RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM

Size: px
Start display at page:

Download "RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM"

Transcription

1 RFIDENTIKIT - ACCREDITATION & PASS MANGEMENT SYSTEM BACKGROUND In 2014 RFIDentikit launched its Accreditation & Pass Management system, ALLOWME, to run seamlessly alongside its RFID Pass Scanning, sister product, SCANME. The software was produced and developed in house to provide event organisers with a sophisticated and robust system to use both pre event and on site. ALLOWME was built with large events in mind, but has the ability to be scaled up and down dependent on the client s particular requirements. The primary function of the software is to deliver a user friendly and secure system to manage individuals, organisations, vehicles and other attributes linked to a specific event.

2 SYSTEM ARCHITECTURE ALLOWME was written in PHP and runs on PHP 5.4, under Apache and against a My SQL database. The following diagram depicts a typical setup for deployment of the system; Administrative (Accreditation / Security Staff) and Public (Delegates / Attendees / Event Crew) users can access the ALLOWME interfaces, either Portal or Admin, via the Internet. The system is compatible with all major browsers and device formats. Each client specific instance of ALLOWME is hosted on the Amazon Web Services Cloud and dependent on the client s location we would choose the relevant hosting location. For standard EU based event deployments we use AWS EU West, based in Ireland. For international events we would use the most regionally available AWS location US (Virginia / Oregon) Asia Pacific (Singapore / Sydney). Once onsite, during event operations, our standard setup would be to install a physical server at the venue, which uses event driven replication to remain sync d with the cloud/web servers. The onsite server would also handle the RFID Scanning hardware, if this were part of the chosen package. The make up and mechanics of the onsite server have all been built and developed in house to provide you with the most robust system possible. Using a transactional queuing system to process new and updated information, the server is built to withstand network and connection downtime.

3 ALLOWME FEATURE OVERVIEW The two main views of ALLOWME are the front/public facing online Portal and the back-end Administrative Interface. The Portal is created to gather specific/required data from customers, suppliers, contractors, guests, VIPs, talent, competitors etc when applying for accreditation for a particular event. The Portal itself is fully customisable and can only be accessed by those invited by the client through a HTTPS encrypted URL. Invited users will be sent a unique set of login credentials and would be asked to provide the required data needed for the client to process an accreditation request for their event. The information gathered from the request is fed directly into the back-end Admin Interface. The Admin Interface is only for the client s use and their authorised agents. This system is used to collate all the data and requests handled by the Portal and display them in a methodical manner, for processing, management, approval and issue. This software is designed to be used both pre event and during live, operational periods, as well as integrating seamlessly to control bolt on RFID hardware if required. Alongside, and linked to, the ability to create and manage pass/accreditation request, the ALLOWME Admin Interface offers the user a plethora of features. In relation to creating passes, the admin user has the ability to capture photos through their web browser, using the built in webcam or an external USB camera. This is also true of smart phones and tablets, with ALLOWME built to offer the front end and back end user the option to capture and upload a selfie through their device. ALLOWME also carries a built in printing service, to print passes/accreditation within the system itself. The pass print out design is fully customisable, batch job friendly and requires no additional program to run the function. There is also the ability to setup unlimited print rules and definitions to ensure passes are printed exactly how you wish, with no added workload. If the client/event has chosen to use SCANME (RFIDentikit RFID System), ALLOWME really comes into it s own with many linked features, not only to control the hardware, but to collect and process relative data. In addition to the enhanced security benefits of using RFID tagged passes, the custom built system can offer invaluable information to the event organiser. With one click RFID tag assignment, live messaging and real time tracking all housed within the same ALLOWME software package, it really becomes the one stop shop for event management.

4 ALLOWME SECURITY OVERVIEW ALLOWME was built & developed with security as a priority and this continues to be one of the main focuses of projects carried out by RFIDentikit. With systems in place to protect sensitive personal data, as well as event specific data, ALLOWME is a trusted piece of software for use across the events industry. Here are the key security features of ALLOWME: - ALLOWME is hosted & controlled by RFIDentikit and is continual monitored, with client permission, to ensure security of each instance in operation. RFIDentikit value the security of its system and its client s data with the upmost importance. - The system runs on a Debian Linux Platform, which is proven to be more sophisticated and less vulnerable than Microsoft Windows. - RFIDentikit use Amazon AWS servers to host all of its Internet based cloud servers. Alongside the built in security features of ALLOWME, using AWS not only gives us flexibility, but we also benefit from Amazon s own security systems to further enhance the safety of our customer data. - Each instance of ALLOWME is setup on its own specific server(s), to allow for complete control, security and customisation. - An event specific system can be configured over two separate servers for increased security. With the front end Portal hosted on a public server, the backend Admin Interface can be hosted on a separate private server. As well as the standard, compulsory, unique logon credentials into both the front-end and back-end, this private server access can be restricted further with IP Address specific access. - User access of the Admin Interface can be restricted over multiple layers, both data specific as well as functional limits. Permissions for individual Admin Users are all configurable & scalable within ALLOWME and can be set to restrict; approval rights, functionality access, individual/organisational data protection and group only views. - Likewise, Portal access and the data available to the end user can also be controlled through configuration of ALLOWME, from Organisation or Group specific views, all the way down to a restricted view for an individual. - Access to the ALLOWME Compliance Module is also configurable to be user specific, giving individual rights to vet and filter user access to the system and ultimately the event itself. - Access and operation of both the Admin Interface and the front facing Portal is via a HTTPS encrypted connection to protect processes and data over the Internet. - Access to both the Admin Interface and the front facing Portal is password protected, with separate credentials required to access each area of the system. - All customer and event specific data is stored within a protected Amazon AWS server, which can be accessed (with the correct permissions) via ALLOWME and several secure, in house, administrative systems. All aspects of the pass request process are logged and audited to ensure that permitted users can track each step from submission, compliance and approval, through to zone/date changes, pass printing and issuing.

5 RFIDENTIKIT DATA PROTECTION COMPLIANCE The Data Protection Act stipulates that anyone processing personal data must comply with Eight Principles of good practice. RFIDentikit enforces these principles with ALLOWME as well as its other products and data passed between. Data Protection Principle Shall be processed fairly and lawfully and in particular, shall not be processed unless specific conditions are met; Shall be obtained only for one or more specified and lawful purposes and shall not be further processed in any manner incompatible with that purpose or those purposes; Shall be adequate, relevant and not excessive in relation to the purpose or purposes for which it is processed; Shall be accurate and where necessary, kept up to date; Shall not be kept for longer than is necessary for that purpose or those purposes; Shall be processed in accordance with the rights of data subjects under the Act; Shall be kept secure i.e. protected by an appropriate degree of security; Shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection. ALLOWME All pass/accreditation requests that are collected by ALLOWME, at the request of the client/event organiser, will follow the Data Protection Principles. The data collected will only be used for the purpose of a specific event or series of events. The data will not be used outside the scope of the original collection agreement. The data collected through ALLOWME would only ever be event specific. Collected on request of the client, as a condition of accrediting an individual, organisation or vehicle. The data is collected for the one off purpose but may be updated by the owner or, with their permission, by the client if necessary. Data is accessible at all times for amendment until its specified expiry date. The data collected will only be used for the specific event, series of events, or for the time schedule specified upon collection. Once the data reaches its expiry it will be completely destroyed from ALLOWME and any related RFIDentikit systems. The data collected through ALLOWME is done so in compliance with the Act. This compliance will be displayed to the user(s) on relevant Portal pages during the collection process. The data stored within RFIDentikit systems will only ever be accessible to the data owner, the contracted client and RFIDentikit permitted administrators. Data collected under the principles of the Data Protection Act will be hosted within the EU. RFIDentikit data holding hardware will not be permitted to travel outside the EU without explicit permission.

6 RFIDentikit will never own or withhold any data that is collected through any of its systems. All data used within ALLOWME and any related admin systems will be completely destroyed on completion of the specific project, including any backups and duplicates. RFIDentikit employees will only ever access personal data when permission is granted from the client for the purpose of event & system support. Personal data held can be made available upon written request from the individual. RFIDentikit Limited is registered with the Information Commissioner's Office under registration reference: ZA097570

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.

More information

Site Builder Privacy and Data Protection Policy

Site Builder Privacy and Data Protection Policy Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

These pieces of information are used to improve services for you through, for example:

These pieces of information are used to improve services for you through, for example: Eolach Accountants & Business Advisors Limited t/a McGinley & Co. Privacy Policy At Eolach Accountants & Business Advisors Limited t/a McGinley & Co. our policy is simple we understand the importance of

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

WIT Diverse Campus Services Ltd. Data Protection Policy

WIT Diverse Campus Services Ltd. Data Protection Policy WIT Diverse Campus Services Ltd. Data Protection Policy Introduction WIT Diverse Campus Services Limited and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

ASSURECRM CUSTOMER RELATIONSHIP MANAGEMENT PRODUCT INFORMATION & USER GUIDE

ASSURECRM CUSTOMER RELATIONSHIP MANAGEMENT PRODUCT INFORMATION & USER GUIDE ASSURECRM CUSTOMER RELATIONSHIP MANAGEMENT PRODUCT INFORMATION & USER GUIDE 6001 Beach Road, #18-07, Singapore 199589 Page 1 of 21 1. AssureCRM The importance of keeping track of our engagements with other

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction WIT Diverse Campus Services Limited (herein after referred to as DCS) and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

UCSU Student and Applicant Data Privacy Statement

UCSU Student and Applicant Data Privacy Statement UCSU Student and Applicant Data Privacy Statement Version number: 1.0 Policy Owner: Data Protection Officer Last Revised: May 2018 Review Date: July 2018 This document is to be reviewed biannually (January

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

De Montfort Students Union Student Data Privacy Statement

De Montfort Students Union Student Data Privacy Statement De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Application Control Review. August 4, 2012

Application Control Review. August 4, 2012 Application Control Review August 4, 2012 Application Controls Review - Scope Web security Access Controls Password Controls Service Level Agreement Database Access Controls Perimeter Security Controls

More information

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website,  , call or write to us. Privacy Policy Background This policy explains when and why we collect personal information about you; how we use it, the conditions under which we may disclose it to others and how we keep it secure.

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

Understand & Prepare for EU GDPR Requirements

Understand & Prepare for EU GDPR Requirements Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

SC Common Reporting (ComRep) Portal User Manual

SC Common Reporting (ComRep) Portal User Manual SC Common Reporting (ComRep) Portal User Manual 1 Contents Page 1. Introduction 1.1 Overview of ComRep portal: brief overview and explanation on ComRep objectives, features and user roles. 3 2. Get Started

More information

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd. Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new

More information

OptiSol FinTech Platforms

OptiSol FinTech Platforms OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India

More information

goaml Web User s Guide Chapter 1 Registration

goaml Web User s Guide Chapter 1 Registration goaml Web User s Guide Chapter 1 Registration version 2.1 Prepared By: Last Edited: Information Technology Service (ITS) 02/03/2016 VP/KR FIU Mauritius Effective March 2016 Page 1 of 14 Ext/goAML4.2/v2.1.

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

Data Protection Policy - Sustainable Hackney

Data Protection Policy - Sustainable Hackney Data Protection Policy - Summary This policy sets out how manages and protects the personal data that we collect in the course of our activities. It sets out how we apply the principles of data protection,

More information

Medical Sciences Division IT Services (MSD IT)

Medical Sciences Division IT Services (MSD IT) Medical Sciences Division IT Services (MSD IT) Security Policy Effective date: 1 December 2017 1 Overview MSD IT provides IT support services support and advice to the University of Oxford Medical Sciences

More information

PRIVACY POLICY BACKGROUND:

PRIVACY POLICY BACKGROUND: PRIVACY POLICY BACKGROUND: SA Designer Parfums Limited understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

3D SAFETY FREQUENTLY ASKED QUESTIONS - FAQS

3D SAFETY FREQUENTLY ASKED QUESTIONS - FAQS 3D SAFETY FREQUENTLY ASKED QUESTIONS - FAQS 3D Safety PO Box 650 Botany NSW 1455 T: 1300 663 195 F: 1300 663 495 www.3dsafety.com.au FREQUENTLY ASKED QUESTIONS (FAQS) The answers are based on a Windows

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v6 Cloud Services Quick Start Guide Tuesday, 20 May 2014 1 P a g e X I A C o n f i g u r a t i o n C l o u d S e r v i c e s Contents Overview... 3 Creating

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Ansible Tower Quick Setup Guide

Ansible Tower Quick Setup Guide Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup

More information

TIA. Privacy Policy and Cookie Policy 5/25/18

TIA. Privacy Policy and Cookie Policy 5/25/18 TIA Privacy Policy and Cookie Policy 5/25/18 Background: TIA understands that your privacy is important to you and that you care about how your information is used and shared online. We respect and value

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Copyright Samsung Electronics Co., Ltd. All rights reserved.

Copyright Samsung Electronics Co., Ltd. All rights reserved. CONTENTS Copyright 2014 Samsung Electronics Co., Ltd. All rights reserved. It is subject to Apache License, Version 2.0 (hereinafter referred to as the "License"). You may not use this file except in compliance

More information

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy COMPUTER & INFORMATION TECHNOLOGY CENTER Information Transfer Policy Document Controls This document is reviewed every six months Document Reference Document Title Document Owner ISO 27001:2013 reference

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

PainChek Web Admin Portal User Guide. WAP User Guide

PainChek Web Admin Portal User Guide. WAP User Guide PainChek Web Admin Portal User Guide WAP User Guide Exported on 09/14/2017 1 Table of Contents 1 Table of Contents...2 2 General Instructions for Use...5 2.1 Overview...5 2.2 Intended Use...5 2.3 Users...5

More information

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration

More information

eservice The simple way to manage your Ricoh products RICOH eservice User Guide

eservice The simple way to manage your Ricoh products RICOH eservice User Guide eservice The simple way to manage your Ricoh products RICOH eservice User Guide The eservice portal is designed with ease-of-use in mind, allowing you to submit queries and information relating to your

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Saba Hosted Customer Privacy Policy

Saba Hosted Customer Privacy Policy Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

Security & Compliance in the AWS Cloud. Amazon Web Services

Security & Compliance in the AWS Cloud. Amazon Web Services Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any

More information

DCCVITAL GDPR Privacy Statement. This privacy statement sets out

DCCVITAL GDPR Privacy Statement. This privacy statement sets out DCCVITAL GDPR Privacy Statement This privacy statement sets out what information DCCVITAL collects from you and why; how DCCVITAL uses and protects any information that you give; and how you can access

More information

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI

More information

How the GDPR will impact your software delivery processes

How the GDPR will impact your software delivery processes How the GDPR will impact your software delivery processes About Redgate 230 17 202,000 2m Redgaters and counting years old customers SQL Server Central and Simple Talk users 91% of the Fortune 100 use

More information

ASD CERTIFICATION REPORT

ASD CERTIFICATION REPORT ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

epldt Web Builder Security March 2017

epldt Web Builder Security March 2017 epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication

More information

Eight Minute Expert GDPR

Eight Minute Expert GDPR Eight Minute Expert GDPR GDPR Login Password MIN1 What is the GDPR? The General Data Protection Regulation is a new regulation by the EU that will replace the current Data Protection Directive of 1995.

More information

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS

More information

Hosts have the top level of webinar control and can grant and revoke various privileges for participants.

Hosts have the top level of webinar control and can grant and revoke various privileges for participants. Introduction ClickMeeting is an easy-to-use SaaS webinar platform used worldwide. It was built using highend technology, with data security as the highest priority. The platform meets stringent security

More information

GENERAL PRIVACY POLICY

GENERAL PRIVACY POLICY GENERAL PRIVACY POLICY MYLAPS (as defined in Article 10 (Contact with MYLAPS) below and hereinafter also referred to as we and us ) respects your privacy and ensures that your personal data are handled

More information

Box Competitive Sheet January 2014

Box Competitive Sheet January 2014 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Learning & Development Online. Quick reference Guide. Version 2.0. Page 1

Learning & Development Online. Quick reference Guide. Version 2.0. Page 1 Learning & Development Online Quick reference Guide Version 2.0 Page 1 Contents Accessing Learning & Development Online... 3 Logging into Learning & Development Online... 4 First time users... 4 Existing

More information

Regions Quick Deposit

Regions Quick Deposit Regions Quick Deposit Frequently Asked Questions It s time to expect more. Regions Bank Member FDIC Revised April 2016 Regions Quick Deposit Note: Select a question below to view the answer. Where can

More information

Contract Services Europe

Contract Services Europe Contract Services Europe Procedure for Handling of Page 1 of 10 1. INTRODUCTION This procedure document supplements the data request and subject access request (SAR) provisions set out in DPS Contract

More information

GateHouse Logistics. GateHouse Logistics A/S Security Statement. Document Data. Release date: 7 August Number of pages: Version: 3.

GateHouse Logistics. GateHouse Logistics A/S Security Statement. Document Data. Release date: 7 August Number of pages: Version: 3. Document Data Release date: Number of pages: Version: 7 August 2018 11 3.1 Version: 3.1 I Page 1/11 Table of Contents 1 Policies and Procedures... 4 1.1 Information Security Management... 4 1.2 Human Resources

More information

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0 Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

NTP Software VFM Administration Web Site

NTP Software VFM Administration Web Site NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of

More information

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented.

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented. Annex to the Financial Services Businesses Handbook Using Technology in the Customer Due Diligence Process A.1. Technology Risk Evaluation 1. A financial services business must, prior to deciding whether

More information

Deep Freeze Cloud. Architecture and Security Overview

Deep Freeze Cloud. Architecture and Security Overview Deep Freeze Cloud Architecture and Security Overview 2018 Faronics Corporation or its affiliates. All rights reserved. NOTICE: This document is provided for informational purposes only. It represents Faronics

More information

CPM Quick Start Guide V2.2.0

CPM Quick Start Guide V2.2.0 CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup

More information

Oracle Utilities Mobile Workforce Management

Oracle Utilities Mobile Workforce Management Oracle Utilities Mobile Workforce Management Mobile Application User s Guide Release 2.1.0 Service Pack 5 E26618-06 October 2013 , Release 2.1.0 Service Pack 5 E26618-06 Copyright 2000, 2012, 2013 Oracle

More information

Hallmark Solutions Limited PRIVACY NOTICE

Hallmark Solutions Limited PRIVACY NOTICE Hallmark Solutions Limited PRIVACY NOTICE Who We Are Hallmark Solutions Limited specialise in the delivery of IT related projects, including consultancy, project management, software development and training.

More information

Centrify Identity Services for AWS

Centrify Identity Services for AWS F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services

More information

The isalon GDPR Guide Helping you understand and prepare for the legislation

The isalon GDPR Guide Helping you understand and prepare for the legislation The isalon GDPR Guide Helping you understand and prepare for the legislation 01522 887200 isalonsoftware.co.uk Read our guide today to help you plan for the new legislation.. The General Data Protection

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

Whitepaper on EU Data Protection October 2014

Whitepaper on EU Data Protection October 2014 Whitepaper on EU Data Protection October 2014 (Please see http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper, and http://aws.amazon.com/de/data-protection/ for the German

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM AIRMIC ENTERPRISE RISK MANAGEMENT FORUM Date 10 November 2016 Name Nick Gibbons Position, PARTNER BLM T: 0207 457 3567 E: Nick.Gibbons@blmlaw.com SUMMARY Cyber crime is now a daily reality Every business

More information

Oracle Real-Time Scheduler

Oracle Real-Time Scheduler Oracle Real-Time Scheduler Mobile Application User s Guide (HTML5-based) Release 2.2.0.3 E64164-01 May 2015 (HTML5-based), Release 2.2.0.3 Copyright 2000, 2015 Oracle and/or its affiliates. All rights

More information

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide

More information

TeamUSA Portal Games Delegation Management Instructions

TeamUSA Portal Games Delegation Management Instructions This document includes the instructions to use TeamUSA Portal for Games Delegation Management. Updates to the system include: Managing your Assignments (all staff who may attend the Games & will need USOC

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information