A1 Information Security Supplier / Provider Requirements

Size: px
Start display at page:

Download "A1 Information Security Supplier / Provider Requirements"

Transcription

1 A1 Information Security Supplier / Provider Requirements Requirements for suppliers & providers A1 Information Security Management System Classification: public Seite 1

2 Version history Version history Version 1.0 Regarding: Creation Approval Creation Maha Sounble Philipp Röhm 26 September October 2017 Note: This document refers to the A1 Information Security Guidelines V1.0. Classification: public Page 2

3 Inhaltsverzeichnis Inhaltsverzeichnis Version history... 1 Inhaltsverzeichnis... 3 Framework requirements Contractual requirements for service providers Non Disclosure Agreements (NDAs) Contract components for Information Security & Data Privacy Organisational requirements for service providers Certifications Audit right of A Use of sub-contractors Technical requirements for service providers Data storage & data transfer Data transfer & deletion... 6 System & application requirements Organisational system requirements Requirements management Change management Tests before start-up Authorisation management Internal Control System (ICS) Technical system requirements Authentication Hardening Logging Data backup Architecture Software development Administration Data deletion Penetration testing Vulnerability Management Incident Management Anforderungen an Internet of Things (IoT) Services Anforderungen an Cloud Service Provider Additional requirements for system outsourcing Contractual requirements for service providers in case of outsourcing Classification: public Page 3

4 Inhaltsverzeichnis Underpinning Contract (UC) Organisational requirements for service providers in case of outsourcing Security concept Human Resource Management Data Storage & Data Transfer Data storage within A Data storage outside of A Minimum standards for external data storage Ongoing inspection Externally stored customer data and personal data Publication & responsibility for content Classification: public Page 4

5 Framework requirements Framework requirements Projects, services and provided services have to be tested before implementation and - ideally during planning - checked and monitored for the necessary security requirements. For each major technical adaptation or modification, as well as with any substantive contract change, but at least every three years as a rule, the departments concerned must check whether the relevant facts for external data storage have changed and whether an adjustment is necessary. 1.1 Contractual requirements for service providers Non Disclosure Agreements (NDAs) External service providers must be obliged to secrecy before confidential information is exchanged. Non Disclosure Agreements (NDAs) 1 are available for this purpose Contract components for Information Security & Data Privacy In contracts between external service providers and A1, the established security measures must be defined and the appropriate processing of the data agreed. Unilateral changes to the agreement are not permitted. 1.2 Organisational requirements for service providers Certifications Information technology service providers, in particular those who provide infrastructure or services, should be able to demonstrate certification according to the ISO / IEC standard. Cloud service providers must also have ISO/IEC certification. For external data storage, ISAE 3402 conformity of the data centre must be present. The certifications shall be maintained throughout the duration of the partnership. When verifying the service provider, appropriate proof is required. If valid certificates are not presented, other certifications may be included in the course of the inspection, if they are equivalent or higher Audit right of A1 A1 performs service provider audits to check for compliance with the agreed security requirements on-site. The service provider must provide the necessary documents and provide access to relevant 1 You can find templates for NDAs here. Classification: public Page 5

6 Framework requirements facilities and systems. A service provider audit is announced to the service provider at least 4 weeks in advance Use of sub-contractors The service provider shall ensure that all requirements placed on it also apply to all subcontractors who are required to provide the service for A Technical requirements for service providers Data storage & data transfer Internal data storage is preferred. Should external data storage be carried out for technical or economic reasons, the service provider shall provide for a physical separation or client separation of the data from other customers. The requirements in Section 4 - Data Storage & Data Transfer must be met Data transfer & deletion Regular deletion of customer, traffic or other protective data must be carried out according to the requirements of A1; more detailed information can be found in Section Data Deletion. At the end of the contract, the contract partner must be given the option to transfer all existing data to A1. Each supplier shall delete the data if they are no longer required for fulfilling the contractual obligations. Classification: public Page 6

7 System & application requirements System & application requirements Systems and applications deployed at or for A1 must meet minimum requirements to protect them against threats such as data theft, data manipulation, sabotage, denial of service attacks, and many more. These provisions contain relevant requirements for systems and applications that are in use of A1, whether or not they have been outsourced. Systems and applications that are for customers are subject to the same requirements, if applicable. In case of inapplicable provisions, compensatory measures shall be taken that ensure the same or higher level of protection. 2.1 Organisational system requirements Requirements management The structured handling of technical demands (requirements) for a new business requirement or a change to an existing technical solution is to be dealt with via an appropriate ticketing system. Interfaces have to be defined in the Underpinning Contract (UC) Change management All changes and implementations of systems or applications must be carried out according to a documented change process Tests before start-up Prior to start-up, several tests are carried out during the A1 change management process, including a comprehensive security check Authorisation management Authorisations must, in principle, be assigned based on the role. The standard approval process for user administration shall be used for the authorisation. The service provider has to enable, that A1 can assign and revoke permissions flexibly. A centralised listing or insight and automatic evaluation of all authorisations must be ensured Internal Control System (ICS) When a new system is installed, a relevance analysis will be carried out by A1 with the internal ICS Competence Centre. If ICS relevance exists, all controls of the internal control system must be carried out on the system. The minimum requirements are the IT General Controls of A1. Classification: public Page 7

8 System & application requirements 2.2 Technical system requirements Authentication Data and other content contained in systems / applications may only be issued following successful authentication of the users or target systems. A user should be authenticated using a directory service, such as Active Directory (AD). AD is the Central User Database at A1. Kerberos authentication also implements single-sign-on (SSO). If the use of Kerberos / SSO is not possible, users may also be authenticated using alternative systems as long as they meet the A1 internal requirements for passwords as described in the A1 Information Security Guidelines, Section 3 - Passwords. In any case, each created user must also be maintained in the corporate directory (CD). Passwords must be encrypted in the file system or stored in the database and transferred to the network in order to reduce the risk of password theft. For this purpose, only state-of-the-art methods may be used. Password storage and transmission is not permitted in plain text. If access from outside the corporate network occurs, authentication must meet higher protection requirements. A two-factor authentication with the A1 account and associated password, as well as another factor, such as a certificate, an SMS token or an RSA token, is required Hardening Unneeded ports, interfaces and services must be disabled. A description of the required ports has to be documented. Systems are transferred to the A1 company free from known security defects. Default passwords must be changed before the transfer to A1 operation. It must be possible to use the standard virus protection used by A1 for all systems at A1. Since this regulation also applies to purchased systems, suppliers can obtain the necessary information prior to implementation. Hardening measures and patch level are regularly checked by the vulnerability scans of A Logging The A1 internal requirements for the logging as described in A1 Information Security Guidelines Section 7 - Logging must be observed. Ideally, systems whose operation has been outsourced are also integrated into the centralised attack detection. Forensic analyses should be possible without the intervention of a supplier Data backup The A1 internal requirements for data backup as described in A1 Information Security Guidelines Section 8 - Data Backup must be observed. In the case of outsourced systems, the supplier is obliged to guarantee corresponding data backups and recovery options. Classification: public Page 8

9 System & application requirements Architecture Applications must be set up in several tiers, which must be safely separated from each other; no tier must be skipped during access. Access from one tier to the next can only be done via defined protocols (ports). There must be a separation into test, integration and productive systems. Developers have no access to productive systems without the express written permission of A1. If the use of Simple Network Management Protocol (SNMP) is required, SNMPv3 should preferably be used. Older versions of SNMP should not be used Software development When developing software, it is recommended to follow the relevant standards (e.g. ÖNORM A7700 in the current version) or the OWASP Guide 2. In any case, the OWASP Top 10 Application Security Risks must be considered Administration A direct link to a system for administration purposes is only permitted within the A1 network. If administration occurs outside (the A1 network), there may only be a link via specified ports in the firewall to an access point in the Demilitarised Zone (DMZ), from where one can then link further to the particular target system. (Remote access by service partners terminate in a separate zone.) Such a connection must be encrypted and prior authentication is required. Service partners are not entitled to transfer maintenance work and thus access to the A1 network to third parties without the express consent of the customer Data deletion Customer, traffic or other protectable data shall be deleted promptly and regularly in accordance with legal and A1 internal requirements. In the design phase, specific deletion requirements for the respective system will be specified by A1. In any event, each supplier must delete the data if they are no longer required for the fulfilment of contractual obligations Penetration testing In the test phase, at least prior to acceptance, a tool is used to test systems for security deficiencies. If deficiencies are found, they must be rectified immediately. Suppliers may not charge additional costs for the rectification. 2 Click here to go to the OWASP Guide. Classification: public Page 9

10 System & application requirements Vulnerability Management Products and systems or applications must be supplied and implemented in a hardened and currently patched state. Before being started up, their condition is ensured by means of vulnerability scans. The supplier must provide the necessary updates free of charge for any security vulnerabilities discovered after start-up. In principle, manufacturers and suppliers must provide security patches at least one week after public announcement on security platforms (e.g. CERT, SecurityTracker, Heise, etc.) or during a period defined in the Underpinning Contract (UC). If vulnerabilities are identified by A1, they must be made available within two weeks. There must be an automated way of checking downloaded patches or software updates for their integrity. Services that are classified as critical (service class 4) are additionally subjected to a source code analysis Incident Management Security incidents at the contractor must be reported immediately to A1 as part of contract fulfilment. 2.3 Anforderungen an Internet of Things (IoT) Services The IoT sensors (e.g. cameras, smart meters, sockets, etc.) must not be accessible directly from the Internet. For the IoT sensors, security updates are automated and must be carried out without manual intervention over the entire lifetime of the product. No hard-coded passwords are allowed in the IoT sensors. Default passwords of the IoT sensors must be changed at start-up. Where technically feasible and practicable, 2-factor authentication must be provided for customer interfaces. The principles of Security by Default and Security by Design apply throughout the entire product life cycle of the overall solution. 2.4 Anforderungen an Cloud Service Provider Cloud Service providers require cloud computing that complies with the EU General Data Protection Regulation (GDPR). In addition, the following certifications are required to be maintained for the entire duration of the partnership or the use of the service: ISO/IEC (information security) and ISO/IEC (PII data in the cloud) of the service provider Classification: public Page 10

11 System & application requirements ISAE 3402-conformance of the computing centre for external data storage (see Section 13 - Data Storage and Data Transfer ) The service provider shall provide appropriate evidence to document the certifications. In the case of non-presentation of valid certificates for ISO/IEC 27001, ISO / IEC and ISAE 3402, other certifications can be applied if they are equivalent or higher. For example, a 5 star StarAudit certificate from EuroCloud 3 is also provided, which also guarantees compliance with general requirements for cloud providers. Cloud Services are tested. The will be approved for use if they comply with the minimum requirements and corresponding contractual arrangements for ensuring the security of the information and data. Unverified cloud services must not be used. 3 You can find more information about the 5 star StarAudit certificate from EuroCloud here. Classification: public Page 11

12 Additional requirements for system outsourcing Additional requirements for system outsourcing 3.1 Contractual requirements for service providers in case of outsourcing Underpinning Contract (UC) Underpinning Contracts (UCs) must be contractually agreed. A competence matrix of the respective services must be agreed upon by contract. 3.2 Organisational requirements for service providers in case of outsourcing Security concept When a system or system part is outsourced to a vendor, the service provider must present a security concept for the security of the data, which is assessed by A1 in the context of the bid negotiations Human Resource Management The service provider must carry out a security check on its employees when they are employed for purposes of the contract with A1. The minimum requirements are an identity check and obtaining a current police clearance certificate. The service provider must complete valid confidentiality agreements with them and train or instruct them in the correct and responsible handling of the information and data of A1. Responsibilities with regard to information security and data protection must be defined. For this purpose, the service provider must publish appropriate guidelines or service instructions on information security and data protection, and must have made them available to its internal and external employees. They must be adequately trained and educated in order to perform the activities for partnership with A1 accordingly. Bottlenecks in human resources are to be avoided, for example, through personnel redundancies and substitution agreements, so that the provision of the service to A1 does no suffer on this account. Classification: public Page 12

13 Data Storage & Data Transfer Data Storage & Data Transfer 4.1 Data storage within A1 In principle, local data storage at A1 is preferred in domestic computing centres, if economically justifiable. 4.2 Data storage outside of A1 Each storage of data outside of A1 means that the data are no longer within the sphere of influence of A1 and are therefore not directly controlled by A1. This assumes that increased safety requirements must be observed. If minimum standards are not met, data storage outside of A1 is not permitted. In addition, a risk assessment (legal, data protection, technical and economic) must be carried out within A1 in each case. If data are affected that A1 processes on behalf of our customers as a service provider outside our computing centres, the affected customers must in any case be informed accordingly for reasons of transparency Minimum standards for external data storage Any storage of data arising from the business operations of A1 outside of A1 is subject to a proven economic, legal, data protection and technical assessment as well as risk assessment. The risk assessment is carried out in accordance with the departments involved with the subject and must be documented in accordance with the established processes in those departments. Only then can the data be provided to a service provider. This also affects data storage at Group companies (TAG, AMEX), which must be viewed like any other service provider. If minimum requirements are not met, external data storage is prohibited. Data storage outside of A1 (e.g. for Cloud Services) is permitted, if data protection regulations are not violated and its use has been explicitly approved. Confidential information may only be transmitted and stored externally in encrypted form. In principle, company-critical and secret information may not be hosted externally. Only in special cases can they be stored in encrypted form outside of the A1, with the key being located exclusively at A1. Particular care should be taken when dealing with customer data, since data protection and contractual obligations must also be taken into account. Classification: public Page 13

14 Data Storage & Data Transfer The following matrix shows which data may be stored externally, provided that the minimum standards are complied with: EXTERNAL DATA STORAGE ACCORDING TO A1 INFORMATION CLASSES INFORMATION CLASS public internal A1 external (AUT, EU & safe third countries or third countries subject to authorisation) confidential (with encryption) A/B/C company-critical (only in exceptional cases) A/B/C of which: sensitive data A/B/C of which: Content data (contents of transmitted messages) secret (only in exceptional cases) The provider of the data centre where the external storage is carried out must confirm conformity with ISAE 3402 or have an equivalent or higher quality certification Ongoing inspection For each major technical adaptation or modification, as well as with any substantive contract change, but at least every three years as a rule, the departments concerned must check whether the relevant facts for external data storage have changed and whether an adjustment is necessary. Unless they already exist, appropriate processes are to be implemented by the relevant specialist areas Externally stored customer data and personal data If data is processed or stored by A1 (e.g. for hosting or housing) on behalf of the customer, and if the processing or storage is to be done outside of the data centres of A1 (e.g. for service providers in the case of Cloud Service providers), the verifiable consent of the customer must be obtained. The consent may be given in the form of an individual contract arrangement, a clause in the service description, or electronically (e.g. in the online shop). In this way, the transparency of the data storage (even outside of A1) is ensured for the customer, so that they can meet their data protection and legal reporting and approval requirements. If customer data within the meaning of the Telecommunications Act (TKG) or personal data generated by the business of A1 are to be stored and/or processed outside of A1, the country in which the data is to be stored must be determined in advance. Classification: public Page 14

15 Data Storage & Data Transfer If the data are subsequently stored in the European Economic Area or in secure third countries, the data transfer is permitted without authorisation by the data protection authority (additional security requirements may apply if relevant). In all other cases, if the data are not only indirectly personally identifiable to the recipient, the approval of the data protection authority must be obtained. The procedure before the data protection authority is carried out by the National Data Privacy department. Access to data from abroad (outside the European Economic Area or a secure third country) is equivalent to the storage of data abroad. Safe third countries include: Switzerland Argentina Guernsey Isle of Man Jersey Faroe Islands Andorra Uruguay New Zealand Canada Israel Classification: public Page 15

16 Publication & responsibility for content Publication & responsibility for content The A1 Information Security Guidelines can be viewed after approval and release in the intranet 4 of A1. The content was created by: security@a1telekom.at 4 The existing security guidelines can be found under A1 Inside/Knowledge/Secure Data. Classification: public Page 16

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement

Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement Key Customer Issues to Consider Before Entering into a Cloud Services Arrangement Law Seminars International December 9, 2014 Peter J. Kinsella 303/291-2328 The information provided in this presentation

More information

Baseline Information Security and Privacy Requirements for Suppliers

Baseline Information Security and Privacy Requirements for Suppliers Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates IMPACT OF INTERNATIONAL PRIVACY REGULATIONS Michelle Caswell, Coalfire Julia Jacobson, K&L Gates Introduction to International Privacy Law General Data Protection Regulation 2 2018 HITRUST Alliance What

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle

More information

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

Use of data processor (external business unit)

Use of data processor (external business unit) Published with the support of: Code of conduct for information security www.normen.no Use of data processor (external business unit) Supporting document Fact sheet no 10 Version: 4.0 Date: 12 Feb 2015

More information

Individual Agreement. commissioned processing

Individual Agreement. commissioned processing Individual Agreement commissioned processing (in the following: AGREEMENT) Between 1. - Address owner / Controller - and 2. - Service provider / Processor - As of: 09/2017, Page 2 of 12 The following provisions

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES. Forum financier du Brabant wallon

THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES. Forum financier du Brabant wallon THE NEW GENERAL DATA PROTECTION REGULATION IMPLICATIONS FOR ENTERPRISES Forum financier du Brabant wallon 14.12.2017 Data Protection should be part of every company s or organisation s DNA Do you process

More information

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere Embedding GDPR into the SDLC Sebastien Deleersnyder Siebe De Roovere Who is Who? Sebastien Deleersnyder 5 years developer experience 15+ years information security experience Application security consultant

More information

ECSA Assessment Report

ECSA Assessment Report ECSA Assessment Report Company Test Cloud Company Name of the cloudservice textcloud.com Website of the cloudservice 11.textcloud.com Project number #10652 Projectname Dummyproject Print date 2015-12-01

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Google Ads Data Processing Terms

Google Ads Data Processing Terms Google Ads Data Processing Terms Google and the counterparty agreeing to these terms ( Customer ) have entered into an agreement for the provision of the Processor Services (as amended from time to time,

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

IT risks and controls

IT risks and controls Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles

More information

Rules for Commissioned Processing. (DDV Declaration of Conformity)

Rules for Commissioned Processing. (DDV Declaration of Conformity) Rules for Commissioned Processing (DDV Declaration of Conformity) Service provider (in the following Service Provider) Representative Street name and number Postal code, place E-mail address Website Version:

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Security Policy (EN) v1.3

Security Policy (EN) v1.3 Security Policy (EN) v1.3 Author: Erik Klein Langenhorst Date: Sept 21, 2017 Classificatie: 2 Intended for stakeholders only Security Policy (EN) v1.5 Pagina 1 van 9 Version History Version Date Name Changes

More information

SDL Privacy Policy Cloud Services

SDL Privacy Policy Cloud Services SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

Embedding GDPR into the SDLC

Embedding GDPR into the SDLC Embedding GDPR into the SDLC Sebastien Deleersnyder Siebe De Roovere Toreon 2 Who is Who? Sebastien Deleersnyder Siebe De Roovere 5 years developer experience 15+ years information security experience

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

Toucan Telemarketing Ltd.

Toucan Telemarketing Ltd. Toucan Telemarketing Ltd. GDPR Data Protection Policy Introduction Toucan Telemarketing is committed to protecting the rights and freedoms of data subjects and safely and securely processing their data

More information

Outsourcing und Data Protection

Outsourcing und Data Protection Outsourcing und Data Protection Clara-Ann Gordon IAPP Workshop on Outsourcing, 9 May 2017 Subject Matter Outsourcing: depending on area different meaning and requirements However always personal data are

More information

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

Talenom Plc. Description of Data Protection and Descriptions of Registers

Talenom Plc. Description of Data Protection and Descriptions of Registers Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers

More information

City, University of London Institutional Repository. This version of the publication may differ from the final published version.

City, University of London Institutional Repository. This version of the publication may differ from the final published version. City Research Online City, University of London Institutional Repository Citation: Collins, D. A. & Klotz, E. (2018). GDPR and E-Commerce. City, University of London. This is the published version of the

More information

Data Processor Agreement

Data Processor Agreement Data Processor Agreement Data Controller: Customer located within the EU (the Data Controller ) and Data Processor: European Representative Company: ONE.COM (B-one FZ-LLC) One.com A/S Reg.no. Reg.no. 19.958

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Cybersecurity Considerations for GDPR

Cybersecurity Considerations for GDPR Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union

More information

DATA PROCESSING AGREEMENT

DATA PROCESSING AGREEMENT DATA PROCESSING AGREEMENT HIRINGBOSS HOLDINGS PTE LTD This DPA is entered into between the Controller and the Processor and is incorporated into and governed by the terms of the Agreement. 1. Definitions

More information

IBM Sterling B2B Services File Transfer Service

IBM Sterling B2B Services File Transfer Service Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients

More information

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data Privacy Policy Datacenter.com (referred to as we, us, our, Datacenter or the Company ) is committed to protecting your privacy and handling your data in an open and transparent manner. The personal data

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement between The Data Controller Name Address Postcode and city Country and The Data Processor Idha Sweden AB Norra vägen 28 856 50 Sundsvall Sweden] Page 1 of 15 1 Content 2 Data

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

PRIVACY POLICY CORPORATE CUSTOMER

PRIVACY POLICY CORPORATE CUSTOMER CORPORATE CUSTOMER PRIVACY POLICY This privacy policy applies when (Telia) supplies products and services to a corporate customer (the customer) and where Telia is the personal data controller. The policy

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information