Threat analysis and recommendations for security Sample Clauses

Threat analysis and recommendations for security. Many threats are presented in the ENISA Position paper No. 1 [ENI07a], as well as recommendations which often may be seen as countermeasures to detected threats. It is our belief that PICOS will benefit from an analysis of the recommendations included in this position paper. The following threats should be targeted: Digital dossier aggregation How are personal profiles protected? Can personal profiles be downloaded and stored by third parties Can information revealed be used for purposes and in contexts different from the ones the profile owner has considered? Secondary data collection Secondary data refers to time and length of connections, location (IP address), profiles visited, messages sent and received, and similar Is it possible for third parties to collect logged data about activities performed by users? Is it clear to users whether any secondary data is collected and in this case how it is used? Do privacy policies refer to eventually collected secondary data? Is the user informed about privacy policies concerning secondary data? Linkability from image metadata May images be tagged, allowing unwanted linkage to personal data? Account deletion Is it possible to remove secondary information linked to a profile such as public comments? Spam Is it possible to receive unsolicited messages? May those be blocked? Cross site scripting, viruses and worms Is PICOS vulnerable to cross site scripting attacks and threats originating from widgets from third parties? An answer should also be given concerning the following recommendations: Contextual information Contextual information should be used to inform people in ―real-time‖ about trust and privacy issues. Sites should publish user-friendly community guidelines rather than ―terms and conditions.‖ Accessible language easy for users to understand should be used. Stronger authentication Stronger authentication and access control should be used in certain social network environments; CAPTCHAs could be also used. Abuse reporting Possibilities for abuse reporting and detection should be maximized, and it should be easy to report abuse and concerns; ―report abuse‖ buttons should be ubiquitous. Default settings should be made as safe as possible. Deletion of data Convenient means to delete data should be provided. Simple, easy to use tools should be provided for removing accounts completely and for allowing users to edit their own posts on other people‘s pubic notes or comments area. Privacy policies and help pages...
AutoNDA by SimpleDocs

Related to Threat analysis and recommendations for security

  • Conclusion and Recommendations D. Evaluations for Offenders without a sex offense conviction shall answer the following additional referral questions in the evaluations:

  • Funding Disclaimers and Labeling A. Grantee shall not use System Agency’s name or refer to System Agency directly or indirectly in any media appearance, public service announcement, or disclosure relating to this Grant Agreement including any promotional material without first obtaining written consent from System Agency. The foregoing prohibition includes, without limitation, the placement of banners, pop-up ads, or other advertisements promoting Grantee’s or a third party’s products, services, workshops, trainings, or other commercial offerings on any website portal or internet-based service or software application hosted or managed by Grantee. This does not limit the Grantee’s responsibility to comply with obligations related to the Texas Public Information Act or Texas Open Meetings Act.

  • STATE’S ABILITY TO MODIFY SCOPE OF MASTER CONTRACT Subject to mutual agreement between the parties, Enterprise Services reserves the right to modify the goods and/or services included in this Master Contract; Provided, however, that any such modification shall be effective only upon thirty (30) days advance written notice; and Provided further, that any such modification must be within the scope of this Master Contract.

  • Notification of Modifications of Licensed Materials From time to time Publisher may add, change, or modify portions of the Licensed Materials, or migrate the Licensed Materials to other formats. When such changes, modifications, or migrations occur, the Licensor shall give notice of any such changes to Licensee as soon as is practicable, but in no event less than sixty (60) days in advance of modification. Such a notice may also be given directly by the Publisher to the Licensee. If any of the changes, modifications, or migrations renders the Licensed Materials substantially less useful to the Licensee, the Participating Institutions or their Authorized Users, the Licensee may seek to terminate this Agreement for breach pursuant to the termination provisions of this Agreement in Section XI, below.

  • Testing/Trouble Reporting 1.15.1 TWTC will be responsible for testing and isolating troubles on Network Elements. TWTC must test and isolate trouble to the AT&T network before reporting the trouble to the Network Elements Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from AT&T at the time of the trouble report, TWTC will be required to provide the results of the TWTC test which indicate a problem on the AT&T network. Version: 4Q06 Standard ICA 11/30/06

  • Sole Source as Grounds for Rejection of a Change Order If a Change Order is submitted to Contractor for the purposes of adding a Bulletin to this Contract and said Bulletin designates a Sole Source from which Contractor is required to procure goods or services necessary to perform the Work, which Sole Source has not been designated previously, Contractor shall be entitled to reject the proposed Change Order if the designated Sole Source refuses to provide to Contractor the warranties, bonds, terms or schedule required under the Contract Documents, including any warranty or terms or schedule required by Bulletins referenced in the proposed Change Order. In such event, Contractor shall give written notice to the Owner rejecting the proposed Change Order and, if possible, shall accompany said written notice with a proposal from Contractor for changes or modifications to the Bulletin so as to eliminate the Sole Source designation but to achieve goods or services equal in quality or function. The Owner may then require the Design Professional to revise the subject Bulletin so as to eliminate the designation of the Sole Source by incorporation of Contractor's proposal or otherwise. Upon revision of the Bulletin by the Design Professional and approval thereof by the Owner, the Owner shall again submit to the Contractor a proposed Change Order for the purpose of adding the revised Bulletin to this Contract. If the Owner decides to retain the Sole Source in the Change Order and Contractor cannot acquire the full contractually required warranties from the Sole Source, Contractor shall be held only to the warranty terms and schedule obtainable from the Sole Source.

  • Loop Testing/Trouble Reporting 2.1.6.1 Think 12 will be responsible for testing and isolating troubles on the Loops. Think 12 must test and isolate trouble to the BellSouth portion of a designed/non- designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Think 12 will be required to provide the results of the Think 12 test which indicate a problem on the BellSouth provided Loop.

  • REGULATORY FILINGS AND CAISO TARIFF COMPLIANCE 3.1 Filing

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • Submission of Certified Payroll Transcripts for Public Works Contracts Only Contractors and Subcontractors on public works projects must submit monthly payroll transcripts to the Authorized User that has prepared or directs the preparation of the plans and specifications for a public works project, as set forth in the Bid Specifications. For Mini-Bid solicitations, the payroll records must be submitted to the entity preparing the agency Mini-Bid project specification. For “agency specific” Bids, the payroll records should be submitted to the entity issuing the purchase order. For all other OGS Centralized Contracts, such records should be submitted to the individual agency issuing the purchase order(s) for the work. Upon mutual agreement of the Contractor and the Authorized User, the form of submission may be submitted in a specified disk format acceptable to the Department of Labor provided: 1) the Contractor/Subcontractor retains the original records; and, (2) an original signed letter by a duly authorized individual of the Contractor or Subcontractor attesting to the truth and accuracy of the records accompanies the disk. This provision does not apply to Article 9 of the Labor Law building services contracts.

Time is Money Join Law Insider Premium to draft better contracts faster.