Browse
Search
2014-528-E Library - CERVIS Technologies for Volunteer Management $2,250
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2010's
>
2014
>
2014-528-E Library - CERVIS Technologies for Volunteer Management $2,250
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
5/25/2017 3:02:23 PM
Creation date
10/13/2014 11:37:09 AM
Metadata
Fields
Template:
BOCC
Date
10/13/2014
Meeting Type
Work Session
Document Type
Contract
Agenda Item
Manager signed
Amount
$2,250.00
Document Relationships
R 2014-528 Library - CERVIS Technologies for volunteer management
(Linked To)
Path:
\Board of County Commissioners\Contracts and Agreements\Contract Routing Sheets\Routing Sheets\2014
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
16
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID: 1 E8BDD1 D-A826-4FDB-AB97-5EE804B7DCCB <br /> completely separate database and encrypted. <br /> 21. At what architectural point in the provider's cloud facility will the County's data be <br /> physically connected to networking equipment with non-County data? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 22. What are the cloud provider's information security policies? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 23. What are the cloud provider's incident management and reporting policies? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. <br /> 24. What is the process by which the cloud provider updates policies and informs customers? <br /> CERVIS does not make internal policies and procedures available to customers and as <br /> such does not have a process to provide updates to customers. <br /> 25. What is the basic architecture of the cloud provider's network security? (overall design, <br /> zones, filters, firewalls, VLANs,protocols, standards) <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, Anti- <br /> Virus software,Network firewalls, host-based firewalls, network intrusion prevention, <br /> host-based intrusion prevention, Database firewalls, SSL encryption of data in motion, <br /> AES encryption of data at rest, encrypted VLANs and regularly scheduled vulnerability <br /> and web application security assessments. <br /> 26. What security measures does the cloud provider use in data storage, transit and use? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, Anti- <br /> Virus software,Network firewalls, host-based firewalls, network intrusion prevention, <br /> host-based intrusion prevention, Database firewalls, SSL encryption of data in motion, <br /> AES encryption of data at rest, encrypted VLANs and regularly scheduled vulnerability <br /> and web application security assessments. <br /> 27. What encryption technologies does the cloud provider use in data management? <br /> Due to security and intellectual property reasons, CERVIS policy does not allow <br /> disclosure of specific information related to infrastructure or security. However, <br /> CERVIS is protected with commercially accepted security practices including, SSL <br /> encryption of data in motion and AES encryption of data at rest. <br /> 28. How are access rights managed by the cloud provider for their employees, contractors <br /> and other persons? <br />
The URL can be used to link to this page
Your browser does not support the video tag.