Technical Security. The Microsoft Teams site is hosted by North East Scotland College and can only be accessed by named individuals who are designated as participants and/or site owners.
Technical Security. Controls With respect to information technology infrastructure, servers, databases, or networks that Process Data, Supplier shall remain in alignment with industry security standards and shall use the following technical security controls where applicable (keeping them current by incorporating and using all updates commercially available): V.
Technical Security. (a) Requests for Personal Data and all responses shall be sent as an email attachment through the relevant secure networks: Police National Network (“PNN”), and email domains that follow the latest Government secure email policy.
(b) All emails sent by the Parties pursuant to this Agreement will be appropriately endorsed in accordance with the Government Security Classifications.
Technical Security. 3.1 Firewalls and anti-virus The systems are protected by firewalls, anti-virus software has been installed on relevant servers and the systems are protected against malicious code execution, in accordance with current industry standards.
Technical Security. 6.1 The cross border transfer of personal data is limited to the minimum system management and user information required by the data importer to provide systems management and support services to each data exporter and where applicable each data exporter’s clients and where required for competence data transfer and other purposes as described in Appendix 1. Privileged access rights required to conduct particular systems’ management functions may, by default, enable the assigned employee of the data importer potentially further to access the data exporter’s client’s personal data placed on servers within and outside EU within those applications. Internal access by the data importer’s assigned staff to application-level data owned by the data exporter’s clients as controllers must not be given to any of the data importer’s staff without the controller’s consent.
Technical Security. All datasets are held on the Scottish Government’s secure SQL and SAS servers. Individual level HWB Census data will only be accessible by a limited group of statisticians in the Scottish Government’s Information Management, Improvement and Evidence Unit, along with server administrator, who have all been trained in the safe handling of data. Access is controlled at two levels:
1. At the operating system level, using Windows Access Control Lists (ACLs) to grant access to the members of approved Active Directory security groups.
2. Within SAS metadata, using SAS Access Control Templates (ACTs) to grant access to the members of groups defined in the metadata. These servers are hosted in one of two data centres and can only be accessed from the internal Scottish Government network, known as SCOTS. The primary data centre is at Saughton House, a Scottish Government building in Edinburgh. The data is held on a storage area network (SAN) physically located in the primary data centre in Edinburgh. This data is also replicated to a SAN in the secondary data centre which is located in the Kaird, Hamilton, Scotland, and additionally backed up every weekend to separate storage in the primary data centre.
Technical Security. Availability and robustness
Technical Security. DS Security Engineering Officers (SEOs) will include post DOC offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections.
Technical Security. DS Security Engineering Officers (SEOs) will include post Defense Component offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections. DOD is responsible for the costs of TSCM inspections of Defense Component offices at posts where DS has determined that the technical threat does not warrant more frequent inspections. The Defense Component Headquarters or the DOD Executive Agent may dispatch people and equipment to post to conduct technical security inspections and investigations of post Defense Component Offices. Such activities will be coordinated in advance with DS, the RSO and the DOD Executive Agent. All information obtained from such investigations will be shared with the RSO, the Defense Component Office at post, DS and the DOD Executive Agent and reported to them following the DCI Procedural Guide I-II-III.
Technical Security. Encryption