General approach and methodology Sample Clauses

General approach and methodology. This section begins with a brief review of the assurance metrics that earlier deliverables recorded as relevant to privacy, trust and identity management. Listed is the set of privacy principles that WP3 identified as important to providing an assurance indication. The assessment of assurance is subdivided by: Safeguards Analysis of vulnerabilities present in the architecture, and whether an exploitable threat either now or in the future. Threat analysis Analysis of the current/future threat landscape. Reputation Analysis of threats that relate to reputation, since reputation is a dominant trust indicator. Testing An assurance assessment is in part derived form a testing phase (in addition to the assessment of the documented architecture). The architecture needs to be able to support testing. The way in which these various elements link together to create the assurance metric is shown in Figure 16. Here, the threat, vulnerability and reputation analysis all feed into the testing schedule. Threat Analysis Reputation Analysis PICOS Architecture Testing Schedule Testing PICOS Prototype 2.1 and D3.3.1, we foresee that the assurance work for the second cycle will mainly focus on a subset of the trust and privacy principles. These include the following11: PrP01: Notice of collection (PP1) PrP10: Fair and lawful Means (PP1) PrP13: Third-party Disclosure (PP1) PrP17: Authentication (PP17) PrP18: Safeguards (PP1,PP4) PrP21: Data Management (PP2) PrP22: End-to-end Privacy (PP9) PrP24: Multiple Persona (PP18) TrP03: Provenance (PP12) TrP05: Audit (PP14) TrP06: Objective/Subjective Trust (PP16) TrP07: Consensus (PP21) 11 PICOS deliverable D3.4.1 provides a comprehensive description of the PICOS Privacy Principles (PrP) and PICOS Trust Principles (TrP), and their relationships with the Privacy Principles (PP) that were used in deliverable D4.1 TrP08: Accountability (PP23) The remaining principles might be treated more briefly, either because they are considered to have already been taken into account in a satisfactory way in the first cycle, or because they are regarded to be not very relevant for the PICOS applications. The principle PrP18 Safeguards is particularly important at this stage, and a sub-section below is dedicated to it. Following our assurance based development methodology described in deliverable D3.1.1, we plan for the second phase of the PICOS project to concentrate on an analysis of threats, risks and vulnerabilities concerning trust and privacy in P...
AutoNDA by SimpleDocs

Related to General approach and methodology

  • Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.

  • Other Methods of Procurement of Goods and Works The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: (a) National Competitive Bidding (b) Shopping (c) Direct Contracting

  • Particular Methods of Procurement of Goods Works and Services (other than Consultants’ Services)

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Service Level Standards In addition to all other requirements in this Agreement, and in accordance with the Best Claims Practices & Estimating Guidelines, Vendor shall use reasonable and good faith efforts to meet the Service Level Standards set forth below.

  • Other Methods of Procurement of Goods and Works. The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: (a) National Competitive Bidding (b) Shopping (c) Direct Contracting

  • Design Criteria and Standards All Projects/Services shall be performed in accordance with instructions, criteria and standards set forth by the Director.

  • Testing Procedure Limitations The Asset Representations Reviewer will only be required to perform the testing procedures listed under “Tests” in Schedule A, and will have no obligation to perform additional procedures on any Subject Lease or to provide any information other than a Review Report indicating for each Subject Lease whether there was a Test Pass or a Test Fail for each Test, or whether the Subject Lease was a Test Complete and the related reason. However, the Asset Representations Reviewer may provide additional information about any Subject Lease that it determines in good faith to be material to the Review.

  • Standard Operating Procedures Standard Operating Procedures shall not contravene the Canada Labour Code, the Canadian Human Rights Code, or the Collective Agreement, and an allegation of such contravention is subject to the grievance procedure.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!