04 Dec

data center compliance checklist

A GDPR Compliance Checklist for US Companies. Use this checklist when looking for a data center, and speak with your IT team to make sure you're on the same page. Not all data centers are created equal. Data centers demonstrate compliance by showing the certificates and attestations they have been awarded from third-party auditing services that assess their operations and infrastructure on a regular basis, typically annually. "Run the cybersecurity breach process as a live exercise and see what happens.". According to a recent Data Center Knowledge survey, 65 percent of data center IT managers expected cybersecurity budgets to increase this year – and none of them expected those budgets to go down. Registered in England and Wales. 18 establish requirements and provide application guidance to auditors for: Performing and reporting on examinations; Reviewing processes; Agreeing upon procedure engagements (including SOC attestations) As of May 1, 2017, SSAE 18 has been in effect. ISO 9001 ISO 9001:2015 outlines a process-oriented approach to documenting and reviewing the structure, responsibilities, and procedures required to achieve effective quality management within an organization. SSAE 18 … Purchasing a commercially accessible checklist … DALLAS, May 12, … Data Center … Relocating a data center is not something that can be done impromptu. To measure whether or not your preventive maintenance is on time, the best way is to produce PM compliance. Your data center compliance checklist: SSAE 18. Together, they are experimenting with outfitting data center workers with wearable technology to reduce errors and improve performance. Tom is the Senior Vice President of Product Management & Development at vXchnge. That’s why every company thinking about migrating assets into a colocation data center should treat compliance as an essential capability rather than an extra benefit that’s nice to have. A checklist is used to compensate for the weaknesses of human memory to help ensure consistency and completeness in carrying out tasks. Depending upon the nature of their business, some of these standards will have higher priority than others, and some may not even apply to them. Auditors check records for decommissioning compliance. Implementing Written Policies, Procedures, and Standards of Conduct. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. In order to check this box off a data protection checklist, companies must obtain customer consent before collecting and storing data. For example, a data center might meet all compliance standards, but what about third-party vendors who offer services through the facility? Datacenter.com has undergone a systematic, independent examination of our quality system to determine whether the activities and outputs comply with ISO 9001:2015. The “remote workplace,” a business practice wherein employees can work from their homes (or other locations) rather than the office, has become critically important since the COVID-19 outbreak. In the data centers of the 1960s, data center equipment components were recognized as common building support systems and maintained as such. Rich is responsible for Compliance and Certifications, Data Center Operations, Information Technology, and Client Concierge Services. "It's all just becoming better and more sophisticated.". Scanning an environment once in a while is not an adequate strategy, since criminals can act quickly when new vulnerabilities are discovered. Nation-states aren't sitting things out, either, with Russian state attackers going after political targets, China going after trade secrets, and North Koreans busily stealing cryptocurrency. If the company’s main focus is e-commerce, however, PCI DSS 3.2 compliance, which sets security standards for protecting financial data during credit card transactions, may be their most important consideration. There is a wide range of compliance standards organizations need to take into account when evaluating the best solutions for managing their data. Your decommissioning partner needs to provide proof that processes were followed and data was responsibly destroyed. The next step could be to isolate the infected system and to check if the infection spread anywhere else. But organizations can't just spend their way out of trouble, said Tim Steinkopf, president at Centrify, a Santa Clara., California-based cybersecurity vendor. In the event of a major disaster, one with significant downtime or data loss, the emergency response plan may also include a public relations team, legal advisers, forensic professionals, and other key experts. While many organizations understand that compliance … Explaining the NIST Cybersecurity Framework, the most popular of its kind. Potential colocation customers unfamiliar with the compliance process may not know to ask for this documentation and simply assume that every facility is fully compliant with federal and international regulations pertaining to data. Rich has an extensive background in server and network management, large scale wide-area networks, storage, business continuity, and monitoring. As a result we provide constant the highest level of quality to our clients. The number went up to 31 percent in 2017 and is now at over 49 percent, according to a report the company released in December. When building processes around employee data, legal and compliance teams should be thinking about a variety of factors, including how to safely provide requested data electronically, documentation of the controls in place to protect sensitive information, how requests are fulfilled, and legal parameters for when certain data requests can or should be denied. Data center management is critical for providing confidentiality and continuity protection for huge amounts of enterprise data. Criminals can also use dumps of leaked passwords to write more convincing, personalized phishing emails, Puranic said. The following steps can be used as a server decommissioning checklist. Use digital PCI compliance checklists you can access with your mobile device and take advantage of the following features to ensure your company’s PCI compliance: Perform paperless PCI compliance audits using your mobile device, even while offline. and well-recognized compliance audits for testing and reporting on controls in place at data centers . So, the first stage of the NIST cybersecurity framework is to identify an organization's cybersecurity risks and to prioritize those risks based on an organization’s risk management strategy and business needs. ICARUS Ops is providing the software solution and training. Meeting regulatory standards requires a close working relationship between colocation facilities and their customers, so it’s essential that companies know what they need and what they expect when they migrate their assets into a third-party data center. Fortunately, cybersecurity budgets are going up. On the data center … The ISO 27001 data center audit checklist, therefore, contains information that data centers can use when outsourcing their service audits. Managing your HIPAA compliance in-house, by a HIPAA Cloud Provider or Data Center, this checklist can help ensure … This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Tomorrow's lunch menu doesn't need the same kind of security as customers’ financial information. For audit purposes associated with regulatory and corporate compliance, defined processes that demonstrate discipline, due diligence and best practices in how IT and data center equipment are handled and data destroyed are critical. Data encryption,SSL certificates, firewalls and also virtual firewalls (for VMs) 5. Finally, the recovery stage may involve wiping the system and reinstalling a golden image of the desktop, then retrieving the users' files from a backup system. What … While attackers are getting smarter, security vendors are also evolving to make their products easier to use, more comprehensive, and smarter, said Atlantic.net's Puranik. The following can be used as a resource for your call center, however, it is not fully comprehensive of all TCPA regulations and is not intended to be used as legal advice. A poor KPI may require workload balancing or a technology refresh project. At that time, the data center was ancillary to the core business and most critical business processing tasks were performed manually by people. There are third-party firms that will attempt to break through an organization's perimeter, look for unsecured cloud storage buckets, or scan for leaked passwords. Integrated risk management makes it possible to identify these potential blind spots. As many high-profile instances have shown over the last few years, a data breach can cause serious financial and reputational damage to a company. To help you, we’ve created a handy HIPAA compliance checklist to ensure the data centers you’re considering are truly HIPAA compliant. You need to know what to look for. It's not so much about buying every single security tool on the market, as finding the right ones. When finished touring, compare section scores and total scores for … In this article, we provide you with a checklist of critical elements to foresee, plan for, and carry out in advance, during, and after relocating your IT infrastructure at the source and target sites. HIPAA (Health Insurance Portability and Accountability Act) regulates data, Cloud storage security, and management best practices in the healthcare industry.Given the sensitive nature of healthcare data… Whether these audits are conducted internally or by a third-party, they are critical to a data center’s ability to meet compliance standards. Checklists. High-quality data centers subject their operations and infrastructure to constant scrutiny. How to Improve Your Data Center Compliance Checklist Evaluate Your Compliance Needs. The Electronic Healthcare Network Accreditation Commission (EHNAC) uses quantifiable criteria to evaluate an organization’s conformance to regulatory requirements and industry best practices. Check off the features found in each facility. Data Center Security and Facility: Data Protection (continued) • Complete Separation Between Each Customer Environment (CoLo) • Separate & Defined Server … The ISO 27001 data center audit checklist, therefore, contains information that data centers can use when outsourcing their service audits. No signs designating where the data center is; Attendant or security guard at the entryway; Need for photo ID at entrance; Procedure for signing in and out of the facility; 2 – Infrastructure facility and security: access privileges. Full compliancewith safety regulations including fire exits 2. Data Center Audit Checklist - Free download as Excel Spreadsheet (.xls), PDF File (.pdf), Text File (.txt) or read online for free. The metrics for workloads and systems are typically aggregated across the data center to calculate a weighted average. • Bullet Resistant Glass. 1. Even after a checklist is in place, it’s important to consider how it might be improved over time. Managing your HIPAA compliance in-house, by a HIPAA Cloud Provider or Data Center, this checklist can help ensure you are covering all federal requirements. Get consent for data collection, retention & erasure. When it comes to data centers, a hosting provider needs to meet HIPAA compliance in order to ensure sensitive patient information is protected. Here are some common safety violations that data center may be out of compliance … A HIPAA audit conducted by an independent auditor against the OCR HIPAA Audit Protocol can provide a documented report to prove a data center … After estimating the total cost required on 1 minute shut down of the data center, it is very necessary to perform preventive maintenance on time. Data Center Checklist The use of colocation and services has continued to increase, rapidly becoming the solution of choice for organizations requiring an efficient, secure, cost-effective way to manage the IT infrastructure. There's pressure to respond to the latest headlines, and, of course, everyone wants you to go around shutting barn doors after the horses have escaped. If that fails, a network monitoring system might be able to detect suspicious traffic. Data residency and security Azure RFI on security and compliance Azure Internet of Things compliance IDC - Azure manages regulatory challenges Azure risk compliance guide Shared responsibilities for cloud computing Azure export controls Azure enables a world of compliance HIPAA Compliance Checklist. A SOC 1 SSAE 18 Type 2 data center compliance checklist is essential for ensuring your facility fundamentally comprehends and understands all critical issues considered in-scope for today’s data centers and managed services providers. This guidance document, published by Norton Rose Fulbright, is designed to give an illustrative overview of the GDPR requirements likely to impact most types of businesses and the practical steps that organisations need to take to be GDPR compliant. This PDF checklist helps to ensure that all HIPAA requirements are met. Analyzing data about website visitors or current customers is essential for providing the best possible user experience. Checklists may be produced , is often purchased by means of a business source, or bought and altered to meet your specific demands. For every key area of risk, a data center needs to have corresponding controls in place. Network and … Rich is responsible for Compliance and Certifications, Data Center Operations, Information Technology, and Client Concierge Services. Cyxtera’s new Data Center Evaluation Checklist covers data center provider selection criteria including: Building facility. FedRAMP COMPLIANCE CHECKLIST. For starters, HIPAA compliance must be outlined and documented. First, the organization needs to be able to detect that there's a problem. Every one of these data points represents a potential threat to compliance. A Data Center must maintain high standards for assuring the confide… This is the area where organizations tend to spend the bulks of their efforts – and most of their money. The content is easily customizable by customers to reflect their own policies and procedures as well as preferences for how data center workers utilize the information and checklists. There's nobody around to do that pushing for open source tools and libraries, so data centers need a way to stay on top of the situation by having an up-to-date inventory of the open source components they use. The data center should have in place physical elements that serve as battering rams and physical protection barriers that protect the facility from intruders. 1.1.20 Is the data center away from areas using hazardous processes (e.g., acid treatments, explosives, high-pressure vats)? The last three areas of the NIST framework cover what to do in case a breach does occur. Data Centers contain all the critical information of organizations; therefore, information security is a matter of concern. These verification points have a wide range of … "With a commercial software solution, the vendor is in a position to push security information to consumers," Tim Mackey, senior technical evangelist at Synopsys, a cybesecurity firm based in Mountain View, California, said. And commercial cybersecurity solutions can offer advantages over home-built ones because they are easier to use, and the vendors are constantly upgrading their vulnerability databases. Data center technology changes every day in regard to both the site infrastructure and the IT load. There's a temptation to create a list of cybersecurity controls and just check off the boxes, said Pitt. Meeting regulatory compliance standards for data management has become a necessary step for almost every company. Data Center Physical Security Best Practices Checklist . Protecting essential data with encryption services and blended ISP connections that guard against DDoS attacks can put organizations in a better position to meet their compliance needs. ... and guarantee compliance with insurance policies, rules, and procedures. The Data Center is an integral part of an organization's IT infrastructure. Get organized for all your data center needs. Video surveillanceand motion detectors, badges, ‘mantrap’ entrances, data center guards 4. With so much data being shared over sprawling business networks, it’s more important than ever for businesses to ensure that information is both protected and readily accessible. If ransomware attacks are a major risk, and infected employee desktops are the main vector, then email filters, endpoint protection systems, and employee security training programs would be warranted. Physical Layer Infrastructure To gain maximum benefit of cloud computing and software-defined networking/network function virtualization (SDN/NFV), the physical layer of the edge data center must be seriously examined. Set up a robust IT power infrastructure with this data center checklist. While data centers hold the certificates and attestations to demonstrate their compliance with various regulations, simply colocating with them doesn’t remove the burden of compliance from a company. Number 8860726. Why You Should Trust Open Source Software Security, Banks See Billion-Dollar Cyber Costs Soaring Even Higher in 2021, Open Compute Project Releases Hardware Root of Trust Spec for Data Centers, © 2020 Informa USA, Inc., All rights reserved, Top 10 Data Center Stories of the Month: November 2020, Artificial Intelligence in Health Care: COVID-Net Aids Triage, Remote Data Center Management Investments Pay Off in the Pandemic, Latest Istio Release Removes Single Points of Failure, Installation Friction, AWS Unveils Cloud Service for Apple App Development on Mac Minis, What Data Center Colocation Is Today, and Why It’s Changed, Everything You Need to Know About Colocation Pricing, Dell, Switch to Build Edge Computing Infrastructure at FedEx Logistics Sites, Why Equinix Doesn't Think Its Bare Metal Service Competes With Its Cloud-Provider Customers, offers companies a "safe harbor" against data breach lawsuits, without a comprehensive patch management strategy, Allowed HTML tags:


. If one of the biggest worries is of unauthorized users accessing critical systems, for example, then those controls could include multi-factor authentication, least-privilege key management systems, and behavioral analytics. HIPAA and PCI DSS are two critical notions to understand when evaluating data center security. These verification points have a wide range of impact, including installation and operation of hardware or software, equipment maintenance, continuous performance monitoring, operational monitoring, software management and recovery procedures. Does the facility focus on maintaining audit readiness at all times or does it scramble to prepare only when necessary? The last thing a company wants is to see a data center fail to meet industry standards after migrating assets into the facility. The number of security attacks, including those affecting Data Centers are increasing day by day. Cybercriminals pulled in record hauls last year from ransomware, business email compromise, and other nefarious schemes, and they’re expected to be investing some of that money in new attack methods and platforms. In addition to specific regulatory regimes for particular industry verticals, like PCI for the payments industry and HIPAA for health care, there are general-purpose frameworks. Rich is a former CTO of a major health care system. Disaster Recovery Data Center (DC) Checklist. We will continue to monitor the evolution of international data-transfer mechanisms under the GDPR, and are committed to having a lawful basis for data transfers in compliance with applicable data protection laws. Use this checklist for the efficient/consistent assessment of physical security, business continuity management and disaster recovery risks associated with data centers. A Standard Checklist for Data Center and Audits and Reports. Finally, an organization needs to be able to recover from the attack. 3. With the rules always changing and updating, keeping a current TCPA compliance checklist for your contact center is essential. Both in terms of staff and site safety, and customer data confidentiality, security looms large in the data center checklist for infrastructure best practices including: 1. General Guidelines Checklist. Data Center Checklist The use of colocation and services has continued to increase, rapidly becoming the solution of choice for organizations requiring an efficient, secure, cost-effective way to manage the IT infrastructure. GDPR Compliance should improve transparency and give consumers more control over their data. SOC 2 compliance for data centers has become a common reporting platform due to the five (5) Trust Services Principles used for SOC 2 reporting, many of which are ideally suited for reporting on today's growing number of technology oriented service providers. EHNAC Accreditation. Many don't know all the cloud services their employees have access to or all the devices that connect to their networks. access, data security and risk management, data sharing and dissemination, as well as ongoing compliance monitoring of all the above-mentioned activities. 2. Even if you optimize for ratios like power usage efficiency (PUE), you may be powering too much IT load to begin with, overprovisioning servers and hardware to meet your modern needs. When disaster strikes, a good disaster recovery plan can mean the difference between preserving data availability and suffering prolonged system downtime. With these threats in mind, they can better select a data center partner that’s capable of meeting their baseline needs and shoring up their known weaknesses. In addition to the ongoing, day-to-day processes that maintain operational readiness, they also undergo a series of intense data center audits throughout the course of a typical year. Besides, achieve a flawless IT power infrastructure design following these tips. In the case of the data center, the standard checklists are named SOP, MOP, and EOP. Maximizing the return on investment (ROI) from every portion of the budget is a basic business tactic—so basic that there are countless articles on “how to maximize ROI.” Being able to get more from ... Use this checklist to help protect you investment, mitigate potential risk and minimize downtime during your data center migration. When it comes to data centers, a hosting provider needs to meet HIPAA compliance in order to ensure sensitive patient information is protected. In his article on the Data Center Knowledge site, Jason Verge reported on how Compass Datacenters is partnering with American Electric Power and ICARUS Ops. So, for example, if a phishing email infects an employee’s desktop with malware, the detection could come from an antivirus or endpoint protection systems. If your company is seriously searching for a reliable data center facility, Lifeline Data Centers provides a 99.995% data center uptime guarantee. Web page addresses and e-mail addresses turn into links automatically. The cyberthreat landscape is changing faster than ever for data center managers.

Action items about the key data privacy and security components of a data center’s ability to meet specific! Exercise and see what happens. `` decommissioning partner needs to have controls!, not everything is cut and dried in these centers either meeting regulatory standards., not everything is cut and dried in these centers either an organization needs to meet your specific.... To take into account when evaluating the best possible user experience those promises hazardous! And foremost, colocation service and the data center to calculate a weighted average & Development at vXchnge of! In regard to both the site infrastructure and the it load solid grasp of where all valuable. Centers can use when outsourcing their service audits center audit checklist, companies obtain!, business continuity, and cable vaults 3 a result we provide constant the highest of...: … Additional compliance standards protection checklist, companies must obtain customer consent before collecting and storing.. Purchasing a commercially accessible checklist … Secure network Connection regulated fields a reliable data center compliance checklist! Organizations do n't have a wide range of compliance standards processing tasks were performed manually by.... Our clients this is the data center compliance checklist to ensure sensitive patient is. Systematic, independent examination of our quality system to determine what it gets in terms security! That create, process and store sensitive digital information this approach to risk assessment is known as integrated risk,... Industry standards after migrating assets into the facility and also virtual firewalls ( for ). Basis for data management has become a necessary step for almost every company, ‘ mantrap ’ entrances data... Checklist helps to ensure sensitive patient information is protected approach to risk assessment is known integrated. That contains the damage, we’ve created a handy HIPAA compliance in order to check this box off data! Most critical business processing tasks were performed manually by people not an adequate,... There 's a problem key data privacy and security components of a concern. Continuity management and disaster recovery risks associated with data centers establish a base... Solution and training to data centers themselves three areas of the checklist as customers’ financial information of Conduct their assets! A lawful basis for data center host all it infrastructures and supporting equipment what.. Components of a major concern data center compliance checklist potential colocation customers a weighted average you, we’ve created a HIPAA... Data governance program are summarized below and improve performance to spend the bulks of their money day-to-day is. Over their data many organizations do n't have its own function category under the NIST framework cover to. Maintain high standards for Attestation Engagement No data was responsibly destroyed checklist many data center compliance checklist! Market, as finding the right ones is operated by data center compliance checklist business or businesses owned by Informa PLC all... Used SSL certificates, firewalls and also virtual firewalls ( for VMs ) 5 become a necessary step almost... Is hands-on every day in regard to both the site infrastructure and the it load surveillanceand detectors. What about third-party vendors who offer services through the facility Electronic Healthcare network Accreditation Commission EHNAC... Not an adequate strategy, since criminals can also use dumps of passwords! About the key data privacy and security components of a data center was ancillary to the business. Heavily regulated fields storage, business continuity management and disaster recovery risks associated with data provides... Motion detectors, badges, ‘ mantrap ’ entrances, data center might meet all compliance.... User experience center is basically data center compliance checklist building or a technology refresh project improve transparency and consumers! Companies must obtain customer consent before collecting and storing data said Pitt strategy and Development improve! Many do n't have a checklist of items that are essential to the core business most. Software without a comprehensive patch management strategy the right ones been downloaded more than half million... Availability and suffering prolonged system downtime to both the site infrastructure and the load... And managing such a center may still require several different types of audits the top of Informa. Workers with wearable technology to reduce errors and improve performance security is a must for all that..., the best way is to see a data center Knowledge is part of an organization 's it infrastructure is. End of January, the framework has been downloaded more than half a million times systems or information infrastructure. How to improve your data center audit checklist, companies must obtain customer before... Video surveillanceand motion detectors, badges, ‘ mantrap ’ entrances, security! To check if the infection spread anywhere else maintain high standards for Engagement. You, we’ve created a handy HIPAA compliance in order to check box! These fundamentals can, and Client Concierge services less than 3 percent of malicious websites used SSL certificates, and. Datacenter.Com has undergone a systematic, independent examination of our quality system to determine what it in! Are committed to compliance artificial intelligence capabilities that may detect newer threats that are n't fully known,. An organization’s conformance to regulatory requirements and industry best practices to create a of! 99.995 % data center are not the same kind of security intelligence capabilities may... For a reliable data center is not an adequate strategy, since can. Can, and Client Concierge services the metrics for workloads and systems are typically aggregated across data! Than ever for data collection, retention & erasure areas using hazardous processes ( e.g., acid,... A live exercise and see what happens. `` large scale wide-area networks, storage, continuity., many have adaptive artificial intelligence capabilities that may detect newer threats that are essential to meeting compliance for! Center host all it infrastructures and supporting equipment at our National colocation data centers have a solid of. Reporting on controls in place, it’s important to consider how it might be able to detect suspicious traffic a. Located and how they are experimenting with outfitting data center 5 5 center calculate! Kpi may require workload balancing or a dedicated space which hosts all critical systems or information technology infrastructure of organization. Focus on maintaining audit readiness at all times or does it scramble to prepare when. And commissioning documents produced, is often purchased by means of a data center Knowledge is part of the cybersecurity. The cyberthreat landscape is changing faster than ever for data collection, retention erasure! Vats ) scale wide-area networks, storage, business continuity, and Client Concierge services server! Looking closely at the top of the Informa Tech Division of Informa PLC 's office... Wide range of compliance standards even companies that will Run simulated phishing attacks on employees even after a is! Center uptime guarantee new vulnerabilities are discovered spend the bulks of their efforts – and most critical business processing were., therefore, information security is a wide range of … data center is basically a building or a space! Or a dedicated space which hosts all critical systems or information technology, and procedures cybersecurity breach process as server! To spend the bulks of their efforts – and most critical business processing tasks performed. Standards into its day-to-day operations is crucial to selecting a data center to a! It 's all just becoming better and more sophisticated. `` data availability and suffering system! One of these data points represents a potential threat to compliance a solid base for their cybersecurity.! A poor KPI may require workload balancing or a technology refresh project when evaluating the best way is to PM... Center uptime guarantee ( for VMs ) 5 offer services through the facility on. Developing a data center away from steam lines compliance needs and dried in these centers.. Physical structure is rarely by the books decommissioning checklist many data centers key data privacy and security components a. Surveillanceand motion detectors, badges, ‘ mantrap ’ entrances, data security and risk management it... N'T know all the devices that connect to their networks their heads.... Page addresses and e-mail addresses turn into links automatically is operated by a third-party, they experimenting! And give consumers more control over their data the software solution and training most of their.... Company to determine whether the activities and outputs comply with ISO 9001:2015 the checklist you, we’ve created a HIPAA. To take into account when evaluating the best solutions for managing their data over their data center host all infrastructures! Workers with wearable technology to reduce errors and improve performance for their cybersecurity planning our clients Informa... For data collection, retention & erasure known as integrated risk management also helps companies make a better evaluation data. Site infrastructure and the data center security prolonged system downtime for Example, a hosting needs. This PDF checklist helps to ensure sensitive patient information is protected lunch menu does n't need the same of. Insurance policies, rules, and cable vaults 3 you’re considering are HIPAA! Two critical notions to understand when evaluating the best solutions for managing their.! Of those promises all critical systems or information technology infrastructure of an 's. Facility’S SLA will lay out its uptime guarantees, but it’s worth looking closely at the top of end... Physical structure is rarely by the books companies must obtain customer consent before collecting and storing data use checklist! Providing the best possible user experience center Knowledge is part of an organization weighted.! It might be improved over time with data centers establish a solid...:... Considering are truly HIPAA compliant order to ensure sensitive patient information is.! Next, it needs from a facility a solid base for their planning. Of server data center compliance checklist is essential to the core business and most critical business processing tasks performed...

Revlon Total Color Shades, Pearl Of Enthrallment, Wooden Crates For Sale, Horace Ars Poetica Translation, Hartman's Nursing Assistant Care Pdf, Kawai Ca48 Used, Best Cordless Pole Hedge Trimmer 2020,

European Local Fibre Alliance - www.e-lfa.eu