ING PUBLIC KEY INFRASTRUCTURE CODE OF CONDUCT FOR EMPLOYEE CERTIFICATES. Version November ING PKI Service
|
|
- Eric Lynch
- 6 years ago
- Views:
Transcription
1 ING PUBLIC KEY INFRASTRUCTURE CODE OF CONDUCT FOR EMPLOYEE CERTIFICATES Version November 2015 ING PKI Service
2 Information sheet Commissioned by Additional copies ING PKI Policy Approval Authority (PAA) of this document can be found at the ING PKI Intranet site: or requested at: ING PKI Service Centre PO Box BV Amsterdam the Netherlands E mail: pki@ing.com Document version control Date Version Changes All ING PKI documents can be found at: Documents relevant to non-ing are also available via the ING PKI Internet: Minor changes Bringing inline with other PKI Service Center documents Important Notice Abstract Audience References The information contained in this document is for internal purposes only and should not be made available to any person outside ING Group. 2015, ING Groep N.V.. All rights reserved. This Code of Conduct for the ING PKI Employee Certificates contains End-User specific rules with regard to being the Certificate Subject and user of a Certificate issued by the ING PKI Employee Certification Authority (CA), in accordance with the applicable ING PKI Certification Practice Statement (CPS) and ING PKI Employee Certificate Policy. The information contained in this document is intended for all End-Users of Certificates issued by the ING PKI Employee CA. In this Code of Conduct the term Employee represents any person working for ING, both internal employees (directly being paid by ING) and contractors, hired via any external party. ING PKI Certification Practice Statement ING PKI Employee Certificate Policy ING PKI Service Centre Code of Conduct for Employee Certificates, v 5.4 November 2015 Page 2 of 6
3 Contents 1 Code of Conduct for Employee Certificates Applicability Eligibility Use of Certificates Related Documents Document Hierarchy End-User Obligations Additional Responsibilities Intellectual Property Enforcement of this Code Applicability of other Codes 6 ING PKI Service Centre Code of Conduct for Employee Certificates, v 5.4, November 2015 Page 3 of 6
4 1 Code of Conduct for Employee Certificates 1.1 Applicability Eligibility Use of Certificates 1.2 Related Documents Document Hierarchy This Code of Conduct for ING PKI Employee Certificates (hereafter to be referred to as the Code ) is binding on each End-User that applies for and/or obtains Certificates issued by the ING PKI Employee CA. All services of the ING PKI Employee CA are supplied by ING Bank NV. Only Employees of ING are eligible to obtain and use Certificates issued by the ING PKI Employee CA. Employee Certificates issued within the ING PKI are not to be used in connection with any Communication other that those with other ING Employees, ING Partners or ING Customers and their representatives. Distribution of an Employee Certificate will in itself not create any power to represent ING for the End-User and should not be used to create the appearance of authority on behalf of ING by the End-User. End-Users will not use such Employee Certificates for private Communication of whatever nature. The ING PKI Glossary, the Certificate Policy (CP) Employee CA, the ING PKI Certification Practice Statement (CPS) and the ING PKI Privacy Statement form an integral part of this Code. ING Bank NV may from time to time amend this Code and the respective documents in accordance with the change procedure as described in the ING PKI CPS. In the event of any inconsistency between the aforementioned documents, the following order of precedence shall be observed: 1. ING PKI Code of Conduct for Employee Certificates 2. ING PKI Glossary 3. ING PKI Employee Certificate Policy 4. ING PKI Certification Practice Statement 5. ING PKI Privacy Statement ING PKI Service Centre Code of Conduct for Employee Certificates, v 5.4, November 2015 Page 4 of 6
5 1.3 End-User Obligations Additional Responsibilities Each End-User associated with a Certificate issued by an ING PKI Employee CA shall: a. Comply with applicable obligations, procedures and controls in the ING PKI Employee Certificate Policy and the ING PKI Certification Practice Statement; b. Use the Certificate only insofar it is valid and not revoked to his/her knowledge; c. Immediately report to the End-Users Certification Authority in case of any compromise or loss of a Private Key, or when there is any reason to suspect compromise or loss thereof; d. Immediately report to the End-Users Certification Authority in case of any change to the information included in the Certificate request or in the Certificate; e. Use the Certificates, the Activation Data, the Key Pairs, and the Software Tokens in a normal, responsible and trustworthy manner, taking into account the interest of ING and, f. Withhold of any activities which may endanger or undermine the trustworthiness or continuity of the ING PKI environment, the ING Group and/or the ING entity he/she is employed with. Each End-User shall be exclusively responsible for monitoring, investigating or confirming the accuracy of the information submitted to the ING PKI Employee CA as well as the Certificate contents after acceptance has taken place. The Certificate, the Activation Data, and the Private Key, or any software related thereto, are restricted only to be used by the End-User. He/she shall not lease, copy, sell, assign (sub)license, grant any limited rights on, nor make available to any third party the Certificate, the Activation Data, or the Private Key. As a consequence of the PKI mechanism, the Public Part of the Certificate will be made public automatically. ING PKI Service Centre Code of Conduct for Employee Certificates, v 5.4, November 2015 Page 5 of 6
6 1.3.2 Intellectual Property 1.4 Enforcement of this Code Applicability of other Codes As far as ING Bank NV provides the End-User with software and/or database licenses from third parties, the license conditions and guarantees of that third party will apply and the End-User shall act accordingly. The End-User shall follow all reasonable instructions given by ING Bank NV with regard to the use of the Intellectual Property Rights applicable to the Certificate, the Activation Data, and the Private Key, or any related software. Breach of this code will result in measures by management of the End-user. Such measures will be based on the employment contract or similar contractual relationship between the End-user and ING and could ultimately result in termination of the employment agreement or similar contractual relationship, notwithstanding any other legal measures ING could take under applicable law. End-Users are legally bound to the rules and regulations as stated in the ING Business Principles and any other local ING General Code of Conduct if available PKI Service Center ING Bank N.V. ING PKI Service Centre Code of Conduct for Employee Certificates, v 5.4, August 2015 Page 6 of 6
ING Corporate PKI G3 Internal Certificate Policy
ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationData Processing Agreement
In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal
More informationFLUENDO GENERIC EULA
FLUENDO GENERIC EULA FLUENDO S.A. Avenida Diagonal 579, 8th floor 08014 Barcelona Spain 1 END USER LICENSE AGREEMENT (EULA) FLUENDO LICENSE AGREEMENT BY FLUENDO, S.A. ( FLUENDO ) IMPORTANT - READ CAREFULLY
More informationClass Composer General Terms of Use
Class Composer General Terms of Use Effective Date: July 24, 2017 Welcome to Class Composer! Please continue reading to learn about the terms by which you may use our Service. If you have any questions
More information(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and
SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )
ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) Introduction These End User Terms permit the use of PAF Data in Solutions by End Users. These terms are not applicable
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationPrivacy Policy... 1 EU-U.S. Privacy Shield Policy... 2
Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationEMPLOYER CONTRIBUTION AGREEMENT
EMPLOYER CONTRIBUTION AGREEMENT This Employer Contribution Agreement ( Agreement ) is entered into by and between, your successors and assigns ( You ) and Oracle America, Inc. ( Oracle ) as of the date
More informationHPE DATA PRIVACY AND SECURITY
ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection
More informationWISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT
WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT Version 1.1 Effective Date: 05 December 2008 WISeKey S.A. 2000-2008 WISeKey hereby grants non-exclusive permission
More informationThe Opt-Out Register for Fax and Telephone - Guidance for Marketers
The Opt-Out Register for Fax and Telephone - Guidance for Marketers Guidance Note 11/13 17 th December 2013 Gibraltar Regulatory Authority Data Protection Division Suite 603, Europort Gibraltar Telephone
More informationBirmingham Midshires - Terms and Conditions Mortgage Intermediaries On-line Terms of Use (June 2017)
Birmingham Midshires - Terms and Conditions http://www.bmsolutions.co.uk/terms/ Mortgage Intermediaries On-line Terms of Use (June 2017) 1. General Which Terms Apply? - Directly Authorised Firms:If you
More informationApple Certification Policies
Apple Certification Policies Apple offers comprehensive certification programs for creative and IT professionals in business, education and other fields, allowing them to distinguish themselves to colleagues,
More informationPrivacy Shield Policy
Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This
More informationThis Access Agreement (the "Agreement") for the use of Math-Whizz Teachers Resource for Schools is between:-
Access Agreement for the use of Math-Whizz Teachers Resource for Schools IMPORTANT: Please read carefully these terms and conditions regarding your use of the Math-Whizz Teachers Resource for Schools service
More informationDisclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates
Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...
More informationConceptboard User Agreement for users registered before October 23, 2015.
Conceptboard User Agreement for users registered before October 23, 2015. This statement was written in German. If you are facing inconsistencies between the translated version of this statement compared
More informationCALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS
CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the
More informationData Processing Clauses
Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationEnd User License Agreement
End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE
More informationProducts: Software, content and digital materials distributed via the Vuzix App Store.
Vuzix Publisher Distribution Agreement By uploading or otherwise making available applications or any other materials via the Vuzix App Store, you (on behalf of yourself or the business you represent)
More informationLegal notice and Privacy policy
Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains
More informationCNH Industrial Privacy Policy. This Privacy Policy relates to our use of any personal information you provide to us.
CNH Industrial Privacy Policy General Terms The CNH Industrial Group appreciates your interest in its products and your visit to this website. The protection of your privacy in the processing of your personal
More informationTERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY
TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY Trademarks-Intellectual Property Rights Xtrade BLZ (hereinafter called the Company or we or us) is the owner of the Copyright in the pages
More informationPRIVACY POLICY/STATEMENT
PRIVACY POLICY/STATEMENT This document is an electronic record in terms of existing and applicable Information Technology laws and the amended provisions thereto pertaining to electronic records in various
More informationTHE TERMS OF THIS PRIVACY & DATA USE POLICY ( POLICY ) ARE LEGALLY BINDING.
Privacy Policy THE TERMS OF THIS PRIVACY & DATA USE POLICY ( POLICY ) ARE LEGALLY BINDING. IF YOU USE OUR SERVICE (AS DEFINED BELOW), YOU AGREE TO BE BOUND TO ALL OF THE TERMS AND CONDITIONS OF THIS POLICY.
More informationCertification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
More informationRecruitment Privacy Notice
Rev. A May 22, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationTechTarget Event Sponsorship Terms and Conditions
TechTarget Event Sponsorship Terms and Conditions TechTarget, Inc. ( TechTarget ) and the company listed on the applicable Insertion Order(s) as the sponsor of the Event(s) ( Sponsor ) each agree that
More informationEND USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007
END USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007 Please read the following license agreement carefully before using this program. By accepting
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationHitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between
between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationWebsite Privacy Policy
Website Privacy Policy 1 Introduction This Policy applies to the following companies: Navios Ship Management Inc, Navios Tankers Management Inc., Navios Corporation, Navios Containers Management Inc.,
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationBLACKBERRY APP WORLD AND BLACKBERRY PAYMENT SERVICE ADDENDUM TO THE BLACKBERRY ID AGREEMENT
BLACKBERRY APP WORLD AND BLACKBERRY PAYMENT SERVICE ADDENDUM TO THE BLACKBERRY ID AGREEMENT IN ORDER TO PURCHASE AND/OR DOWNLOAD ANY PRODUCTS OR SERVICES FROM BLACKBERRY APP WORLD OR USE THE BLACKBERRY
More informationOracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications
Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications Export Controls Export laws and regulations of the United States and any other
More informationDATA PROCESSING AGREEMENT
DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej
More informationBeta Testing Licence Agreement
Beta Testing Licence Agreement This Beta Testing Licence Agreement is a legal agreement (hereinafter Agreement ) between BullGuard UK Limited ( BullGuard ) and you, either an individual or a single entity,
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version January 12, 2018 1. Scope, Order of Precedence and Term 1.1 This data processing agreement (the Data Processing Agreement ) applies to Oracle
More informationEntrust WAP Server Certificate Relying Party Agreement
Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further
More informationNYSVMS WEBSITE PRIVACY POLICY
Your Privacy Rights Effective Date: June 16, 2016 NYSVMS WEBSITE PRIVACY POLICY The New York State Veterinary Medical Society, Inc. and its affiliates ( NYSVMS, we, and us ) recognize the importance of
More informationTerms of Service. USER means the individual that creates and/or has access to manage or maintain
Terms of Service Tiggee LLC doing business as DNS Made Easy, (hereafter DNS Made Easy or Tiggee ), provides the service ( SERVICE or DNS Made Easy service ) subject to the terms and conditions set forth
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationEntrust SSL Web Server Certificate Subscription Agreement
Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationSCHOOL SUPPLIERS. What schools should be asking!
SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated
More informationAvira Certification Authority Policy
Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification
More informationContent. Privacy Policy
Content 1. Introduction...2 2. Scope...2 3. Application...3 4. Information Required...3 5. The Use of Personal Information...3 6. Third Parties...4 7. Security...5 8. Updating Client s Information...5
More informationWinnebago Industries, Inc. Privacy Policy
Winnebago Industries, Inc. Privacy Policy At Winnebago Industries, we are very sensitive to the privacy concerns of visitors to our websites. Though we do not obtain any personal information that individually
More informationGeneral Terms & Conditions (GTC)
General Terms & Conditions (GTC) Definitions and Preamble By registering and/or logging on to B.V. (from hereon UIIN) The User (The User is the individual or legal entity responsible for purchasing and
More informationTo make that choice, please click under privacy policy the checkbox (https://www.uniassist.de/en/privacy-policy/)
Privacy Information Protecting your privacy is important to us, the ARBEITS- UND SERVICESTELLE FÜR INTERNATIONALE STUDIENBEWERBUNGEN (uni-assist) e.v., Geneststraße 5, 10829 Berlin, Germany. You may also
More informationPRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to:
PRIVACY NOTICE This Privacy Notice is issued by BGR FOODSERVICE SDN. BHD. (445653-K) ( the Company or BFSB ) and/or its related companies, as defined in the Companies Act, 1965 (collectively Group ) pursuant
More informationPKI Disclosure Statement Digidentity Certificates
PKI Disclosure Statement Digidentity Certificates Title PKI Disclosure Statement Digidentity Certificates Date 25 March 2019 Author Digidentity Version 2019-v1 Classification Public Digidentity 2019 Revisions
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Okanagan College Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationDECISION OF THE EUROPEAN CENTRAL BANK
L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationData Access Request Form
Data Access Request Form Applicant and lead user contact information Full name Postal address Telephone Organization Email Department Contact information for other users. Please use additional sheets if
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationNew Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )
New Zealand Telecommunications Forum Code for Vulnerable End Users of Telecommunication Services ( Vulnerable End User Code ) Code Status: Code Classification: Date: Review Status: For Public Consultation
More informationData Use and Reciprocal Support Agreement (DURSA) Overview
Data Use and Reciprocal Support Agreement (DURSA) Overview 1 Steve Gravely, Troutman Sanders LLP Jennifer Rosas, ehealth Exchange Director January 12, 2017 Introduction Steve Gravely Partner and Healthcare
More informationLiechtenstein. General I Data Protection Laws. Contributed by Wanger Advokaturbüro. National Legislation. National Regulatory Authority.
Contributed by Wanger Advokaturbüro General I Data Protection Laws National Legislation General data protection laws The Data Protection Act (the DPA ) dated 14 March 2002 and the relevant Ordinance on
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationAs used in these Rules and unless the context otherwise requires: CMIC shall refer to the Capital Markets Integrity Corporation.
Section 1. Short Title These Rules may be cited as the DMA Rules. Section 2. Definition of Terms As used in these Rules and unless the context otherwise requires: Algorithmic Trading shall mean the use
More informationSchedule Identity Services
This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth
More informationSCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION
SCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION Enquiry Application Renewal COMPANY DETAILS COMPANY NAME TRADING NAME ABN WEBSITE POSTAL ADDRESS LOCATION ADDRESS ORGANISATION
More informationICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability
ICT Legal Consulting on GDPR: the possible value of certification in data protection compliance and accountability Prof. Dr. Paolo Balboni Founding Partner Professor of Privacy, Cybersecurity, and IT Contract
More informationPERSONAL DATA PROCESSING POLICY FOR SUPPLIER
PERSONAL DATA PROCESSING POLICY FOR SUPPLIER 1. Definitions. In accordance with current legislation on the subject definitions are: a) Authorization: Expressed and informed prior consent of the Data Subject
More informationThe Apple Store, Coombe Lodge, Blagdon BS40 7RG,
1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member
More informationMERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS
MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")
More informationSERVICES and MICROSOFT HOSTED EXCHANGE
EMAIL SERVICES and MICROSOFT HOSTED EXCHANGE 1. Description of Service. Web.com may provide you with the capability of sending and receiving electronic mail via the Internet and through mobile phones ("Email
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationFPKIPA CPWG Antecedent, In-Person Task Group
FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent
More informationMohammed Ahmed Al Amer Chairman of the Board of Directors. Issued on: 16 Rabi' al-awwal 1437 (Arabic calendar) Corresponding to: 27 December 2015
The Telecommunications Regulatory Authority s Board of Directors Resolution No. (13) of 2015 Promulgating the SIM-Card Enabled Telecommunications Services Registration Regulation Chairman of the Telecommunications
More informationPrivacy Policy. LAST UPDATED: 23 June March 2017
Privacy Policy LAST UPDATED: 23 June 20156 March 2017 VERSION 3.0 2.0 Comment [A1]: The Privacy Policy has been updated because we now use Google Analytics, to help improve our services and our communications
More informationA full list of SaltWire Network Inc. publications is available by visiting saltwire.com.
Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic
More informationToken Sale Privacy Policy
Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also
More informationThe City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.
Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV
More informationPhase I CAQH CORE 102: Eligibility and Benefits Certification Policy version March 2011
Phase I CAQH CORE 102: Eligibility and Benefits Certification Policy GUIDING PRINCIPLES After signing the CORE Pledge, the entity has 180 days to complete CORE certification testing. CORE will not certify
More informationWHAT DOES THIS PRIVACY POLICY COVER?
Privacy policy DELIVER MY TUNE ("DELIVER MY TUNE ") knows that you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn more
More informationLakeshore Technical College Official Policy
Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director
More informationSWITCHaai Service Description
SWITCHaai Service Description Nicole Beranek Zanon Thomas Lenggenhager Version: V1.0 Created: 15. Nov. 2011 Last change: 05. Dec. 2011 http://www.switch.ch/aai/docs/switchaai_service_description.pdf 1
More informationDIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018
DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information
More informationDATA PROCESSING TERMS
DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica
More informationPrivacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES
Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you
More information