SKSPI33 Undertake image asset management
|
|
- Evelyn Hoover
- 8 years ago
- Views:
Transcription
1 Overview This Standard is about undertaking image asset management in your business or organisation for internal and/or external clients and understanding the resources required and available. The Standard applies to historical or current images which are produced and/or contained in any form of media (electronically or mechanically). It covers electronic and manual methods of archiving, conservation, storage, preservation, security, access, retrieval, and the monitoring and control of the use of images. It requires an understanding of the use and importance of metadata, and also requires the application of colour management techniques. SKSPI33 1
2 Performance criteria You must be able to: P1 in accordance with business or organisational policies ensure a risk assessment has been carried out on minimising such risks as accidental or illegal criminal or civil - loss of images P2 before archiving, using or retrieving images, ensure an assessment for quality and fitness for purpose has been made P3 ensure before archiving or using images that they do not infringe current laws and guidelines, and where applicable, ensure that releases and permissions have been granted or sought P4 for images requiring adjustments ensure these are carried out in conjunction with your business or organisation s ethics and procedures, and that image integrity is retained P5 confirm colour management processes have been carried out properly and in accordance with client s requirements P6 ensure images and the media on which they are stored are protected from physical damage during work processes and during storage P7 in accordance with your business or organisation s procedures, archive images appropriate to their type, format and usage P8 produce a specification for the digital asset management (DAM) system you require and assess DAM software for suitability P9 ensure that images are keyworded and captioned accurately and appropriately, according to accepted standards, and that the metadata remains with each image at all times P10 ensure the archived media are preserved by environmental and security systems, according to your organisation or business requirements P11 ensure that protection systems are used, maintained and kept up to date, including anti-virus control, electronic or physical systems, with appropriate levels of access P12 ensure records are kept and maintained and they contain clear and accurate data on the content of the output P13 ensure systems and procedures are in place to maintain a complete audit history of all digital image files P14 ensure that systems are in place that monitor and control the use of images within your business or organisation P15 ensure back- ups or copies of electronically stored media are made at the required frequency and that backups are stored in a separate, but safe and secure location SKSPI33 2
3 Knowledge and understanding You need to know and understand: K1 the laws, regulations and guidelines relevant to your work, including copyright, ethics, data protection, model and property rights and confidentiality, codes of conduct and best practice relating to your work K2 your business or organisation s policies and strategy or objectives and how to interpret information in relation to its activities K3 your business or organisation s range of work carried out, the systems and procedures used to enable that work to be undertaken and how it is managed K4 the protocols to use when capturing and importing images from a capturing device e.g. RAW, TIFF, JPEG, and the reasons for using them K5 the importance of metadata in allowing for the search and proper identifications of stored images, protecting intellectual property and allowing successful commercial exploitation of images K6 existing or evolving industry and international standards or scheme for storing technical, descriptive, provenance, copyright and licensing information including IPTC Core & Extension, and other sector specific standards where relevant K7 your organisation s systems and procedures for archiving images with regard to technical metadata, cataloguing and keywording K8 available DAM systems and software and their suitability for your business or organisation K9 how the archived images will be protected and stored, according to the image medium and format, the business or organisation s conservation and archival requirements K10 colour management - the reasons for and the use of image profiles K11 the environmental systems, controls and relevant standards used for different types of media to help preserve images K12 the security systems required to protect the images for different types of media: physical, electronic and surveillance K13 the access and usage levels appropriate to the images stored, for example commercial, legal and government restrictions K14 file sizes appropriate to different image purposes K15 your business or organisation s systems and protocols to access, retrieve images or media and monitor, control and report the usage of images K16 the importance of maintaining effective audit trails of all actions relating to digital image files K17 your business or organisation s image asset risk management systems, including the back up of data, risk assessments, disaster recovery and adequate insurance cover K18 the law relating to health and safety, the assessment of hazards and risks and the action to take to deal with them, and specifically those SKSPI33 3
4 relating to computer equipment and the workstation K19 the principles of colour theory and practice of image preservation, including colour management K20 the methods of conservation and preservation of hard copy original artwork K21 current British Standards and where applicable International Standards for storage and archiving K22 troubleshooting techniques in dealing with lost or corrupt media or media which cannot be accessed K23 other assets and systems the business or organisation has to manage e.g. IT and finance, and how this interrelates with image asset management K24 the resources required and how to access them, to meet the client s requirements K25 existing or evolving industry and international standards in the management, storage and supply of images K26 the different types of image asset management systems in the market place K27 codes of conduct and best practice relating to your work K28 relevant sources of information to help you keep your knowledge and skills up-to-date SKSPI33 4
5 Developed by Creative Skillset Version number 2.0 Date approved February 2013 Indicative review date Validity Status Originating organisation Original URN Relevant occupations Suite Key words February 2016 Current Original Creative Skillset SKSPI21 Arts, Media and Publishing; Associate Professionals and Technical Occupations; Retail and Commercial Enterprise; Service Enterprises; Media and Communication; Media Associate Professionals Photo Imaging Image; asset; management; business; organisation; internal; external; clients; resources; historical; current; media; electronically; mechanically; electronic; manual; archiving; conservation; storage; preservation; security; access; retrieval; monitoring; control; metadata; colour; techniques SKSPI33 5
FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation
Facilitate Business Continuity Planning and disaster recovery for a Overview This unit is suitable for those working in risk management roles who have responsibility for facilitating business continuity
More informationAS/NZS 4801:2001. Safety Management Systems (SMS) Self-Assessment Checklist. Revision 1 (January 2014)
AS/NZS 4801:2001 Safety Management Systems (SMS) Self-Assessment Checklist This document restates the requirements of AS/NZS 4801:2001 for Safety Management Systems (SMS) and has been developed to assist
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationRESEARCH DATA MANAGEMENT POLICY
Document Title Version 1.1 Document Review Date March 2016 Document Owner Revision Timetable / Process RESEARCH DATA MANAGEMENT POLICY RESEARCH DATA MANAGEMENT POLICY Director of the Research Office Regular
More informationFSPAMFPI06 Complete reports for mortgage and/or financial planning clients
Complete reports for mortgage and/or financial planning clients Overview You must be able to accurately complete reports of a complex nature, and take a proactive approach to the preparation of valuations
More informationOH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained
More informationAHDS Digital Preservation Glossary
AHDS Digital Preservation Glossary Final version prepared by Raivo Ruusalepp Estonian Business Archives, Ltd. January 2003 Table of Contents 1. INTRODUCTION...1 2. PROVENANCE AND FORMAT...1 3. SCOPE AND
More informationAn Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
More informationNHS Business Services Authority Records Management Audit Framework
NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued
More informationThe legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
More informationESKIDMS3 Database management software
Overview This is the ability to use a software application designed to store and retrieve data needed for a variety of business functions. It also includes an understanding of the features and facilities
More informationA Selection of Questions from the. Stewardship of Digital Assets Workshop Questionnaire
A Selection of Questions from the Stewardship of Digital Assets Workshop Questionnaire SECTION A: Institution Information What year did your institution begin creating digital resources? What year did
More informationLIBER Case Study: University of Oxford Research Data Management Infrastructure
LIBER Case Study: University of Oxford Research Data Management Infrastructure AuthorS: Dr James A. J. Wilson, University of Oxford, james.wilson@it.ox.ac.uk Keywords: generic, institutional, software
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationThe Australian War Memorial s Digital Asset Management System
The Australian War Memorial s Digital Asset Management System Abstract The Memorial is currently developing an Enterprise Content Management System (ECM) of which a Digital Asset Management System (DAMS)
More information3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationOverview. PRODPP128 (SQA Unit Code - H9KH 04) Produce approved proofs from digital artwork. Produce approved proofs from digital artwork
(SQA Unit Code - H9KH 04) Overview This standard is about producing, assessing and correcting hard-copy proofs produced from that meet the criteria for a 'contract-quality' proof. A contract-quality proof
More informationManagement of Official Records in a Business System
GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version
More informationCompetency framework COMPUTING AND INTERNET CERTIFICATE (C2i)
Competency framework COMPUTING AND INTERNET CERTIFICATE (C2i) Mission Numérique pour l'enseignement Supérieur (MINES - DGESIP) (Digital Mission for Higher Education) Ministry of Higher Education and Research
More informationRecords Management Policy
Records Management Policy Document Number SOP2006-073 File No. 07/7 Date issued 1 September 2006 Author Branch Records and Mail Services Unit Branch contact 9320.7722 Division Finance & Data Services Summary
More informationWASTE MANAGEMENT DATA & INFORMATION MANAGEMENT POLICY STATEMENT
Attachment 5.4 WASTE MANAGEMENT DATA & INFORMATION MANAGEMENT POLICY STATEMENT PREPARED BY THE April 2010 1 Status of this Policy Statement This Policy Statement has been prepared by the Municipal Waste
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More informationAPPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES
APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,
More informationPARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
More informationRECORDKEEPING MATURITY MODEL
Introduction Maturity Rating Definitions 1 Level 1 Inadequate/Sub-standard Practice is not formalised or documented. Processes and practices are fragmented or non-existent. Where processes and practices
More informationScanning Guidelines. Records Management
Records Management Scanning Guidelines for compliance with Code of practice for legal admissibility and evidential weight of information stored electronically (Reference document BSI document: BS10008)
More informationRecords Management & Data Quality in the Contact Centre. Internal Audit Report 2013/14
Records Management & Data Quality in the Report 2013/14 Records Management & Data Quality in the Ann Kirk & Julie Ball 19 May 2014 Contents Audit: Auditor: Records Management & Data Quality in the Ann
More informationRelease: 1. BSBCMN406A Maintain business technology
Release: 1 BSBCMN406A Maintain business technology BSBCMN406A Maintain business technology Modification History Unit Descriptor This unit covers the skills and knowledge required to maintain the effectiveness
More informationHow To Build A Map Library On A Computer Or Computer (For A Museum)
Russ Hunt OCLC Tools Managing & Preserving Digitised Map Libraries Keywords: Digital collection management; digital collection access; digital preservation; long term preservation. Summary This paper explains
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
More informationChecklist and guidance for a Data Management Plan
Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
More informationMaster Class 4 - Introduction to Intellectual Property and Copyright Wilna Macmillan, Director of Client Services, Library
IP and Research Data Managing your research data Consider early and review often Master Class 4 - Introduction to Intellectual Property and Copyright Wilna Macmillan, Director of Client Services, Library
More informationNOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager
FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011
More informationResearch Data Management Policy
Research Data Management Policy Version Number: 1.0 Effective from 06 January 2016 Author: Research Data Manager The Library Document Control Information Status and reason for development New as no previous
More informationData Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationNational Statistics Code of Practice Protocol on Data Management, Documentation and Preservation
National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation London:
More informationDIGITIZATION S GUIDE. Go for quality and document your process!
DIGITIZATION S GUIDE Go for quality and document your process! DIGITIZATION: GO FOR QUALITY AND DOCUMENT YOUR PROCESS! (Source: La numérisation des documents administratifs Méthodes et recommandations
More informationESKITP2034.03 Assist in the preparation of change management plans and assignments for IT enabled systems 1
Assist in the preparation of change management plans and assignments for IT Overview This sub-discipline, Change Management (203) is concerned with the competencies required to manage the introduction
More informationESKITP4082 IT/Technology Infrastructure Design and Planning Level 2 Role
IT/Technology Infrastructure Design and Planning Level 2 Role Overview This sub-discipline is part of overall service design. It concerns the design of, and planning for, resilient IT/ technology infrastructure
More informationOFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
More informationApplication Development within University. Security Checklist
Application Development within University Security Checklist April 2011 The Application Development using data from the University Enterprise Systems or application Development for departmental use security
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationRelease: 1. CPPSEC4015A Maintain networked security system
Release: 1 CPPSEC4015A Maintain networked security system CPPSEC4015A Maintain networked security system Modification History Not Applicable Unit Descriptor Unit descriptor This unit of competency specifies
More informationICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
More informationSTORRE: Stirling Online Research Repository Policy for etheses
STORRE: Stirling Online Research Repository Policy for etheses Contents Content and Collection Policies Definition of Repository Structure Content Guidelines Submission Process Copyright and Licenses Metadata
More informationData management plan
FACILITATE OPEN SCIENCE TRAINING FOR EUROPEAN RESEARCH 612425 Data management plan Course for Doctoral Students at ECPR Summer School 2015 Faculty of Social Sciences, University of Ljubljana, Slovenia
More informationOECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT
GENERAL DISTRIBUTION OCDE/GD(95)115 OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationTechnical Competency Framework for Information Management (IM)
Technical Competency Framework for Information Management (IM) Office of the Chief Information Officer (OCIO) June 15, 2009 Table of contents IM Competency Framework...1 Competency 1: Information Management
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
More informationIT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
More informationBSO Board Director of Human Resources & Corporate Services Digitalisation of records in the Scanning Centre. 21 June 2012
To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Digitalisation of records in the Scanning Centre For Approval 21 June 2012 The Board is asked to consider
More informationE-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationInformation Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
More informationVersion 1.0. Ratified By
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience
More informationFSPAMFPI01 Provide an administrative service for mortgage and/or financial planning clients
FSPAMFPI01 Provide an administrative service for mortgage and/or financial planning clients Overview You must be able to deal with clients as well as internal colleagues, whether you are responding to
More informationRecords Management plan
Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland
More informationINTERNATIONAL SOS. Data Retention, Archiving and Destruction Policy. Version 1.07
INTERNATIONAL SOS Data Retention, Archiving and Destruction Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: January 2009 Revised: 2015 All copyright in these materials
More informationRecords and Information Management. General Manager Corporate Services
Title: Records and Information Management Policy No: 057 Adopted By: Chief Officers Group Next Review Date: 08/06/2014 Responsibility: General Manager Corporate Services Document Number: 2120044 Version
More informationCOMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
More informationWhat NHS staff need to know
St George s Healthcare NHS NHS Trust Surrey Health Informatics Service Sussex Health Informatics Service Records Management Explained What NHS staff need to know A guide to Records Management Contents
More informationOMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT
More informationScotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
More informationOutline of a Research Data Management Policy for Australian Universities / Institutions
Outline of a Research Data Management Policy for Australian Universities / Institutions This documents purpose: This document is intended as a basic starting point for institutions that are intending to
More informationRelease 1. ICAICT814A Develop cloud computing strategies for a business
Release 1 ICAICT814A Develop cloud computing strategies for a business ICAICT814A Develop cloud computing strategies for a business Modification History Release Release 1 Comments This version first released
More informationCOUNCIL POLICY R180 RECORDS MANAGEMENT
1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.
More informationTHE WALTER AND ELIZA HALL INSTITUTE OF MEDICAL RESEARCH POSITION DESCRIPTION
THE WALTER AND ELIZA HALL INSTITUTE OF MEDICAL RESEARCH POSITION DESCRIPTION POSITION TITLE: Head, Information Technology Services DIVISION / DEPARTMENT: Information Technology Services DATE: 2 June 2009
More informationInformation Management Policy CCG Policy Reference: IG 2 v4.1
Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control
More informationThe Data Management Plan with. Dataverse. Mercè Crosas, Ph.D. Director of Product Development
The Data Management Plan with Dataverse Mercè Crosas, Ph.D. Director of Product Development The Dataverse The Data Management Plan The Data Management Plan with Dataverse The Dataverse The Data Management
More informationProtecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
More informationRecords Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
More informationPrivacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationManagement of Research Data Procedure
Management of Research Data Procedure Related Policy Management of Research Data Policy Responsible Officer Deputy Vice Chancellor (Research) Approved by Deputy Vice Chancellor (Research) Approved and
More informationITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:
ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationForbes Shire Council Internet Access Policy
Forbes Shire Council Forbes Shire Council Internet Access Policy Policy No IT/001 Date approved 17 August 2006 Authority Information Technology Services Contact Officer Brian Clarke Revision History Version
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
More informationProcurement of Goods, Services and Works Policy
Procurement of Goods, Services and Works Policy Policy CP083 Prepared Reviewed Approved Date Council Minute No. Procurement Unit SMT Council April 2016 2016/0074 Trim File: 18/02/01 To be reviewed: March
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationWorkshop: Data protection in the digital office. ICO Foundation SME Workshop Technology
Workshop: Data protection in the digital office ICO Foundation SME Workshop Technology Overview Aims and objectives Scenario-based Risks in the digital office Cloud computing Mobile devices Office relocation
More information1.0 Policy Statement / Intentions (FOIA - Open)
Force Policy & Procedure Reference Number Business Continuity Management D269 Policy Version Date 23 July 2015 Review Date 23 July 2016 Policy Ownership Portfolio Holder Links or overlaps with other policies
More informationArchival Data Format Requirements
Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016
More informationRECORDS MANAGEMENT & DIGITISING SPECIALISTS
RECORDS MANAGEMENT & DIGITISING SPECIALISTS DOCUMENT STORAGE VAULT STORAGE MEDIA STORAGE DOCUMENT RESTORATION HIGH SPEED DOCUMENT SCANNING DOCUMENT DESTRUCTION CONSULTANCY www.grm.ie www.grm.ie 1 Our records
More informationHow To Manage Your Digital Assets On A Computer Or Tablet Device
In This Presentation: What are DAMS? Terms Why use DAMS? DAMS vs. CMS How do DAMS work? Key functions of DAMS DAMS and records management DAMS and DIRKS Examples of DAMS Questions Resources What are DAMS?
More informationCFAM&LAA2 Develop your knowledge, skills and competence
Overview This standard is about taking responsibility for developing your own knowledge, skills and competence to meet the current and future requirements of your work and to support your personal and
More informationRecords Management - Department of Health
Policy Directive Records Management - Department of Health Document Number PD2009_057 Publication date 24-Sep-2009 Functional Sub group Corporate Administration - Records Ministry of Health, NSW 73 Miller
More informationNOT PROTECTIVELY MARKED FORCE PROCEDURES. Using the Off-Site Storage Facility for Physical Records - v03. Records Manager
FORCE PROCEDURES Using the Off-Site Storage Facility for Physical Records - v03 Procedure Reference Number: 2010.07 Procedure Author: Samantha Hampson Records Manager Procedure Review Date: February 2013
More informationRole Description Curator - Digital Assets
Role Description Curator - Digital Assets Cluster Agency Division/Branch/Unit Location Department of Planning & Environment Sydney Living Museums Collections & Access The Mint Classification/Grade/Band
More informationInformation Management Strategic Plan - Methodology
OVERVIEW: According to ISO 15489-1 and -2 Information and Documentation Records Management, Part 1 (General) and Part 2 (Guidelines), in order to design and implement sustainable record systems, a design
More informationLife Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
More informationServices for professional procurement. Be better informed, make better decisions. RISQS Audit Questions Medical Screening Requirements
Services for professional procurement. Be better informed, make better decisions. RISQS Audit Questions Medical Screening Requirements Contents Contents... 2 Preface... 3 Issue Record... 3 Assessment Requirements...
More informationINFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
More informationSINGAPORE NATIONAL CO-OPERATIVE FEDERATION. Presentation on Managerial and Professional exposures
SINGAPORE NATIONAL CO-OPERATIVE FEDERATION Presentation on Managerial and Professional exposures 2 Important Notice Full details of the terms, clauses, conditions, limitations and exclusions of the various
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More information