Building Your DLP Strategy & Process. Whitepaper

Size: px
Start display at page:

Download "Building Your DLP Strategy & Process. Whitepaper"

Transcription

1 Building Your DLP Strategy & Process Whitepaper

2 Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful Project 5 Phase 1: Define Success & Freeze Project Scope 5 Phase 2: Identify Critical DLP User Profiles 5 Phase 3: Identify Sensitive Information & Business Requirements 5 Phase 4: Design & Manage DLP Policies 5 Phase 5: Fine-Tune Policies and Incident Management 6 Phase 6: Implement Awareness & Training Programs 6 Phase 7: Manage the Project & Track Progress 2

3 INTRODUCTION Forcepoint works with its clients around the world to develop effective strategies and processes for implementing data loss prevention (DLP) programs. Our extensive experience and technical expertise in this area of data security has led to our continuous industry leadership and product innovation to stop malicious or inadvertent data leakage. This guide provides you the key points you need to understand as you organize your DLP project, define key user profiles that affect your DLP strategy and roll out your DLP program at every phase of deployment. As you read, keep in mind these must-dos: Determine goals and objectives for your DLP program up front. As with all change initiatives, DLP programs should help achieve strategic business objectives and provide benefits in return for the costs incurred. Clear and measurable goals and objectives at the outset will ensure that the program is focused on protecting the data that is most important to the organization. DLP PLANNING: ORGANIZE YOUR PROJECT FOR SUCCESS Because DLP affects so many functions within an organization, you ll need to clarify roles and responsibilities across the workstreams detailed below. Building consensus about these workstreams at the outset will make it easier for your organization to implement and manage your DLP strategy. Program Management This team ensures that the work effort achieves the goals stated by the steering committee. Responsibilities include: Set and review objectives Oversee management of project scope and cost Address all aspects of People, Process and Product. As highlighted throughout this document, DLP revolves around the people, the processes and the technology products you use. It s critical to identify clear roles and responsibilities for individuals, create effective processes to detect and respond to incidents and configure your tools accurately to identify and prevent data loss. 1 PROJECT LEADERSHIP Program Management Steering Committee Establish ample executive support and participation. Active involvement from business and operating units across your organization will create more user acceptance of the transition toward a more secure environment. It will also ensure that business input is provided at key stages which is paramount for a successful DLP program. Define sensitive data. Implementing DLP technology and controls universally across an organization can have an adverse and costly impact on the business. By defining sensitive data up front and aligning the program to protect their most sensitive data, organizations can ensure that resources are deployed to manage the most important risks. Reinforce awareness for end users. In their day-to-day work, end users are mostly confronted by the limitations imposed by DLP. Without an awareness of the reasons behind additional security measures, employees will be more likely to seek work-arounds to bypass controls. Increased awareness also helps users take responsibility for classifying and protecting critical information and assets. Formally define and monitor the effectiveness of DLP controls. Once implemented, the DLP controls and their effectiveness in protecting your data assets should be monitored closely to drive a cycle of constant improvement. 2 3 PROJECT MANAGEMENT Quality Management Project Management Office PROJECT TEAM Change Management Functional Workstream Solution Workstream Infrastructure Workstream Steering Committee This committee should be headed by the Chief Information Security Officer (CISO) or Chief Information Officer (CIO) and include all important stakeholders in the project. Responsibilities include: Own and oversee implementation of the project s underlying strategies Define the project s connection to the enterprise s overall business plans and direction Provide and interpret policy Ensure participation of relevant business functions in the project Remove internal and external barriers to achieving the project s goals Review progress at set intervals to ensure alignment with the overall strategic vision 3

4 Quality Management Responsibilities include: Assess and review project requirements and activities for quality planning and controls Ensure adherence to project timelines Project Management Office Responsibilities include: Derive and manage the project plan Dynamically allocate and direct resources to ensure product deliverables, timeline and budget Review project progress and coordinate with business functions as required Change Management Responsibilities include: Control changes to the project plan Adapt and implement effective new operational changes required to make the project successful In many organizations, a single person carries out both the Functional and Solution workstreams: Functional Workstream To ensure its success, your DLP project needs representatives from relevant business functions within the organization who understand those critical business processes that deal with sensitive data. Primary responsibilities are: Understand business requirements from each business function Identify and document sensitive data from each business function Develop workflows for DLP policy creation and modification, and for incident management and remediation Solution Workstream These project members devise effective incident management and remediation frameworks, as well as structure metrics that allow stakeholders to understand progress made on the project, risks addressed by the strategy, the efficiency of incident management and so on. They should have deep technical knowledge of the DLP solution. Other responsibilities include: Analyze methods to detect sensitive data types Recommend best practices for data management Develop DLP policies based on business requirements Identify best practices for installation, administration and operation of the DLP solution Conduct training for business teams Infrastructure Workstream This function addresses technical deliverables relating to DLP system readiness, management, maintenance and support. They configure policies and perform operational tasks on the DLP solution itself. Other responsibilities include: Conduct technical trainings Manage technical issues Meet with operations team Generate reports Interact with vendor support team Create technical documentation DLP PLANNING: CLARIFY USER PROFILES For a DLP roll-out to be effective, it needs clearly defined roles for key participants, from line-of-business personnel to technical DLP specialists to end users. Understanding up front what the different roles are and what each of them does will help ensure the success of your DLP program. Business Function Lead This person should be knowledgeable about the critical business processes and data used within the business function that will be addressed by the DLP project. This individual will be involved in data identification and classification and DLP policy approval. After the project is complete, this member will continue to offer feedback on critical business processes and the data generated from them. DLP Consultant Functional & Solution Workstreams The person in this role will perform the functions stated under the Functional and Solution workstreams in the prior section. Often, it is a good choice to appoint the IT, security or risk specialist already responsible for the business function, as this person will need to combine understanding of business processes with knowledge of the DLP solution. They should also have basic IT knowledge covering file directories, databases, directory paths, network credentials and related topics, and they will benefit from quality and security audit certifications (e.g. for ISO 27001) as well. When the project is complete, the DLP Consultant will continue to adapt DLP policies as needed, working in concert with the DLP Product Administrator. DLP Product Administrator Infrastructure Workstream This team member usually from the IT Security organization must be capable of installing, administrating and supporting the DLP solution itself, which will require them to have completed DLP product training and to possess relevant IT knowledge. After the project is complete, this person will continue to write new policies and modify existing ones in the DLP product s management console as instructed by the DLP Consultant. 4

5 Business Function Incident Manager This member s role is to interpret, analyze, manage and remediate DLP incidents as they arise. In practice, this means reading reports generated by the DLP solution and determining whether a non-conforming incident merits further investigation or escalation to the Critical Incident Manager or other management. In carrying out this role, the Incident Manager must be familiar with the critical business processes of their business function, as well as have detailed knowledge of the organization s incident management and remediation framework. During the project, they will also review and comment on policies, workflows and metrics and assist with end-user training. Phase 3: Identify Sensitive Information & Business Requirements Even though it relies on advanced technology, DLP is ultimately a business strategy meant to reduce risks for your organization. That s why it s so important for DLP project stakeholders to hold discussions with Business Function Leads and Business Function Incident Managers about which information is critical for each business function and what the operational requirements are for implementing DLP. Critical Incident Manager This person likely the CISO, chief risk officer or DLP strategy owner must make the final decision on mitigation actions whenever a case of data leakage occurs. They will also manage any such incidents arising from the actions of the Business Function Lead, and the Business Function Incident Manager and other high-profile users. This member should have a strong background in security or risk operations, along with solid knowledge of the critical business processes of the organization. End Users During the project, the team should recruit personnel who are interested in being pilot users to provide feedback on DLP issues specific to each business function, and to participate in user acceptance testing (UAT). These pilot users should use the software applications and have the access privileges of typical end users. DLP IMPLEMENTATION: PHASES OF A SUCCESSFUL PROJECT You should enter into your DLP project with a commitment to using best practices that align People, Process and Product to achieve effective outcomes. As represented by the diagram, the ongoing challenge of data loss prevention implies a multiphase cycle, where the successful outcome of your current project feeds into the initiation of the next project perhaps by extending the DLP program to other business units. This section provides you with details for each phase. Phase 1: Define Success & Freeze Project Scope For a DLP project to work, it needs be built on well-defined criteria for success that will demonstrate value to stakeholders across the organization. Too many organizations make the mistake of trying to address data security needs of the entire enterprise through a DLP project, but then struggle to demonstrate value. While DLP should indeed connect to broader security objectives for example your approach to stopping insider threats your specific DLP project should be tightly defined, with objectives that can actually be measured and achieved. That s how you win buy-in across the organization, which is critical for long-term success. Phase 2: Identify Critical DLP User Profiles For your DLP strategy to be effective, the user profiles from the previous section of this paper need to be assigned to staff members who understand their responsibilities and have the resources they need to carry them out. Business stakeholders should share what they already know about the sensitive data that needs to be protected for their business function. To prevent scope creep, stakeholders might be asked to identify their top N types of sensitive information, where N is a number that fits within the agreed-upon scope for the DLP project. When Forcepoint engages with clients on planning DLP projects, we share sample data classification worksheets, templates and questionnaires to streamline the process. Ask if your DLP technology provider offers similar tools. Phase 4: Design & Manage DLP Policies During this phase, the team reviews data highlighted from every business function in Phase 3, engages the DLP Consultant and then derives policies to effectively identify that data. Your DLP tool will provide various data identifiers such as patterns, regular expressions, keywords, dictionaries, file attributes, fingerprints and machine learning algorithms. Once these data identifiers have been reviewed, you then must decide which of the identifiers needs to be used to identify the data accurately. Then you can configure DLP policies (initially in monitoring mode), capture them in a policy log and obtain approvals from relevant stakeholders. You should also define appropriate change management controls for raising and approving change requests. 5

6 Policy Management Process It s important to have a policy management process to ensure that new policies are created and managed effectively. That process should go something like this: 1. End User identifies that new sensitive data has been created, or that existing data has become sensitive. 2. Business Function Lead confirms that a new data leakage policy is needed and then sends the requirement for that policy to the DLP Consultant. 3. DLP Consultant translates the requirement into a new DLP policy based on the established framework, updates the DLP policy log and status files and sends the updated files to the DLP Product Administrator. 4. DLP Product Administrator writes the new DLP policies into the DLP solution s management console. The procedure for modifying an existing policy works much the same, except that it s initiated when an end user or Business Function Incident Manager determines that an existing policy is ineffective. Phase 5: Fine-Tune Policies and Incident Management This phase is crucial for creating an effective policy framework and configuring DLP policies in enforcement mode. It starts with understanding why DLP incidents occur, because not every data leak is either intentional or malicious. Leaks fall into four main types, and each is best addressed by a different strategy: Accidental Leak: At least 60% incidents arise from employee ignorance, when someone is unaware of the risks of sharing critical information. The remedy is employee education. Malicious Outsider: These arise when systems are infected with malware and attempt to exfiltrate data. The remediation strategy is to detect and remediate, identifying machines that are affected and then cleaning those machines. Intentional Non-Malicious: Unexamined business processes can foster intentional employee behaviors that are inadvertently risky from a data loss perspective. Your DLP project will bring visibility to these processes, opening the door to productive discussions with relevant leaders about improving business processes or fine-tuning DLP policies to accommodate those that have an acceptable level of risk. Malicious Insider: These occur when employees try to steal information or do harm to the organization by leaking it. These incidents can be detected only if your DLP solution provides the insight needed for profiling risky user behaviors, as Forcepoint s Insider Threat Data Protection solution does. It is critical that your organization have defined processes to deal with such high-risk incidents. With a clear understanding of these type of leaks, your project team should identify stakeholders with responsibility for security, risk, compliance, legal affairs, human resources and so on who need to take part in incident management and remediation processes, then create the workflows including escalation mechanisms relevant for those functions. Phase 6: Implement Awareness & Training Programs Awareness Your DLP solution can be used as a great tool to spread awareness about your organization s data security policies, and to understand high-risk users who violate DLP policies because of ignorance. Options for raising awareness include: Display pop-ups to end users when they are about to violate policy Send notification s to end users (and optionally managers) after they have violated policy Allow users to enter a justification message before performing an action which may violate policy These awareness options can significantly reduce incidents triggered by end user negligence. DATA LEAK SOURCE ACCIDENTAL MALICIOUS OUTSIDER INTENTIONAL (NON-MALICIOUS) MALICIOUS INSIDER REMEDIATION STRATEGY EMPLOYEE EDUCATION DETECT AND REMEDIATE VISIBILITY RISKY USER BEHAVIOR PROFILING Training It s very important that a proper training program is in place for different DLP user profiles. Training should be given at regular intervals, with the following modules suggested for different types of users: Incident Management & Reporting Training Targeted for personnel that will access the reporting system to check alerts generated by the DLP solution. This training is relevant for Business Function Leads, Business Function Incident Managers, Critical Incident Managers and, optionally, DLP Product Administrators. System Admin & Maintenance Training Targeted for the IT personnel that will be responsible for maintaining the DLP solution from a technical perspective. DLP Product Administrators must attend this training before performing the responsibilities of that role. 6

7 Data Classification & Policy Training Targeted for personnel that will be creating new policies and modifying existing ones. This training is relevant for Business Function Leads, DLP Consultants, DLP Product Administrators and, optionally, Business Function Incident Managers. End User Training It s very important to keep end users aware of the processes that they must follow to make the DLP strategy successful for your organization. This training should be offered through online modules at least once per quarter. Phase 7: Manage the Project & Track Progress To ensure that your project is successful and that stakeholders understand its importance for the organization It s critical to use meaningful metrics that track how the DLP project is being executed. For instance, you want to know whether sensitive data is being copied to removable media such as DVDs or USB sticks. Your DLP solution monitors that activity and protects you from it, but it also keeps track of how often that type of activity happens and who attempts it. Over time, you will be able to see metrics for whether your DLP project, tied to an awareness program, is effective in reducing that risk. We recommend that you use at least the following reporting metrics: Weekly Reports to Business Function Leads and Business Function Incident Managers Monthly Reports to Senior Management Top policy category violations Top users and business processes that violate policies Reports with sample incidents highlighting business risks for each business function Policy violations per channel or application (USB, , etc.) Risk reduction reports, based on the number of incidents per week By grouping incidents specific to each business, you can help stakeholders understand the relevant risks that the DLP solution and the overall DLP strategy are identifying and preventing for them. It s vital that you inform stakeholders about how the strategy reduces business risks so that they, in turn, will lead their teams to adopt more risk-averse behavior to maintain data security. When you have achieved that, you ll know your DLP program is a success. Top 10 endpoints/users violating the policy for each business function Top policy category violations Policy violations per channel or application (USB, , etc.) Incident reports Incident status reports Incident trend reports CONTACT /contact ABOUT FORCEPOINT 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. [WHITEPAPER_BUILDING_DLP_PROCESS_ENA4]

DATA LOSS PREVENTION: A HOLISTIC APPROACH

DATA LOSS PREVENTION: A HOLISTIC APPROACH DATA LOSS PREVENTION: A HOLISTIC APPROACH Introduction Data breach has been one of the biggest fears that organizations face today. While DLP is not a panacea to such attacks, it should certainly be in

More information

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS E-Guide SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS SearchSecurity D ata loss prevention (DLP) allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. In this

More information

SERVICE DESCRIPTION VIDENS SD-WAN SERVICE MANAGEMENT

SERVICE DESCRIPTION VIDENS SD-WAN SERVICE MANAGEMENT VERSION 2.1 MARCH 2018 SERVICE DESCRIPTION VIDENS SD-WAN SERVICE MANAGEMENT TABLE OF CONTENTS 1 Videns SD-WAN Service Management overview... 3 2 Customer benefits... 3 3 Service levels... 3 4 Deliverables...

More information

Mirth Solutions. Powering Healthcare Transformation.

Mirth Solutions. Powering Healthcare Transformation. Mirth Solutions Powering Healthcare Transformation. You re on a mission to... Eliminate costly information gaps and duplications that make it hard to integrate information and achieve interoperability.

More information

Case Study: The Workforce Strategy Was Key to Indiana's IT Consolidation

Case Study: The Workforce Strategy Was Key to Indiana's IT Consolidation Industry Research Publication Date: 26 January 2010 ID Number: G00173747 Case Study: The Workforce Strategy Was Key to Indiana's IT Consolidation Massimiliano Claps The Indiana Office of Technology (IOT)

More information

The ChildTrauma Academy

The ChildTrauma Academy The ChildTrauma Academy www.childtrauma.org The Neurosequential Model of Therapeutics NMT Training Certification for Institutions and Organizations (Site Certification) Phase I, Phase II/TTT & NMT Mentor

More information

REQUEST FOR PROPOSALS AND TERMS OF REFERENCE

REQUEST FOR PROPOSALS AND TERMS OF REFERENCE REQUEST FOR PROPOSALS AND TERMS OF REFERENCE Request for Proposals (RFP) and Terms of Reference (TOR) for consultancy services to establish technical standards for FM radio broadcasting in The Bahamas

More information

ICOMOS ENAME CHARTER

ICOMOS ENAME CHARTER ICOMOS ENAME CHARTER For the Interpretation of Cultural Heritage Sites FOURTH DRAFT Revised under the Auspices of the ICOMOS International Scientific Committee on Interpretation and Presentation 31 July

More information

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

Appendix C.4 Assistant Deputy Ministers Project Review Committee Terms of Reference

Appendix C.4 Assistant Deputy Ministers Project Review Committee Terms of Reference Appendix C.4 Assistant Deputy Ministers Project Review Committee Terms of Reference A. GENERAL The Assistant Deputy Ministers Project Review Committee (the ADM Committee ) provides support to the Deputy

More information

ITU-T Y Functional framework and capabilities of the Internet of things

ITU-T Y Functional framework and capabilities of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Frequently Asked Questions

Frequently Asked Questions for community colleges, by community colleges http://vfa.aacc.nche.edu Frequently Asked Questions What is the VFA? The Voluntary Framework of Accountability (VFA) is the first ever national accountability

More information

F5 Network Security for IoT

F5 Network Security for IoT OVERVIEW F5 Network Security for IoT Introduction As networked communications continue to expand and grow in complexity, the network has increasingly moved to include more forms of communication. This

More information

WHITEPAPER. Customer Insights: A European Pay-TV Operator s Transition to Test Automation

WHITEPAPER. Customer Insights: A European Pay-TV Operator s Transition to Test Automation WHITEPAPER Customer Insights: A European Pay-TV Operator s Transition to Test Automation Contents 1. Customer Overview...3 2. Case Study Details...4 3. Impact of Automations...7 2 1. Customer Overview

More information

ICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites

ICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites ICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites Revised Third Draft, 5 July 2005 Preamble Just as the Venice Charter established the principle that the protection of the extant fabric

More information

Alcatel-Lucent 5620 Service Aware Manager. Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver

Alcatel-Lucent 5620 Service Aware Manager. Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver Alcatel-Lucent 5620 Service Aware Manager Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver [The Alcatel-Lucent 5620 SAM] was the most cost-effective and the shortest

More information

Name / Title of intervention. 1. Abstract

Name / Title of intervention. 1. Abstract Name / Title of intervention 1. Abstract An abstract of a maximum of 300 words is useful to provide a summary description of the practice State subsidy for easy-to-read literature Selkokeskus, the Finnish

More information

ICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites

ICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites University of Massachusetts Amherst ScholarWorks@UMass Amherst Selected Publications of EFS Faculty, Students, and Alumni Anthropology Department Field Program in European Studies October 2008 ICOMOS Charter

More information

DM Scheduling Architecture

DM Scheduling Architecture DM Scheduling Architecture Approved Version 1.0 19 Jul 2011 Open Mobile Alliance OMA-AD-DM-Scheduling-V1_0-20110719-A OMA-AD-DM-Scheduling-V1_0-20110719-A Page 2 (16) Use of this document is subject to

More information

VFA Participation Agreement 2018 (Year 5)

VFA Participation Agreement 2018 (Year 5) 1 VFA Participation Agreement 2018 (Year 5) The VFA Participation Agreement is updated and approved by the VFA Oversight Board. This agreement s terms and conditions supersede any earlier VFA Participation

More information

Four steps to IoT success

Four steps to IoT success Introduction Businesses are using the Internet of Things (IoT) to connect the unconnected. By taking all their electro-mechanical assets and applying a digital layer a layer enabled by the Internet of

More information

How to Categorize Risk in IoT

How to Categorize Risk in IoT How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview

More information

Florida Department of Education CURRIUCULUM FRAMEWORK. Digital Television and Media Production

Florida Department of Education CURRIUCULUM FRAMEWORK. Digital Television and Media Production Florida Department of Education CURRIUCULUM FRAMEWORK December 2001 Program Title: Occupational Area: CIP Number Grade Level Length Certification Digital Television and Media Production Industrial Education

More information

Memorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and

Memorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and Memorandum of Understanding between The Ministry of Civil Defence & Emergency Management and Television New Zealand Limited and MediaWorks TV Limited for the provision of television broadcast support before

More information

DM DiagMon Architecture

DM DiagMon Architecture DM DiagMon Architecture Approved Version 1.0 20 Dec 2011 Open Mobile Alliance OMA-AD-DM-DiagMon-V1_0-20111220-A [OMA-Template-ArchDoc-20110121-I] OMA-AD-DM-DiagMon-V1_0-20111220-A Page 2 (13) Use of this

More information

ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE

ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE 237 2017 Implementation Steps for Adaptive Power Systems Interface Specification (APSIS ) NOTICE The Society of Cable Telecommunications

More information

6. Institutional Planning and Budgeting Processes

6. Institutional Planning and Budgeting Processes 6. Institutional Planning and Budgeting Processes 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732

More information

New York MX700 Room. PWD-NY5-MX700-P60 List Price: $11, SLA Price: $1,100.00/year (Other options available See Appendix B)

New York MX700 Room. PWD-NY5-MX700-P60 List Price: $11, SLA Price: $1,100.00/year (Other options available See Appendix B) New York MX700 Room PWD-NY5-MX700-P60 List Price: $11,000.00 SLA Price: $1,100.00/year (Other options available See Appendix B) Statement of Work (SoW) Project Summary RoomReady will install the following

More information

Escorting / Supervision of service providers and contractors

Escorting / Supervision of service providers and contractors Escorting / Supervision of service providers and contractors PIN020 Operations Directorate 8 The Director of Operations 29/01/14 See Section 5 of this document - - 29/01/2016 29/01/2014 IPS Policy for

More information

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the

More information

Joint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum

Joint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum Joint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum 1. Introduction and summary The above-named organisations welcome the

More information

Ex Libris and Shibboleth

Ex Libris and Shibboleth Karen Groves MetaLib Product Manager, Ex Libris Group Federated Authentication & Digital Libraries AAI2 Rome, Italy 6 March 2007 Copyright Statement All of the information and material inclusive of text,

More information

NOVA Digital Media System Guidelines Northern Virginia Community College 2017

NOVA Digital Media System Guidelines Northern Virginia Community College 2017 NOVA Digital Media System Guidelines Office of College Marketing and Web Services Northern Virginia Community College 2017 NOVA Digital Media System Guidelines Table of Contents Overview 3 Goals of Digital

More information

Bridging the Trust Gap for Mobile BYOD Deployments. Ojas Rege, VP Strategy, MobileIron Professional Techniques D12

Bridging the Trust Gap for Mobile BYOD Deployments. Ojas Rege, VP Strategy, MobileIron Professional Techniques D12 Bridging the Trust Gap for Mobile BYOD Deployments Ojas Rege, VP Strategy, MobileIron Professional Techniques D12 This presentation should not be used as a substitute for competent legal advice from a

More information

Vice President, Development League of American Orchestras

Vice President, Development League of American Orchestras Vice President, Development League of American Orchestras New York, NY http://www.americanorchestras.org Send Nominations or Cover Letter and Resume to: Zena Lum Search Director 617-262-1102 zlum@lllsearches.com

More information

The 2017/18 Rooftop Movies season will run from 1 December 2017 to 31 March 2018.

The 2017/18 Rooftop Movies season will run from 1 December 2017 to 31 March 2018. Position Description Site & Venue Manager Rooftop Movies About Rooftop Movies Rooftop Movies is a pop-up outdoor cinema produced by Artrage, a not-for-profit cultural organisation that s been at the forefront

More information

700 MHz clearance programme timescale review. Review of progress, risks and readiness

700 MHz clearance programme timescale review. Review of progress, risks and readiness 700 MHz clearance programme timescale review Review of progress, risks and readiness Publication Date: 13 December 2018 About this document When confirming the timescales for the delivery of the 700 MHz

More information

Identity & Communication Standards

Identity & Communication Standards Identity & Communication Standards KCSOS Identity & Communication Standards Why image matters: As employees working for a taxpayersupported organization, headed by a publicly-elected superintendent of

More information

Improving Physician Efficiency and Patient Care with Electronic Prescription of Controlled Substances (EPCS) Thursday March 3rd Todd Smith, MD, CMIO

Improving Physician Efficiency and Patient Care with Electronic Prescription of Controlled Substances (EPCS) Thursday March 3rd Todd Smith, MD, CMIO Improving Physician Efficiency and Patient Care with Electronic Prescription of Controlled Substances (EPCS) Thursday March 3rd Todd Smith, MD, CMIO Lou Gallagher, System Director of Engineering and Architecture

More information

RESULT-BASED ACTION PLAN

RESULT-BASED ACTION PLAN RESULT-BASED ACTION PLAN IMPLEMENTATION OF SECTION 41 OF THE OFFICIAL LANGUAGES ACT For the period 2006 2009 May 31, 2006 Table of contents 1.0 General information...1 2.0 Introduction...2 3.0 Summary

More information

Monitor QA Management i model

Monitor QA Management i model Monitor QA Management i model 1/10 Monitor QA Management i model Table of Contents 1. Preface ------------------------------------------------------------------------------------------------------- 3 2.

More information

JOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE

JOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE JOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE Job Title: Picture Editor, Arabic Service. Reports to: Production Editor, Visual Journalism Department: Visual Journalism, BBC News,

More information

ICOMOS ENAME CHARTER

ICOMOS ENAME CHARTER THIRD DRAFT 23 August 2004 ICOMOS ENAME CHARTER FOR THE INTERPRETATION OF CULTURAL HERITAGE SITES Preamble Objectives Principles PREAMBLE Just as the Venice Charter established the principle that the protection

More information

Collection Management Policy

Collection Management Policy Collection Management Policy 9/26/2017 INTRODUCTION Collection management encompasses all activities that create and maintain the material holdings that comprise the collection of Henrico County Public

More information

BBC Response to Glasgow 2014 Commonwealth Games Draft Spectrum Plan

BBC Response to Glasgow 2014 Commonwealth Games Draft Spectrum Plan BBC Response to Glasgow 2014 Commonwealth Games Draft Spectrum Plan Response to Draft Spectrum Consultation Glasgow 2014 Page 1 of 8 1. BACKGROUND 1.1 The BBC welcomes Ofcom s engagement with stakeholders

More information

emedical Frequently Asked Questions (FAQs) Guide

emedical Frequently Asked Questions (FAQs) Guide emedical Frequently Asked Questions (FAQs) Guide USFS Fire & Aviation Mangement emedical August 2017 Table of Contents 1. Overview...3 2. Purpose...3 3. FAQs...3 3.1 What is emedical?... 3 3.2 How do I

More information

IMS Brochure. Integrated Management System (IMS) of the ILF Group

IMS Brochure. Integrated Management System (IMS) of the ILF Group Br ochur e IMS Brochure Integrated Management System (IMS) of the ILF Group FOREWORD ILF Consulting Engineers always endeavours to precisely analyse the requests and needs of its customers and to subsequently

More information

Securing IoT in the Enterprise

Securing IoT in the Enterprise Securing IoT in the Enterprise Daniel Miessler May 2017 Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017 About - Infosec for around 18 years - Mostly technical testing and enterprise consulting

More information

CASE STUDY. Smart Motorways Project. Temporary CCTV Monitoring Systems for England s Motorway network.

CASE STUDY. Smart Motorways Project. Temporary CCTV Monitoring Systems for England s Motorway network. CASE STUDY Smart Motorways Project. Temporary CCTV Monitoring Systems for England s Motorway network. OVERVIEW The Strategic Road Network in England covers over 2,200 miles (3,500Km) and facilitates more

More information

Privacy Level Indicating Data Leakage Prevention System

Privacy Level Indicating Data Leakage Prevention System Privacy Level Indicating Data Leakage Prevention System Jinhyung Kim, Jun Hwang and Hyung-Jong Kim* Department of Computer Science, Seoul Women s University {jinny, hjun, hkim*}@swu.ac.kr Abstract As private

More information

ILO Library Collection Development Policy

ILO Library Collection Development Policy ILO Library Collection Development Policy 1. Overview 1.1 Purpose of the collection development policy The collection development policy sets out guidelines for developing and maintaining the Library s

More information

Satellite Services and Interference: The current situation. ITU International Satellite Communication Symposium Geneva, June 2016

Satellite Services and Interference: The current situation. ITU International Satellite Communication Symposium Geneva, June 2016 1 Satellite Services and Interference: The current situation ITU International Satellite Communication Symposium Geneva, 13-14 June 2016 Ruben D. Marentes Director, RF Operations Center 2 Current impact

More information

Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study

Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study Dr. Jagadish M.V Librarian Sri, D.Devaraja Urs Government First Grade

More information

Standard IRO Reliability Coordination Responsibilities and Authorities

Standard IRO Reliability Coordination Responsibilities and Authorities A. Introduction 1. Title: Reliability Coordination Responsibilities and Authorities 2. Number: IRO-001-3 3. Purpose: To establish the authority of Reliability Coordinators to direct other entities to prevent

More information

Ex Libris Rosetta Privacy Impact Assessment

Ex Libris Rosetta Privacy Impact Assessment Ex Libris Rosetta Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents... 2 2 - Disclaimer... 3 3 - Purpose of this document... 4 4 - Main Findings and Conclusions... 4 5 -

More information

1.1 What is CiteScore? Why don t you include articles-in-press in CiteScore? Why don t you include abstracts in CiteScore?

1.1 What is CiteScore? Why don t you include articles-in-press in CiteScore? Why don t you include abstracts in CiteScore? June 2018 FAQs Contents 1. About CiteScore and its derivative metrics 4 1.1 What is CiteScore? 5 1.2 Why don t you include articles-in-press in CiteScore? 5 1.3 Why don t you include abstracts in CiteScore?

More information

RFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh, Avinow Raj, ShahinaFirdoush, and ShrutiKriti

RFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh, Avinow Raj, ShahinaFirdoush, and ShrutiKriti International Journal of Computer Engineering and Applications, Volume X, Special Issue, ICRTCST -2016 www.ijcea.com, ISSN 2321-3469 RFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh,

More information

SAP Edge Services Edge Services Overview Guide Version 1711

SAP Edge Services Edge Services Overview Guide Version 1711 SAP Edge Services Edge Services Overview Guide Version 1711 Table of Contents ABOUT THIS DOCUMENT... 3 INTRODUCTION... 4 Persistence Service... 4 Streaming Service... 4 Business Essential Functions Service...

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD IEC 62546 Edition 1.0 2009-07 colour inside High Definition (HD) recording link guidelines IEC 62546:2009(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2009 IEC, Geneva, Switzerland

More information

Signal Sighting Standard

Signal Sighting Standard Engineering Standard Signals L1-CHE-STD-004 Signal Sighting Standard Version: 1 Issued: June 2016 Owner: Engineering Approved By: Phil Ellingworth Chief Engineer PRINTOUT MAY NOT BE UP-TO-DATE; REFER TO

More information

VAR Generator Operation for Maintaining Network Voltage Schedules

VAR Generator Operation for Maintaining Network Voltage Schedules Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

ITU-T Y Reference architecture for Internet of things network capability exposure

ITU-T Y Reference architecture for Internet of things network capability exposure I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4455 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Digital Signage Policy ADM 13.0

Digital Signage Policy ADM 13.0 Policy Type: Administrative POLICY DATES Issued: 7/1/2016 Last Revised: Reviewed: In 2012, the University of Mount Union launched a new digital signage initiative as a means of enhancing communication

More information

Understanding PQR, DMOS, and PSNR Measurements

Understanding PQR, DMOS, and PSNR Measurements Understanding PQR, DMOS, and PSNR Measurements Introduction Compression systems and other video processing devices impact picture quality in various ways. Consumers quality expectations continue to rise

More information

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director Mobile IoT: 3GPP standard per reti LPWA e IoT security 2 Introduction of the GSMA Content Understanding IoT and the market opportunity

More information

Definitions. General Principles. Reviewed 08 August 2002

Definitions. General Principles. Reviewed 08 August 2002 !" $#%&! Reviewed 08 August 2002 This document outlines the interference resolution procedures that NESMC and its members will follow when faced with interference. This document is primarily concerned

More information

2 Develop a range of creative approaches. 4.1 Use refined concepts as the basis for developing detailed implementation specifications.

2 Develop a range of creative approaches. 4.1 Use refined concepts as the basis for developing detailed implementation specifications. Diploma of Music Industry BSBCRT501 Originate and Develop Concepts 1 Evaluate and explore needs and opportunities 2 Develop a range of creative approaches 1.1 Research and evaluate existing information

More information

London Environment Directors Network

London Environment Directors Network UNDERSTANDING AND TACKLING FLY-TIPPING IN LONDON Executive summary JuLY 2018 about London Environment Directors Network The London Environment Directors' Network (LEDNet) is the membership association

More information

6Harmonics. 6Harmonics Inc. is pleased to submit the enclosed comments to Industry Canada s Gazette Notice SMSE

6Harmonics. 6Harmonics Inc. is pleased to submit the enclosed comments to Industry Canada s Gazette Notice SMSE November 4, 2011 Manager, Fixed Wireless Planning, DGEPS, Industry Canada, 300 Slater Street, 19th Floor, Ottawa, Ontario K1A 0C8 Email: Spectrum.Engineering@ic.gc.ca RE: Canada Gazette Notice SMSE-012-11,

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Ref: HRF013 Issue No.:5 Date: Mar 2018 Position Title: Divison: Department: Assistant Producer OzAsia Festival Programming OzAsia Festival Programming, Development and Venue Sales

More information

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE STANDARD SCTE

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE STANDARD SCTE ENGINEERING COMMITTEE Digital Video Subcommittee SCTE STANDARD SCTE 230 2016 Recommended Practice for Proper Handling of Audio- Video Synchronization in Cable Systems NOTICE The Society of Cable Telecommunications

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 197 2018 Recommendations for Spot Check Loudness Measurements NOTICE The Society of Cable Telecommunications Engineers (SCTE) / International

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

FROM: CITY MANAGER DEPARTMENT: ADMINISTRATIVE SERVICES SUBJECT: COST ANALYSIS AND TIMING FOR INTERNET BROADCASTING OF COUNCIL MEETINGS

FROM: CITY MANAGER DEPARTMENT: ADMINISTRATIVE SERVICES SUBJECT: COST ANALYSIS AND TIMING FOR INTERNET BROADCASTING OF COUNCIL MEETINGS TO: HONORABLE CITY COUNCIL FROM: CITY MANAGER DEPARTMENT: ADMINISTRATIVE SERVICES DATE: FEBRUARY 3, 2003 CMR: 131:03 SUBJECT: COST ANALYSIS AND TIMING FOR INTERNET BROADCASTING OF COUNCIL MEETINGS RECOMMENDATION

More information

ELIGIBLE INTERMITTENT RESOURCES PROTOCOL

ELIGIBLE INTERMITTENT RESOURCES PROTOCOL FIRST REPLACEMENT VOLUME NO. I Original Sheet No. 848 ELIGIBLE INTERMITTENT RESOURCES PROTOCOL FIRST REPLACEMENT VOLUME NO. I Original Sheet No. 850 ELIGIBLE INTERMITTENT RESOURCES PROTOCOL Table of Contents

More information

Master of Arts in Leadership: Modern Music. Master of Arts in Leadership: Music Production

Master of Arts in Leadership: Modern Music. Master of Arts in Leadership: Music Production MASTER OF ARTS IN LEADERSHIP (2-YEAR PLAN) Master of Arts in Leadership: Modern Music MUS5133 Church Music Administration 3 MUS5313 Applied Leadership: Music Theory 3 Semester Hour Total 6 Semester Hour

More information

CITY OF LOS ANGELES CIVIL SERVICE COMMISSION CLASS SPECIFICATION POSTED JUNE VIDEO TECHNICIAN, 6145

CITY OF LOS ANGELES CIVIL SERVICE COMMISSION CLASS SPECIFICATION POSTED JUNE VIDEO TECHNICIAN, 6145 CITY OF LOS ANGELES CIVIL SERVICE COMMISSION CLASS SPECIFICATION POSTED JUNE 1999 04-26-96 VIDEO TECHNICIAN, 6145 Summary of Duties: Operates municipal access equipment for City departments, City Council

More information

Ex Libris. Aleph Privacy Impact Assessment

Ex Libris. Aleph Privacy Impact Assessment Ex Libris Aleph Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents...2 2 - Disclaimer...3 3 - Purpose of this document...4 4 - Main Findings and Conclusions...4 5 - Scope

More information

LEARN TO BE AN EXPERT FROM THE EXPERTS IN CABLE TECHNOLOGY.

LEARN TO BE AN EXPERT FROM THE EXPERTS IN CABLE TECHNOLOGY. HOW DO YOU TURN YOURSELF INTO A CABLE TECHNOLOGY EXPERT? TURN TO THE EXPERTS. SCTE ISBE is the industry leader in developing certified experts. And you can be next. Learn core network technologies by taking

More information

LEARN TO BE AN EXPERT FROM THE EXPERTS IN CABLE TECHNOLOGY.

LEARN TO BE AN EXPERT FROM THE EXPERTS IN CABLE TECHNOLOGY. LEARN TO BE AN EXPERT FROM THE EXPERTS IN CABLE TECHNOLOGY. EARN SCTE ISBE CERTIFICATIONS TODAY! :: Prove your Cable Knowledge :: Gain Recognition for your Skills :: Promote your Expertise :: Advance your

More information

LCD-420SI. TimeIPS LCD Display w/speaker and Biometric Fingerprint Reader. Installation Guide

LCD-420SI. TimeIPS LCD Display w/speaker and Biometric Fingerprint Reader. Installation Guide LCD-420SI TimeIPS LCD Display w/speaker and Biometric Fingerprint Reader Installation Guide FCC Declaration of Conformity (DoC) Compliance Information (according to FCC 2.1077) (1) Product: LCD-420SI/IPSLCD420SI

More information

Questions to Ask Before Beginning a Digital Audio Project

Questions to Ask Before Beginning a Digital Audio Project Appendix 1 Questions to Ask Before Beginning a Digital Audio Project 1. What is your purpose for transferring analog audio recordings to digital formats? There are many reasons for digitizing collections.

More information

USER INTERFACE. Real-time video has helped Diebold cut training time by 35 percent as well as improve call resolution times.

USER INTERFACE. Real-time video has helped Diebold cut training time by 35 percent as well as improve call resolution times. Acelity USER INTERFACE CLOUD SOFTWARE Chris Lynch of Acelity discusses what user interface really means and why it is a critical consideration for today s field service solutions. A property management

More information

M.M. Roberts Stadium. Challenge. Solution. Benefits

M.M. Roberts Stadium. Challenge. Solution. Benefits M.M. Roberts Stadium Challenge Faced with crowd outbursts, fan disturbances, and other serious security threats, M.M. Roberts Stadium needed a surveillance solution to boost patron safety, reduce operational

More information

and By Al Flapan KN4FA

and By Al Flapan KN4FA The Amateur Auxiliary of the FCC and The ARRL s OO Program By Al Flapan KN4FA OOC South FloridaSection What is the Amateur Auxiliary The Amateur Auxiliary is composed of approximately 700 ARRL volunteer

More information

Multi-Media Card (MMC) DLL Tuning

Multi-Media Card (MMC) DLL Tuning Application Report Multi-Media Card (MMC) DLL Tuning Shiou Mei Huang ABSTRACT This application report describes how to perform DLL tuning with Multi-Media Cards (MMCs) at 192 MHz (SDR14, HS2) on the OMAP5,

More information

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017 Internet of things (IoT) Regulatory aspects 1 Trilok Dabeesing, ICT Authority 28 June 2017 2 IoT Regulatory aspects IoT - the interconnection via the Internet of computing devices embedded in everyday

More information

administration access control A security feature that determines who can edit the configuration settings for a given Transmitter.

administration access control A security feature that determines who can edit the configuration settings for a given Transmitter. Castanet Glossary access control (on a Transmitter) Various means of controlling who can administer the Transmitter and which users can access channels on it. See administration access control, channel

More information

Applying to carry BBC content and services: a partners guide to process

Applying to carry BBC content and services: a partners guide to process Applying to carry BBC content and services: a partners guide to process June 2018 Introduction 1. This document outlines the processes the BBC follows in meeting partner s requests to carry 1 BBC content

More information

Device Management Requirements

Device Management Requirements Device Management Requirements Approved Version 2.0 09 Feb 2016 Open Mobile Alliance OMA-RD-DM-V2_0-20160209-A [OMA-Template-ReqDoc-20160101-I] OMA-RD-DM-V2_0-20160209-A Page 2 (14) Use of this document

More information

Modelling Prioritisation Decision-making in Software Evolution

Modelling Prioritisation Decision-making in Software Evolution Modelling Prioritisation Decision-making in Software Evolution Denisse Muñante 1, Fitsum Meshesha Kifetew 1, and Oliver Albrecht 2 1 Fondazione Bruno Kessler, Italy munante kifetew@fbk.eu 2 SEnerCon GmbH,

More information

Growing the Digital Business: Spotlight on the Internet of Things. Accenture Mobility Research 2015

Growing the Digital Business: Spotlight on the Internet of Things. Accenture Mobility Research 2015 Growing the Digital Business: Spotlight on the Internet of Things Accenture Mobility Research 2015 Introduction 2 The Internet of Things is experiencing exponential growth fueled by decreasing costs in

More information

Why, How, Who, and other Questions

Why, How, Who, and other Questions Piloting E-Books Why, How, Who, and other Questions Diane Baden O Neill Library, Boston College Good Practices for Great Outcomes OCLC, Harvard University November 30, 2011 Outline About Boston College

More information

Netflix Originals. Rate Card and Scope Of Work

Netflix Originals. Rate Card and Scope Of Work Netflix Originals Rate Card and Scope Of Work Rate Card : Originals Master Fulfillment Rates Mastering Service Per min rate 1 A/V with IMF Packaging for 4K/UHD + MASTER QC $50.00 2 A/V with IMF Packaging

More information

Life Changers International Church. Job Description

Life Changers International Church. Job Description Life Changers International Church Job Description Job Title: Church Production Manager - Editor FLSA Status: Exempt Dept: GDM Date: March 2018 Reports to: Director of Gregory Dickow Ministries Job Summary

More information

Privacy Policy. April 2018

Privacy Policy. April 2018 Privacy Policy April 2018 Contents 1 Purpose of this policy 2 2 Overview 2 3 Privacy Policy 2 3.1 Rights to Privacy 2 3.2 What kinds of personal information does APN Group collect? 2 3.3 Collection of

More information

VENDOR MANUAL VERSION 2.0. SECTION 8 Quality Assurance Requirements

VENDOR MANUAL VERSION 2.0. SECTION 8 Quality Assurance Requirements VENDOR MANUAL 2017-2018 VERSION 2.0 SECTION 8 Quality Assurance Requirements Updated as of October 7, 2017 TABLE OF CONTENTS Contents Quality Assurance Program 1 Reporting and Quality Approval Process

More information

WORLD LIBRARY AND INFORMATION CONGRESS: 75TH IFLA GENERAL CONFERENCE AND COUNCIL

WORLD LIBRARY AND INFORMATION CONGRESS: 75TH IFLA GENERAL CONFERENCE AND COUNCIL Date submitted: 29/05/2009 The Italian National Library Service (SBN): a cooperative library service infrastructure and the Bibliographic Control Gabriella Contardi Instituto Centrale per il Catalogo Unico

More information

Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n

Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4115 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

Start of DTV Transition 600 MHz repacking

Start of DTV Transition 600 MHz repacking Start of DTV Transition 600 MHz repacking April 21, 2017 Building a prosperous and innovative Canada Brief Recap of Prior Presentations DTV Application Process 600 MHz Repacking (Nov. 21, 2016) Application

More information