| Contact Us Application |
| 1. Every Bespoke Application Service has a public menu bar that has buttons to popup a common privacy notice and contact us notice. |
| 2. The Contact Us Notice web page includes a form that triggers the Contact Us Application (CUA). Contact Us Notice complies with the legal obligation (GDPR article 13(1a+1b)) to provide people with data controller contact facilities. Contact Us Notice complies with the legal obligation (GDPR article 38.4) to provide people with the right to send a messge to the Data Protection Officer. |
| 3. The contact us notice web page is common to all Bespoke Application Services and provides an online message service that conforms with legal obligations that a person must be able to request more information from the DPO and others. |
| 4. Any approved person should sign-in so they are identified and then author a support request. |
| 5. Any person may use the CUA to send a message and where it is from an approved person, then the CUA message is transformed into a normal support message. It is expected that the majority of CUA messages will be fake and can be ignored. |
| Monica |
| 1. Monica periodically reads the image library to detect a new CUA message. |
| 2. Monica will decrypt and display the message. |
| 3. First Level Support may click the message to popup the CUA application that can process the message. |
| 4. When the persons identity is fake, the CUA message can be ignored and so its status is simply changed to "closed" so it will not be shown again. |
| 5. When the persons identity is confirmed, then CUA message will be copied into a Bespoke Application Service support message that can be processed by the Request Fulfilment Management team as normal. |
| 6. When the support message has a simple resolution, the applicable web page can be entered and the support message sent via an email envelope to the "on behalf of" approved person. |
| 7. Closed CUA messages will periodically be destroyed. Support messages are retained for two years and then destroyed. |
| Private Security |
| 1. CUA information is encrypted to cause it to be unintelligible, meaningless and worthless to a criminal. |
| It is plausible to state that CUA information is never stored and so CUA information cannot be stolen. |
| 2. CUA encrypted images are replicated to ensure that they cannot be lost. |
| If an image is corrupted, stolen or lost in one image library, other copies exist in other image libraries. |
| 3. CUA messages are never leaked by email and so they may contain private, confidential and sensitive information. |
| CUA messages are only displayed using HTTPS end-to-end encrypted communications. |
| Message To |
| 1. The message author does not need to know the name of the person who is available to handle their request because they can select from a drop down list of roles and responsibilities as:- All roles are manned 24*7 to expect a response within the hour and an automatic escallation to an officer if a message is not being resolved in an effective way. |
| First Level Support (default) |
| Request Fulfilment Manager (enquiries) |
| Data Protection Officer (privacy) |
| Access Control Manager (sign in) |
| Personel Director (HR) |
| . |
| Demand Director (capacity management) |
| Supplier Director (a large number of secure data centers) |
| Operations Director (system software) |
| Finance Director (open and transparent accounts) |
| Portfolio Director (demonstrable applications) |
| Continual Improvement Manager (making dreams come true) |
| Business Continuity Manager (replicated with no single point of failure) |
| Service Level Manager (as defined by the owner) |
| Information Security Manager (as needed to eliminate problems) |
| Compliance Manager (international open standards) |
| Facilties Manager (data center environmental issues) |
| Risk Manager (what can go wrong and what is needed to stop it) |
| Development Manager (what does the Owner want) |
| Deployment Manager (what the owner said) |
| Configuration Manager (making the hardware fit the application) |
| Knowledge Manager (artificial intelligence rules) |
| Incident Manager (attack containment) |
| Problem Manager (attack counter measures) |
| Process Audit Manager (review and revise) |
| 3. For advice and guidance about these roles and responsibilities, please lookup the Information Technology Infrastructure Library (ITIL) ISO 20001 International standard. |