RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM
|
|
- Junior Weaver
- 5 years ago
- Views:
Transcription
1 RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM BACKGROUND In 2014 RFIDentikit launched its Accreditation & Pass Management system, ALLOWME, to run seamlessly alongside its RFID Pass Scanning, sister product, SCANME. The software was produced and developed in house to provide event organisers with a sophisticated and robust system to use both pre event and on site. ALLOWME was built with large events in mind, but has the ability to be scaled up and down dependent on the client s particular requirements. The primary function of the software is to deliver a user friendly and secure system to manage individuals, organisations, vehicles and other attributes linked to a specific event.
2 SYSTEM ARCHITECTURE ALLOWME was written in PHP and runs on PHP 5.4, under Apache and against a My SQL database. The following diagram depicts a typical setup for deployment of the system; Administrative (Accreditation / Security Staff) and Public (Delegates / Attendees / Event Crew) users can access the ALLOWME interfaces, either Portal or Admin, via the Internet. The system is compatible with all major browsers and device formats. Each client specific instance of ALLOWME is hosted on the Amazon Web Services Cloud and dependent on the client s location we would choose the relevant hosting location. For standard EU based event deployments we use AWS EU West, based in Ireland. For international events we would use the most regionally available AWS location US (Virginia / Oregon) Asia Pacific (Singapore / Sydney). Once onsite, during event operations, our standard setup would be to install a physical server at the venue, which uses event driven replication to remain sync d with the cloud/web servers. The onsite server would also handle the RFID Scanning hardware, if this were part of the chosen package. The make up and mechanics of the onsite server have all been built and developed in house to provide you with the most robust system possible. Using a transactional queuing system to process new and updated information, the server is built to withstand network and connection downtime.
3 ALLOWME FEATURE OVERVIEW The two main views of ALLOWME are the front/public facing online Portal and the back-end Administrative Interface. The Portal is created to gather specific/required data from customers, suppliers, contractors, guests, VIPs, talent, competitors etc when applying for accreditation for a particular event. The Portal itself is fully customisable and can only be accessed by those invited by the client through a HTTPS encrypted URL. Invited users will be sent a unique set of login credentials and would be asked to provide the required data needed for the client to process an accreditation request for their event. The information gathered from the request is fed directly into the back-end Admin Interface. The Admin Interface is only for the client s use and their authorised agents. This system is used to collate all the data and requests handled by the Portal and display them in a methodical manner, for processing, management, approval and issue. This software is designed to be used both pre event and during live, operational periods, as well as integrating seamlessly to control bolt on RFID hardware if required. Alongside, and linked to, the ability to create and manage pass/accreditation request, the ALLOWME Admin Interface offers the user a plethora of features. In relation to creating passes, the admin user has the ability to capture photos through their web browser, using the built in webcam or an external USB camera. This is also true of smart phones and tablets, with ALLOWME built to offer the front end and back end user the option to capture and upload a selfie through their device. ALLOWME also carries a built in printing service, to print passes/accreditation within the system itself. The pass print out design is fully customisable, batch job friendly and requires no additional program to run the function. There is also the ability to setup unlimited print rules and definitions to ensure passes are printed exactly how you wish, with no added workload. If the client/event has chosen to use SCANME (RFIDentikit RFID System), ALLOWME really comes into it s own with many linked features, not only to control the hardware, but to collect and process relative data. In addition to the enhanced security benefits of using RFID tagged passes, the custom built system can offer invaluable information to the event organiser. With one click RFID tag assignment, live messaging and real time tracking all housed within the same ALLOWME software package, it really becomes the one stop shop for event management.
4 ALLOWME SECURITY OVERVIEW ALLOWME was built & developed with security as a priority and this continues to be one of the main focuses of projects carried out by RFIDentikit. With systems in place to protect sensitive personal data, as well as event specific data, ALLOWME is a trusted piece of software for use across the events industry. Here are the key security features of ALLOWME: - ALLOWME is hosted & controlled by RFIDentikit and is continual monitored, with client permission, to ensure security of each instance in operation. RFIDentikit value the security of its system and its client s data with the upmost importance. - The system runs on a Debian Linux Platform, which is proven to be more sophisticated and less vulnerable than Microsoft Windows. - RFIDentikit use Amazon AWS servers to host all of its Internet based cloud servers. Alongside the built in security features of ALLOWME, using AWS not only gives us flexibility, but we also benefit from Amazon s own security systems to further enhance the safety of our customer data. - Each instance of ALLOWME is setup on its own specific server(s), to allow for complete control, security and customisation. - An event specific system can be configured over two separate servers for increased security. With the front end Portal hosted on a public server, the backend Admin Interface can be hosted on a separate private server. As well as the standard, compulsory, unique logon credentials into both the front-end and back-end, this private server access can be restricted further with IP Address specific access. - User access of the Admin Interface can be restricted over multiple layers, both data specific as well as functional limits. Permissions for individual Admin Users are all configurable & scalable within ALLOWME and can be set to restrict; approval rights, functionality access, individual/organisational data protection and group only views. - Likewise, Portal access and the data available to the end user can also be controlled through configuration of ALLOWME, from Organisation or Group specific views, all the way down to a restricted view for an individual. - Access to the ALLOWME Compliance Module is also configurable to be user specific, giving individual rights to vet and filter user access to the system and ultimately the event itself. - Access and operation of both the Admin Interface and the front facing Portal is via a HTTPS encrypted connection to protect processes and data over the Internet. - Access to both the Admin Interface and the front facing Portal is password protected, with separate credentials required to access each area of the system. - All customer and event specific data is stored within a protected Amazon AWS server, which can be accessed (with the correct permissions) via ALLOWME and several secure, in house, administrative systems. All aspects of the pass request process are logged and audited to ensure that permitted users can track each step from submission, compliance and approval, through to zone/date changes, pass printing and issuing.
5 RFIDENTIKIT DATA PROTECTION COMPLIANCE The Data Protection Act stipulates that anyone processing personal data must comply with Eight Principles of good practice. RFIDentikit enforces these principles with ALLOWME as well as its other products and data passed between. Data Protection Principle Shall be processed fairly and lawfully and in particular, shall not be processed unless specific conditions are met; Shall be obtained only for one or more specified and lawful purposes and shall not be further processed in any manner incompatible with that purpose or those purposes; Shall be adequate, relevant and not excessive in relation to the purpose or purposes for which it is processed; Shall be accurate and where necessary, kept up to date; Shall not be kept for longer than is necessary for that purpose or those purposes; Shall be processed in accordance with the rights of data subjects under the Act; Shall be kept secure i.e. protected by an appropriate degree of security; Shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection. ALLOWME All pass/accreditation requests that are collected by ALLOWME, at the request of the client/event organiser, will follow the Data Protection Principles. The data collected will only be used for the purpose of a specific event or series of events. The data will not be used outside the scope of the original collection agreement. The data collected through ALLOWME would only ever be event specific. Collected on request of the client, as a condition of accrediting an individual, organisation or vehicle. The data is collected for the one off purpose but may be updated by the owner or, with their permission, by the client if necessary. Data is accessible at all times for amendment until its specified expiry date. The data collected will only be used for the specific event, series of events, or for the time schedule specified upon collection. Once the data reaches its expiry it will be completely destroyed from ALLOWME and any related RFIDentikit systems. The data collected through ALLOWME is done so in compliance with the Act. This compliance will be displayed to the user(s) on relevant Portal pages during the collection process. The data stored within RFIDentikit systems will only ever be accessible to the data owner, the contracted client and RFIDentikit permitted administrators. Data collected under the principles of the Data Protection Act will be hosted within the EU. RFIDentikit data holding hardware will not be permitted to travel outside the EU without explicit permission.
6 RFIDentikit will never own or withhold any data that is collected through any of its systems. All data used within ALLOWME and any related admin systems will be completely destroyed on completion of the specific project, including any backups and duplicates. RFIDentikit employees will only ever access personal data when permission is granted from the client for the purpose of event & system support. Personal data held can be made available upon written request from the individual. RFIDentikit Limited is registered with the Information Commissioner's Office under registration reference: ZA097570
Data protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationEnviro Technology Services Ltd Data Protection Policy
Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More informationUKIP needs to gather and use certain information about individuals.
UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:
More informationSecurity Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication
Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.
More informationSite Builder Privacy and Data Protection Policy
Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationThese pieces of information are used to improve services for you through, for example:
Eolach Accountants & Business Advisors Limited t/a McGinley & Co. Privacy Policy At Eolach Accountants & Business Advisors Limited t/a McGinley & Co. our policy is simple we understand the importance of
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationWIT Diverse Campus Services Ltd. Data Protection Policy
WIT Diverse Campus Services Ltd. Data Protection Policy Introduction WIT Diverse Campus Services Limited and/or its associated companies ( us or we ) have created this privacy statement to demonstrate
More informationElement Finance Solutions Ltd Data Protection Policy
Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationData Sharing Agreement. Between Integral Occupational Health Ltd and the Customer
Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services
More informationASSURECRM CUSTOMER RELATIONSHIP MANAGEMENT PRODUCT INFORMATION & USER GUIDE
ASSURECRM CUSTOMER RELATIONSHIP MANAGEMENT PRODUCT INFORMATION & USER GUIDE 6001 Beach Road, #18-07, Singapore 199589 Page 1 of 21 1. AssureCRM The importance of keeping track of our engagements with other
More informationData Protection Policy
Data Protection Policy Introduction WIT Diverse Campus Services Limited (herein after referred to as DCS) and/or its associated companies ( us or we ) have created this privacy statement to demonstrate
More informationPrivacy Policy Inhouse Manager Ltd
Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationUCSU Student and Applicant Data Privacy Statement
UCSU Student and Applicant Data Privacy Statement Version number: 1.0 Policy Owner: Data Protection Officer Last Revised: May 2018 Review Date: July 2018 This document is to be reviewed biannually (January
More information"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.
Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and
More informationDe Montfort Students Union Student Data Privacy Statement
De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations
More informationCreative Funding Solutions Limited Data Protection Policy
Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationApplication Control Review. August 4, 2012
Application Control Review August 4, 2012 Application Controls Review - Scope Web security Access Controls Password Controls Service Level Agreement Database Access Controls Perimeter Security Controls
More informationThis Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.
Privacy Policy Background This policy explains when and why we collect personal information about you; how we use it, the conditions under which we may disclose it to others and how we keep it secure.
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller
More informationUnderstand & Prepare for EU GDPR Requirements
Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the
More informationCPM. Quick Start Guide V2.4.0
CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationPRIVACY POLICY. 1. Introduction
PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationSC Common Reporting (ComRep) Portal User Manual
SC Common Reporting (ComRep) Portal User Manual 1 Contents Page 1. Introduction 1.1 Overview of ComRep portal: brief overview and explanation on ComRep objectives, features and user roles. 3 2. Get Started
More informationSecuring Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.
Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new
More informationOptiSol FinTech Platforms
OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India
More informationgoaml Web User s Guide Chapter 1 Registration
goaml Web User s Guide Chapter 1 Registration version 2.1 Prepared By: Last Edited: Information Technology Service (ITS) 02/03/2016 VP/KR FIU Mauritius Effective March 2016 Page 1 of 14 Ext/goAML4.2/v2.1.
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationData Protection Policy - Sustainable Hackney
Data Protection Policy - Summary This policy sets out how manages and protects the personal data that we collect in the course of our activities. It sets out how we apply the principles of data protection,
More informationMedical Sciences Division IT Services (MSD IT)
Medical Sciences Division IT Services (MSD IT) Security Policy Effective date: 1 December 2017 1 Overview MSD IT provides IT support services support and advice to the University of Oxford Medical Sciences
More informationPRIVACY POLICY BACKGROUND:
PRIVACY POLICY BACKGROUND: SA Designer Parfums Limited understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationGDPR Compliance. Clauses
1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More information3D SAFETY FREQUENTLY ASKED QUESTIONS - FAQS
3D SAFETY FREQUENTLY ASKED QUESTIONS - FAQS 3D Safety PO Box 650 Botany NSW 1455 T: 1300 663 195 F: 1300 663 495 www.3dsafety.com.au FREQUENTLY ASKED QUESTIONS (FAQS) The answers are based on a Windows
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v6 Cloud Services Quick Start Guide Tuesday, 20 May 2014 1 P a g e X I A C o n f i g u r a t i o n C l o u d S e r v i c e s Contents Overview... 3 Creating
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More informationAnsible Tower Quick Setup Guide
Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup
More informationTIA. Privacy Policy and Cookie Policy 5/25/18
TIA Privacy Policy and Cookie Policy 5/25/18 Background: TIA understands that your privacy is important to you and that you care about how your information is used and shared online. We respect and value
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationCopyright Samsung Electronics Co., Ltd. All rights reserved.
CONTENTS Copyright 2014 Samsung Electronics Co., Ltd. All rights reserved. It is subject to Apache License, Version 2.0 (hereinafter referred to as the "License"). You may not use this file except in compliance
More informationCOMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy
COMPUTER & INFORMATION TECHNOLOGY CENTER Information Transfer Policy Document Controls This document is reviewed every six months Document Reference Document Title Document Owner ISO 27001:2013 reference
More informationWhat is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller
A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation
More informationPainChek Web Admin Portal User Guide. WAP User Guide
PainChek Web Admin Portal User Guide WAP User Guide Exported on 09/14/2017 1 Table of Contents 1 Table of Contents...2 2 General Instructions for Use...5 2.1 Overview...5 2.2 Intended Use...5 2.3 Users...5
More informationBlue Alligator Company Privacy Notice (Last updated 21 May 2018)
Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration
More informationeservice The simple way to manage your Ricoh products RICOH eservice User Guide
eservice The simple way to manage your Ricoh products RICOH eservice User Guide The eservice portal is designed with ease-of-use in mind, allowing you to submit queries and information relating to your
More informationSecurity Principles for Stratos. Part no. 667/UE/31701/004
Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED
More informationCompliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security
Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED
More informationInstitute of Technology, Sligo. Information Security Policy. Version 0.2
Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date
More informationSaba Hosted Customer Privacy Policy
Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data
More informationTrinity Multi Academy Trust
Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope
More informationSecurity & Compliance in the AWS Cloud. Amazon Web Services
Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any
More informationDCCVITAL GDPR Privacy Statement. This privacy statement sets out
DCCVITAL GDPR Privacy Statement This privacy statement sets out what information DCCVITAL collects from you and why; how DCCVITAL uses and protects any information that you give; and how you can access
More informationEnterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud
Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI
More informationHow the GDPR will impact your software delivery processes
How the GDPR will impact your software delivery processes About Redgate 230 17 202,000 2m Redgaters and counting years old customers SQL Server Central and Simple Talk users 91% of the Fortune 100 use
More informationASD CERTIFICATION REPORT
ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon
More informationA Homeopath Registered Homeopath
A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationEight Minute Expert GDPR
Eight Minute Expert GDPR GDPR Login Password MIN1 What is the GDPR? The General Data Protection Regulation is a new regulation by the EU that will replace the current Data Protection Directive of 1995.
More informationSecurity & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web
Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS
More informationHosts have the top level of webinar control and can grant and revoke various privileges for participants.
Introduction ClickMeeting is an easy-to-use SaaS webinar platform used worldwide. It was built using highend technology, with data security as the highest priority. The platform meets stringent security
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY MYLAPS (as defined in Article 10 (Contact with MYLAPS) below and hereinafter also referred to as we and us ) respects your privacy and ensures that your personal data are handled
More informationBox Competitive Sheet January 2014
This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when
More informationSparta Systems Stratas Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationLearning & Development Online. Quick reference Guide. Version 2.0. Page 1
Learning & Development Online Quick reference Guide Version 2.0 Page 1 Contents Accessing Learning & Development Online... 3 Logging into Learning & Development Online... 4 First time users... 4 Existing
More informationRegions Quick Deposit
Regions Quick Deposit Frequently Asked Questions It s time to expect more. Regions Bank Member FDIC Revised April 2016 Regions Quick Deposit Note: Select a question below to view the answer. Where can
More informationContract Services Europe
Contract Services Europe Procedure for Handling of Page 1 of 10 1. INTRODUCTION This procedure document supplements the data request and subject access request (SAR) provisions set out in DPS Contract
More informationGateHouse Logistics. GateHouse Logistics A/S Security Statement. Document Data. Release date: 7 August Number of pages: Version: 3.
Document Data Release date: Number of pages: Version: 7 August 2018 11 3.1 Version: 3.1 I Page 1/11 Table of Contents 1 Policies and Procedures... 4 1.1 Information Security Management... 4 1.2 Human Resources
More informationVodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0
Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.
More informationCardiff University Security & Portering Services (SECTY) CCTV Code of Practice
Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date
More informationNTP Software VFM Administration Web Site
NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of
More information5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented.
Annex to the Financial Services Businesses Handbook Using Technology in the Customer Due Diligence Process A.1. Technology Risk Evaluation 1. A financial services business must, prior to deciding whether
More informationDeep Freeze Cloud. Architecture and Security Overview
Deep Freeze Cloud Architecture and Security Overview 2018 Faronics Corporation or its affiliates. All rights reserved. NOTICE: This document is provided for informational purposes only. It represents Faronics
More informationCPM Quick Start Guide V2.2.0
CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup
More informationOracle Utilities Mobile Workforce Management
Oracle Utilities Mobile Workforce Management Mobile Application User s Guide Release 2.1.0 Service Pack 5 E26618-06 October 2013 , Release 2.1.0 Service Pack 5 E26618-06 Copyright 2000, 2012, 2013 Oracle
More informationHallmark Solutions Limited PRIVACY NOTICE
Hallmark Solutions Limited PRIVACY NOTICE Who We Are Hallmark Solutions Limited specialise in the delivery of IT related projects, including consultancy, project management, software development and training.
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationThe isalon GDPR Guide Helping you understand and prepare for the legislation
The isalon GDPR Guide Helping you understand and prepare for the legislation 01522 887200 isalonsoftware.co.uk Read our guide today to help you plan for the new legislation.. The General Data Protection
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationWhitepaper on EU Data Protection October 2014
Whitepaper on EU Data Protection October 2014 (Please see http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper, and http://aws.amazon.com/de/data-protection/ for the German
More informationACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION
ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or
More informationAIRMIC ENTERPRISE RISK MANAGEMENT FORUM
AIRMIC ENTERPRISE RISK MANAGEMENT FORUM Date 10 November 2016 Name Nick Gibbons Position, PARTNER BLM T: 0207 457 3567 E: Nick.Gibbons@blmlaw.com SUMMARY Cyber crime is now a daily reality Every business
More informationOracle Real-Time Scheduler
Oracle Real-Time Scheduler Mobile Application User s Guide (HTML5-based) Release 2.2.0.3 E64164-01 May 2015 (HTML5-based), Release 2.2.0.3 Copyright 2000, 2015 Oracle and/or its affiliates. All rights
More informationNHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018
NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide
More informationTeamUSA Portal Games Delegation Management Instructions
This document includes the instructions to use TeamUSA Portal for Games Delegation Management. Updates to the system include: Managing your Assignments (all staff who may attend the Games & will need USOC
More informationSingle Sign-On. Introduction
Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More information