Technical Security. The Microsoft Teams site is hosted by North East Scotland College and can only be accessed by named individuals who are designated as participants and/or site owners.
Technical Security. 6.1 The cross border transfer of personal data is limited to the minimum system management and user information required by the data importer to provide systems management and support services to each data exporter and where applicable each data exporter’s clients and where required for competence data transfer and other purposes as described in Appendix 1. Privileged access rights required to conduct particular systems’ management functions may, by default, enable the assigned employee of the data importer potentially further to access the data exporter’s client’s personal data placed on servers within and outside EU within those applications. Internal access by the data importer’s assigned staff to application-level data owned by the data exporter’s clients as controllers must not be given to any of the data importer’s staff without the controller’s consent.
Technical Security. (a) Requests for Personal Data and all responses shall be sent as an email attachment through the relevant secure networks: Police National Network (“PNN”), and email domains that follow the latest Government secure email policy.
Technical Security. 1. The establishment of a method to communicate and/or push security patch updates for operating systems, software, and applications deployed in its environments. Critical patches and or updates must be deployed within thirty (30) days of release.
Technical Security. 3.1 Firewalls and anti-virus The systems are protected by firewalls, anti-virus software has been installed on relevant servers and the systems are protected against malicious code execution, in accordance with current industry standards. 15.2
Technical Security. All datasets are held on the Scottish Government’s secure SQL and SAS servers. Individual level HWB Census data will only be accessible by a limited group of statisticians in the Scottish Government’s Information Management, Improvement and Evidence Unit, along with server administrator, who have all been trained in the safe handling of data. Access is controlled at two levels:
Technical Security. Availability and robustness The Data Processor shall implement the following technical security measures regarding availability and robustness:
Technical Security. DS Security Engineering Officers (SEOs) will include post DOC offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections.
Technical Security. DS Security Engineering Officers (SEOs) will include post Defense Component offices in routine technical security countermeasures (TSCM) inspections of controlled access areas at post, where the technical threat warrants such routine inspections. DOD is responsible for the costs of TSCM inspections of Defense Component offices at posts where DS has determined that the technical threat does not warrant more frequent inspections. The Defense Component Headquarters or the DOD Executive Agent may dispatch people and equipment to post to conduct technical security inspections and investigations of post Defense Component Offices. Such activities will be coordinated in advance with DS, the RSO and the DOD Executive Agent. All information obtained from such investigations will be shared with the RSO, the Defense Component Office at post, DS and the DOD Executive Agent and reported to them following the DCI Procedural Guide I-II-III.
Technical Security. Encryption The Data Processor shall implement the following technical security measures regarding encryption: