Presented by: Nick McHugh Date: 15/11/2005 Security, Safety, Confidence.

Slides:



Advertisements
Similar presentations
MGD Services, Inc. The IT Quality Assurance Specialists
Advertisements

Ethics in Field Research Philip Verwimp 27 February, 2014.
Data Protection.
Thematic Workshop on Synergies for Capacity Building Geneva, Switzerland 30 March – 2 April National Capacity Requirements Under International Agreements.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Auditing Computer Systems
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
University of Sunderland CIFM03Lecture 1 1 Quality Management of IT CIFM03 Introduction.
Microsoft Office Open XML Formats Brian Jones Lead Program Manager Microsoft Corporation.
Data Preservation Best Practices for preserving your research data for future reuse The goal of data preservation is to ensure that your data is in a sustainable.
Electrolux System Integration Projects
SharePoint at SRP Perry Bellaire Content Management Salt River Project 2/9/2010.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Characterizing the Existing Network Designing and Supporting Computer Networks.
Laboratory Biorisk Management Standard CWA 15793:2008
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Information Architecture Linden Daniels. Steps of a Successful Information Architecture Discovery Education Design Migration Monitor.
Certification Approaches EAC Meeting Miami, FL August 2008 Gordon Gillerman Conformity Assessment Advisor Homeland Security National Institute of Standards.
ESTA Technical Standards Committee Product Stewardship.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Product Stewardship: Putting It into Practice GCWellon, Manager, Responsible Care Methanex Corporation June 2010.
ArcGIS Data Reviewer: An Introduction
Use of Administrative Data Seminar on Developing a Programme on Integrated Statistics in support of the Implementation of the SNA for CARICOM countries.
Microsoft Office 365 Proposal Presentation
Icphso 2010 Annual Meeting and Training Symposium Washington DC 15 th February 2010 Stakeholders response to OECD Draft report on Enhancing Information.
Agenda Introduction Student Day 2006 Microsoft IT Academy MSDN Academic Alliance Questions Paul Lo Academic Advisor Paul Lo Academic.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
ELandings Data Extract Mechanisms. Data Extract Options:
HND Computing Unit 8 Quality Management Prepared by S Hargrave
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
Office of Pipeline Safety Hazardous Liquid Pipeline Integrity Management July , 2002 Houston, Texas Welcome.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
1 Calgary SharePoint Users Group The Challenges of Office 365.
Library Security Issues and Policies Patron access and protection: Staff Security: Mitigating Actions By John R. Sanders LIS Aug 2004.
LESSONS LEARNED FROM RECENT PIPELINE INCIDENTS FLORIDA NATURAL GAS ASSOCIATION (FNGA) OPERATING & MARKETING CONFERENCE ROD WALKER PRINCIPAL CONSULTANT.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
© 2016 IBM Corporation Virtual Appliance migration self-assessment May 2016 IBM Security Identity Manager.
Chapter 8 Controlling Information Systems: IT Processes.
Workshop on E-waste Recycling and Refurbishing: Environmentally Sound Management Practices Guidance Supporting Environmentally Sound Management (ESM)
DXL to PST Converter presents
GS-R-3 vs. ISO 9001:2008 Requirements - 4
Safety Accountabilities
Information Security Seminar
Standards and Certification Training
Portable License Utility
RBEAP Risk Based Exposure Assessment Process
All data occupies physical space, even if we don't think of it as such.
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Managing Content: You Need To Think About More Than Office 365
Presentation pattern Please use this pattern to prepare your presentation for Smart Systems Integration The presentation should be brought on a USB-Stick.
05 | Making the Cloud Transition
Data SIG Proposed Terms Of Reference
OpenAccess Coalition: Goals and Status
Learning bulletin Developer Services Thames Valley
Risk Management NDS Forum June 23rd 2010.
Management of Pollution Risks at Activity Cessation GROUP HSE RULE (CR-GR-HSE-421) EXECUTIVE SUMMARY This rule sets the HSE requirements for the management.
Presentation transcript:

Presented by: Nick McHugh Date: 15/11/2005 Security, Safety, Confidence

Agenda Data – the need for security Data security within QAS solutions QAS Integrations – ensuring they are safe Making your solution safe Summary

The need for security QAS BS7799 (ISO17799) Collection and dissemination Processed Managed, transferred and stored Data Protection Act

Data – why it must be secure Sensitive data >18 suppliers of data Data not ours Sharing Contractual obligations What you can do with it Who can use it

Security within QAS solutions Data Binary format

Names data file

Security within QAS solutions Data Binary format Can’t modify it Can’t read it Access only through QAS products Standalone & APIs License control Data level

Ensuring integrations are safe Risk 3 rd party software Internal standards Support, SLA Your responsibility Error handling Correct logic Threading Loose Vs strong coupling

Making your solution safe Ask for help Speak to us Web site Manuals, tech notes, sample code QAS accreditation Assess integration Technical & functional perspective Recommend changes Document set up

QAS integration service Assist or undertake integrations Experts Planning & coding Reduces integration time Migration services Training Making your solution safe

Summary Security Confidence in supplier Contractual obligations QAS security Safety Ensuring your solution is safe Assistance from QAS