1. |
PCI Compliance Oxcyon, Inc. client solutions (Online Merchant locations) that accept credit card payments must process those payments in a manner compliant with the Payment Card Industry Data Security Standard (PCI DSS) per the Oxcyon Merchant Card Processing Policy which considers and is based upon the Payment Card Industry Security Standards Council (PCI-SSC) . It is the responsibility of each Merchant location to maintain compliance with PCI DSS. e-Commerce Operations , u...
- Site Map
- Everyone: All Users
- 8/26/2016
- Relevance: 29
-
-
12/31/9999 11:59:59 PM
-
PCI Compliant, Ecommerce, Centralpoint, CMS, Portal, Enterprise, Online Store
-
-
-
-
-
-
-
-
8/26/2016 8:34:43 AM
-
-
|
2. |
- Security Policies
- Security
- Everyone: All Users
- 7/27/2022
- Relevance: 19
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:27 AM
-
-
|
3. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2020
- Relevance: 18
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:48 PM
-
-
|
4. |
The life sciences community has always been more conservative when it comes to the adoption of new technologies, and cloud-based systems are no exception. This cautious approach to shiny new technology objects is more than appropriate given the high stakes nature of the good work these companies perform. Mitigating risks and avoiding new ones is top of mind for pharmaceutical IT and quality professionals. Now that cloud-computing models are well accepted across many industries with proven security models...
- Site Map
- Everyone: All Users
- 6/4/2017
- Relevance: 18
-
-
12/31/9999 11:59:59 PM
-
FDA, GMA, Validation, Security
-
-
-
-
-
-
-
-
7/20/2020 1:33:18 PM
-
-
|
5. |
- Security Policies
- Security
- Everyone: All Users
- 8/26/2021
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:13:03 AM
-
-
|
6. |
- Centralpoint Module Gallery
- Everyone: All Users
- 10/23/2015
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Magic Quadrant, MQ, Digital Experience, Portal, SSO, SAML, AD, Data Migraiton, Document Management, Metadata, Taxonomy, Enterprsie Content Management, Knowledge Management, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Centralpoint's file output module works in unison with Roles, Audiences, Global Login, and Data Sources to render living, breathing files unique for each user who downloads them. This is DITA, Darwin Information Typing Architecture, and it is changing the way organizations manage information across their many users. It means a single source of truth, which passes through easy to use templates (able to be managed simply by uploaded Microsoft Word, Powerpoint or Excel documents) in which to provide outputs (Word, PDF, PPT, Excel) to your users....fresh out of the oven.
DITA Means giving everyone access to the same document, (like a sales contract), yet each representative might download it differently based on their role, region or both. This document may provide the correct legal clause for the State of California for one agent, and the appropriate clause for Utah for another agent. Each and every element on the output (document or download) is rendered intelligently based on their request. This means you only need worry about the templates, and tagging your content appropriately (for certain agents in either California or Utah).
Centralpoint File Output module is found under the Data Transform category of your Client Console. This module allows you to manage multiple templates, and their corresponding download link (or button) which you can provide to your users. It is the 'filter' in which your information transforms into the file output that you wish to make available. This file is fresh from the oven, each time it is downloaded.
-
-
-
-
-
-
-
2/19/2024 12:08:45 PM
-
https://qc.xoprod20.com/Uploads/Public/DITA3.png
-
|
7. |
Philosophy The value of data as a resource is increased through its widespread and appropriate use; its value is diminished through misuse, misinterpretation, unnecessary restrictions to its access, or failure to maintain quality. Most importantly, wide access to data will enable consumers to identify new relationships in data and new information previously unknown or unavailable. This is the domain of data mining and to some degree what-if analysis. Oxcyon endorses and supports this within the appropri...
- Site Map
- Everyone: All Users
- 2/3/2021
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/14/2022 10:44:46 AM
-
-
|
8. |
What is Section 508 Compliance? § 1194.1 Purpose. The purpose of this part is to implement section 508 of the Rehabilitation Act of 1973, as amended (29 U.S.C. 794d). Section 508 requires that when Federal agencies develop, procure, maintain, or use electronic and information technology, Federal employees with disabilities have access to and use of information and data that is comparable to the access and use by Federal employees who are not individuals with disabilities, unless an undue bu...
- Site Map
- Everyone: All Users
- 8/26/2016
- Relevance: 15
-
-
12/31/9999 11:59:59 PM
-
508, Portal, Enterprise, Content Management, Digital Experience 508
-
-
-
-
-
-
-
-
2/1/2018 2:14:13 PM
-
-
|
9. |
- Security Policies
- Operations
- Everyone: All Users
- 10/25/2022
- Relevance: 14
-
-
12/31/9999 11:59:59 PM
-
Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:53 PM
-
-
|
10. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:39 PM
-
-
|
11. |
We at Oxcyon, Inc. recognize our responsibility to develop electronic and information technology (EIT) products and services that are accessible and usable by all people, including those with disabilities and special needs. We are committed to making our products and services compliant with the accessibility standards of Section 508 (Electronic and Information Technology Accessibility Standards, 36 C.F.R. § 1194) . To meet this commitment, we will comply with the requirements of Section 508 of the...
- Site Map
- Everyone: All Users
- 1/27/2016
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
508, Section 508, Accessibility, Handicapped, Disabled, Blind, Centralpoint, Oxcyon, Gartner, Digital Experience, Digital Experience Platforms
-
-
-
-
-
-
-
-
2/1/2018 2:22:02 PM
-
-
|
12. |
HIPAA BUSINESS ASSOCIATE PRIVACY POLICY Oxcyon, Inc. takes privacy very seriously. We share a commitment with Covered Entities to protect the privacy and confidentiality of Protected Health Information (PHI) that we obtain subject to the terms of a Business Associate Agreement. This Policy is provided to help you better understand how we at OXCYON, INC., use, disclose, and protect PHI in accordance with the terms of Business Associate Agreements. Definitions Business Associate Agreement (BA Agreement). ...
- Site Map
- Everyone: All Users
- 8/26/2016
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
HIPAA Compliant Portal, Content Management, Patient Portal, Extranet, Healthcare, Intranet
-
-
-
-
-
-
-
-
8/26/2016 8:34:03 AM
-
-
|
13. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:19 PM
-
-
|
14. |
It is difficult to come across a unified explanation of how one should look at the concept of distributed ledger technology or blockchain. Blockchain is a type of database spread across multiple sites, regions, or participants. As one would expect, a distributed ledger has to be decentralized, otherwise it would resemble a centralized database like most companies use today. Removing the intermediary party from the equation is what makes the concept of distributed ledger technology so appealing. Remember...
- Blogs
- Everyone: All Users
- 7/22/2017
- Relevance: 10
-
-
12/31/9999 11:59:59 PM
-
Blockchain Enterprise, Blockchain Content management, Oxcyon, Centralpoint, DITA, Digital Experience, SSO, Centralpoint, Gartner
-
-
-
-
-
-
-
-
4/13/2021 10:14:10 AM
-
-
|
15. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 9
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
16. |
Oxcyon, Inc.and its subsidiaries respect the privacy of their employees, users and customers and are committed to protecting employee, user and customer data maintained by the company. Due to the global nature of Oxcyon, Inc.’ business, transfers of employee and customer Personal Data, defined below, across national boundaries may occur. As a result, Oxcyon, Inc.has adopted this Safe Harbor Data Privacy Policy and adheres to the Safe Harbor Principles published by the U.S. Department of Commerce, in agre...
- Site Map
- Everyone: All Users
- 4/12/2013
- Relevance: 9
-
-
12/31/9999 11:59:59 PM
-
Centralpoint by Oxcyon's Safe Harbor Policy
-
-
-
-
-
-
-
-
8/8/2017 11:30:38 AM
-
-
|
17. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
18. |
Oxcyon, is compliant with ISO27k by proxy of Certificate Number OHS 587454 . Those prefixed with ‘A’ are listed in Annex A of ISO/IEC 27001:2013 and are explained in more detail in ISO/IEC 27002:2013. Further ISO27k standards fill-in various supplementary details ( e.g. ISO/IEC 27005 on information risk management and ISO/IEC 27018 on privacy in cloud computing), while other ISO and non-ISO standards and resources provide lots more information, and in some cases recommend alternative o...
- Site Map
- Everyone: All Users
- 8/2/2014
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
ISO27K, EU, EU Compliance, Standards, Policy, ISO/IEC 27001:2013
-
-
-
-
-
-
-
-
8/8/2017 11:24:16 AM
-
-
|
19. |
Your personal data Personal data relates to a living individual who can be identified from that data. Identification can be by the information alone or in conjunction with any other information in the data controller’s possession or likely to come into such possession. The processing of personal data is governed by the General Data Protection Regulation (the “GDPR”). Who we are ,legal name, [cp:scripting key='AudienceInfo' attributesys...
- Site Map
- Everyone: All Users
- 9/10/2010
- Relevance: 7
-
-
12/31/9999 11:59:59 PM
-
Oxcyon, Centralpoint, Privacy Policy, GDPR, EU, European Privacy, Website Privacy Policy
-
-
-
-
-
-
-
-
2/16/2023 3:37:37 PM
-
-
|
20. |
The Federal Information Security Management Act (FISMA) requires federal agencies to implement and support standardized IT security controls. These controls, defined by the National Institute of Standards and Technology (NIST), allow agencies to safely and confidently outsource critical applications to FISMA-compliant clouds, managed hosting environments and SaaS providers. Designed to Address Strict FISMA Standards More than half of all federal cabinet-level agencies — including Veterans Affairs, the De...
- Site Map
- Everyone: All Users
- 9/13/2017
- Relevance: 6
-
-
12/31/9999 11:59:59 PM
-
Fedramp, FISMA, Federal Government Hosting, 21st Century Digital Experience, Managed Services, FedRAMP Compliance, FISMA compliant, US Government
-
-
-
-
-
-
-
-
12/20/2023 3:53:17 PM
-
-
|
21. |
Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. We are focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings, providing security control transparency. This effort by design is integrated with and will support ...
- Site Map
- Everyone: All Users
- 6/5/2017
- Relevance: 6
-
-
12/31/9999 11:59:59 PM
-
CMS CAIQ Compliance, CAIQ Portal, ECM CAIQ
-
-
-
-
-
-
-
-
9/19/2018 5:58:02 AM
-
-
|