Telecom Service Provider
Telecom Service Provider
Gp: Primary interconnection pt. between operator’s n/w and un-trusted external networks
Gc: Allows access (via HLR) to key user info. from remote network during roaming
Vulnerable Interfaces
Gi: Exposed to all threats from Internet: viruses, DoS, and malicious network traffic
Gp: Connection hijacking, overbilling from a roaming network during handover
Gn: Not encrypted by default
For CDMA2000 1X data sessions and EV-DO, including the Challenge Handshake
Authentication Protocol (CHAP) or upgraded equivqlent by the Packet Data Serving
Node-Authentication Authorization Accounting (PDSN-AAA), server should not be
compromised in any case and the tests reported.
Note:
The security related test specified in this agreement are not exhaustive and are
indicative. The list is a guideline to the provider to verify that the vendor has tested
20
against the vulnerabilities and reported the outcome of the tests in a comprehensive
test report made available to him. All required security related tests as available and
applicable must be performed.
Hence, the following security related tests are recommended for the Vendor to perform
and report to the TSP as mandatory compliance by the vendors both for the IT related
infrastructure and for the telecom related infrastructure (Or for the converged
infrastructure) as well as elements/appliances/subsystems including all types of related
software/hardware, internal/external interfaces, signaling and all other protocols.
7.12 ESCROW
7.12.1 The Vendor shall at TSP’s request at Vendor’s expense, enter into an escrow deposit
arrangement in respect of all Information and documentation in relation to Supplies (including,
without limitation, in respect of Hardware, Software, all source code, “gold” build, software,
High Level Designs (HLD), Detail Design Documents (DDD), listings and programmer’s notes)
(“the Escrow Information”) as would enable TSP or a competent party authorized by
LICENSOR on TSP’s behalf to:
(a) complete any outstanding obligations of the Vendor under this Agreement, including,
without limitation, obligations that would have existed (including the requirement to
fulfill any orders that TSP would have otherwise placed under this Agreement) had this
Agreement not been terminated by TSP (other than pursuant to of the Condition headed
“Termination”) before the expiry of its natural term; and
7.12.2 Without affecting any other rights it may have, TSP shall have the right, free of
charge, to use the Escrow Information, after its release, in order to use or maintain (including to
upgrade) the Software, to modify or have modified the Software, and to authorize such modified
Software to or have it maintained by third parties.
7.12.3 The Vendor shall ensure that the Escrow Information deposited in accordance
with para 7.12.1 above is and will be maintained as sufficient to allow a reasonably skilled
programmer or analyst to maintain, modify and correct the Hardware and Software without the
help of any other person or reference, and the Vendor further undertakes to keep the Escrow
Information fully up-to-date throughout the Term.
21
7.12.4 On the occurrence of any event permitting the release of the Escrow Information, the
Vendor shall immediately provide, at its cost and expense, to TSP for a reasonable period, such
advice, support assistance, data, information, access to Vendor's personnel or any key personnel
of legal owner of the [Hardware and/or] Software for the purpose of understanding, maintaining
(including upgrading), modifying and correcting any of the Hardware and/or Software. The
Source code/softwares written only in ENGLISH language shall be acceptable. The Source
code/softwares shall be proven to be operational and correct version and to be certified that it
does not have self destructing programmes. This may be ensured by using the same at least once
for loading the system initially before being deposited.
Parties
Agreement
f) Test cases and other test assets for verification and validation;
6. Interface
For Interface to other key products such as database, etc. the vendor
shall provide test product with current versions of his product;
23
Release of material
Release conditions
“no longer providing support” mean, such as providing upgraded versions to run
with supported versions of operating systems and database versions.
7.14 Inspection:
The Vendor/Supplier must allow the Telecom Service Provider, Licensor/DoT and/or its
designated agencies to inspect the hardware, software, design, development, manufacturing
facility and supply chain and subject all software to a security/threat check at the time of
procurement of equipment and atleast one more time in the year of procurement and every two
years thereafter, at the time of discretion of the telecom service provider. The expenditure for
such visits upto 40 man days per visit should either be borne by the service provider or the
vendor. All the documents should be in English and handed over to the visiting team at least 4
week ahead of the visit.
All the software codes, firmware, operating system, hardware details should be in
ENGLISH only.
8 Data Protection:
“Personal Data” - all data relating to individuals including that which is defined as ‘Personal Data’
or ‘Sensitive Personal Data’ in the Directive as well as all data relating to legal persons to the
extent the same is defined as Personal Data in applicable local legislation provided by TSP to the
Vendor or acquired by the Vendor from TSP’s systems during the course of the negotiations
leading to or on the execution and during the Term of this Contract including, without limitation,
data relating to TSP employees and TSP customers.
“the Directive” - Directive of the LICENSOR with regard to the processing of personal data and
on the free movement of such data, or any subsequent legislation in relation thereto.
25