottish Hydro-Electric

More information

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code ) New Zealand Telecommunications Forum Code for Vulnerable End Users of Telecommunication Services ( Vulnerable End User Code ) Code Status: Code Classification: Date: Review Status: For Public Consultation

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 6 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

BSCP128 Production, Submission, Audit and Approval of Line Loss Factors Version 3.0. Balancing and Settlement Code. BSC Procedure DRAFT

BSCP128 Production, Submission, Audit and Approval of Line Loss Factors Version 3.0. Balancing and Settlement Code. BSC Procedure DRAFT Balancing and Settlement Code BSC Procedure Production, Submission, Audit and Approval of Line Loss Factors BSCP128 Version 3.0- Effective Date: 30 June 2011 Balancing and Settlement Code Page 1 of 32

More information

PUBLICATION 1 SERVICE DESCRIPTION FOR NETWORK INTERACTIVE VOICE RESPONSE SERVICE

PUBLICATION 1 SERVICE DESCRIPTION FOR NETWORK INTERACTIVE VOICE RESPONSE SERVICE PUBLICATION 1 SERVICE DESCRIPTION FOR NETWORK INTERACTIVE VOICE RESPONSE SERVICE 1.1 Service Overview The Network Interactive Voice Response Service ("NIVR Service") provides fully managed network-based

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Sunrise Software Limited, Sostenuto is a registered trade mark of Sunrise Software Limited.

Sunrise Software Limited, Sostenuto is a registered trade mark of Sunrise Software Limited. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, or stored in any retrieval system of any nature without the prior written permission of Sunrise

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

Smart Metering Implementation Programme. Consultation on transitional arrangements in the Smart Energy Code

Smart Metering Implementation Programme. Consultation on transitional arrangements in the Smart Energy Code Smart Metering Implementation Programme Consultation on transitional arrangements in the Smart Energy Code Page 1 of 9 Contents 1 Executive Summary... 3 2 Communications Hubs... 5 3 Service Management...

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

Telephone System Service Level Agreement

Telephone System Service Level Agreement Telephone System Service Level Agreement V1.0 The Complete Business Solution 04 0 Document Version Log 03 1 Purpose 03 2 Service Description 03 3 Service Availability 03 4 Scope of Service and Exclusion

More information

BSCP128 Production, Submission, Audit and Approval of Line Loss Factors Version 3.0. Balancing and Settlement Code. BSC Procedure DRAFT

BSCP128 Production, Submission, Audit and Approval of Line Loss Factors Version 3.0. Balancing and Settlement Code. BSC Procedure DRAFT Balancing and Settlement Code BSC Procedure Production, Submission, Audit and Approval of Line Loss Factors BSCP128 Version 3.0 Effective Date: 30 June 2011 Balancing and Settlement Code Page 1 of 33 30

More information

Reference Offer for Leased Line and Ethernet Services

Reference Offer for Leased Line and Ethernet Services Reference Offer for Leased Line and Ethernet Services Service Operations Manual Contents 1. Background... 2 2. Service Request Process... 2 2.1. Clean Order Process... 2 2.2. Order Delivery Process...

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide Gatekeeper Public Key Infrastructure Framework Information Security Registered Assessors Program Guide V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright.

More information

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality

More information

POWER SYSTEM DATA COMMUNICATION STANDARD

POWER SYSTEM DATA COMMUNICATION STANDARD POWER SYSTEM DATA COMMUNICATION STANDARD PREPARED BY: AEMO Systems Capability VERSION: 2 EFFECTIVE DATE: 1 December 2017 STATUS: FINAL Australian Energy Market Operator Ltd ABN 94 072 010 327 www.aemo.com.au

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

Ethernet DIA SLA Fault Reporting

Ethernet DIA SLA Fault Reporting Ethernet DIA SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name

More information

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels

More information

Governance of the use of as a valid UNC communication

Governance of the use of  as a valid UNC communication Stage 01: : u Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate assurance is

More information

Error Handling Strategy

Error Handling Strategy DECC/ SEC Subsidiary Document Consultation Draft V1.0 Error Handling Strategy Author: Date: 9 th May 2014 Page 1 of 8 Public DECC/ SEC Subsidiary Document Consultation Draft V1.0 Contents Error Handling

More information

Guidance: Operational Conditions Precedent (OCPs) September 2016 Version 1

Guidance: Operational Conditions Precedent (OCPs) September 2016 Version 1 Guidance: Operational Conditions Precedent (OCPs) September 2016 Version 1 Contents 1 Introduction 4 2 Operational Conditions Precedent requirements 4 3 Low Carbon Contracts Company Process 8 4 Supporting

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

URL NETWORKS CORPORATE INTERNET

URL NETWORKS CORPORATE INTERNET URL NETWORKS CORPORATE INTERNET SERVICE LEVEL AGREEMENT APRIL 2016 1. INTRODUCTION 1.1 This SLA covers services including (unless otherwise notified by URL Networks) Data Services, Voice Services, Dark

More information

PART IV GLOSSARY OF TERMS

PART IV GLOSSARY OF TERMS PART IV GLOSSARY OF TERMS Terms and Definitions For the purposes of this document, the following terms and definitions shall apply: PROCESS MANUAL FOR THE GFSI BENCHMARKING PROCESS V7.2 Introduction Purpose

More information

Accreditation & Certification Supplier Guide

Accreditation & Certification Supplier Guide Accreditation & Certification Supplier Guide Network Connectivity Products and Services Connected Health Version 1.0 Table of Contents 1 PREFACE... 3 1.1 AUDIENCE...3 1.2 PURPOSE...3 1.3 SCOPE...3 2 CONNECTED

More information

Global Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research.

Global Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research. CONTENTS i. INTRODUCTION 3 ii. OVERVIEW SPECIFICATION PROTOCOL DOCUMENT DEVELOPMENT PROCESS 4 1. SCOPE 5 2. DEFINITIONS 5 3. REFERENCES 6 4. MANAGEMENT STANDARDS FOR APPROVED CERTIFICATION BODIES 6 4.1

More information

UK LINK DESCRIPTION OF UK LINKDOCUMENT

UK LINK DESCRIPTION OF UK LINKDOCUMENT UKLINK DESCRIPTION UK LINK DESCRIPTION OF UK LINKDOCUMENT July 2017 Version 1.1 For Approval Version Control Version COR Date of Change Changes 1 Draft - June 2017 Update to reflect implementation of UNC

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

v February 2016

v February 2016 Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance

More information

REGISTRATION DATA INTERFACE SPECIFICATION

REGISTRATION DATA INTERFACE SPECIFICATION REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS Data Transfer Catalogue DCC Status DCC Status File Electricity Registration Data Provider FTP FTPS Gas Registration Data Provider Hot Standby Router

More information

Standdards of Service

Standdards of Service Standards of Service for the Provision and Maintenance of; THUS Demon Business 2000, Business 8000, Business 2+, Business 2 + Pro, Demon Business Lite, Demon Business Lite +, Demon Business Unlimited,

More information

Guidance for IT staff on priorities to be used when logging incidents.

Guidance for IT staff on priorities to be used when logging incidents. Information Technology IT Incident Criteria Guidance for IT staff on priorities to be used when logging incidents. Version Control... 2 Introduction... 3 Definitions (ITIL)... 3 Response time... 3 Resolution

More information

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited

More information

Terms and Conditions for External accounts Service

Terms and Conditions for External accounts Service Terms and Conditions for External accounts Service You must read these Terms and Conditions before using External accounts service. IMPORTANT INFORMATION External accounts service is an account aggregation

More information

MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS

MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS MSATS PROCEDURES: CATS PROCEDURE PRINCIPLES AND OBLIGATIONS PPEPARED FOR: Electricity PREPARED BY: Retail Markets and Metering DOCUMENT NO: MT_RT1700v004.03.8 VERSION NO: 4.03.8 EFFECTIVE DATE: 15 May

More information

These terms are product specific terms which apply to our DSL Services.

These terms are product specific terms which apply to our DSL Services. CONDITIONS OF SERVICE - DSL SERVICES 1. ABOUT These terms are product specific terms which apply to our DSL Services. 2. APPLICATION We will supply the DSL Services to you pursuant to the terms and conditions

More information

2017 ICANN-IETF MoU Supplemental Agreement Introduction

2017 ICANN-IETF MoU Supplemental Agreement Introduction 2017 ICANN-IETF MoU Supplemental Agreement Introduction This document is between the IETF Administrative Oversight Committee (IAOC) and the Internet Corporation for Assigned Names and Numbers (ICANN) to

More information

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 728 METERING PROTOCOL Table of Contents MP 1 OBJECTIVES, DEFINITIONS AND SCOPE

More information

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF ORIGINAL VOLUME NO. III Original Sheet No. 977 METERING PROTOCOL

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF ORIGINAL VOLUME NO. III Original Sheet No. 977 METERING PROTOCOL ORIGINAL VOLUME NO. III Original Sheet No. 977 METERING PROTOCOL ORIGINAL VOLUME NO. III Original Sheet No. 978 METERING PROTOCOL Table of Contents MP 1 OBJECTIVES, DEFINITIONS AND SCOPE MP 1.1 Objective

More information

Areas of impact for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949

Areas of impact for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949 Areas of for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949 1 st February 2014 1 Foreword Introduction The IATF recognizes certification

More information

l i P a g e Service Level Commitment Infinity TXT mobile marketing solutions (ITMMS): Updated February 2010 Service Level Commitment 1.

l i P a g e Service Level Commitment Infinity TXT mobile marketing solutions (ITMMS): Updated February 2010 Service Level Commitment 1. Infinity TXT mobile marketing solutions (ITMMS): Updated February 2010 Service Level Commitment 1. Service Levels 1.1 Infinity TXT mobile marketing solutions (ITMMS) offers the commitment of maintaining

More information

Adopter s Site Support Guide

Adopter s Site Support Guide Adopter s Site Support Guide Provincial Client Registry Services Version: 1.0 Copyright Notice Copyright 2016, ehealth Ontario All rights reserved No part of this document may be reproduced in any form,

More information

Architecture Tool Certification Certification Policy

Architecture Tool Certification Certification Policy Architecture Tool Certification Certification Policy Version 1.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

California Independent System Operator Corporation Fifth Replacement Electronic Tariff

California Independent System Operator Corporation Fifth Replacement Electronic Tariff Table of Contents 17. Transmission Ownership Rights (TORs)... 2 17.1 TRTC Instructions... 2 17.1.1 Responsibility to Create TRTC Instructions... 2 17.1.2 TOR Scheduling Coordinator Responsibilities...

More information

Attachment C Service Level Agreement for WAN and Internet

Attachment C Service Level Agreement for WAN and Internet Attachment C Service Level Agreement for WAN and Internet Overview The Vendor SLA for Owner shall apply to all data transmission and reception on all Vendor provided Owner Wide Area Network (WAN) connectivity,

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

GUIDE ON APPLICATION FOR ROUNDTABLE FOR SUSTAINABLE PALM OIL PRINCIPLES AND CRITERIA (RSPO P & C) INCLUDING GROUP CERTIFICATION

GUIDE ON APPLICATION FOR ROUNDTABLE FOR SUSTAINABLE PALM OIL PRINCIPLES AND CRITERIA (RSPO P & C) INCLUDING GROUP CERTIFICATION GUIDE ON APPLICATION FOR ROUNDTABLE FOR SUSTAINABLE PALM OIL PRINCIPLES AND CRITERIA (RSPO P & C) INCLUDING GROUP CERTIFICATION Page 1 of 7 1. INTRODUCTION This guideline has been prepared to provide guidance

More information

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL

CALIFORNIA INDEPENDENT SYSTEM OPERATOR CORPORATION FERC ELECTRIC TARIFF FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 727 METERING PROTOCOL FIRST REPLACEMENT VOLUME NO. II Original Sheet No. 728 METERING PROTOCOL Table of Contents MP 1 OBJECTIVES, DEFINITIONS AND SCOPE

More information

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents University of Central Florida Information Technology (UCF IT) Title: Effective: 12/15/2016 UCF IT Incident Management Policy & Procedure Revised: 07/13/2018 Approved By: Michael Sink, Associate VP & COO,

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

CERTIFICATION GUIDELINES FOR MANAGEMENT SYSTEM

CERTIFICATION GUIDELINES FOR MANAGEMENT SYSTEM CERTIFICATION GUIDELINES FOR MANAGEMENT SYSTEM Table of Content 1.0 INTRODUCTION... 2 2.0 CERTIFICATION PROCESS... 2 3.0 SCHEDULE OF FEES... 3 4.1 CERTIFICATION REQUIREMENTS... 3 4.2 Eligibility criteria

More information

Chain of Custody Policy. July, 2015

Chain of Custody Policy. July, 2015 July, 2015 Copies of this document are available for free in electronic format at the following website: www.rainforest-alliance.org Please send your comments or suggestions concerning this document to

More information

Internode Complaint Handling Policy

Internode Complaint Handling Policy Internode Complaint Handling Policy This article will outline our Complaint Handling Policy. While we always aim to provide you with awesome customer service, if you haven t received the service you expected,

More information

SMKI Code of Connection

SMKI Code of Connection SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5

More information

2.0 02/10/2013 Updates following the CACoP review December /11/2014 Proposed updates following the CACoP review October 2014

2.0 02/10/2013 Updates following the CACoP review December /11/2014 Proposed updates following the CACoP review October 2014 Contents 1 Introduction 2 2 Code Administration Principles 4 3 Modification Process Principles 9 4 Common Modification Process 19 Appendix 1: List of Code Administrators 22 Appendix 2: Modification Templates

More information

Patient Reported Outcome Measures (PROMs)

Patient Reported Outcome Measures (PROMs) Patient Reported Outcome Measures (PROMs) Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

BT Product and Services Agreement (PSA) Apps from BT Service Schedule

BT Product and Services Agreement (PSA) Apps from BT Service Schedule 1 Definitions The following definitions apply, in addition to those in the General Terms and Conditions. Application means a software program designed to carry out operations for specific tasks. Availability

More information