National Infrastructure Group. Paul McLaren (Updated by Russell Fleming and Stuart Graham)

Size: px
Start display at page:

Download "National Infrastructure Group. Paul McLaren (Updated by Russell Fleming and Stuart Graham)"

Transcription

1 Document Control Document Title Infrastructure Standard Version 2.0 Owner Authors National Infrastructure Group Paul McLaren (Updated by Russell Fleming and Stuart Graham) Created date 5 th August 2013 Compliance See guidance in section 2 Reviewers Distribution and National Infrastructure Group, National Application Group, ehealth Leads, ehealth Architecture and Design Version Control Date Version Author Changes 05/08/ Paul McLaren Initial draft 26/08/ Paul McLaren Comments from John Light, NHS GGC 16/09/ Paul McLaren Updated following review by National Infrastructure Group on 30/08/ /09/ Paul McLaren Minor updates to wording in section /11/ Paul McLaren Update following review by National Applications Group 13/01/ Paul McLaren Update to Infrastructure Management section. 03/02/ Paul McLaren Sign off by ehealth Leads Group 02/05/ Paul McLaren Amend regarding version of Win 7 to include both 32 and 64 bit. 12/08/ Russell Fleming & Stuart Graham Major revision to ensure versioning complies with product support lifecycles. 07/02/ Russell Fleming Added a specific green ICT & environmental regulations section to make them clearer. 20/02/ Russell Fleming Added exception governance statement Page 1 of 13

2 06/03/ Russell Fleming Sign off by ehealth Leads Group Page 2 of 13

3 Infrastructure Management (within local Boards) Governance (supported by National Infrastructure Group) 1. Overview This standard describes the hardware and software specifications for infrastructure in NHSScotland. It aims to benefit a number of audiences to ensure they are making informed decisions based on the actual availability of IT infrastructure. The standard replaces the NHS Scotland Personal Computer Standard to provide wider coverage of the infrastructure stack, covering the following infrastructure elements and describing the specification for each: User directory services, authentication by single sign on Applications browsers, productivity, and core business functionality (excludes line of business and clinical) Client hardware, operating systems for PCs, laptop, tablet and mobile devices Server hardware, storage, operating systems, databases and web hosting Hosting data centres and computer rooms within Boards and beyond Network connectivity within premises, between locations and to other networks Adherence to the standard will support Boards in local planning, aid procurements by providing specifications and assist suppliers to provide solutions that can integrate with the NHSScotland infrastructure, therefore leading to more effective solution delivery. It should also be noted that NHSScotland seeks to ensure that single supplier dependencies are minimised and that lock-in to additional products is avoided to limit exposure to hidden TCO increases. The standard is also supported by roadmaps documenting the lifecycles of each of the elements within the standard, supporting transition and providing advance notification of product end of life. 2. Compliance For Boards: The standard provides Boards with a specification to which infrastructure within their Board should comply. For Suppliers: The standard provides suppliers with a specification to which their solutions must comply. Suppliers should ensure their solutions can be deployed, function and integrate where required with all the relevant specifications detailed in the standard. Page 3 of 13

4 For non-compliant solutions which require specifications out-with those in the standard then appropriate consultation should be undertaken with infrastructure teams at a local, regional or national level to consider the implications of the increased support and both cost and risk implications the non-standard product(s) introduce. Page 4 of 13

5 3. Specification The following tables detail the specification for each section of the infrastructure stack. Where a product is specified it should be assumed that product or equivalent is acceptable for Boards to have available. User Recommended specifications for directory services and authentication. Type Directory Services Authentication Single Sign On Specification Detail Minimum: Microsoft Active Directory managed by Health Board Desirable: Support for federated directory services Minimum: Microsoft Active Directory managed by Health Board Desirable: Support for claims aware federated directory support Minimum: Imprivata OneSign 4.x (latest major version -1). Desirable: Imprivata OneSign 5.x (latest major version) On Roadmap Applications Recommended specifications for browsers, productivity and core business functionality (excludes line of business and clinical). Type Application Delivery Specification Detail Methods of application delivery are, in order of preference: i. compliance with the Web Browser specification. ii. iii. packaged applications for deployment by Health Board client management tools delivery of application by desktop virtualisation or thin client technologies On Roadmap Installing or running of applications should not require elevated rights for the logged on user Page 5 of 13

6 Web Browser Minimum: Solutions must be HTML5 compliant and should be tested on IE11 Desirable: Solution are also tested for compliance with latest versions of Chrome, Firefox and Safari, as well as leading mobile browser platforms (ios, Android, Windows 10) Web Components Productivity Security Client Management Minimum: Java SE 7.x Desirable: Java SE 8.x Microsoft Office: Minimum: Microsoft Office 2007 Standard Edition Desirable: Microsoft Office 2016 Aspirational: Microsoft Office 365 Open source alternative with Health Board agreement, however, the solution must be open standards compliant. Adobe Acrobat Reader: Minimum Version 11.x.x (latest available version -1) Desirable: Acrobat Reader DC (latest available version) Health Board specified solutions offering following: Anti-virus active and managed by local Health Board Client Firewall optional Anti-malware optional Encryption per the Mobile Data Protection Standard (ref 1) USB port control optional Preboot authentication - optional Faulty and end of life hard disks are to be shredded or securely wiped and a ful;l audit trail of the process is to be maintained by the Health Board. Health Boards specified solution offering following: Hardware asset management Imaging Endpoint location information Remote support Application deployment Operating system patch deployment Application patch deployment Software asset management and licence metering Local Session Data Session data created by applications should not retained on endpoint (e.g. local copies of databases and similar) Page 6 of 13

7 Screensaver NHSScotland approved security screensavers, in addition to any local images, with a screen locking function enabled. Client Recommended specifications for hardware, operating systems for PCs, laptop, tablet and mobile devices. Type Specification Detail On Roadmap Operating System: Minimum: Windows 7 32 bit and 64 bit Desirable: Windows bit and 64 bit Processor: Windows 7 compliant minimum Memory: Windows 7 compliant minimum+, recommended Desktop/Laptop 2Gb Disk: Minimum to meet local requirements, additional spare space varies locally Screen Resolution: native to monitor with minimum 1024x bit minimum up to 32 bit colour quality Tablet and Mobile Device Tablet and Mobile Device hardware should be bought from the National contract to ensure that it is the latest compliant model. Server Recommended specifications for hardware, storage, operating systems, databases and web hosting. Type Hardware Virtualisation Specification Detail As specified by Health Board, either physical or virtual instance VMWare: Minimum: vsphere 5.5 (latest major release -1) Describable: vsphere 6.0 (latest major release) Hyper-V: Minimum: latest major release -1 Desirable: latest major release On Roadmap Page 7 of 13

8 Storage Operating System Database Web Hosting Backup As specified by Health Board, either physically attached or SAN Windows Server: Minimum: 2008 R2 SP1 Desirable: 2012 R2 Red Hat Enterprise Linux Minimum: Latest major release -1 Desirable: Latest major release SQL Server Minimum: 2012 R2 Desirable: 2016 Oracle products per the NHS Scotland EWA (ref 4) IIS: Minimum: 7.x Desirable: 8.x Apache Tomcat: Minimum: 8.x Desirable: 9.x As specified by Health Board, in line with existing Health Board solution and backup policies. Hosting Recommended specifications for data centres and computer rooms within Health Boards and beyond. Type General Rack Environment Specification Detail As specified by Health Board but recommended TIA-942 / Uptime Institute Tier-2 availability minimum (with aspects of Tier-3 such as dual PSU s in all servers, storage and networking devices). Availability in agreement with local Health Board, specification to Electronic Industries Alliance standard 19 rack mount. As specified by local Health Board but recommended: N+1 cooling capacity, minimum dual units Hot/Cold aisle configuration, maximising power utilisation efficiency. Target PUE <1.5 On Roadmap Page 8 of 13

9 Power Access As specified by local Health Board but recommended: Dual incoming supplies N+N capacity Dual UPS N+N capacity Each supply has own distribution board Each rack is supplied with 32A Commando connection from each supply Desirable: Power Monitoring with separate monitoring for IT Infrastructure and Environmental controls Physical site and equipment access in line with Health Board arrangements Remote support in line with Health Board arrangements and security policies. Access control policies should be appropriate for each security level Network Recommended specifications for connectivity within premises, between locations and to other networks. Type Local Area Wireless Local Area Wide Area Security Video Services Specification Detail Minimum: 100Mb/s to wired client devices. Desirable: 1Gb/s to wired client devices. IEEE ac standard. Secure access to be provided for staff and option to allow guest access on a separate VLAN. NHSScotland sites are connected by SWAN and COINs. Site bandwidth varies from 512kb/s to 1Gb/s (10Gb/s for some COIN backbones) with QoS for selected national applications. Asynchronous and synchronous technologies are in use. Firewalls in place between internal networks and all external environments, including SWAN, direct ISP Internet, and partner organisations such as councils, and other public sector. Configurations changes in agreement with local Health Board. Compliance with NHSScotland Video Conferencing Standard (ref 2) On Roadmap Page 9 of 13

10 Green ICT compliance Recommended environmental specifications for data centres and computer rooms within Health Boards. Health Boards and suppliers should ensure compliance with the EU Code of Conduct for Data Centre Energy Efficiency (reference 3) and the Scottish Public Sector Green ICT Strategy (reference 5). Some high level guidance is provided below: Green ICT Summary of Legislation and Scottish Government Policy The Scottish Government Green ICT policy is not itself underpinned by legislation or mandation. It will, however, contribute to the mandatory and reporting elements established in other aspects of Scottish Government Legislation and policy initiatives. NHS Scotland Boards and Suppliers should comply with the following aspects of legislation: Procurement Reform (Scotland) Act, 2014 The sustainable procurement duty of The Procurement Reform (Scotland) Act, 2014 (reference 6) refers to the environment, and requires authorities to produce procurement strategies and annual reports. The key element pertinent to the Green ICT strategy is that before carrying out a regulated procurement initiative, public authorities should consider how in conducting the procurement process they can improve the economic, social, and environmental wellbeing of the authority s area. Climate Change (Scotland) Act, 2009 The Climate Change (Scotland) Act, 2009 (reference 7), sets out targets to reduce Scotland s greenhouse gas emissions by at least 42% by 2020 and 80% by 2050, compared to a baseline. The Act requires Scottish Ministers to set annual targets for Scottish emissions from 2010 to 2050, and publish a report on proposals and policies setting out how Scotland can deliver annual targets for reductions in emissions. Waste Electrical and Electronic Equipment (WEEE) The EC Directive on Waste Electrical and Electronic Equipment (2002/96/EC) was made law in the UK IN The WEEE regulations (reference 8) have interdependencies with the Scottish Landfill Tax (reference 9) which came into force in April 2015, and also with Scotland's Zero Waste Plan (reference 10). WEEE obligations do not cover all aspects of waste and asset disposal (e.g. data removal and destruction). The Green ICT Lifecycle: Green ICT aims at reducing emissions and other waste produced across the ICT lifecycle from procurement, to operational use, to disposal. Page 10 of 13

11 Procurement Dispopsal Operations Procurement Principles: Consider extending life of existing systems Go for services not assets: Cloud services, virtualise, consolidate Packaging reduction, re-use, repair and re-cycling methods Operations Principles Minimise Power consumption Follow data centre standards for efficient operations to help reduce power consumption. Develop a roadmap for the transition from hosting own data to hosting in cloud based services to further reduce power consumption Reduce paper consumption Embed green behaviours in operational practices and services Disposal Principles: Repair before disposal Re-use and refurbish Re-cycle in line with regulations Clean and re-sell/donate Dispose in line with regulations Environmental Standards and PUE - Energy use and environmental impact: It is well recognised that data centres are large consumers of energy, the main areas are IT power and ancillary/cooling power. The only credible and widely accepted energy performance rating system for data centres is the Power Usage Effectiveness (PUE) rating where the most efficient score is 1. Page 11 of 13

12 The rating is calculated by dividing the total data centre load by the IT load. PUE Rating Level of Efficiency >3 Very Inefficient 2.5 Inefficient 2 Average 1.5 Efficient 1.2 Very Efficient The Target for Data Centres hosted by NHSS Boards is <1.5 PUE Infrastructure Management The following should be noted: Health Boards manage and operate their ehealth infrastructure services locally to ITIL aligned processes. Suppliers and their service desks should equally be ITIL aligned. Change control or similar requests may require approval by a Board Design Authority or CAB. Suppliers should provide sufficient advance notice for planned works so Health Board approval can be agreed. Changes should be scheduled for an agreed time that causes least disruption to the business. Exceptions to the Standard Where there is a need to deviate from the Infrastructure Standard, then a request must be submitted in writing to the Chair of the National Infrastructure Group. All requests will be considered by the National Infrastructure Group and a written response will be provided outlining the decision. Governance Where there is a requirement for approval and sign off various groups and Management Boards exist within NHSScotland. The process to be followed for approval will vary dependent on the financial levels and operational impact of the request. ehealth Governance has the following structure for infrastructure decision making and sign off: ehealth Strategy Board ehealth Programme Board ehealth Leads Group Page 12 of 13

13 National Infrastructure Group (acting on behalf of the Infrastructure Portfolio Management Group) Health Board ehealth/infrastructure Management A number of other advisory groups exist (Information Governance, Security etc.) that may provide input if required. Review This standard will be reviewed every 6 months, indicated by the published date. Individual sections may be reviewed out of sequence as required. The next scheduled review date is: September References 1. Mobile Data Protection Standard: 3. EU Code of Conduct on Data Centre Energy Efficiency (2016 Best Practice Guidelines): /2016_best_practice_guidelines_v7.1.2.pdf 4. NHSScotland Oracle Enterprise Wide Agreement (EWA) products available on this agreement available on request. 5. The Scottish Public Sector Green IT Strategy (2015): 2. Video Conferencing Standard: The Procurement Reform (Scotland) Act, 2014: creformact 7. The Climate Change (Scotland) Act, 2009: 8. The EC Directive on Waste Electrical and Electronic Equipment (WEEE) (2002/96/EC): 9. The Scottish Landfill Tax: Scotland s Zero Waste Plan: Page 13 of 13

NHSScotland. National ICT Infrastructure Standard and 2021 Target Operating Model

NHSScotland. National ICT Infrastructure Standard and 2021 Target Operating Model NHSScotland National ICT Infrastructure Standard and 2021 Target Operating Model 1 Document Control Document Title NHSScotland ICT Infrastructure Standard and 2021 Target Operating Model Version 1.0 Owner

More information

Green IT (ICT) (Accredited by British Computer Society)

Green IT (ICT) (Accredited by British Computer Society) Green IT (ICT) (Accredited by British Computer Society) 1. What is Green IT? An Overview (4 hrs)* 1.1. Understand the overall need for an organization to adopt a Green IT strategy. (30 - The reality of

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

SOE GUIDELINE STANDARD OPERATING ENVIRONMENT GUIDELINE

SOE GUIDELINE STANDARD OPERATING ENVIRONMENT GUIDELINE SOE GUIDELINE Massey University Information Technology Services (ITS) support a Standard Operating Environment (SOE) for desktop and notebook computers. The SOE is designed to ensure that the large number

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

WEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd

WEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd WEEE disposal and the creation of social value Jon Selby Tier 1 Asset Management Ltd Why is Tier 1 here this evening? Every business needs to consider these Social Responsibility Data Security Cost Peace

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Green ICT INSERT PHOTO HERE. Implementing environmentally friendly ICT practices 26 February 2008

Green ICT INSERT PHOTO HERE. Implementing environmentally friendly ICT practices 26 February 2008 Green ICT INSERT PHOTO HERE Implementing environmentally friendly ICT practices 26 February 2008 Welcome (8:00am) Paul Engelman Why go green? (8:05am) Kent Davey ICT contract provisions for environmental

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK IN THE FRAME Computacenter Public Sector Frameworks FRAMEWORK SOLUTION PUBLIC SECTOR FRAMEWORK ACCELERATE TRANSFORMATION Put digitalisation in the fast lane with cost-effective, compliant and centralised

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

uk green ict programme - the virtuous triangle

uk green ict programme - the virtuous triangle Guildford Branch Surrey University 23 May 2013 Bob Crooks Green ICT Lead, Dept Env Food & Rural Affairs Chair BCS Green IT Specialist Group uk green ict programme - the virtuous triangle Not only Climate

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

The ehealth Annual Report aims to highlight the activities within the teams that make up the ehealth Department.

The ehealth Annual Report aims to highlight the activities within the teams that make up the ehealth Department. Board paper 18/41 THE STATE HOSPITALS BOARD FOR SCOTLAND Date of Meeting: 28 June 2018 Agenda Reference: Item No: 21 Sponsoring Director: Author(s): Title of Report: Purpose of Report: Finance and Performance

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Green Star Volume Certification. Process Guide

Green Star Volume Certification. Process Guide Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Repeatable IT Hub Rooms

Repeatable IT Hub Rooms Repeatable IT Hub Rooms Repeatable IT Hub Rooms Catalogue Reducing the cost of NCPI through standardisation Reducing the costs of NCPI through standardisation The UK Government s plan for growth, published

More information

Enterprise Architecture Technology Standards

Enterprise Architecture Technology Standards Platform Technical Requirements May 29, 2018 Enterprise Architecture Technology Standards Our Vision We will become the nation's model for delivery of technology, media, and contact center services for

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

EIM-POL Information Security Classification Policy

EIM-POL Information Security Classification Policy Plymouth University EIM-POL-001 - Information Security Classification Policy Author: Elena Menendez-Alonso (Data Architect) & Paul Ferrier (Enterprise Security Architect) Date: 11/01/2016 Security Level:

More information

TIBCO Nimbus Service

TIBCO Nimbus Service TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

How Green is Your ITIL?

How Green is Your ITIL? The Presentation Will Begin At 3PM EST How Green is Your ITIL? Karen Ferris Director of Macanta Consulting PTY LTD Most organizations are fighting the environmental impact of technology with more technology!

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

McClelland Report. John McClelland CBE, June 2011

McClelland Report. John McClelland CBE, June 2011 McClelland Report 2 The public sector is lagging where it should be and there is an opportunity to capture a multiplicity of benefits in radically changing how ICT is adopted and deployed and in how it

More information

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution.

Overview Cobweb s Acronis Backup Cloud service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. Overview Cobweb s service is a comprehensive, yet simple, flexible and cost-effective cloud backup solution. is an easy-to-use, cloud backup storage solution that enables companies to backup files, folders,

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018 1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess

More information

Hardware and Software Security

Hardware and Software Security Hardware and Software Security Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre

More information

SDL Privacy Policy Cloud Services

SDL Privacy Policy Cloud Services SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This

More information

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites

EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR For Viewer Sites Agenda 1 Introduction and EHR Security Policies Background 2 EHR Security Policy Overview 3 EHR Security Policy Assessment

More information

GP IT Re-Provisioning Update (February 2017)

GP IT Re-Provisioning Update (February 2017) GP IT Re-Provisioning Update (February 2017) Background The current GP IT Framework Agreements with EMIS and INPS commenced on 1 March 2010 Each Call-Off contract exists for seven years from the date it

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Green IT Challenges for the CIO

Green IT Challenges for the CIO Green IT Challenges for the CIO The impacts of climate change will become more serious as global warming continues whether this is disastrous will depend on how rapidly GHG concentrations increase and

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Technical Security Standard

Technical Security Standard Technical Security Standard Title: Minimum Controls TSS Version: 1.1 Effective Date July 2018 This Standard defines the minimum baseline security controls and Summary: processes required for a given Information

More information

McGill University Virtualization Service Description and Service Level Agreement

McGill University Virtualization Service Description and Service Level Agreement McGill University Virtualization Service Description and Service Level Agreement Document Control Revision No. Document Control Date Description Approved By 1.0 January 19, 2007 Creation of the document

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Managing The Infrastructure Of Data Centers

Managing The Infrastructure Of Data Centers Managing The Infrastructure Of Data Centers David Cuthbertson Square Mile Systems Ltd david.cuthbertson@squaremilesystems.com www.squaremilesystems.com Square Mile Background Develop toolsets, training

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Corporate Responsibility at Tieto. Overview

Corporate Responsibility at Tieto. Overview Corporate Responsibility at Tieto Overview Sustainability is the new norm According to the Intergovernmental Panel on Climate Change (IPCC), global emissions of greenhouse gases grew more quickly between

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Case Study: myaccount

Case Study: myaccount Case Study: myaccount mygovscot myaccount is the simple and secure sign-in service to access online public services provided by eligible public bodies in Scotland. It is the agreed national approach for

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Credentials Policy. Document Summary

Credentials Policy. Document Summary Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy

More information

Connected Health Principles

Connected Health Principles Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6

More information

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation WOSDEC: Privacy Policy West of Scotland Development Education Centre WOSDEC - (We) are committed to protecting and respecting your privacy. This policy sets out how the personal information we collect

More information

Mission Statement & Company Overview

Mission Statement & Company Overview STP_SOLUTIONS_Services_Brochure 13/09/2011 14:22 Page 1 SPECIALISTS IN PROVIDING NATIONWIDE WORKSPACE SOLUTIONS OFFICE REFURBISHMENT DATA CENTRES / DISASTER RECOVERY SITES ELECTRICAL & MECHANICAL INSTALLATIONS

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Procedure: Bring your own device

Procedure: Bring your own device Procedure: Bring your own device Purpose This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University s network or who use their personal

More information

Job Description. ICT Systems Administrator

Job Description. ICT Systems Administrator Job Description Job Title: Directorate: Responsible to: Job Purpose: ICT Systems Administrator Finance & ICT Directorate ICT Infrastructure Manager Support and assist the provision of a high quality and

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

Senior Manager Information Technology (India) Duration of job

Senior Manager Information Technology (India) Duration of job Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Assistant

More information

Policy. Business Resilience MB2010.P.119

Policy. Business Resilience MB2010.P.119 MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to

More information

ASD CERTIFICATION REPORT

ASD CERTIFICATION REPORT ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon

More information

Code Alert Customer Information Technology Requirements Series 30 Software

Code Alert Customer Information Technology Requirements Series 30 Software Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Mobile investment toolkit: Device selection considerations

Mobile investment toolkit: Device selection considerations Mobile investment toolkit: Device selection considerations Summary notes There are many mobile devices on the market today and the scope and capabilities of these devices will continue to change and improve

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Cloud Security Standards

Cloud Security Standards Cloud Security Standards Classification: Standard Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January 2018 Next

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Governing Body 313th Session, Geneva, March 2012

Governing Body 313th Session, Geneva, March 2012 INTERNATIONAL LABOUR OFFICE Governing Body 313th Session, Geneva, 15 30 March 2012 Programme, Financial and Administrative Section PFA FOR INFORMATION Information and communications technology questions

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

SBL Professional Services

SBL Professional Services SBL Professional Service Delivery Practice Operating from a secure facility in the UK, SBL are market leaders in the provision of Information Assurance Solutions. Within excess of 20 years experience of

More information

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems

The University of Texas at El Paso. Information Security Office Minimum Security Standards for Systems The University of Texas at El Paso Information Security Office Minimum Security Standards for Systems 1 Table of Contents 1. Purpose... 3 2. Scope... 3 3. Audience... 3 4. Minimum Standards... 3 5. Security

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information