Faculty of Natural and Agricultural Sciences IT POLICIES & SERVICE CATALOGUE

Size: px
Start display at page:

Download "Faculty of Natural and Agricultural Sciences IT POLICIES & SERVICE CATALOGUE"

Transcription

1 Faculty of Natural and Agricultural Sciences IT POLICIES & SERVICE CATALOGUE

2 Contents Section 1 Support Parameters... 3 Section 2 Supported Platforms... 4 Section 4 Computer Specific Services... 5 Section 4 Computer Specific Services... 6 Policies... 8 Minimum Standards... 8 Operating Systems... 8 Hardware... 9 Supported Applications... 9 Supported Office Software... 9 Supported Clients... 9 Supported Browsers... 9 Other Supported Software... 9 Supported PDA/Smartphone Devices... 9 Other defined standards - Network Transport... 9 Standard Operating Environment (SOE) SOE Platform SOE Policy FNAS Security Policy Roles and Responsibilities Security fundamentals Compliance with other Laws and Policies... 17

3 Section 1 Support Parameters Service Item Availability Supported Sites Tier 1 and 2 support (Helpdesk and desktop support) Tier 1 support only (Helpdesk assistance) Current FNAS staff, visitors and students on the UWA Crawley campus, QEII and Shenton Park Field Station Current FNAS staff, visitors and students at other research sites Information / Advice Supported times Service Levels - All FNAS provided services (unless covered by a negotiated SLA) Current FNAS staff, visitors and students in any location Available 8:30am to 5:00pm, Monday to Friday except on University Holidays Systems on which services are based are available 24hrs/day, 7 days/week, 365 day/year, 95% of the time (4% scheduled and 1% unscheduled downtime) Notification of extended outages for system for maintenance will be provided via to schools and centres for distribution internally. Standard response times and systems availability defined herein excludes support based on third party vendors Service Response Communication parameters Service responses are outlined in the Prioritisation and Categorisation page of the Policies document Job progress will be notified through the service desk only, with notifications sent only to the person's official UWA address

4 Section 2 Supported Platforms Service Item Availability Hardware Supported See Policies: Minimum Standards - Hardware Operating Systems Supported See Policies: Minimum Standards - Operating System Supported Office Software Supported Clients Supported Browsers See Policies: Supported Applications - Office Suites See Policies: Supported Applications - Clients See Policies: Supported Applications - Browsers Other software support Any software required for the undertaking of the business of the University will receive all reasonable support efforts. PDA devices supported See Policies: Supported Devices - PDA/Smartphone

5 Section 4 Computer Specific Services Service Item Informational Services Provide Work Related IT Advice Provide advice on peripherals / accessories (external devices - scanners, backup drives, etc) Provide advice/estimates on costs of IT Solutions for Business Units/Individuals Procurement Services Assist with choice of IT Equipment or Solutions Provide advice on selection of computer from available SOE models Provide quotations for SOE Computer equipment Provide recommendations for/against non SOE requests Authentication Services Provide authenticated access to FNAS network (user listed / active in Pheme) Provide authenticated access to FNAS network (user not listed / active in Pheme) Provide Generic/shared login to FNAS network Arrange temporary short-term access to internet services via SNAP (where no UWA record yet exists) Arrange temporary short-term access to FNAS Network (where no UWA record yet exists) Equipment Provision Services Provision of computer equipment, cables, peripherals Availability All staff and students All staff and students All staff and students All staff and students All staff and students All staff and students through School / Centre managers YES NO NO YES e.g. conferences, visitors < 2 weeks NO Business unit responsibility Where available Short term loan of equipment through service desk request Security Services Provide and configure boundary firewall to FNAS Network YES Subnets Firewall configuration for standard required services YES Firewall configuration for individual/unique requirements Reasonable Effort Provide secure domain based authentication YES Provide security groups for authenticated access to domain YES resources Install and maintain UWA Licensed Anti-Virus Application UWA Owned Machines Disable unused user and computer accounts (>90 days) YES Additional Service Provision Where any additional service is required beyond those on offer and funded by the Faculty, these must be discussed and negotiated with IT. All services will be scoped and costed, where appropriate Service Level Agreements implemented and any costs must be fully met by the project budget of the initiating area.

6 Section 4 Computer Specific Services Service Item Where computers meet minimum standards Availability UWA owned Faculty standard / SOE Computer Permitted/Approved Non-SOE Computer Non-SOE computer purchased without approval Undergraduate Lab Computer Deployment Services SOE Development and Update YES NO NO YES NO SOE Image deployment YES NO NO YES NO Manual Operating system NO YES NO NO NO installation and configuration Upgrade or install newer SOE to NO NO NO NO NO previously deployed machine (OS upgrade) Configure machine to an operational YES YES NO YES NO standard for Faculty Network Maintain Operating Environment and YES assist/advise NO YES NO Security Patches Operating System Reimaging and/or YES YES NO YES NO Recovery Configure Preferred Network YES reasonable effort NO YES NO Printers Deliver / Deploy machine to users As required As required NO YES NO desk Data Services Migrate data from old to new YES reasonable effort NO N/A NO machine Data conversion (eg mail / documents) to supported format reasonable effort reasonable effort NO N/A NO Data Recovery from failed computer/drive Desktop Services Provide Tier 1 Contact and Service Desk Support reasonable effort reasonable effort NO reasonable effort YES YES NO YES YES Non-UWA owned Personal / External / Visitor Computers Provide Tier 2 Desktop Support YES YES NO YES YES General Troubleshooting and fault YES YES NO YES YES diagnosis / repair Minor upgrades, excluding required YES YES NO YES NO parts, where Warranty will not be affected. Hardware repairs NO NO NO NO NO Arrange Warranty repairs with assist/advise assist/advise NO YES NO vendor Virus/Malware/Threat removal (isolate/reimage/reinstall where YES YES isolate and advise YES isolate and advise necessary) Software Services (For UWA business and where licenses permit this use) Software Installation (valid UWA YES YES NO YES NO Software Licenses - ITS Software) Software Installation (Business Unit YES YES NO YES NO Purchased valid license) Software Installation (other valid YES YES NO YES NO licenses) Software Installation (personal or NO NO NO As license NO non UWA purchase) permits Software metering/reporting (FNAS YES where supported NO YES NO Domain Clients only) Software Asset Management NO NO NO YES NO Authentication and Access Services NO

7 Provide authenticated access to YES where supported NO YES NO faculty network Provide / configure access to FNAS YES reasonable effort NO YES instruct/assist services and resources (eg printers, shares, hosted services) Provide Access to University YES YES NO YES instruct/assist Network Provide Access to the wider Internet YES YES NO via UWA Proxy instruct/assist Provide authenticated access to YES reasonable effort NO YES YES permitted Faculty/School shares/resources Configuration Services Configure access to FNAS network YES reasonable effort NO YES NO Configure access to University YES YES NO via web YES Services (using supported mail client) Configure access to University YES NO NO NO NO Business Systems Configure access to University YES reasonable effort if NO YES NO Teaching Systems supported Configure access to wider internet YES YES NO YES Via SNAP Configure access to shared resources (printers/shares) YES reasonable effort if supported NO YES instruct/assist only Network Services (Where FNAS network is reticulated) Provide connection to faculty YES YES NO YES YES network infrastructure (does not imply network access) Provide network switching and YES YES NO YES YES infrastructure to the data socket (100Mb/s) Provide network switching and NO NO NO NO NO infrastructure to the data socket ( > 100Mb/s) Provide network cabling from the NO NO NO YES NO data socket to the computer Support connections made through NO NO NO NO NO network equipment not provided by FNAS Peripheral Equipment Services Configuration of necessary work related peripherals YES YES reasonable effort Troubleshoot connections/installation/function of necessary work related peripherals Configuration/support of Wireless Keyboards and Mice Configure Single-User and nonstandard Printers Provide access to supported network and workgroup printers Configure supported network and workgroup printers Assist with peripheral devices purchased against recommendation Assist with peripheral devices used against policy or advice reasonable effort reasonable effort NO NO NO NO NO reasonable effort reasonable reasonable effort NO NO NO effort YES reasonable effort NO YES Via IPS YES reasonable effort Via IPS NO NO NO NO NO NO NO NO NO NO Reasonable effort is determined by the FNAS IT team. It ensures a fair time allocation to an issue for the affected user and all other users of the IT Support Services, but does not necessarily ensure a resolution. If after an assessment of the issue the IT team is unable to resolve, they may refer the client to warranty or external services, or may determine that the issue cannot be resolved. In these circumstances, the client should seek alternatives to the service or device in question.

8 Policies Minimum Standards The Minimum Standards policy was passed by the Faculty Resources Committee in August 2003, on the recommendation of the Faculty Information Services Committee. The policy was last reviewed at the Faculty Information Services Committee meeting, July The minimum standards policy determines at what level IT support are required to continue to support or otherwise engage with a computer resource, and at what level a computer system meets current network and security requirements. Operating Systems Under the current policy revision for the minimum standard for supported operating systems on the network, it was deterimed that: 1. Windows XP Professional be the minimum operating system version for PCs attached to the network as of August 1st Windows 2000 systems may remain connected but are unsupported. Windows NT, ME, 95 and 98 machines are expressly forbidden access to the network or any form of support. 2. OSX 10.4 be the minimum operating system for Macintosh computers as of August 1st OSX 10.3 systems may remain connected but are unsupported. OSX 10.2 and below, OS9, OS8 and earlier versions are expressly forbidden access to the network or any form of support. 3. Computer officers are to be closely consulted about the purchase and installation and maintenance of Linux computers to ensure that they are installed on the network in such a way that minimises security vulnerability for this operating system. 4. All computers to be subject to a log-in process (ie user authentication) against a domain controller from January 1, Support of computers below the specified standards is strictly limited to reasonable efforts to recover data. The computers will not be returned to the network. 6. Where computers are connected to research equipment, and that equipment requires a specific computer or operating system, IT support staff will provide their best efforts to maintain or repair those computers. Network access is not provided if these systems fall below required standards.

9 Hardware Under the current policy revision for the minimum standard for computer hardware, it was determined that: 1. It is no longer feasible for IT staff to provide repairs, upgrades or support to PC computer hardware earlier than the Socket LGA 775, Intel 915 Series Pentium 4 Chipset. 2. It is no longer feasible for IT staff to provide repairs, upgrades or support to any Macintosh computer using PowerPC (pre-intel) architecture. 3. Even at these levels, access to parts, replacements and other necessary resources is not always possible and repairs are rarely feasible. In these cases, support will be limited to reasonable efforts at data recovery and transfer to a supported system. Supported Applications Defined in accordance with the Minimum Standards Policy is a list of common applications supported by FNAS IT. Where defined, support is limited to only the versions listed. Use of other applications or versions is not advised and by doing so the user takes responsibility for all support, format conversion and problem resolution. In all cases, applications are supported only where used for conducting the business of the University. Supported Office Software Microsoft Office 2003, 2007 for PC and Office 2004 and 2008 for Mac Supported Clients Outlook 2003, Outlook 2007, Entourage 2004, Entourage 2008 and native client support on Windows Mobile and iphone devices for ECS mail only Supported Browsers Internet Explorer 7, Internet Explorer 8, Safari Other Supported Software Any software required for the undertaking of the business of the University will recieve all reasonable support efforts. Supported PDA/Smartphone Devices As described in the supported client section above, Windows Mobile 6.x and Apple iphone devices are supported, and assistance will be given for the purposes of connecting to ECS mail only. Other defined standards - Network Transport The single supported network transport for all platforms will be TCP/IP over an Ethernet network.

10 Standard Operating Environment (SOE) After a long consultative process with all sections of the faculty, a Standard Operating Environment was adopted as policy by the Faculty Resource Committee and Endorsed by the IT Policy Committee in November This SOE was designed to best reflect the diverse range of needs within the Faculty, and permits a solid and secure platform on which to progress IT in to the future. FNAS has chosen to base its SOE hardware specification around the Hewlett Packard Business Desktop and Notebook computers available to the University under the UWA Preferred Supplier Agreement. It is a requirement that all computers purchased for use on the FNAS network are selected only from the models available under this agreement. IT staff can advise which system will best meet the needs of staff and students, depending on their application requirements. The models available under the SOE are shown on the hardware specification page. The models listed below are currently available under the agreement. FNAS IT will develop, update and maintain a base software SOE for this hardware platform which will form a stable, secure and functional Faculty IT environment. SOE Platform Hardware Platform DESKTOP - Must be a Hewlett Packard DC8000 Series Business Workstation from the preferred supplier, Synergy. Optional: All other components - to suit performance and budget requirements. Includes Processor, RAM, Hard Disk Drives, wired (not wireless) keyboard and Mouse, Monitor, DVD Drive, Choice of Convertible Mini Tower/Desktop or Small Form Factor Desktop. LAPTOP - Must be one of the Hewlett Packard 6730B 15.4" notebook or 2930P 12" Ultra Portable notebook range, or a 8440P 14" Notebook for Performance and Portability. Note - Netbooks are available for field work and travel without approval, however these are not adequate to perform day-to-day work and will not be connected to the FNAS network / domain. They can be configured by the user for SNAP or UWA Wireless, and are not generally supported by FNAS IT. Operating System - Must be purchased with Microsoft Windows, typically Vista Business Edition. Computers can no longer be downgraded from Vista to XP Pro If a computer is purchased with XP or Vista Home Edition, it must be upgraded to at least Windows XP Professional or Vista Business before the system can be used on the Faculty network. For University owned computers this can be done under the MS Campus Agreement, otherwise this upgrade is at the buyer's expense.

11 Base Software Installation Faculty IT will assemble a common base platform on which a user can tailor a system. This platform will be configured to make the most of the new Faculty wide network, and will be applied to all new computers. The Base SOE will be as follows: Windows 7 Enterprise Edition with security updates Office 2007 Professional (Word, Excel, Outlook, Powerpoint, Access) with service packs Internet Explorer 8 configured to use UWA proxy server Adobe Acrobat Reader Sophos Antivirus (push install) CutePDF (open source pdf file creator) Endnote (link to installation source only) IrfanView (Freeware image viewing software) Services Automatic Windows Update via FNAS Windows Software Update Service Support Mechanisms Terminal Services Client Remote Assistance Client Documentation Links to setup instructions Links to downloadable forms Links to University Policy documentation Configuration Preset links to relevant resources - (printers, file shares) Current SOE System - Desktop Desktop Basic Configuration HP DC8000 Series Business Workstation (Any of six UWA Configurations) 1 x 4GbMb DDR3 Memory Modules (Additional 4Gb or greater is optional) Intel Core 2 Duo CPU 160 or 250Gb Hard Disk Drive DVD R/W Drive Wired Keyboard and Optical Mouse (wireless keyboards and mice are not supported or maintained by FNAS IT) Windows Vista (upgraded under the MS Campus agreement to Windows 7) Other Components 20" or above LCD Flat Panel Display, Widescreen 22" recommended.

12 Current SOE Systems - Laptop A Hewlett Packard 6730B 15.4" notebook, 2930P 12" Ultra Portable notebook, or a 8440P 14" for balanced Performance/Portability. Other Components Kensington Security Cable Laptop bag Docking Station External Monitor (20" or above Widescreen matching laptop native resolution) Network Cable Additional wired Keyboard / Mouse (wireless keyboards and mice are not supported or maintained by FNAS IT) External USB HDD backup system (used regularly and stored away from the laptop) Other Configurations / Models The models listed above are very well suited to the core needs of most UWA staff and students and are generally the only models which will be configured, connected and supported by the facutly IT team. In cases where there is a specific research requirement for a different configuration, and it can be demonstrated that the SOE model is not able to perform the required task, an application for a non-soe machine may be made through your school manager to Faculty IT for a non SOE purchase. See the SOE Policy page for more information. For more information or to address specific requirements, contact a Faculty IT staff member in your area.

13 SOE Policy Summary of the FNAS SOE Faculty I.T. will develop and maintain a common base SOE around a single standard hardware platform. All new computers and laptops are purchased with one of the configurations detailed on a computer purchasing web page maintained by computer support Other software requirements installed as required, with remote push deployment being the preferred delivery method. All machines purchased through a University preferred supplier In the case of requirements outside of the allowed specification, a case for justifying such a purchase be made by the School Manager to the IT Manager for consideration. Schools and centres remain responsible for purchasing and for software licensing. Benefits Extremely stable, robust and reliable hardware platform Unified architecture Excellent integration and compatibility with university projects and application delivery Economies of scale derived through use of University approved vendors Selection of configurations available to suit budget and performance requirements Aligned with best practice deployment techniques Systems chosen from a single Tier 1 vendor and from their stable platform range Confluence with a known vendor hardware roadmap, giving guaranteed platform stability and therefore absolute image compatibility for the life of the product allowing planned transition to new models. Aim of automating setup out of the box from the vendor to allow user to become productive sooner Achieves a vastly more manageable, secure and upgradeable platform Achieves a single vendor SOE solution in a price competitive multi vendor preferred supplier environment Provides much improved document and compatibility Provides known hardware support and ensures delivery and warranty under SLA Efficient delivery of IT support to the user through: Excellent specific hardware and installation knowledge Known stable base SOE software image Improved fault finding ability Improved delivery under SLA from vendor Reduced time from delivery to end-user's desk Improved service and warranty under SLA from vendor

14 Purchases outside the SOE In order to purchase a computer outside of the SOE, an end user must present a case to their School or Centre Manager and to the Faculty IT Manager. As there is a recognised significant additional cost to individually configure and support these non-soe systems, the case presented must explain the reasons that the non-soe system is a requirement explain why the SOE model is not capable of the required tasks It must be stressed that approval for non-soe equipment is not given without an absolute requirement, or where a significant existing hardware or software investment exists, and licenses are not transferrable to the SOE platform. Personal preference for a brand or platform is not sufficient justification to purchase outside the SOE. For approval to be granted, the end-user must acknowledge that they are choosing to purchase an unsupported platform, and that services as simple as printing and file-sharing, local services and access to corporate applications are not guaranteed and that there is no requirement on FNAS IT to work to provide these services. FNAS IT are not responsible for document compatibility or conversion on the non-soe platform. The end-user also takes on the responsibility of securing and updating their system, and agrees to perform software installations and make any configuration changes required at the request of FNAS IT. If agreed, and approval is granted, the system will be recorded as a supported, non-soe machine. Should a purchase be made which does not comply with the SOE specification and which has not been approved for purchase and support, it will not be supported or given access to the faculty network. It may be used as a stand-alone, non-networked machine or may be provided access only through SNAP. SNAP access is authenticated and charged against a cyllene or student account, and gives no access to printers, services or servers on the FNAS network. It would allow user access to the web and mail, but effectively isolates the system and maintains the security of the local network.

15 FNAS Security Policy Introduction FNAS is committed to providing a secure yet accessible network which provides for the needs of our teaching, research, management and outreach objectives. It is our aim to protect and maintain the confidentiality and integrity of all information required to pursue the ongoing interests of the faculty and its partners. Policy It is the responsibility of each staff member, student and visitor to the faculty to ensure the data sources in their care are not compromised, and that their level of protection is not diminished. These data sources include but are not limited to the computers, laptops, networks, software, mobile and data storage devices that each individual may use in pursuing the day to day business of the faculty, independent of their location or ownership. Protection of these devices includes physical protection against loss, theft, damage or abuse data security practises against malicious or unintentional access system maintenance and updates, for protection from known threats and compromises Roles and Responsibilities Responsibilities are not diminished through role. In situations where more than one individual or area may have access to or control of a data source or device, no individual is absolved of any level of responsibility for the security of that device or data source as a result. The range of responsibility for any one individual will vary based on their role, from simple password and physical protection to more complete oversight of overall security. Below is a typical outline of responsibilities based on role. Business Unit and Project Managers identify all data sources relating to their role identify and maintain functional access and security to these data sources for role participants in considering functional access, assess the risk of data loss or malicious or inadvertent alteration of data against the following criteria o policy or law governing the use or distribution of the data o the significance of the data to the continuing operation of the business unit or project o the value of reputation and perception, and to attracting ongoing and future projects o the value of the data to any project contributor or sponsor

16 o the likelihood that the data could benefit; or be used against; other entities o the costs involved in recreating or recovering data loss ensure that in all cases where information from these sources is use or communicated outside the business unit or project, that this communication is legitimate, and does not compromise the security or property of the faculty develop principals and practices governing required changes to security access Users identify all data sources relating to their role request only required levels of access to this data protect data resources in their control from theft and any unauthorised access ensure passwords and other access technologies are never shared maintain systems and system security through routine managed system updates maintain system sanctity and security by only installing software and accessing systems and sites approved for and relevant to the role Information Technology Staff provide the highest possible level of security which does not hinder the functional requirements of the faculty provide users with the systems and practices necessary to implement security maintain system and security updates for critical network infrastructure monitor security practises on data sources throughout the faculty assist users with security issues and advise on practises wherever possible, alleviate the burden on users by providing systems which automate their security processes analyse any potential threat to systems security and implement security measures that mitigate threats ensure that privileged accounts are held by a minimum number of staff and are governed by principals of acceptable use establish appropriate use for the resources under their control Security fundamentals Data Security All systems must be subject to authentication, and access must be commensurate with the value of the systems and data sources and the level of risk identified against a breach of authorised access to these sources. Authentication methods to faculty resources, including passwords and keys, must never be shared or used by more than one individual System and software patches must be maintained to minimise the risk of unauthorised access

17 Every system when compromised puts at risk or increases the risk of access to all other systems. Physical Security Adequate control of physical access to data resources and providers must be maintained, and must be commensurate with the value of the systems and data sources and the level of risk identified against a breach of authorised access to these sources. Suitable measures must be employed to protect against unauthorised physical access to resources, ranging in scope from rooms with restricted access, to cable locking of easily moved equipment. Where an item is used in more than one location, no single location should have less than an adequate level of physical protection. Compliance with other Laws and Policies Where a business unit or individual engages with another area external to the faculty, there must be no dissolution of this policy in favour of other practises, except where other practises, policies or laws enhance the requirements set out in this policy, in which case they must be additionally adopted. All Faculty employees, visitors and students are bound by this policy, and by relevant policies adopted by the University with regard to data resources and systems, the laws of Western Australia and Australia, and relevant international laws governing the use of data obtained and / or stored. The following activities are specifically prohibited under this Policy: interfering with, destroying or disrupting data, data sources or data systems intentionally transmitting any computer viruses, worms, or other malicious software intentionally installing and using software which may put data security at risk attempting to access, accessing, or exploiting resources you are not authorized to access knowingly enabling or exploiting inappropriate levels of access storing sensitive or confidential data on systems that are not adequately protected against unauthorized access disclosing or distributing any data you do not have a right to issue In addition to possible legal action, any violation of this Policy may be pursued and disciplinary action initiated through relevant University Statutes.

Workstation Management

Workstation Management Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described

More information

Employee Service Level Agreement

Employee Service Level Agreement Employee Service Level Agreement 1.0 Purpose 2.0 Term and Scope of Agreement 3.0 Scope of Service 3.1 Support Environment 3.2 Local Computer Administrative Privileges 4.0 Support Response Levels 4.1 Exceptions

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

Warner CNR Computer Desktop Support Policy

Warner CNR Computer Desktop Support Policy Warner CNR Computer Desktop Support Policy Documentation Date: November, 2013 The Natural Resources Computing and Network Services (NRCNS) goal is to provide, support and encourage efficient and safe use

More information

STCC Hardware & Equipment Policy

STCC Hardware & Equipment Policy STCC Hardware & Equipment Policy The Help Desk will be the primary point of contact for all related support requests. The preferred method of contact is via email at helpdesk@stcc.edu or, if email is unavailable,

More information

Business white paper. HP Business Helpdesk. System requirements and supported products

Business white paper. HP Business Helpdesk. System requirements and supported products Business white paper HP Business Helpdesk System requirements and supported products Minimum system requirements Operating System: Current Licensed Versions for Microsoft, Apple or Android, detailed in

More information

CSG Windows Support Policy

CSG Windows Support Policy CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics

More information

Office of Information Technology Addendum to Managed Workstation Service Level Agreement

Office of Information Technology Addendum to Managed Workstation Service Level Agreement Office of Information Technology Addendum to Managed Workstation Service Level Agreement This Addendum further defines and explains the Basic Support, Extended Support and Premium Support Level Services

More information

Standards of Technology Support

Standards of Technology Support Standards of Technology Support Summary The Computing Services Group () provides information technology assistance, oversight and resources for the college s teaching, research and outreach missions. By

More information

St Michael s Collegiate School

St Michael s Collegiate School St Michael s Collegiate School Information Technology Handbook 2014 St Michael's Collegiate School ICT and Notebook Policy Handbook. Collegiate has for many years been a leader in ICT integration within

More information

School of Computer Science and Engineering policy with regard to self-administered computers

School of Computer Science and Engineering policy with regard to self-administered computers School of Computer Science and Engineering policy with regard to self-administered computers CSE Computer Security Committee October, 2002 Abstract The School s Computing Support Group (CSG) provides a

More information

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes

More information

Appendix C to DIR Contract No. DIR-SDD-1880 Pricing Index

Appendix C to DIR Contract No. DIR-SDD-1880 Pricing Index Appendix C to DIR Contract No. DIR-SDD-1880 Pricing Index NOTE: Services pricing and/or desktop/laptop pricing may change from what is listed in this Appendix C based on customer requirements and changes

More information

Mac Managed Platform Service Level Agreement. Oxford University Computing Services Network Systems Management Service

Mac Managed Platform Service Level Agreement. Oxford University Computing Services Network Systems Management Service Mac Managed Platform Service Level Agreement Oxford University Computing Services Network Systems Management Service Version: Release Date: 1.0 09/05/2011 Document Control Authors Wylie Horn, Jon Hutchings,

More information

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration IT Service Level Agreement (SLA) for users supported by the BEI Pilot Cluster in the departments of Biological Chemistry, Neurobiology, Neurology, and Pharmacology by the Information Technology Center

More information

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due:

REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES. Bid Packets are Due: REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY SUPPORT SERVICES Issue Date: Friday, March 15 th, 2013 Closing Date: Monday, April 15 th, 2013 University City District is requesting proposals from qualified,

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested

More information

Departmental On-Site Computing Support (DOCS) Server Support SLA

Departmental On-Site Computing Support (DOCS) Server Support SLA 1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The

More information

CBE Architectural Overview and System Requirements

CBE Architectural Overview and System Requirements CBE Architectural Overview and System Requirements January 2015 ARCHITECTURAL OVERVIEW ARCHITECTURAL OVERVIEW EXAMPLE OF CBE SOFTWARE INSTALLATION The following diagram shows the users, programs in use

More information

Network Guidelines and Hardware Requirements

Network Guidelines and Hardware Requirements Network Guidelines and Hardware Requirements To optimize performance in the IntraVet program we suggest that your network and computers follow the recommendations listed below. Doing so will help ensure

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7 MYOB EXO System Requirement Guidelines 30 April 2014 Version 2.7 Contents 1 System Requirements 4 1.1 Overview 4 1.2 Server Requirements 4 1.2.1 Server Requirements (excluding terminal server) 4 1.2.2

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Computing Services Helpdesk

Computing Services Helpdesk s e r v i c e l e v e l a g r e e m e n t Computing Services Helpdesk This document contains an agreement between the Computing Services (CS) Helpdesk and the Faculty, Staff, and Students (FSS, or Ross

More information

SMALL BUSINESS OUTSOURCING

SMALL BUSINESS OUTSOURCING SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Microsoft Windows Client Security Policy. Version 2.1 POL 033

Microsoft Windows Client Security Policy. Version 2.1 POL 033 Microsoft Windows Client Security Policy Version 2.1 POL 033 Ownership Policy Owner: Information Security Manager Revision History Next Review Date: 2 nd April 2015 Approvals This document requires the

More information

PVTC Technical Requirements

PVTC Technical Requirements About the Installation Scenarios This document describes the minimum hardware requirements to install the Pearson VUE Testing (VTS) software in a Pearson VUE Authorized Test Center. The VTS software may

More information

Service Level Agreement

Service Level Agreement This document outlines the Service Level Agreement (SLA) between University Technology Services (UTS) and our Customers for the delivery of. The purpose of this agreement is threefold: 1. To clearly represent

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Organisation Division St. John s Regional College St. John s Regional College, established in 1958, is a catholic college providing secondary education to boys and girls in the parishes located in the

More information

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Prepared by: OIC OF SOUTH FLORIDA. May 2013 OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

University Managed Desktop Program. Desktop Computing Support Framework 343-3362 or 875-6422

University Managed Desktop Program. Desktop Computing Support Framework 343-3362 or 875-6422 University Managed Desktop Program Desktop Computing Support Framework 343-3362 or 875-6422 Overview Commencing [enter department-specific date], desktop computing support will be provided for [enter department

More information

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide REMOTE ACCESS SERVICE SUPPORT ICR User Guide Question Answer/ What is supported Non-ICR computer access 1. What are the support hours for the remote access service? The IT Helpdesk service is available

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

Hardware and Software

Hardware and Software Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Ohio University Office of Information Technology

Ohio University Office of Information Technology Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels

More information

AllianceIT Managed Services

AllianceIT Managed Services AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand

More information

CENG Information Technology Services University of North Texas

CENG Information Technology Services University of North Texas CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista Get Connected! How to Configure Your Computer for MITnet Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista 2008 Massachusetts Institute of Technology Table of Contents Introduction...3 About

More information

The Education Edge / The Financial Edge 7.85

The Education Edge / The Financial Edge 7.85 Minimum System Requirements This document lists the minimum infrastructure required to run your Blackbaud. We recommend the purchase of topof-the-line equipment when possible and that organizations budget

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Finance and Business Operations. Information Technology Services Department. Service Level Agreement

Finance and Business Operations. Information Technology Services Department. Service Level Agreement Finance and Business Operations Information Technology Services Department Service Level Agreement Updated February 28, 2012 Table of Contents Purpose and Ownership of Document.. Introduction... Mission,

More information

VIRGIN BROADBAND BROADBAND SERVICES DESCRIPTION 1 ABOUT THIS SERVICE DESCRIPTION... 3 2 HOW WILL WE NOTIFY YOU OF CHANGES TO THE AGREEMENT?.

VIRGIN BROADBAND BROADBAND SERVICES DESCRIPTION 1 ABOUT THIS SERVICE DESCRIPTION... 3 2 HOW WILL WE NOTIFY YOU OF CHANGES TO THE AGREEMENT?. VIRGIN BROADBAND BROADBAND SERVICES DESCRIPTION Click on the page number of the section that you are interested in 1 ABOUT THIS SERVICE DESCRIPTION... 3 2 HOW WILL WE NOTIFY YOU OF CHANGES TO THE AGREEMENT?.

More information

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines California State Polytechnic University, Pomona Desktop Security Standard and Guidelines Version 1.7 February 1, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM DESKTOP SECURITY STANDARD...3 ROLES

More information

Policy on Connection to the University Network

Policy on Connection to the University Network Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05

More information

IT Helpdesk Services. IT Environment Operation Support Service Menu

IT Helpdesk Services. IT Environment Operation Support Service Menu IT Helpdesk Services IT Environment Operation Support Service Menu Do you ever need a little help with your personal computer? IT Helpdesk Services Person unfamiliar with PC Person unfamiliar with PC Help

More information

QUALIFICATION GUIDELINES

QUALIFICATION GUIDELINES The NetTech 603 Seagaze Drive #117 Oceanside, CA 92054 Phone: (800) 642-7116 Web: www.4nettech.com E-mail: info@4nettech.com QUALIFICATION GUIDELINES For Networks to be covered under The NetTech's maintenance

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

CCC Technical Requirements. Updated: June 2016

CCC Technical Requirements. Updated: June 2016 Updated: June 2016 2016 All rights reserved. CCC is a registered trademark and the CCC logo is a registered service mark of CCC Information Services Inc. This document supersedes ALL previous Technical

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

HP Windows 7 Onsite Upgrade Service

HP Windows 7 Onsite Upgrade Service HP Windows 7 Onsite Upgrade Service HP Care Pack Services Technical data The Windows 7 Onsite Upgrade Service provides your company with onsite installation, setup, and training for the Microsoft Windows

More information

San Jacinto College District Information Technology Services Desktop Support Guidelines

San Jacinto College District Information Technology Services Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving to provide a secure and efficient

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Karen Winter Service Manager Schools and Traded Services 01823 355267 KWinter@somerset.gov.uk

Karen Winter Service Manager Schools and Traded Services 01823 355267 KWinter@somerset.gov.uk Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

APPENDIX C. I. IT Standards and Levels of Support Service Provided by ITS. and ITS Performance Pledges

APPENDIX C. I. IT Standards and Levels of Support Service Provided by ITS. and ITS Performance Pledges APPENDIX C IT Standards and Levels of Support Service Provided by ITS and ITS Performance Pledges I. IT Standards and Levels of Support Service Provided by ITS In general, 3 levels of support service have

More information

Windows XP is no longer supported by Microsoft, effectively making it noncompliant

Windows XP is no longer supported by Microsoft, effectively making it noncompliant System Requirements This page has been formulated for the sole purpose of general specifications only and is NOT to be used as a final hardware consultation. Please consult with the ChiroTouch sales and/or

More information

Business and Administrative Services. Information Technology Services Department. Service Level Agreement

Business and Administrative Services. Information Technology Services Department. Service Level Agreement Business and Administrative Services Information Technology Services Department Service Level Agreement Updated April 27, 2015 Table of Contents Purpose and Ownership of Document.. Introduction... Mission,

More information

Before you start your SKE course:

Before you start your SKE course: Before you start your SKE course: We are looking forward to supporting you in your studies with us. As you know the course is entirely delivered online. In preparation, we just need to check with you about

More information

Using Virtual PC 7.0 for Mac with GalleryPro

Using Virtual PC 7.0 for Mac with GalleryPro Using Virtual PC 7.0 for Mac with GalleryPro Installing and Configuring What is Virtual PC for Mac? Virtual PC (VPC) is emulation software that simulates an actual (though virtual) Windows computer running

More information

A guide to CLARiSUITE TM network solutions

A guide to CLARiSUITE TM network solutions Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management

More information

Information Technology Services. HelpDesk. Service Level Agreement (SLA) Effective November 13, 2012

Information Technology Services. HelpDesk. Service Level Agreement (SLA) Effective November 13, 2012 Information Technology Services HelpDesk Service Level Agreement (SLA) Effective November 13, 2012 Holy Family University IT Service Level Agreement Page 1 Holy Family University Information Technology

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services

More information

Service Level Agreement

Service Level Agreement Service Level Agreement Information Technology Support for Southern Clinical School Departments Provided by Technology Services Group-Southern Regional (TSG-SR) Southern Clinical School Monash University

More information

Video Conference Center Project

Video Conference Center Project Rik Beatty T00183610 LSTE 7309 Fulper Video Conference Center Project Purpose: This project is to create a network of Video conference centers within the Division of Disability Services. These centers

More information

DO NOT REMOVE ANY PAGES FROM THIS REQUEST FOR QUOTATION DOCUMENT. FAILURE TO RETURN ALL PAGES WITH YOUR REQUEST FOR QUOTATION MAY INVALIDATE YOUR BID.

DO NOT REMOVE ANY PAGES FROM THIS REQUEST FOR QUOTATION DOCUMENT. FAILURE TO RETURN ALL PAGES WITH YOUR REQUEST FOR QUOTATION MAY INVALIDATE YOUR BID. Page 1 of 10 April 7, 2015 Name of Firm or Individual Address City Province Postal Code Telephone No. Fax No. Name of Person Signing for Firm (Please Print) Position of Person Signing for Firm DO NOT REMOVE

More information

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51. School of Medicine Information Technology Services All newly enrolled School of Medicine students are encouraged to visit the School of Medicine s IT office before orientation to obtain help configuring

More information

Upon completion of this chapter, you will able to answer the following questions:

Upon completion of this chapter, you will able to answer the following questions: CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the

More information

Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index

Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index NOTE: Services pricing and/or desktop/laptop pricing may change from what is listed in this Appendix C based on customer requirements and changes

More information

Small Business Server Part 1

Small Business Server Part 1 Small Business Server Part 1 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Admitted Students. Information. Technology. Welcome Packet

Admitted Students. Information. Technology. Welcome Packet Columbia Law School : Information Technology Admitted Students 2014 Information Technology Welcome Packet Columbia Law School Information Technology Helpdesk M- F (9-5) 05/01/14 v1 Information Technology

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

How To Create A Virtual Desktop In Gibidr

How To Create A Virtual Desktop In Gibidr Virtual Desktop Infrastructure for IGIDR Sealed quotations are invited from authorized partners of OEM providing VDI solutions. The sealed quotations should be supplied in two parts Technical Bid (Part

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Purpose. Availability. Program guidelines. Allocation. Equipment selection

Purpose. Availability. Program guidelines. Allocation. Equipment selection University of Illinois at Urbana-Champaign Library Computing Technology Allocation Program (CTAP) Program Guidelines Purpose The work of Library Faculty and Academic Professionals (AP) is increasingly

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations. Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It

More information

Student Desktop@ Home

Student Desktop@ Home Student Desktop@ Home Full Off Campus Access to your Programs and Files Full Access to the University from Home You can access the University from any computer with an internet connection. This system

More information