CPIT Aoraki ICT Asset and Media Security Standard
|
|
- Naomi Jordan
- 8 years ago
- Views:
Transcription
1 CPIT Araki Crprate Services Divisin: ICT This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic. Knwn as CPIT Araki the new rganisatin will trade under this name until rebranded during CPIT Araki ICT Asset and Media Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument 121d Principles Infrmatin Cmmunicatin Technlgy Divisin Security Plicy Security Standard, aligned with Security Standards Guidelines and Prcedures AS/NZS ISO/IEC 27001: 2006 fr Infrmatin Security Management
2 CPIT Araki Crprate Services Divisin: ICT Cntents 1 INTRODUCTION COLLECTING AND RECORDING ICT ASSET INFORMATION ICT HARDWARE ICT Hardware Standards ICT MEDIA STANDARDS Strage and Transprting Restricted Media Dispsal and Media Sanitisatin Standards ICT Asset and Media Security Standard Page 2 f 13
3 CPIT Araki Crprate Services Divisin: ICT ICT Asset and Media Security Standard Purpse This standard defines the recmmended security practices fr Asset and Media Management. It includes prcesses fr mnitring security n ICT assets, recrding f ICT asset infrmatin and mnitring f assets. In additin it cntains recmmended security measures fr all ICT equipment and media. This standard applies t all ICT assets and services prvided acrss CPIT sites. Authrised By: Dcument Owner ICT Directr Service Desk and Prcurement Manager Date f Issue: 15 March 2012 Review date: Nvember 2014 Versin: 2.2 References: This dcument shuld be read in cnjunctin with the ICT Security Plicy. In additin it shuld be read in cnjunctin with the fllwing ICT Security Standards: 1. Physical and Envirnmental Security Standard 2. Human Resurces ICT Security Standard 3. Cmmunicatins and Operatins Management Standard 4. Access Cntrl Security Standard 5. Infrmatin Systems Acquisitin, Develpment and Maintenance Security Standard ICT Asset and Media Security Standard Page 3 f 13
4 CPIT Araki Crprate Services Divisin: ICT 1 INTRODUCTION ICT equipment supprts the business prcesses and prvides business functinality at the Institutin. It is essential that the ICT equipment that prvides these services is well managed and prtected thrugh the apprpriate security standards and prcesses that fllw recmmended ICT best practices. The bjective f this security standard is t define the recmmended prcess fr the ICT asset lifecycle management. The standard includes references t ICT best practices including the IT Infrastructure Library (ITIL). ITIL is a series f prcess and practices fr IT, t aid the implementatin f an IT Service Management framewrk. The fllwing tpics are cvered: Asset Management ICT Equipment ICT Media ICT Dispsal Standards t cntrl access t ICT services and particularly manage access t ICT secure facilities. Standards fr ICT equipment prcurement and cnfiguratin t maintain the integrity and availability f ICT services. Standards fr the strage and transprtatin f ICT media t prtect the integrity f infrmatin held n data strage within the Institutin. Standards fr dispsal, t ensure apprpriate prcesses are fllwed fr sensitive infrmatin cntained n ICT media. ICT Asset and Media Security Standard Page 4 f 13
5 CPIT Araki Crprate Services Divisin: ICT 2 COLLECTING AND RECORDING ICT ASSET INFORMATION ICT Asset Lifecycle Management refers t the cradle t grave prcess f infrmatin n ICT hardware, sftware and assciated peripherals, prcured, managed and dispsed f. Asset infrmatin is an imprtant inventry t maintain. Asset inventries can be used fr audits n ICT assets, recrd details fr legal r regulatry returns and t supprt asset replacement prcesses. As part f the wider service management prgramme it is imprtant t identify and recrd ICT assets which can be referenced during r fllwing a security incident. Fr example: theft f an ICT asset r t determine the risk acrss assets when a security weakness has been identified. This standard recmmends fllwing the ITIL best practice guidelines fr asset infrmatin cllectin and recrding. ICT assets include but are nt limited t: cmputers, sftware, tablet devices, telephny devices, cmmunicatins equipment (ruters, switches), assciated ICT hardware (including racks, wiring frames, UPS) and specialist ICT equipment (like GPS units, pltters, CAD equipment) nrmally purchased thrugh the ICT prcurement prcess. Excluded are CPIT telephny devices and lw cst peripheral devices where nt practicable. The fllwing standards are recmmended: All ICT assets are t be recrded within ICT Asset Registers. These registers will be the authritative recrd f ICT assets and asset infrmatin. All ICT assets issued by CPIT are t remain the prperty f CPIT with an asset wner defined within the Asset Register. The Asset Register shuld cntain: Asset details including a unique asset number which has been allcated. Ideally a nnremvable asset label will be attached t each asset recrding the asset number. Hardware asset details including: type f hardware, serial numbers, characteristics f hardware (drives, cnfiguratin, etc) and s n. Why have an asset register? As infrmatin systems equipment becme increasingly distributed it becmes mre imprtant t have the details recrded centrally. The asset register recrds specific details f individual cmpnents and this is useful when equipment has t be returned fr repair under warranty, when leases expire and fr accunting purpses. The annual inventry verifies that the infrmatin in the asset register is crrect. Maintaining an asset register is the nly flprf way f managing a diverse and extensive ICT envirnment. Sftware asset details including: versin number, purchase details, type f license (retail/educatinal/shareware), supprt details, serial number, deplyment infrmatin and purpse f sftware. Details f the lcatin f the asset, asset wner and cntact details f the asset wner r nminated asset wner. It is imprtant that financial infrmatin is recrded in the register. This includes when the asset was purchased and the value f the asset. Retirement date fr replacing the asset r the date fr upgrading the asset (if knwn). Classificatin f the ICT asset fllwing the classificatin standards defined within the data gvernance standards. The Assets Register must be prtected with apprpriate access cntrl, t prevent asset details being altered r remved. Details f any changes made t the Asset register are t be recrded with the details f what changes have been made. ICT Asset and Media Security Standard Page 5 f 13
6 CPIT Araki Crprate Services Divisin: ICT It is recmmended that the fllwing Assets Management Reprts are available t be prduced as requested: Ref Asset Reprts 1 Management r Faculty Asset Reprt Reprt t indicate what ICT assets have been allcated t bth the individuals in that divisin r faculty. Management will need t validate the assets recrded within the reprt. 2 Sftware Asset Reprt Reprt t indicate what sftware licenses are used acrss CPIT. 3 Security Investigatin Reprt Reprt t prvide details f an asset including the details within the Asset Register 4 Cessatin Reprt. Reprt t list what assets have been recrded against an individual Asset Registers are t be reviewed regularly. The recmmended review perid is 12 mnths. Peridic reviews are recmmended f the sftware installed acrss the CPIT netwrk t identify sftware assets and indicate the number f licenses in use and the installatin f unauthrised sftware. Autmated tls, like SCCM, may be used t streamline the cllectin prcess. ICT Asset and Media Security Standard Page 6 f 13
7 CPIT Araki Crprate Services Divisin: ICT 3 ICT HARDWARE ICT hardware used at the Institutin needs t be installed and maintained t an agreed security standard t safeguard the integrity f CPIT s infrmatin retained n the hardware and the supprting infrastructure. T safeguard CPIT infrmatin and services a defence in depth apprach will be fllwed. This requires security cntrls t be applied acrss ICT systems that cnnect t Internet, systems n the netwrk and systems that access the netwrk. This sectin defines the security standards t prtect ICT equipment at CPIT and recmmends the security cntrls t be implemented t fllw the principles f defence in depth. Defence in Depth A defence in depth principle supprts multiple f layers f security cntrls t prtect infrmatin and services acrss CPIT. If ne f the layers is cmprmised ther layers in defence still apply t safeguard infrmatin. The last layer in the defence f depth principle is the physical cmputers, hand held devices and assciated peripherals. These devices als need t be prtected and security cntrls applied. 3.1 ICT Hardware Standards Defining standards n ICT equipment, including the prcurement and prtectin f these devices, is an imprtant prcess fr maintaining the integrity and availability f ICT services. A prly cnfigured ICT system may result in ICT services being cmprmised r a service being adversely impacted due t a failing device. The bjective f adpting these standards is t ensure that ICT equipment perates as intended is available when required and integrates within the current envirnment, reducing the ptential fr a service being cmprmised. Standards t be fllwed include: Warranty and Maintenance ICT hardware shuld be cvered by a warranty r maintenance agreement t maintain the physical equipment. ICT Staff shuld have access t warranty r maintenance agreement infrmatin pertaining t the ICT asset and the prcedure t cntact third parties in the event f a fault. All cmputers returned frm repair, r transferred t a new user, will be reimaged t the latest build standards befre they are redeplyed r returned t custmers. All hardware sent away fr repair shuld be cleansed f institutin-sensitive infrmatin befre being dispatched where pssible. There are circumstances where the lcal cmputer administratr credentials are prvided t the repair agents t aid with replicating the prblem within the envirnment (image n the cmputer). In such situatins, an arrangement and agreement must be made that nne f this infrmatin is disclsed ther than fr the purpse f replicating the fault and repairing the faulty equipment. Build Standards ICT hardware is t be cnfigured t the technical cnfiguratin that ICT sets. This includes the ICT perating system, apprved applicatin sftware and cmmunicatins sftware. It is recgnised that apprved staff at CPIT may install sftware fr the benefits f academic research and persnal develpment. Sftware installed by staff needs t be apprpriately licensed and nt cmprmise the security f infrmatin r ICT services at CPIT. The ICT Security Plicy stipulates: ICT Asset and Media Security Standard Page 7 f 13
8 CPIT Araki Crprate Services Divisin: ICT ICT staff can remve unauthrised sftware and return ICT hardware t its riginal build status. ICT staff, are als authrised t install and cnfigure sftware and hardware and make changes t ICT services prvided at CPIT. Only apprved sftware is t be installed in the prductin envirnment. ICT Hardware Prtectin All ICT hardware will be installed with an enterprise managed malware prtectin tls t prtect against malicius sftware (this includes cmputer viruses, wrms, Trjan hrses, spyware, adware, malicius mbile cde and the like). Only servers and apprved repsitries fr infrmatin strage will be backed up fllwing the standards defined within the Cmmunicatins and Operatins Standard. Only apprved web brwsers are t be installed. IT Service Desk can advise n the apprved internet brwsers and if a nn-apprved web brwser is deemed t be interfering with the apprved brwser it may be remved by ICT staff. Prtected BIOS passwrds as a standard n all cmputers t prevent changes in bt-up pririty. CPIT cmputers are als cnfigured such that the remval f the exterir case will prmpt the entry f the BIOS passwrd n next start-up. The cmputer will nt prceed until a valid BIOS passwrd is entered. ICT will implement restrictins n cmputers t prevent users frm re-setting r changing security cntrls, this is typically cntrlled thrugh grup plicies acrss netwrk cnnected ICT equipment. Disabled r restricted access f the fllwing services t prtect netwrk cnnected ICT Hardware: Cmmunicatin services that are inherently susceptible t abuse r nt deemed suitable business services. Including peer t peer cmmunicatins sftware and VPN cnnects that directly cnnects cmputers and bypasses security cntrls. Cmmunicatin prtcls that are inherently susceptible t abuse. Including FTP sftware frm within the netwrk. Disabling prts that are nt required fr CPIT business activities. Administratin utilities like windws registry r cntrl panel. Run cmmands r cmmand prcessrs. Disabling accunts such as guest accunt r equivalent in ther perating systems. The recmmended settings abve will be reviewed regularly t ensure that security cntrls prvide sufficient prtectin against current vulnerabilities. ICT will install remte mnitring sftware t integrate cmputers and gather infrmatin fr audits r cmplete assistance t users at CPIT. Keep yur imprtant data away frm the internet ICT Asset and Media Security Standard Page 8 f 13
9 CPIT Araki Crprate Services Divisin: ICT Internet facing r Web Server Build Standards Increased security risks are assciated with servers that directly cnnect t the internet. External internet facing web servers shuld meet the fllwing standards: Segregated frm the internal netwrk and untrusted netwrks within a secure envirnment (r cmmnly referred t as DMZ - Demilitarised Zne). Imprtant infrmatin (particularly if it is the nly cpy) must be kept away frm an internet facing web server where it culd be mdified r deleted by unauthrised parties. Infrmatin shuld be stred n internal machines that are prtected by firewalls r ther security barriers. The mre sensitive the infrmatin the mre layers f defence need t be built t prtect the infrmatin. Operate n a dedicated cmputer ideally (i.e. the server des nt prvide ther services like prcessing, databases, FTP r ther business applicatins) t minimise the security risk by islating the web server and minimise any impact if the web server is cmprmised. Supprt the peratin f web applicatins with minimal privilege, i.e. run as a standard user and nt as administratr. This is critical as high privileged accunts shuld never be used n internet facing web servers. Prevented frm making direct Internet cnnectins (thrugh the server being lcked-dwn, r firewall rules preventing access t the Internet t minimise the risk f inapprpriate sftware being installed nt the web server by accident r intentinally). Cnfigured t cllect lg files and retained fr the recmmend standard. Ensure the web servers' files and directries are nt able t be indexed and that the nly results frm a search engine are the user cntent. Back-ffice systems (applicatin and database servers) are islated thrugh the use f a firewall r private netwrk t minimise the risk f internal access. Supprt mutual authenticatin, tw cmputers verifying each ther s identity befre exchanging data. Netwrk Segregatin T cntrl access acrss the CPIT netwrk and t safeguard internal ICT systems frm external threats, netwrk segregatin will be used at CPIT. The netwrk perimeter is t be secured thrugh the segregatin f the internal netwrk frm the external internet. ICT will use a firewall t achieve this segregatin between the tw netwrks. Firewalls n laptp cmputers are t be cnfigured t prtect laptps when they are away frm the ffice. The firewall service will: Be managed by ICT and all changes t the firewall will fllw the change management prcess and require apprval befre changes are made. Firewall will perate n a separate dedicated cmputer and nt be used fr prviding any ther ICT service. Firewall alerts are t be sent t the ICT Service Desk (r cnslidated within Micrsft System Centre) and technical staff within the Infrastructure team. Details f third parties managing the firewall service are t be available t ICT Service Desk and cntact details t cntact in the event f a security incident. Netwrk segregatin is als recmmended fr cmputers perating sensitive infrmatin (like financial r student persnal infrmatin), sftware develpment cmputers and system administratin cmputers. Decisin t use netwrk segmentatin is t be agreed n a case by case basis. ICT Asset and Media Security Standard Page 9 f 13
10 CPIT Araki Crprate Services Divisin: ICT Encryptin T prtect the cnfidentiality f data stred n ICT hardware the recmmended security cntrl is t use encryptin. Encryptin must be used t encrypt data where the risk f lss thrugh theft r interceptin is high, where there is the ptential fr a majr security breach shuld that data get int the hands f unauthrised persns and where the lss f the data wuld have a majr impact n CPIT. Care and Lss Staff at CPIT that have been issued with ICT hardware are expected t act with due care and diligence in prtecting it frm theft r damage. ICT Service Desk can prvide advice and guidance n precautins t take when travelling with prtable ICT hardware. If ICT hardware is lst, stlen, r damaged then staff members are t cntact the ICT Service Desk immediately. ICT Asset and Media Security Standard Page 10 f 13
11 CPIT Araki Crprate Services Divisin: ICT 4 ICT MEDIA STANDARDS ICT media refers t: magnetic tape, USB keys, prtable drives and disks in use at CPIT. T safeguard media against crruptin, lss r disclsure the security cntrls defined within this standard are t be fllwed. 4.1 Strage and Transprting Restricted Media ICT media that cntains restricted infrmatin is t be stred in a physically secure lcatin like a lcked filing cabinet, lcked rm r a fireprf safe. ICT media that is classified as restricted is t be labelled t indicate its sensitivity and the infrmatin classificatin (restricted access, cnfidential etc). ICT media that is sensitive is t be encrypted befre being transmitted r transprted. ICT hardware that has been used t stre restricted media needs t have the strage media remved befre being sent t a third party. Alternatively, a service engineer shuld attend CPIT, this is preferable t sending equipment ff-site that may cntain restricted infrmatin. Restricted Data? With reference t the CPIT data gvernance standards, Restricted data is data cntaining sensitive r cnfidential infrmatin that if cmprmised culd have a material adverse effect n CPIT interests, the peratins f the Institutin and the privacy t which individuals are entitled. The ther data classificatin standards are: Prtected data t be used by individuals wh require it fr their jbs; Institutinal internal use infrmatin and nt fr external distributin and, finally, Public available t the general public. We need a new sub-sectin arund strage f crprate data in the clud, and the sharing f it? File cllabratin amng staff/students can be a challenge fr CPIT. Cumbersme legacy enterprise cntent management slutins ften dn t cut it, and file cllabratin by presents a myriad f challenges, such as lack f versining and inapprpriate use f expensive media ptimised fr perfrmance rather than strage/archival purpses. Staff are demanding file sharing slutins that are as easy t use as cnsumer-riented prducts like Drpbx. ICT has n cntrl ver what staff stre n their persnal CPIT clud strage, s ICT/LTU needs t prvides staff with a clear understanding f hw they are t stre CPIT wrk files in the clud, in that a cpy must always be stred n a CPIT netwrked drive fr backup. Preference is given t OneDrive and Bx ver ther clud strage prviders as ICT s recmmended prviders have terms and cnditins that are aligned with that f CPIT s standards and plicies. With and intrductin f Office365 and Adbe Creative Clud fr staff, there needs t be a clearer Institutinal plicy and guiding dcument t supprt and steer apprpriate use f such services by CPIT Staff. 4.2 Dispsal and Media Sanitisatin Standards Infrmatin may be accessed by unauthrised individuals thrugh careless dispsal f cmputer media r by nt cleaning media that is re-issued t anther staff member. Infrmatin Leak? Infrmatin leak refers t infrmatin ICT Asset and Media Security Standard Page 11 f 13
12 CPIT Araki Crprate Services Divisin: ICT As the use f sphisticated encryptin prevents access t infrmatin attackers are lking fr alternative ways t access infrmatin. One avenue f attack is the recvery f deleted data frm ICT media. This is increasingly becming a significant risk as infrmatin can be stred n a variety f prtable devices, like smart phnes and tablet devices, which all need t be sanitised when nt lnger needed r transferred t anther user. Sanitisatin refers t remving data frm the strage device t a pint whereby anyne accessing the strage device cannt retrieve r recnstruct the data. being disclsed t a third party. Whether this is hard cpies f infrmatin fund by dumpster diving r electrnic infrmatin fund n an ld cmpute t a smart phne discarded imprperly. A disclsure culd lead t an embarrassing disclsure f infrmatin r t a majr security incident. The dispsal r re-use f ICT media is further cmplicated by the high number f devices and strage mediums than can stre infrmatin. Equally there is a risk that sensitive infrmatin may als be expsed thrugh dcuments being dispsed f inapprpriately. T reduce the risk f an infrmatin leak the fllwing standards apply fr bth sft and hard ICT media: Hard Cpy ICT Media Fr example: restricted dcuments r cnfidential reprts. All hard ICT media that cntains restricted infrmatin is t be dispsed f after crss-cut shredding r placed in secure bins fr prcessing by an apprved dcument destructin service. Sft Cpy ICT Media Fr example: electrnic media are the bits and bytes cntained in hard drives, randm access memry (RAM), read nly memry (ROM), disks, memry devices, phnes, mbile cmputing devices, netwrking equipment. Fr sft media that is a standalne device (like a DVD r USB key) r integrated within ICT hardware (hard disk r smart phne) the fllwing standards apply: Data Classificatin f data stred n Sft Media Erase and Dispsal Standard PUBLIC Device t be re-used: re-frmat the disk using standard perating sftware prcesses r fllw device specific erasure prcesses. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: dispse thrugh standard prcesses at CPIT, n additinal steps necessary. PROTECTED, INSTITUTIONAL Device t be re-used: use a sanitisatin sftware prduct t re-frmat the media including any free spaces n the disk drives r fllw the manufactures specific guidance n wiping the data. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: physically destry (fr ICT Asset and Media Security Standard Page 12 f 13
13 CPIT Araki Crprate Services Divisin: ICT Data Classificatin f data stred n Sft Media Erase and Dispsal Standard example breaking a DVD) and dispse lcally. RESTRICTED Device t be re-used: use a sanitisatin sftware prduct t re-frmat the media including any free spaces n the disk drives r fllw the manufactures specific guidance n wiping the data. Where applicable (e.g. smartphnes/tablets), adequate system recvery prcedures are carried ut t cmplete wipe the device and restre it t factry defaults. Device n lnger required: destry by crushing the item r placing in a furnace t physically make the device unreadable. Nte: changes in media technlgy have changed the sanitisatin best practices; riginally multiple verwriting was necessary t sanitise sftware media. This has changed and a single pass is adequate t prtect the media frm being expsed. It is imprtant hwever that the entire disk is verwritten nt just the used space. Devices that d nt fall with the abve classificatins must be physically destryed. ICT will perfrm the erasure prcess and recrd that the prcess has been fllwed. Details will be maintained with the Assets Register (refer t Sectin 2) including the erasure standard used. This is the end f the ICT Asset and Media Security Standard. This standard is ne f six standards that prvide advice and guidance n the best practices t fllw when using and accessing ICT services. The ther standards are available n the CPIT ICT intranet. ICT Asset and Media Security Standard Page 13 f 13
Christchurch Polytechnic Institute of Technology Access Control Security Standard
CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015
ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationCPIT Aoraki Communications and Operations Management
This security standard refers t CPIT, which is the current legal name fr the new rganisatin established 1 January 2016 bringing tgether CPIT and Araki Plytechnic. Knwn as CPIT Araki the new rganisatin
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationRemote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationEA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
More informationVersion Date Comments / Changes 1.0 January 2015 Initial Policy Released
Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance
More informationReadme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.
Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationSPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010
OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationHelp Desk Level Competencies
Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationA96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
More informationUnified Infrastructure/Organization Computer System/Software Use Policy
Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationDeployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationCloud Services MDM. Windows 8 User Guide
Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad
More informationensure that all users understand how mobile phones supplied by the council should and should not be used.
Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended
More informationImplementing ifolder Server in the DMZ with ifolder Data inside the Firewall
Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure
More informationCSC IT practix Recommendations
CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins
More informationSecurely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationBackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationDisplayNote Technologies Limited Data Protection Policy July 2014
DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationProcess of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
More informationUnified Communications
Office f Infrmatin Technlgy Services Service Level Agreement Unified Cmmunicatins Nvember 7, 2013 v2.2 Service Descriptin Unified Cmmunicatins Service Descriptin ITS Unified Cmmunicatins ffers a number
More informationIntroduction to Mindjet MindManager Server
Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights
More informationLINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
More informationPreparing to Deploy Reflection : A Guide for System Administrators. Version 14.1
Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the
More informationSystem Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationNorwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16
Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationName. Description. Rationale
Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based
More informationRUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer
RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible
More informationFINRA Regulation Filing Application Batch Submissions
FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s
More informationInstant Chime for IBM Sametime Quick Start Guide
Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished
More informationTen Steps for an Easy Install of the eg Enterprise Suite
Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid
More informationLearn More Cloud Extender Requirements Cheat Sheet
MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationA. Early Case Assessment
Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering
More informationSystem Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
More informationHow To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn
SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4
More informationManaging Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite
Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More information2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY
2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.
More informationIT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT
Chairpersn and Subcmmittee Members AUDIT AND RISK SUBCOMMITTEE 6 AUGUST 2015 Meeting Status: Public Purpse f Reprt: Fr Infrmatin IT CONTROL ENVIRONMENT ASSESSMENT AND RECOMMENDATIONS REPORT PURPOSE OF
More informationPrivacy and Security Training Policy (PS.Pol.051)
Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider
More informationCallRex 4.2 Installation Guide
CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex
More informationIntroduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.
Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and
More informationTITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
More informationSources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
More informationInstallation Guide Marshal Reporting Console
INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationROSS RepliWeb Operations Suite for SharePoint. SSL User Guide
ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,
More informationService Level Agreement Distributed Hosting and Distributed Database Hosting
Office f Infrmatin Technlgy Services Service Level Agreement Distributed Hsting and Distributed Database Hsting Nvember 12, 2013 Service Descriptin Distributed Hsting and Distributed Database Hsting Service
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationSaaS Listing CA Cloud Service Management
SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters
More informationPresentation: The Demise of SAS 70 - What s Next?
Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS
More informationViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
More informationHow To Ensure That The Internet Is Safe For A Health Care Worker
POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy
More informationEnsuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
More informationCitrix XenServer from HP Getting Started Guide
Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based
More informationUsing Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors
Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR ACTIVE DIRECTORY, EXCHANGE AND GROUP POLICY QUICK-START GUIDE Prduct versin: 7.5.873 February 2014 February 2014. Legal Ntice The infrmatin in this publicatin is furnished fr
More informationDISASTER RECOVERY PLAN TEMPLATE
www.disasterrecveryplantemplate.rg The bjective f a disaster recvery plan is t ensure that yu can respnd t a disaster r ther emergency that affects infrmatin systems and minimize the effect n the peratin
More informationInformation Security Policy
Infrmatin Security Plicy Last updated: 09 March 2010 Plicy Assigned t: Chief Infrmatin Officer, ICT Table f Cntents 1. Overview... 2 2. Backgrund... 2 3. Cverage... 2 4. Definitins... 3 5. Risk Assessment
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin
More informationSoftware and Hardware Change Management Policy for CDes Computer Labs
Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces
More informationScaleIO Security Configuration Guide
ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:
More informationMicrosoft Certified Database Administrator (MCDBA)
Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t
More informationOrganisational self-migration guide an overview V1-5 April 2014
Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins
More informationZimbra Professional Services Portfolio, Purchasing Guide & Price List
In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the
More information