Skip to:Content
|
Bottom
Cover image for RFID in the supply chain : a guide to selection and implementation
Title:
RFID in the supply chain : a guide to selection and implementation
Personal Author:
Series:
Series on resource management
Publication Information:
Boca Raton, FL : Auerbach Publications, 2007
ISBN:
9780849330186

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010121116 TS160 M93 2007 Open Access Book Book
Searching...
Searching...
30000010307873 TS160 M93 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness. Helping you bring your organization into the future, RFID in the Supply Chain: A Guide to Selection and Implementation explains RFID technology, its applications in SCM, data storage and retrieval, business processes, operational and implementation problems, risks, security and privacy, facility layout, handling systems and methods, and transportation costs. In short, with its soup-to-nuts coverage, the book ensures that your RFID implementation is successful and that you get the most from your investment.

The book discusses the major paradigm shift in product traceability that began with transitioning to RFID technology from bar code technology. It examines the economic feasibility of rolling out RFID and the challenges in supply chain synchronization, customer privacy, security, operations and IT, logistics, program management, education and training, and implementation, as well as what lessons have been learned. The author addresses the RFID business processes needed to analyze and resolve problems the suppliers face when they deal with multiple customers, each with a different mandate, and with their own set of suppliers.

Going beyond the technology and how it has changed supply chain processes, the book includes selection guidelines and implementation examples, such as speed of tag reads versus quality of computer inputs and optimal tag location. The author discusses the implementation of a business process model and the separate but equal concerns that business and IT executives have about the implementation of RFID applications. The book also covers security, integrated control management linked to the corporate strategy, and laws and regulations.


Table of Contents

Tablesp. xvii
Figuresp. xix
Prefacep. xxi
1 Supply Chain Overviewp. 1
1.1 Paradigm Shift in Product Traceabilityp. 1
1.1.1 Transitioning to RFID Technologyp. 1
1.1.2 Tracking Problemsp. 5
1.1.3 Supply Chainp. 9
1.2 RFID Marketsp. 12
1.3 Economic Feasibility of Rolling Out RFIDp. 15
1.3.1 Supply Chain Synchronizationp. 16
1.3.2 Customer Privacy Issuesp. 16
1.3.3 Security Challengesp. 17
1.3.4 Operational and IT Challenges (Hardware, Software, System Compatibility, People Expertise)p. 17
1.3.5 Logistical Challengesp. 18
1.3.6 Program Management Challengesp. 19
1.3.7 Education and Trainingp. 19
1.3.8 Standard Implementation Challengesp. 20
1.3.9 Lessons Learnedp. 20
1.3.9.1 Iraq: Asset Visibilityp. 20
1.3.9.2 Wal-Mart: Implementation Trainingp. 23
1.3.9.3 International Paper: Business Processesp. 23
1.3.9.4 Procter & Gamble: Docking Loading Throughputp. 23
1.4 RFID Technology Infrastructurep. 24
1.4.1 Open Architecture: Savant Serverp. 24
1.4.2 Major Vendor Serversp. 26
1.4.3 Tagsp. 27
1.4.4 Antennasp. 29
1.4.5 Readersp. 30
1.4.6 Electronic Product Codep. 31
1.4.7 Object Name Servicep. 33
1.4.8 EPC Information Servicep. 34
1.4.9 Scenariosp. 35
1.5 Web-Centric Supply Chain Management Challengesp. 36
1.5.1 Combining Web-Centric with RFID Technologyp. 36
1.5.2 E-Business Applicationsp. 36
1.5.3 Advantages and Disadvantagesp. 37
Referencesp. 38
2 RFID Technologyp. 39
2.1 Primary Driversp. 39
2.1.1 RFID Technology Deploymentp. 39
2.1.2 RFID Technology: Basics, Advantages, and Disadvantagesp. 43
2.2 Selection Guidance on Tags, Servers, and Middlewarep. 46
2.2.1 EPC Tag Classesp. 47
2.2.2 ISO Standardsp. 48
2.2.3 RFID Device Selection Criteriap. 50
2.2.3.1 What Are the Objects to Be Tagged?p. 50
2.2.3.2 What Are the Materials of the Objects and How Do They Affect Reading Ranges?p. 51
2.2.3.3 What Are Chip Antenna Types?p. 53
2.2.3.4 What Readers Can Read Both Passive and Active Tags?p. 55
2.2.3.5 What Are Other Considerations that Could Affect Externally the Optimal Location of Tags?p. 56
2.2.3.6 What Readers Can Read Both RFID Tags and Bar Codes for Easy Transitioning?p. 56
2.2.3.7 How Do Various Entities Organize Frequency Types or Ranges?p. 57
2.2.3.8 What Standards Are the Vendors Using for Their RFID Products?p. 60
2.2.4 Middleware Selection Criteriap. 60
2.2.4.1 RFID Plug-and-Playp. 61
2.2.4.2 RFID Supply Chain Execution Applicationsp. 62
2.2.4.3 RFID Platform-Dependent Legacy Systemsp. 64
2.2.4.4 RFID Integration Hubsp. 67
2.3 RFID Implementation Examplesp. 68
Referencesp. 73
3 RFID Applications in Supply Chain Managementp. 75
3.1 Logisticsp. 75
3.1.1 SCM Logistics Maturity Modelp. 77
3.1.2 Logistics: Reactive, Proactive, and RFIDp. 79
3.2 Managementp. 82
3.2.1 Oracle-PeopleSoftp. 82
3.2.2 Microsoft RFID Councilp. 83
3.2.3 IBMp. 84
3.2.4 The METRO Group Future Storep. 85
3.2.4.1 Inventory Managementp. 86
3.2.4.2 Information Managementp. 86
3.2.4.3 Check-Outp. 87
3.2.5 Chain Pharmacy Operationsp. 88
3.2.6 SAPp. 89
3.2.7 Web Servicesp. 91
3.2.7.1 Object Name Servicep. 93
3.2.7.2 EPC Information Servicep. 93
3.2.7.3 Electronic Product Codep. 95
3.2.7.4 Savant Serversp. 96
3.2.7.5 EPCglobal and the Auto-ID Centerp. 97
Referencesp. 100
4 Storing and Retrieving Datap. 101
4.1 Two Big Questionsp. 101
4.1.1 Relationship between Data Storage and Retrieval Issuesp. 101
4.1.2 Understanding Risks Associated with RFID/EPC Technologiesp. 102
4.2 EPC Technology in Functional Areasp. 103
4.3 Perceptions of Product Benefitsp. 103
4.4 Database CD on Local Workstationp. 105
4.5 Remote Database Serversp. 106
4.5.1 How Can We Reduce the Number of Traffic Bottleneck Incidents?p. 107
4.5.2 Why Do We Need to Divide the Database into the Static and Dynamic Partitions?p. 108
4.5.3 What Kind of Database Management Should We Get to Satisfy Our Requirements?p. 108
4.5.4 What Is the Optimal Way of Increasing Throughputs and Operational Efficiency?p. 109
4.5.4.1 Peoplesoft Enterprise Systemsp. 110
4.5.4.2 IBM RFID Productp. 110
4.5.5 How Do We Reduce Loading Times Cost Effectively?p. 111
4.5.6 How Do We Migrate a Relational Database Management System to Another?p. 112
4.5.7 How Is Partitioning Emulated and What Are the Partitioning Types?p. 112
4.5.8 How Do You Determine the Number of Partitions for a Database?p. 115
4.5.9 What Are the Factors You Should Consider in Your Migration Planning?p. 116
4.6 Databases in Company Merger Processesp. 117
4.7 Hybrid Databasesp. 117
4.8 Web Servicesp. 118
Referencesp. 120
5 RFID Business Processesp. 121
5.1 Implementation Approachesp. 122
5.1.1 Dual Shipping Facesp. 123
5.1.2 Two Sides of the Mandatesp. 124
5.1.3 RFID Implementation Checklistp. 124
5.2 Business Process Reengineeringp. 126
5.2.1 Procter & Gamble: Dock Loading Throughputp. 127
5.2.2 Canus: Changing Antenna's Orientationp. 128
5.2.3 Unilever: Changing Tag Placementp. 128
5.2.4 Heinz: Adapting Tag Requirementsp. 128
5.2.5 Gillette Scenario: Misplaced Casep. 129
5.2.6 Canus: Adjusting Computer Speedp. 131
5.2.7 Software Checklistp. 131
5.3 Organizational Maturityp. 132
5.4 Basic Multi-Layer RFID Business Process Modelp. 135
5.5 Adaptive Multi-Layer RFID Business Process Modelp. 136
5.5.1 Adaptive Maturityp. 137
5.5.2 Application Adaptorsp. 138
5.5.3 The METRO Groupp. 139
5.6 Predictive Multi-Layer Business Process Modelp. 140
5.7 RFID Business Processes Strategyp. 143
5.7.1 IBM RFID Strategyp. 143
5.7.2 Heinz RFID Strategyp. 144
5.7.3 Canus RFID Strategyp. 144
5.7.4 International Paper RFID Strategyp. 145
5.7.5 Kayser-Roth RFID Strategyp. 145
5.7.6 Philips Semiconductors RFID Strategyp. 146
5.7.7 Intel RFID Strategyp. 148
5.7.8 Unilever RFID Strategyp. 149
5.7.9 Major Clothier Retailer RFID Strategyp. 149
5.7.10 Marks and Spencer RFID Strategyp. 149
5.8 RFID Enterprise Supply Chain Systemsp. 150
5.8.1 Supply Chain Planningp. 150
5.8.2 Supply Chain Executionp. 151
5.8.3 Supply Chain Managementp. 153
5.8.3.1 SCM Logisticsp. 153
5.8.3.2 SCM Managementp. 155
5.9 RFID Business Process Life Cyclep. 156
5.9.1 Older Life-Cycle Modelsp. 158
5.9.1.1 Waterfall Life Cyclep. 158
5.9.1.2 Incremental Life Cyclep. 159
5.9.1.3 Spiral Life Cyclep. 161
5.9.2 Newer Life-Cycle Modelsp. 162
5.9.2.1 Adaptive Linear Feedback Life Cyclep. 162
5.9.2.2 Adaptive Dynamic Life Cyclep. 162
Referencesp. 163
6 RFID Security, Privacy, and Risk Assessmentp. 165
6.1 Security Policyp. 165
6.1.1 Organizational Policyp. 166
6.1.2 Issue-Specific Policyp. 166
6.1.3 System-Specific Policyp. 167
6.2 Security of RFID Queryp. 168
6.2.1 Query Scenariop. 168
6.2.2 Security Problemsp. 169
6.3 Attacks on RFID Technologyp. 170
6.3.1 War-Walking and Liftingp. 170
6.3.2 Counterfeitingp. 172
6.3.3 Denial-of-Servicep. 173
6.3.4 Weak Cryptographyp. 173
6.4 Defense in Depthp. 176
6.5 Risk Assessmentp. 177
6.5.1 Risk Assessment Profilep. 178
6.5.2 Internal Asset Risk Assessmentp. 178
6.5.3 Risk Assessment Servicep. 182
Referencesp. 183
Appendix A Passive RFID Technologyp. 185
A.1 Avonwood (http://www.avonwood.com)p. 185
A.1.1 Eureka 111 Systemsp. 185
A.1.2 Eureka 211 Systemsp. 185
A.2 Escort Memory Systems (http://www.ems-rfid.com/)p. 186
A.2.1 HMS Passive Read/Write Systemsp. 186
A.2.1.1 HMS100 Series Passive Read/WriteTagsp. 186
A.2.1.2 HMS800 Series Passive Reader/Writersp. 186
A.2.1.3 HMS827 Series Passive Reader/Writerp. 186
A.2.1.4 HMS828 Series Passive Reader/Writerp. 187
A.2.1.5 HMS820-04/HMS830-04 Series Passive Conveyor Reader/Writersp. 187
A.2.1.6 HMS820-08/HMS830-08 Series Passive Wide-Plate Reader/Writersp. 187
A.2.1.7 HMS820/HMS830 Passive Reader/Writersp. 187
A.2.1.8 HMS827-04 Passive Conveyor Reader/Writerp. 188
A.2.1.9 HMS827-05 Passive Tubular Reader/Writerp. 188
A.2.1.10 HMS814/HMS816 Portable Reader/Writersp. 188
A.2.2 Passive Read-Only Systemsp. 188
A.2.2.1 ES600-Series Read-Only Tagsp. 189
A.2.2.2 RS427 Read-Only Readerp. 189
A.2.2.3 RS427-04 Passive Read-Only Conveyor Antennap. 189
A.3 Intermec (www.intermec.com)p. 189
A.3.1 RFID Tags and Insertsp. 189
A.3.2 RFID Readersp. 191
A.3.3 Intellitag PM4i Printerp. 194
A.3.4 RFID Partnersp. 195
A.4 Northern Apex (www.northernapex-rfid.com)p. 195
A.4.1 Inlays and Tagsp. 195
A.4.2 Readers and Antennasp. 197
A.4.2.1 900-MHz Readers and Antennasp. 197
A.4.2.2 13.56-MHz Readers and Antennasp. 198
A.5 Philips (www.semiconductors.philips.com)p. 199
A.5.1 I-CODE Transponder ICsp. 199
A.5.2 MIFARE Reader Componentsp. 201
A.6 SAMSysp. 201
A.7 Symbol Technologies (www.symbol.com; formerly Matrics)p. 202
A.7.1 Tagsp. 202
A.7.2 Readersp. 202
A.7.3 Antennasp. 203
A.8 TAGSYS (www.tagsys.com)p. 204
A.8.1 Industry and Logistics Marketp. 204
A.8.1.1 RFID Chipsp. 205
A.8.1.2 RFID Tagsp. 206
A.8.1.3 RFID Readersp. 207
A.8.1.4 RFID Antennasp. 208
A.8.1.5 RFID Kitsp. 209
A.8.2 Industry and Logistics Partner Productsp. 210
A.8.2.1 Atheliap. 210
A.8.2.2 Blackroc Technology (www.blackroc.com)p. 213
A.8.2.3 DAP Technologies (www.daptech.com)p. 213
A.8.2.4 EIA (www.eia-italia.com)p. 214
A.8.2.5 GIS (www.gis-net.de)p. 214
A.8.2.6 ichain (www.ichain.co-za)p. 215
A.8.2.7 ICS (www.ica.nl)p. 215
A.8.2.8 Microraab (www.microraab.hu)p. 216
A.8.2.9 Minec (www.minec.com)p. 217
A.8.2.10 Nordicid (www.nordicid.com)p. 218
A.8.2.11 Northern Apex (www.northernapex-rfid.com)p. 218
A.8.2.12 System Concepts (www.systemconcepts.com)p. 219
A.8.2.13 Teraoka Seiko (teraoka.digi.co.jp)p. 220
A.8.2.14 Toshiba (www.toshibatec-eu.com)p. 220
A.8.2.15 Touchstar (www.touchpc.com)p. 220
A.8.3 Products for the Library Marketp. 221
A.8.4 TAGSYS Partner Products for the Library Marketp. 224
A.8.4.1 Blackroc Technology (www.blackroc.com)p. 225
A.8.4.2 Minec (www.minec.com)p. 225
A.8.4.3 Vernon Library Supplies (www.vernlib.com)p. 225
A.8.4.4 Gemsys (www.gemsys.no)p. 226
A.8.4.5 VTLS Inc. (www.vtls.com)p. 226
A.8.4.6 Tech Logic (www.tech-logic.com)p. 226
A.8.4.7 Teraoka Seiko (teraoka.digi.co.jp)p. 227
A.8.4.8 Toshiba (www.toshibatec-eu.com)p. 227
A.8.5 Textile Rental Industryp. 227
A.8.5 TAGSYS Partner Products for Textile Rental Industryp. 232
A.8.5.1 Laundry Computer Technics (www.LCT.nl)p. 233
A.8.5.2 Jensen (www.jensen-group.com)p. 234
A.8.5.3 Positek RFID (www.positekrfid.com)p. 234
A.8.5.4 Metalprogetti (metalpro@tin.il)p. 235
A.9 Texas Instruments-RFID (www.ti-rfid.com)p. 236
A.9.1 13.56-MHz Productsp. 236
A.9.2 Low-Frequency Productsp. 237
A.9.3 Softwarep. 238
Appendix B Active RFID Technologyp. 241
B.1 Alien Technology (www.alientechnology.com)p. 241
B.2 Axcess Inc. (www.axcessinc.com)p. 243
B.3 Escort Memory Systemsp. 243
B.4 Microtec (www.ksw-microtec.de)p. 246
B.5 SAMSys (www.samsys.com)p. 247
B.6 Savi Technology (www.savi.com)p. 248
B.7 WhereNet (www.wherenet.com)p. 250
Appendix C Semi-Passive RFID Technologyp. 253
C.1 Alien Technology (www.alientechnology.com)p. 253
C.2 Avonwoodp. 254
C.3 KSW Microtec (www.ksw-microtec.com)p. 255
Appendix D RFID Middlewarep. 257
D.1 Acsis Inc. (www.acsis.com)p. 257
D.2 Axcess Inc. (www.axcessinc.com)p. 258
D.3 Blue Vector Systems (www.bluevectorsystems.com)p. 258
D.4 ConnecTerra (www.connecterra.com)p. 259
D.5 Data Brokers (www.databrokers.com)p. 259
D.6 EPCglobal (www.epcglobalinc.org)p. 261
D.7 Franwell (www.franwell.com)p. 261
D.8 GlobeRanger (www.globeranger.com)p. 261
D.9 i2 Technologies (www.i2.com)p. 262
D.10 Manhattan Associates (www.manh.com)p. 262
D.11 OATSystems (www.oatsystems.com)p. 262
D.12 Oracle (www.oracle.com)p. 263
D.13 RF Code (www.rfcode.com)p. 263
D.14 Savi Technology (www.savi.com)p. 264
D.15 Sun (www.sun.com)p. 264
D.16 T3Ci (www.t3ci.com)p. 265
D.17 TIBCO (www.tibco.com)p. 265
D.18 VeriSign (www.verisign.com)p. 265
D.19 webMethods (www.webmethods.com)p. 266
Appendix E Network/Server Interfacesp. 267
E.1 Escort Memory Systems (www.ems-rfid.com)p. 267
E.2 WhereNet (www.wherenet.com)p. 269
E.3 Blue Vector Systems (www.bluevectorsystems.com)p. 271
Appendix F Physical Markup Language for RFID Applicationsp. 273
F.1 XML File Instancesp. 273
F.1.1 Instance 1: Multiple Tags with No Datap. 274
F.1.2 Instance 2: Tags with Datap. 275
F.1.3 Instance 3: Memory Tags with Datap. 276
F.1.4 Instance 4: Tags with Mounted Sensorsp. 277
F.1.5 Instance 5: Observed Data in Hexbinary Formatp. 278
F.2 XML Schemasp. 279
Referencesp. 287
Appendix G Warehouse Management Systemsp. 289
G.1 RT-Systems: RT-Locatorp. 289
G.2 Robocomp. 290
G.2.1 Management Controlp. 291
G.2.2 Inboundp. 291
G.2.3 Inventory Managementp. 291
G.2.4 Outboundp. 291
G.2.5 RDT Subsystemp. 292
G.2.6 Other RIMS Modulesp. 292
G.3 HighJumpp. 293
G.4 KARE Technologiesp. 293
G.5 Daly Commercep. 294
Appendix H Supply Chain Execution Systemsp. 297
H.1 HighJumpp. 297
H.2 Proviap. 302
H.3 Softeonp. 302
H.4 ClearOrbitp. 306
H.4.1 Pro Series for Any ERPp. 307
H.4.2 Pro Series for Oracle 10.7/11.0/11ip. 309
H.4.3 Pro Series for SAP R/3p. 309
H.5 Peoplesoft (Formerly JD Edwards, Now Part of Oracle)p. 311
Appendix I Enterprise Intelligence: WebFOCUSp. 313
I.1 Data Sourcesp. 313
I.2 Reporting Serverp. 313
I.3 Data Managementp. 315
I.4 Microsoft Integrationp. 317
I.5 Portal Integrationp. 317
I.6 Reports as Web Servicesp. 318
I.7 Web Services Adapterp. 319
I.8 Miscellaneousp. 319
Appendix J Enterprise Databasesp. 321
J.1 Base/Onep. 321
J.1.1 Base/One Foundation Class Libraryp. 322
J.1.2 Database Command Processorp. 322
J.1.2.1 Common SQL Commandsp. 323
J.1.2.2 Built-In Basic Commandsp. 323
J.1.2.3 Built-In Commands That Use the Data Dictionaryp. 323
J.1.2.4 DOS and WIN Command Linesp. 324
J.1.2.5 Error Suppression Commandsp. 324
J.1.2.6 Database Buffer Commandsp. 324
J.1.2.7 Database Manager Commandsp. 325
J.1.2.8 Custom Commandsp. 325
J.1.2.9 Macro Assignment Command Linesp. 326
J.1.3 Database Libraryp. 326
J.1.4 Systems Requirementsp. 329
J.2 CodeBasep. 330
J.2.1 Windows CE 4.0p. 330
J.2.2 J2MEp. 331
J.2.3 JDBC 3.0p. 332
J.2.4 UNIXp. 334
J.2.5 Linuxp. 334
J.2.6 Bundle for Windows and .NETp. 335
J.2.7 Delphi and Kylixp. 335
J.2.8 SQL 2.0 for Windowsp. 335
J.2.9 64-Bit Add-Onp. 335
J.2.10 Maximum Limitsp. 336
J.2.11 Slow Query Performancep. 337
J.2.11.1 Unique Tagp. 337
J.2.11.2 Filtered Tagp. 337
J.2.11.3 Tag Using General Collating Sequencep. 339
J.2.12 Windows Registryp. 340
J.2.13 Using CodeBase from Microsoft Accessp. 340
J.2.14 Running Visual Basic Examplep. 341
J.2.15 Running Visual C++ Examplep. 341
Appendix K Data Synchronization: GoldenGatep. 343
K.1 Primary Modulesp. 343
K.1.1 GoldenGate Capture Corep. 343
K.1.2 GoldenGate Delivery Corep. 344
K.1.3 GoldenGate Manager Corep. 344
K.2 Software Modulesp. 344
K.3 Database Replicationp. 345
Appendix L Partitioning Large Databases: Oraclep. 347
Listing L.1 Create Table Examplep. 347
Listing L.2 Create Table for Coded Unusable Itemsp. 350
Appendix M Software Engineering Standardsp. 353
M.1 IEEE Standardsp. 353
M.2 ISO/IEC Standardsp. 356
M.3 Related Standardsp. 358
Appendix N Business Process Automation: IBM Productsp. 359
Appendix O Commercial Assessment Productsp. 363
O.1 HackerShieldp. 363
O.2 NetReconp. 364
Appendix P Risk-Related Softwarep. 365
Appendix Q Sample Security Policy Templatesp. 377
Q.1 Acceptable Use Policyp. 377
Q.1.1 Overviewp. 378
Q.1.2 Purposep. 378
Q.1.3 Scopep. 378
Q.1.4 Policyp. 378
Q.1.4.1 General Use and Ownershipp. 378
Q.1.4.2 Security and Proprietary Informationp. 379
Q.1.4.3 Unacceptable Usep. 380
Q.1.5 Enforcementp. 382
Q.1.6 Definitionsp. 382
Q.2 Acquisition Assessment Policyp. 382
Q.2.1 Purposep. 382
Q.2.2 Scopep. 382
Q.2.3 Policyp. 382
Q.2.3.1 Generalp. 382
Q.2.3.2 Requirementsp. 383
Q.2.4 Enforcementp. 384
Q.3 Audit Vulnerability Scan Policyp. 384
Q.3.1 Purposep. 384
Q.3.2 Scopep. 385
Q.3.3 Policyp. 385
Q.3.3.1 Network Controlp. 385
Q.3.3.2 Service Degradation or Interruptionp. 385
Q.3.3.3 Client Point of Contact during the Scanning Periodp. 386
Q.3.3.4 Scanning Periodp. 386
Q.3.4 Enforcementp. 386
Q.3.5 Revision Historyp. 386
Q.4 Automatically Forwarded E-Mail Policyp. 386
Q.4.1 Purposep. 386
Q.4.2 Scopep. 386
Q.4.3 Policyp. 386
Q.4.4 Enforcementp. 387
Q.4.5 Definitionsp. 387
Q.5 Database Password Policyp. 387
Q.5.1 Purposep. 387
Q.5.2 Scopep. 388
Q.5.3 Policyp. 388
Q.5.3.1 Generalp. 388
Q.5.3.2 Specific Requirementsp. 388
Q.5.4 Enforcementp. 389
Q.5.5 Definitionsp. 390
Q.6 E-Mail Retention Policyp. 390
Q.6.1 Purposep. 390
Q.6.2 Scopep. 391
Q.6.3 Policyp. 391
Q.6.3.1 Administrative Correspondencep. 391
Q.6.3.2 Fiscal Correspondencep. 391
Q.6.3.3 General Correspondencep. 391
Q.6.3.4 Ephemeral Correspondencep. 392
Q.6.3.5 Instant Messenger Correspondencep. 392
Q.6.3.6 Encrypted Communicationsp. 392
Q.6.3.7 Recovering Deleted E-Mail via Backup Mediap. 392
Q.6.3.8 Enforcementp. 392
Q.6.3.9 Definitionsp. 392
Q.6.3.10 Revision Historyp. 393
Q.7 Extranet Policyp. 393
Q.7.1 Purposep. 393
Q.7.2 Scopep. 393
Q.7.3 Policyp. 394
Q.7.3.1 Prerequisitesp. 394
Q.7.3.2 Establishing Connectivityp. 395
Q.7.3.3 Modifying or Changing Connectivity and Accessp. 395
Q.7.3.4 Terminating Accessp. 395
Q.7.4 Enforcementp. 396
Q.7.5 Definitionsp. 396
Q.8 Information Sensitivity Policyp. 396
Q.8.1 Purposep. 396
Q.8.2 Scopep. 397
Q.8.3 Policyp. 397
Q.8.4 Enforcementp. 400
Q.8.5 Definitionsp. 400
Q.9 Password Policyp. 402
Q.9.1 Overviewp. 402
Q.9.3 Purposep. 403
Q.9.3 Scopep. 403
Q.9.4 Policyp. 403
Q.9.4.1 Generalp. 403
Q.9.4.2 Guidelinesp. 404
Q.9.5 Enforcementp. 406
Q.9.6 Definitionsp. 406
Q.1O Remote Access Policyp. 407
Q.10.1 Purposep. 407
Q.10.2 Scopep. 407
Q.10.3 Policyp. 407
Q.10.3.1 Generalp. 407
Q.10.3.2 Requirementsp. 408
Q.10.4 Enforcementp. 409
Q.10.5 Definitionsp. 409
Q.11 Risk Assessment Policyp. 411
Q.11.1 Purposep. 411
Q.11.2 Scopep. 411
Q.11.3 Policyp. 412
Q.11.4 Risk Assessment Processp. 412
Q.11.5 Enforcementp. 412
Q.11.6 Definitionsp. 412
Q.12 Router Security Policyp. 412
Q.12.1 Purposep. 412
Q.12.2 Scopep. 413
Q.12.3 Policyp. 413
Q.12.4 Enforcementp. 413
Q.12.5 Definitionsp. 414
Q.13 Server Security Policyp. 414
Q.13.1 Purposep. 414
Q.13.2 Scopep. 414
Q.13.3 Policyp. 414
Q.13.3.1 Ownership and Responsibilitiesp. 414
Q.13.3.2 General Configuration Guidelinesp. 415
Q.13.3.3 Monitoringp. 416
Q.13.3.4 Compliancep. 416
Q.13.4 Enforcementp. 416
Q.13.5 Definitionsp. 416
Q.14 Virtual Private Network (VPN) Policyp. 417
Q.14.1 Purposep. 417
Q.14.2 Scopep. 417
Q.14.3 Policyp. 417
Q.14.4 Enforcementp. 418
Q.14.5 Definitionsp. 418
Q.15 Wireless Communication Policyp. 418
Q.15.1 Purposep. 418
Q.15.2 Scopep. 419
Q.15.3 Policyp. 419
Q.15.3.1 Register Access Points and Cardsp. 419
Q.15.3.2 Approved Technologyp. 419
Q.15.3.3 VPN Encryption and Authenticationp. 419
Q.15.3.4 Setting the SSIDp. 419
Q.15.4 Enforcementp. 419
Q.15.5 Definitionsp. 420
Q.15.6 Revision Historyp. 420
Indexp. 421
Go to:Top of Page