INFORMATION AND CYBER SECURITY POLICY V1.1

Size: px
Start display at page:

Download "INFORMATION AND CYBER SECURITY POLICY V1.1"

Transcription

1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1

2 Future Generali 2 Revision History Revision / Version No Rollout Date Location of change Mumbai Thane Changed by Original Samir Kolwalkar, Reviewed by CISO Approved by Information Steering Committee The Board Description of revision Original - References Added as per observation provided by Cyber Security Audit - Added Annexure for approval from the Board

3 Future Generali 3 Definitions & Abbreviations Title Description IT Information Technology FG Non-Life Future Generali Non-Life Company Cyber-attack Any type of offensive maneuver employed by an individual / Attacker / Anonymous that target computer information systems, infrastructure, computer networks, and/or personal computer devices that steals, alters or destroys information by means of malicious act or makes the systems unreachable / inaccessible Information assets Computer hardware, disc, , web, application servers, Computer systems, application software, software, etc. System Software including: operating systems, database management systems, and backup and restore software, communications protocols, and so forth. Application Software: used by the various departments within the company, including custom written software applications, products, and software packages. Communications Network hardware and software including: routers, routing tables, modems, multiplexers, switches, firewalls, private lines, and associated network management software and tools Documents developed (Physical or Electronic) for business in any form Users All employees and contractors who use the computer systems, networks, and information resources as business partners, and individuals who are granted access to the network for the business purposes of the company

4 Future Generali 4 Vendor & Service Providers DRP IRDAI Third-party Endpoint ISC CISO Suppliers who supplied product or responsible for providing service Disaster Recovery Plan Insurance Regulatory and Development Authority of India Third-party refers to vendors, consultants and business partners doing business with the company, and other partners that have a need to exchange information with the company. Company provided Desktops, Laptops and Tabs Information Security Committee Chief Information Security Officer

5 Future Generali 5 1. INTRODUCTION The Confidentiality, Integrity, Availability and Privacy of information are of great importance to the Company and its operation. Failure in any of these areas can result in disruption to the services and loss of confidence of our customers. Cyber-attacks and Cyber-crimes are becoming more and more common, sensitive information is stolen at much faster rate. Cyber-attacks may impact the Company s operations significantly or may damage reputation on account of leakage of sensitive information. The security of our information assets is therefore regarded as fundamental to the success of the business.

6 Future Generali 6 2. OBJECTIVE The purpose of this policy is to state the intention and commitment towards the protecting and safeguarding customer s interest through adoption of right process and technology by employees. This is a formal and high-level document describing the objective, basic principles and requirements on Information Security at FG Non-Life. This policy document contains an extract from the Security Policies along with a brief description of the various policies and processes that are set in the organization to provide high-level understanding towards security requirements and commitments. The policy objectives are achieved through the implementation of Information Security Policy, which includes security standards, procedures and guidelines developed in accordance with ISO27001, sector best practices, Cyber Security Guidelines of IRDAI and other Company Policies.

7 Future Generali 7 3. SCOPE & APPLICABILITY The policy provides the minimum standards for IT Risk and Information Security for Future Generali Non-Life offices, IT operations, Computer systems, Information assets, Employees, Contractors, Temporary staff, Vendors and Suppliers.

8 Future Generali 8 4. STATEMENT The management of FG Non-Life is committed to the development, implementation and continual improvement of Information Security practices for which following shall be done: The Management has established Information Security policy The Management provides adequate support by involvement of Senior management team Apportionment of individuals who are suitably qualified and experienced with specific expertise as required to perform a designated role. To provide directions and support to the individuals contributing to the effectiveness of the security program Encourages continual improvement through the actions, resulted from periodic monitoring and measurement including Internal & External audits Identifying and sponsoring the requirement of resources through the management review meetings and takes necessary actions Management Principles: FG Non-Life has identified Management Principles to govern the Security Program. Need-to-Know and Need-to-do Basis: All information will be shared, viewed, entered and used by all the stakeholders only based on the principle of Need-to- Do and Need-to-Know. Segregation of Duties: At no point of time any activity on information assets will be permitted to specific roles or persons, by design that would result into conflict of interests.

9 Future Generali 9 Individual Accountability: Current modern world is driven by technologies; a significant level of information processing power and capabilities reside with individuals and Company empowers them more to carry out business transactions effectively. While FG Non-Life shall provide the necessary infrastructure, directions, guidelines, policies, procedures, instructions and formal or informal training, it will be the responsibility of an individual to abide by the same. Individuals will be held accountable for the set of actions performed by them outside the permissible organizational framework. Principle of proportionality: All organizational stakeholders shall have different levels of authority, responsibility and accountability, the information accesses, information rights. Information processing capabilities will follow the principles of proportionality while managing the systems. In case of any defaults, security breaches or system misuses for any intentional or unintentional purpose, individual liabilities and responsibilities will be decided on the principle of proportionality. Adherence to Law of Land: FG Non-Life operates into diverse geographies within India. FG Non-Life recognizes the supremacy of law of the land in which it operates. Information Collection, Processing, Transmission, Storage and any other system of Information Management forms part of this legal framework. FG Non-Life shall take all the necessary steps to ensure that it adheres to the law of the land at all the time.

10 Future Generali 10 Security Goal: FG Non-Life is committed to safeguard the confidentiality, integrity and availability of all information assets of the company to ensure that regulatory, operational and contractual requirements are fulfilled. Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Integrity: The property of safeguarding the accuracy and completeness of assets Availability: The property of being accessible and usable upon demand by an authorized entity The overall goals for information security at FG Non-Life are: Ensure compliance with current laws, regulations and guidelines Comply with requirements for confidentiality, integrity and availability for employees, customers and interested parties Establish controls for protecting FG Non-Life s information and information systems against theft, abuse, Cyber-attacks, disrupt and other forms of harm and loss Motivate employees and interested parties to maintain the responsibility for, ownership of and knowledge about information security, to minimize the risk of security incidents Ensure that external service providers comply with FG Non-Life s information security needs and requirements Ensure flexibility and an acceptable level of security for accessing information systems outside FG Non-Life premises Data Privacy Protection, Personal and Health information of the individual is not made available or disclosed to unauthorized individuals

11 Future Generali 11 Organizational roles responsibilities and authorities: Company has well defined structure, roles and responsibilities allocation to provide leadership guidance and governance required for accomplishing Security Program. The Board shall be responsible for the overall framework to information and cyber security policy and strategy and the information and cyber security assurance program. Information Security Committee (ISC) has been formed by a senior level executive with a reporting line to the Board to take overall responsibility for the information security governance framework. Members for ISC includes functional heads from Operations, Information Technology, Legal, Compliance, Finance, HR, Enterprise Risk Management, and Internal Audit. Roles and responsibilities of ISC has been defined and documented. Governance Structure Information Security Committee Chief Information Security Officer Information Security Administrator Administration and Implementation Users

12 Future Generali 12 CISO is responsible for articulating Information and Cyber Security policy for the Organization and provide necessary advice and support in implementation of Information and Cyber Security policies. CISO shall be responsible proposing the policy to ISC. Each Functional head, Business heads, shall be responsible for implementing the Security policy within their areas of responsibility and for ensuring the adherence of their staff to the policy. Company has identified following in specifics: External Parties Insurance Regulatory Body IRDA Financial institutions Banks, Payment Gateways External customers Needs and expectations 1. Adherence to statutory and regulatory requirements 1. Adherence to Agreements / Contractual Requirements 2. Adherence to delivery commitment 1. Adherence to delivery commitment 2. Adherence to Data Privacy and Data Security Outsourced vendors and Partners 1. Adherence to Service delivery commitments 2. Adherence to Agreements/Contractual Requirements Internal Parties Human Resources / Human Capital Needs and expectations 1. Continuity of employment 2. Motivated Work Culture 3. Drive for Good Governance

13 Future Generali Opportunities for advancement Finance 1. Approval for security initiatives 2. Adherence to payment terms and Conditions 1. Identify and select vendors at best rate 2. Adherence to delivery commitment Procurement Learning & Development Risk Management 3. Identify Terms and Conditions 1. Prepare training module and disseminate 1. Establish link between IT risks to Enterprise Risk 2. Establish link between IT DRP to Business Continuity Internal Audit Administration Legal & Compliance 1. Check adherence to set processes and policies 1. Providing Safe Working Conditions and wellequipped office Infrastructure with Security controls 1. Adherence to statutory and regulatory requirements It must be ensured that business information, inclusive of the computing systems is protected from inappropriate access, disclosure or modification. Information, as an asset, should be protected just as any other company asset and therefore to safeguard its value, FG Non-Life via this policy has mandated for its employees to go through the Policy documents, understand, accept and practice the rules and regulations that have been defined. It is the Company s policy to:

14 Future Generali 14 Ensure that information is accessible only to those authorized to have access Safeguard the accuracy and completeness of information and processing methods Ensure that authorized users have access to information and associated assets when required To identify organizational assets, define appropriate protection and responsibilities Establish and maintain formal, documented procedures for performing information risk assessments To update IT infrastructure with the supported, tested and reasonably latest OS and database patches including security patches and upgradation patches Ensure that information it manages shall be secured to protect against the consequences of breaches of confidentiality, failures of integrity or interruptions to the availability of that information Define an information classification scheme describing classes and how information of a particular class should be managed (stored, accessed, transmitted, shared, and disposed of) Meet all information security requirements under appropriate regulations, legislation, organization policies and contractual obligations Develop Business Continuity, Cyber Crisis Management and Incident Response plans for IT and business processes, which shall be maintained and tested on a regular basis Confidentiality, Integrity and Availability requirements of all business systems are to be ensured by vendor, third party staff working on behalf of the organization Promote this policy and raise awareness of information security Provide appropriate information security training for our staff and third-party contractors To connect only authorized devices, Authorized devices include PCs and workstations owned by company that comply with the configuration guidelines of the company

15 Future Generali 15 To ensure a secure method of connectivity provided between the company and all third-part companies and other entities required to electronically exchange information with company for approved business purpose System Administrators, network administrators, and security administrators will have full access to host systems, routers, switches, firewalls and other security devices as required to fulfill their respective duties. Right to inspect any data stored on computer system, or telecommunication systems, or transmitted or received via the Company s networks, in the course of investigating security incidents, or safeguarding against security threats. Computer networks and systems outside of the Company is considered as insecure Security shall be considered during the design of any IT components and Application deployment Identification and implementation of adequate controls to secure Endpoints against prevailing threats To establish suitable Data backup and retention policy To prevent unauthorized physical access, damage and interference to the organization s information and information processing facilities Identification and management of information security requirements and associated processes for information systems projects To establish logging and monitoring capabilities to detect security events in timely manner To perform formal checks through Internal Audit program User Responsibilities: This section establishes a high-level usage policy for the computer systems, networks and information resources.

16 Future Generali 16 Acceptable Use: Company has defined the Acceptable Usage policy. User accounts on company computer systems are to be used only for business of the company and not to be used for personal activities. Unauthorized use of the system may be in violation of the law, constitutes theft and can be punishable by law. Therefore, unauthorized use of the company computing system and facilities may constitute grounds for either civil or criminal prosecution. Users are personally responsible for protecting all confidential information used and/or stored on their accounts. Users are prohibited from making unauthorized copies of such confidential information and/or distributing it to unauthorized persons outside of the company. Users shall not engage in activity with the intent to: harass other users; degrade the performance of the system; divert system resources to their own use; or gain access to company systems for which they do not have authorization. Users will be responsible for all transactions occurring during Logon sessions initiated by use of the User s password and ID. Users shall not logon to a computer and then allow another individual to use the computer or otherwise share access to the computer systems. Users shall not attach unauthorized devices on their computers, unless they have specific authorization. Users shall not download unauthorized software onto their computers. Users are required to report any weaknesses in the company computer security, any incidents of misuse or violation of security policy to their immediate supervisor / IT Security / IT Helpdesk.

17 Future Generali 17 Use of the Internet: The company will provide Internet access to users for business-related purposes such as obtaining useful business information and relevant technical and business topics. The Internet service shall not be used for transmitting, retrieving or storing any communications of a discriminatory or harassing nature or which are derogatory to any individual or group, obscene or pornographic, or defamatory or threatening in nature for chain letters or any other purpose which is illegal or for personal gain. Monitoring Use of Computer Systems: The company has the right to monitor electronic information created and/or communicated by users using company s computer systems and networks, including e- mail messages and usage of the Internet. Users should be aware that the company may monitor usage, including, but not limited to, patterns of usage of the Internet, and electronic files and messages to the extent necessary to ensure that the Internet and other electronic communications are being used in compliance with the law and with company policy. Access Control: A fundamental component of Security Policy is controlling access to the critical information assets that require protection from unauthorized disclosure or modification. Access controls exist at various layers of the system, including the network. Access

18 Future Generali 18 control is implemented by logon ID and password. At the application and database level, other access control methods shall be implemented to further restrict access. Employee Login account shall be deactivated as soon as possible upon employee termination or exit. Exception Management: ISC shall review and approve the exceptions to the Information Security Policy. Any significant risk shall be reported to the Board. Operational level exceptions can be approved by respective Business owner in consultation with CISO. If the requirement differs from the guideline due to applicable laws, and regulations, the exception shall be reviewed and approved by the Board. Security Incident Handling Procedures: This policy provides guidelines and procedures for handling security incidents. The term security incident is defined as any irregular or adverse event that threatens the security, integrity, or availability of the information resources on any part of the company network. Employees, who believe their terminal or computer systems have been subjected to a security incident, or has otherwise been improperly accessed or used, should report the situation to ITSecurity / ITHelpdesk / Supervisor immediately. Adherence to this policy will help to protect the Company, Employees, and Customers from information security threats, whether internal or external, deliberate or accidental. We at FG Non-Life are committed for good information security practices for our stakeholders, employees and customers. It is recognized that detailed policies and procedures are required, and the Company is committed to implementing these in full.

19 Future Generali 19 Communication: Information Security policy shall be communicated to all Users of the company. Compliance: Compliance to the Security Policies and Guidelines is mandatory. All users using the information technology resources of the Company must ensure that they understand the policies and guidelines and comply with the same. Disciplinary Action: Every user of FG Non-Life s information systems shall comply with information security policies. The company takes the issue of security seriously. Violation of policy and of relevant security requirements will therefore constitute a breach of trust between the user and FG Non-Life and may have consequences for employment or contractual relationships. The specific discipline imposed will be determined by a case-by-case basis, taking into consideration the nature and severity of the violation of the Security Policy, prior violations history, regulations, laws and all other relevant information. The Company may refer the information to law enforcement agencies and/or prosecutors for consideration as to whether criminal charges should be filed against the alleged violator(s). Review: Information Security policies shall be reviewed every 12 months or sooner as necessary by the CISO to ensure that it remains up-to-date in the light of relevant legislation, organizational procedures or contractual obligations.

20 Future Generali 20 References: - ISMS Manual - IT Security Policy - IT Compliance Management Policy - Network Security Policy Annexure I: Approval from The Board

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

Data Protection Agreement

Data Protection Agreement Data Protection Agreement This Data Protection Agreement (the DPA ) becomes effective on May 25, 2018. The Customer shall make available to GURTAM and the Customer authorizes GURTAM to process information

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

DATA PROCESSING ADDENDUM

DATA PROCESSING ADDENDUM DATA PROCESSING ADDENDUM This Data Processing Addendum ( DPA ) forms part of the End User License and Services Agreement (the Agreement ) between Customer and Ivanti, to reflect the parties agreement about

More information

H 7789 S T A T E O F R H O D E I S L A N D

H 7789 S T A T E O F R H O D E I S L A N D ======== LC001 ======== 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT Introduced By: Representatives

More information

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit Page 1 of 24 NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0 (Glossary provided at end of document.) Information Security 1.1 Information Security

More information

PCI Compliance and Payment Card Processing Policy

PCI Compliance and Payment Card Processing Policy PCI Compliance and Payment Card Processing Policy Policy Number: Effective Date: Approval: Office: PURPOSE: The University of Indianapolis accepts payment cards on payment for goods and services under

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

March 1. HIPAA Privacy Policy

March 1. HIPAA Privacy Policy March 1 HIPAA Privacy Policy 2016 1 PRIVACY POLICY STATEMENT Purpose: The following privacy policy is adopted by the Florida College System Risk Management Consortium (FCSRMC) Health Program and its member

More information

Title CIHI Submission: 2014 Prescribed Entity Review

Title CIHI Submission: 2014 Prescribed Entity Review Title CIHI Submission: 2014 Prescribed Entity Review Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated health

More information

HOW TO REGISTER ON THE OECD ESOURCING PORTAL

HOW TO REGISTER ON THE OECD ESOURCING PORTAL HOW TO REGISTER ON THE OECD ESOURCING PORTAL Bidder - User Guide OECD all rights reserved Create your Organisation Profile Access the esourcing Portal following the link: https://oecd.bravosolution.com

More information

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses)

DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) DATA PROCESSING AGREEMENT (GDPR, Privacy Shield, and Standard Contractual Clauses) This Data Processing Agreement ("DPA") forms part of the Master Services and Subscription Agreement between Customer and

More information

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations ! SECURITY POLICY This Security Policy ( Policy ) applies to all Services provided by Collective Medical Technologies, Inc. ( CMT ) pursuant to a Master Subscription Agreement ( Underlying Agreement )

More information

Cyber ERM Proposal Form

Cyber ERM Proposal Form Cyber ERM Proposal Form This document allows Chubb to gather the needed information to assess the risks related to the information systems of the prospective insured. Please note that completing this proposal

More information

4.1 Risk Assessment and Treatment Assessing Security Risks

4.1 Risk Assessment and Treatment Assessing Security Risks Information Security Standard 4.1 Risk Assessment and Treatment Assessing Security Risks Version: 1.0 Status Revised: 03/01/2013 Contact: Chief Information Security Officer PURPOSE To identify, quantify,

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

AonLine Service Agreement Effective July 19, By logging into AonLine, user agrees to these terms and conditions (T&C):

AonLine Service Agreement Effective July 19, By logging into AonLine, user agrees to these terms and conditions (T&C): AonLine Service Agreement Effective July 19, 2014 By logging into AonLine, user agrees to these terms and conditions (T&C): 1. Definitions. For purposes of this Agreement, the following definitions shall

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

TERMS AND CONDITIONS OF USE

TERMS AND CONDITIONS OF USE TERMS AND CONDITIONS OF USE Thank you for visiting the Society of Actuaries ( SOA ) Web site. Please be aware that visitors are subject to the following Terms and Conditions of Use (these Terms ) established

More information

Lystable SaaS Terms of Use

Lystable SaaS Terms of Use of Use These Lystable software as a service (SaaS) terms of use (the Terms ) are effective as of the Effective Date and in conjunction with the Privacy Policy and any other terms and conditions of use

More information

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES I, Maria T. Vullo, Superintendent of Financial Services, pursuant to the

More information

Credit Card Handling Security Standards

Credit Card Handling Security Standards Credit Card Handling Security Standards Overview This document is intended to provide guidance regarding the processing of charges and credits on credit and/or debit cards. These standards are intended

More information

Kalo SaaS Terms of Use

Kalo SaaS Terms of Use of Use These Kalo software as a service (SaaS) terms of use (the Terms ) are effective as of the Effective Date and in conjunction with the Privacy Policy and any other terms and conditions of use which

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds

More information

SPECIAL CONDITIONS ( SPECIAL CONDITIONS ) FOR BUSINESS NETVIGATOR SERVICE ( BNS )

SPECIAL CONDITIONS ( SPECIAL CONDITIONS ) FOR BUSINESS NETVIGATOR SERVICE ( BNS ) SPECIAL CONDITIONS ( SPECIAL CONDITIONS ) FOR BUSINESS NETVIGATOR SERVICE ( BNS ) The Special Conditions for the BNS are additional to the General Conditions of Services of Hong Kong Telecommunications

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

IT Risk in Credit Unions - Thematic Review Findings

IT Risk in Credit Unions - Thematic Review Findings IT Risk in Credit Unions - Thematic Review Findings January 2018 Central Bank of Ireland Findings from IT Thematic Review in Credit Unions Page 2 Table of Contents 1. Executive Summary... 3 1.1 Purpose...

More information

FOR COMMENT PERIOD NOT YET APPROVED AS NEW STANDARD

FOR COMMENT PERIOD NOT YET APPROVED AS NEW STANDARD UPDATED STANDARD FOR COMMENT OCT 2017 Page 1 of 23 NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA (Glossary provided at end of document.) Information

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service)

Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service) Chesapeake Regional Information System for Our Patients, Inc. ( CRISP ) HIE Participation Agreement (HIE and Direct Service) A. CRISP is a private Maryland non-stock membership corporation which is tax

More information

APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS

APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS Background States must obtain an examination report by an independent auditor of the State electronic benefits transfer (EBT) service providers (service

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

South Carolina General Assembly 122nd Session,

South Carolina General Assembly 122nd Session, South Carolina General Assembly 122nd Session, 2017-2018 R184, H4655 STATUS INFORMATION General Bill Sponsors: Reps. Sandifer and Spires Document Path: l:\council\bills\nbd\11202cz18.docx Companion/Similar

More information

Principles. Bison Transport will implement policies and procedures to give effect to this policy, including:

Principles. Bison Transport will implement policies and procedures to give effect to this policy, including: Principles The ten principles that form this policy are interrelated, and Bison Transport will adhere to the ten principles as a whole. This policy, then, applies to personal information about Bison Transport

More information

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT WITH THE DOCTORS CLINIC, PART OF FRANCISCAN MEDICAL GROUP and THIS AGREEMENT ( Agreement ) is made and entered into this day of, 20, by and between The Doctors

More information

Data Processing Appendix

Data Processing Appendix Company Name* Execution Date *Company name indicated must conform to the name on customer s Master Subscription Agreement executed with SugarCRM. This Data Processing Appendix on the processing of personal

More information

Bitwise ( Wifi ) Internet Customer Agreement

Bitwise ( Wifi ) Internet Customer Agreement Bitwise ( Wifi ) Internet Customer Agreement This Agreement is made by and between Bitwise, Inc. ( Bitwise ) a Michigan company with a headquarters address at 411 West Flint Street, Davison, MI and Customer

More information

DATA PROCESSING ADDENDUM FOR CUSTOMERS AND USER OF AEROHIVE PRODUCTS AND SERVICES. Version May 2018

DATA PROCESSING ADDENDUM FOR CUSTOMERS AND USER OF AEROHIVE PRODUCTS AND SERVICES. Version May 2018 DATA PROCESSING ADDENDUM FOR CUSTOMERS AND USER OF AEROHIVE PRODUCTS AND SERVICES 1. Scope and Order of Precedence Version May 2018 This Data Processing Addendum (this DPA ) is deemed an addendum to the

More information

GLOBAL CODE OF CONDUCT AND ETHICS

GLOBAL CODE OF CONDUCT AND ETHICS Author: Legal Department Updated by: Global Compliance Release Date: 10 September 2014 Last Reviewed: 10 September 2014 Status: Approved Owner: Legal Department Version: 2.0 Custodian: Global Compliance

More information

Albany State University Telecommunications Policy for Wireless Devices

Albany State University Telecommunications Policy for Wireless Devices Albany State University Telecommunications Policy for Wireless Devices Purpose To provide guidelines for the acquisition, use, and payment of wireless communications devices for university-related business.

More information

HIPAA Security. ible. isions. Requirements, and their implementation. reader has

HIPAA Security. ible. isions. Requirements, and their implementation. reader has HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

CLOUDINARY DATA PROCESSING ADDENDUM

CLOUDINARY DATA PROCESSING ADDENDUM CLOUDINARY DATA PROCESSING ADDENDUM This Data Processing Addendum ( DPA ) forms part of the agreement for the subscription by the Customer to the Cloudinary Service ("Subscription Agreement") between Cloudinary

More information

The Province of British Columbia. Privacy Protection Measures

The Province of British Columbia. Privacy Protection Measures The Province of British Columbia Privacy Protection Measures The measures listed in this document reflect a wide range of strategies available for consideration when negotiating a contract with a U.S.

More information

IDEXX - DATA PROTECTION AGREEMENT

IDEXX - DATA PROTECTION AGREEMENT IDEXX - DATA PROTECTION AGREEMENT (A) (B) (C) (D) IDEXX and Customer have entered into an Agreement. In the context of the Agreement, IDEXX will process Personal Data on behalf of and for the benefit of

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT The Guide to Completing a PRIVACY IMPACT ASSESSMENT Under the Access to Information and Protection of Privacy Act, 2015 June 2016 Table of Contents Part A Introduction to Privacy Impact Assessments...

More information

Contingent Worker Code of Conduct

Contingent Worker Code of Conduct Contingent Worker Code of Conduct Introduction HP is committed to the highest standards of business ethics and regulatory compliance. We gain trust by treating others with integrity, respect and fairness.

More information

Information security policy

Information security policy Information security policy Policy objectives 1 This policy is intended to establish the necessary policies, procedures and an organisational structure that will protect NMC s information assets and critical

More information

Application for Online Access to Motor Vehicle Records

Application for Online Access to Motor Vehicle Records ALL PAGES MUST BE COMPLETED AND SUBMITTED FOR YOUR REQUEST TO BE CONSIDERED. SIGNATURE IS REQUIRED ON THE LAST PAGE. Once completed, mail this form to the New Jersey Motor Vehicle Commission (MVC), unit

More information

Penn Wisp LLC. TERMS OF SERVICE April 15, 2015

Penn Wisp LLC. TERMS OF SERVICE April 15, 2015 Penn Wisp LLC. TERMS OF SERVICE April 15, 2015 PLEASE READ THIS ENTIRE AGREEMENT CAREFULLY. This Agreement with you (the "Customer"), consists of this document, and the Service order (collectively, the

More information

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual Eastern Iowa Mental Health and Disability Services HIPAA Policies and Procedures Manual This HIPAA Master Manual has been reviewed, accepted and approved by: Eastern Iowa MH/DS Region Governing Board of

More information

MentorcliQ Data Processing Agreement

MentorcliQ Data Processing Agreement MentorcliQ Data Processing Agreement This MentorcliQ Data Processing Agreement ( DPA ), that includes the Standard Contractual Clauses adopted by the European Commission, as applicable, reflects the parties

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

Cyber Security Insurance Proposal Form

Cyber Security Insurance Proposal Form Cyber Security Insurance Proposal Form This proposal must be completed and signed by a Principal, Partner or Director of the Proposer. The person completing and signing the form should be authorised by

More information

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE Deerfield Insurance Company Evanston Insurance Company Essex Insurance Company Markel American Insurance Company Markel Insurance Company Associated International Insurance Company DataBreach SM APPLICATION

More information

TERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE

TERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE TERMS These Terms govern your use of the Clarivate Analytics products and services in your order form. We, our and Clarivate means the Clarivate entity identified in the order form and, where applicable,

More information

EU Data Processing Addendum

EU Data Processing Addendum EU Data Processing Addendum This EU Data Processing Addendum ( Addendum ) is made and entered into by and between AlienVault, Inc., a Delaware corporation ( AlienVault ) and the customer specified in the

More information

DATA PROCESSING ADDENDUM

DATA PROCESSING ADDENDUM DATA PROCESSING ADDENDUM This Data Processing Addendum ( DPA ) forms part of the Master Purchase Agreement, Customer Agreement, Channel Partner Agreement, End User License Agreement or other written agreement

More information

Supplier Code of Conduct

Supplier Code of Conduct Supplier Code of Conduct VERIZON SUPPLIER CODE OF CONDUCT The Verizon Supplier Code of Conduct ( Supplier Code ) sets forth principles that Verizon has adopted to promote ethical conduct in the workplace,

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016 Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions June 2016 Program Overview Regulatory Environment Who Needs a Privacy Program and Common Questions Components of a Comprehensive

More information

ANTI-FRAUD CODE CONTENTS INTRODUCTION GOAL CORPORATE REFERENCE FRAMEWORK CONCEPTUAL FRAMEWORK ACTION FRAMEWORK GOVERNANCE STRUCTURE

ANTI-FRAUD CODE CONTENTS INTRODUCTION GOAL CORPORATE REFERENCE FRAMEWORK CONCEPTUAL FRAMEWORK ACTION FRAMEWORK GOVERNANCE STRUCTURE ANTI-FRAUD CODE CONTENTS INTRODUCTION GOAL CORPORATE REFERENCE FRAMEWORK CONCEPTUAL FRAMEWORK ACTION FRAMEWORK GOVERNANCE STRUCTURE PREVENTION, DETECTION, INVESTIGATION AND RESPONSE MECHANISMS APPLICATION

More information

MANITOBA OMBUDSMAN PRACTICE NOTE

MANITOBA OMBUDSMAN PRACTICE NOTE MANITOBA OMBUDSMAN PRACTICE NOTE Practice notes are prepared by Manitoba Ombudsman to assist persons using the legislation. They are intended as advice only and are not a substitute for the legislation.

More information

THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES

THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES Policy All vendors and third-party information technology service providers must comply with all applicable UT Health San Antonio policies. A. Contracts

More information

RECITALS. WHEREAS, this Amendment incorporates the various amendments, technical and conforming changes to HIPAA implemented by the Final Rule; and

RECITALS. WHEREAS, this Amendment incorporates the various amendments, technical and conforming changes to HIPAA implemented by the Final Rule; and Amendment to Business Associate Agreements and All Other Contracts Containing Embedded Business Associate Provisions as stated in a Health Insurance Portability and Accountability Act Section between Independent

More information

CODE OF BUSINESS CONDUCT FOR THE LIFETIME HEALTHCARE COMPANIES

CODE OF BUSINESS CONDUCT FOR THE LIFETIME HEALTHCARE COMPANIES CODE OF BUSINESS CONDUCT FOR THE LIFETIME HEALTHCARE COMPANIES Approved January 29, 1999 Revised and Approved May 19, 2000, March 30, 2006 Welcome to The Lifetime Healthcare Companies. I am pleased to

More information

Permitted Mobile Banking Transfers Mobile Deposit Capture

Permitted Mobile Banking Transfers Mobile Deposit Capture TERMS AND CONSENT APPLICABLE TO ONLINE BANKING, ELECTRONIC SIGNATURES, EMAIL, FACSIMILE, AND OTHER ELECTRONIC SERVICES, COMMUNICATIONS, AND TRANSACTIONS Introduction The use of Patriot Federal Credit Union

More information

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

HOW TO INSURE CYBER RISKS? Oulu Industry Summit HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN

More information

U.S. Eagle Federal Credit Union Mobile Banking Agreement

U.S. Eagle Federal Credit Union Mobile Banking Agreement U.S. Eagle Federal Credit Union Mobile Banking Agreement Please read these Agreements carefully before accessing or using this service. By accessing or using the service, you agree to be bound by the terms

More information

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph.

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph. Managing Information Privacy & Security in Healthcare The HIPAA Security Rule in Plain English 1 By Kristen Sostrom and Jeff Collmann Ph.D This document includes a Plain English explanation for the general

More information

CBSA PRIVACY POLICY. Canadian Business Strategy Association Page 1

CBSA PRIVACY POLICY. Canadian Business Strategy Association Page 1 CBSA PRIVACY POLICY The CBSA Privacy Policy is a statement of principles and policies regarding the protection of personal information provided by the Canadian Business Strategy Association. The objective

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING Pg. 1 of 3 DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE This Memorandum of Understanding (MOU) is entered

More information

The Allied Group Privacy Shield Policy

The Allied Group Privacy Shield Policy The Allied Group Privacy Shield Policy The Allied Group, Inc. ("Allied") has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection.

More information

and legally represented by Antoniou Antoni, as a legally

and legally represented by Antoniou Antoni, as a legally COMPLEMENTARY AGREEMENT ON THE CONTRACT FOR PROVIDING INVESTMENT AND ANCILLARY SERVICES DATING The current agreement is drawn today at in Larnaca between: 1. Prochoice Chrimatistiriaki Ltd (Registration

More information

SCCCI Personal Data Protection Policy

SCCCI Personal Data Protection Policy SCCCI Personal Data Protection Policy At SCCCI, we are committed to protecting and safeguarding the personal data we collected from you. This Personal Data Protection Policy describes the types of personal

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

DATA HANDLING AGREEMENT

DATA HANDLING AGREEMENT DATA HANDLING AGREEMENT This agreement is for the provision of the transfer of school data between the School, Wonde and approved third party applications. Wonde Ltd a company registered in England under

More information

SureRent 2020 Private Landlord Tenant Screening Application Package

SureRent 2020 Private Landlord Tenant Screening Application Package Page 1 of 9 SureRent 2020 Private Landlord Tenant Screening Application Package Welcome to Alliance 2020. Your membership packet includes several forms that you must complete before service can be started,

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Please read this Terms of Use agreement (the agreement ) carefully. It is a legal and binding contract between you and Franciscan Health and Wellness Services, Inc. d/b/a HEALTHY

More information

Lloyds Steels Industries Limited. Internal Financial Control Framework

Lloyds Steels Industries Limited. Internal Financial Control Framework Internal Financial Control Framework Introduction Section 134 (5) (e) of the Companies Act, 2013 requires Directors of a listed company to state in their Directors Responsibility Statement that they have

More information

Managing E-Commerce Risks

Managing E-Commerce Risks Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery

More information

THE HARTFORD CYBERCHOICE 2.09 SM

THE HARTFORD CYBERCHOICE 2.09 SM THE HARTFORD CYBERCHOICE 2.09 SM CYBER AND TECHNOLOGY RISK AND LIABILITY INSURANCE (INSURER NAME) NOTICE: THE LIABILITY COVERAGE PARTS SCHEDULED IN ITEM 5 OF THE DECLARATIONS PROVIDE CLAIMS MADE COVERAGE.

More information

DATA PROTECTION ADDENDUM

DATA PROTECTION ADDENDUM DATA PROTECTION ADDENDUM In the event an agreement ( Underlying Agreement ) entered into by and between (i) either Sunovion Pharmaceuticals Inc. or its subsidiary, Sunovion Pharmaceuticals Europe Ltd.

More information

T E R M S A N D C O N D I T I O N S

T E R M S A N D C O N D I T I O N S T E R M S A N D C O N D I T I O N S F O R S E R V I C E S 1. INTRODUCTION VOLVO wants to offer you the best available Services (as defined below in this Section 1) to make your VOLVO driving experience

More information

HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Privacy & Security. Transportation Providers 2017 HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information

More information

SCHEDULE A TERMS AND CONDITIONS

SCHEDULE A TERMS AND CONDITIONS SCHEDULE A TERMS AND CONDITIONS Section A - General Provisions 1. Definitions. Capitalized terms used and not otherwise defined herein shall have the meanings ascribed to such terms in Section B (Glossary

More information

NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION

NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION MINIMUM STANDARDS FOR ELECTRONIC PAYMENT SCHEMES ADOPTED SEPTEMBER 2010 Central Bank of Swaziland Minimum standards for electronic payment schemes Page

More information

Info. Sec. Organization / Structure (cont.)

Info. Sec. Organization / Structure (cont.) Info. Sec. Organization / Structure (cont.) Identify Protect Detect Respond Recover Info. Sec. Organization / Structure (cont.) Functions Related to Info. Sec. Program (cont.) Functions Performed by Business

More information

Code of Ethics for Directors

Code of Ethics for Directors Code of Ethics for Directors 2 Table of Contents 1. Introduction... 3 1.1. Application... 3 1.2. Following these principles... 3 1.3. Other requirements... 3 1.4. Waivers... 3 1.5. Revisions... 3 1.6.

More information

1) Introduction 4 2) Definition.4 3) Objective..4 4) Classification of Insurance Frauds..5 5) Fraud Monitoring and its Control..6

1) Introduction 4 2) Definition.4 3) Objective..4 4) Classification of Insurance Frauds..5 5) Fraud Monitoring and its Control..6 ANTI FRAUD POLICY 1 2 Table of Contents 1) Introduction 4 2) Definition.4 3) Objective..4 4) Classification of Insurance Frauds..5 5) Fraud Monitoring and its Control..6 6) Communication Channel/Reporting

More information

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen Cyber COPE Transforming Cyber Underwriting by Russ Cohen Business Descriptor How tall is your office building? How close is the nearest fire hydrant? Does the building have an alarm system? Insurance companies

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such

More information

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION THIS AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION ( PHI ) ( Agreement ) is entered into between The Moses H. Cone Memorial Hospital Operating

More information

YOUNGEVITY INTERNATIONAL, INC. And Subsidiaries. Code of Business Conduct and Ethics Adopted by the Board of Directors Effective May 1, 2014

YOUNGEVITY INTERNATIONAL, INC. And Subsidiaries. Code of Business Conduct and Ethics Adopted by the Board of Directors Effective May 1, 2014 YOUNGEVITY INTERNATIONAL, INC. And Subsidiaries Code of Business Conduct and Ethics Adopted by the Board of Directors Effective May 1, 2014 Youngevity International, Inc. is committed to conducting its

More information

TERMS & CONDITIONS FOR INTERNET BANKING SERVICES

TERMS & CONDITIONS FOR INTERNET BANKING SERVICES TERMS & CONDITIONS FOR INTERNET BANKING SERVICES GENERAL TERMS This Internet Banking Services Agreement ( Agreement ) is a contract between you and Public Service Credit Union ( PSCU ) which establishes

More information

Privacy and Security Standards

Privacy and Security Standards Contents Privacy and Security Standards... 3 Introduction... 3 Course Objectives... 3 Privacy vs. Security... 4 Definition of Personally Identifiable Information... 4 Agent and Broker Handling of Federal

More information

TORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS. November 29, 2005

TORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS. November 29, 2005 TORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS November 29, 2005 CODE OF BUSINESS CONDUCT AND ETHICS... 2 SUMMARY OF CODE OF BUSINESS CONDUCT AND ETHICS... 2 EXPLANATION OF THE CODE... 3 1.

More information