<INSERT PROJECT NAME> DATA MIGRATION CHECKLIST

Size: px
Start display at page:

Download "<INSERT PROJECT NAME> DATA MIGRATION CHECKLIST"

Transcription

1 <INSERT PROJECT NAME> DATA MIGRATION CHECKLIST Ensure you always have the latest version of this document. Document Location This document is only valid on the day it was printed. The source of the document will be found at the Informatics Programme Office. Revision History Version Control Version Date Author Issued To Comments V0.1 V1.0 10/09/2010 PSO Compliance Review V PSO PMO For compliance with Walsall Health Care logo Approvals This document requires the following approvals. Signed approval forms are filed in the Management section of the project files. Name Signature Title Date of Issue Version Status : Date of Issue : Reason for Issue : Reviewed by : Produced by : Authorised by : Distribution This document has been distributed to: Name Title Date of Issue Version Walsall Informatics providing shared services to: NHS Walsall, Walsall Healthcare NHS Trust

2 Glossary of Terms Abbreviation/Term Description Ref: INFPMO-ORG-PRJNAME-CHECK LIST-Data Migration-V1.1-YYYYMMDD.DOC Page 2 of 6

3 Check Item Check 1. Does the Data Migration Approach include: Data Migration Plan Data Migration Approach Check (as detailed in the Data Migration Plan) YES NO N/A a) The Supplier s Data Migration Processes including intended controls. b) A detailed plan on how the migration is to be conducted. c) Any subcontractor issues and agreed allocation of responsibility for risk. 2. Data Migration Scope: Data Migration Requirements Check (as detailed in the Data Migration Plan) a) Has the supplier agreed to migrate all patient records to the target retaining all semantic and syntactic clinical meaning? b) Has the supplier agreed to migrate the following? i. All electronic medical records (including free text data, patient registration status, etc.)? ii. The relevant structural and coding information? iii. iv. All clinical record attachment (e.g. scanned letters, image files, etc.) and associated inks to the relevant patient records? Records for all patients with data in the Source System? c) Has the supplier provided a clear indication of what data will not be migrated and the HO s responsibilities for this? 3. Does the Data Migration Plan include business continuity and technical data recovery procedures? a) Has the supplier agreed provisions regarding the impact on continuity of Health care at the HO? This will Walsall Informatics providing shared services to: NHS Walsall, Walsall Healthcare NHS Trust

4 include consideration of: i. The timescales for the data migration slipping ii. Restoration from backups iii. iv. There is a serious data error discovered with the Target System following Data Load System loss and business continuity b) Has the HO adequate backup and data archive regimes are in place prior to data migration? c) Require the Healthcare Organisation and Source Supplier to agree with the Supplier any software or code updates to the existing source clinical system between the samples and live stages of the migration process? d) Has the HO agreed access to the source system for an agreed period post migration? e) Has the Supplier agreed to maintain all existing interfaces with the other IT systems and equipment 4. Has the Data Migration Approach been risk assessed and has the assessment been signed off by the supplier and HO Clinical Leads? 5. Has the HO considered information Governance aspects of the Data Migration? 6. Has the Supplier agreed to provide appropriate reports including: i. Validation Reports ii. Data Quality Reports iii. Data Quality Log iv. Data Mapping v. Exceptions Report 7. Have appropriate roles and responsibilities of supplier, HO and Third Party been agreed? 8. Has the Data Mapping exercise been appropriately risk assessed? This may form part of the main implementation safety assessment. Data Cleansing Ref: INFPMO-ORG-PRJNAME-CHECK LIST-Data Migration-V1.1-YYYYMMDD.DOC Page 4 of 6

5 9. Has data cleansing been undertaken to an appropriate Data Cleansing Requirement, e.g. NHS CfH basic Data Quality requirements document (NPFIT-FNT-TO-DQM-0157)? 10. Has there been a reconciliation exercise with NHAIS (the New Health Authorities Information System; better known as the Exeter System)? Data Extraction from the Source System 11. Is he Data Extract: a) Complete and uncorrupted and backed by a fully documented data integrity check? b) Backed by documentation detailing data structures, encryption, exceptions, and details of the last source system backup? 12. Has the supplier tested the transformations process prior to the mitigation? 13. Has the supplier provided: i. Data Mapping documentation ii. Mapping Tables iii. Data Quality reports iv. Details of any errors or irregularities with the data 14. Has the Supplier agreed appropriate checks, balances, and reconciliations with the HO to validate the migrated data? 15. Has the check of the final cut of Transformed Data been completed, and reviewed and signed off by the healthcare organisations? Data Load into the Target System 16. Has the HO signed off the Data Verification Report? 17. Has the HO signed off the Safety Closure Report? 18. Are arrangements in place for the healthcare organisation to Source System data and the audit trail? 19. Has data been validated in line with the approved data accreditation standards? Ref: INFPMO-ORG-PRJNAME-CHECK LIST-Data Migration-V1.1-YYYYMMDD.DOC Page 5 of 6

6 20. Have all outstanding data nominations been addressed and resolved? Ref: INFPMO-ORG-PRJNAME-CHECK LIST-Data Migration-V1.1-YYYYMMDD.DOC Page 6 of 6

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) (NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies

More information

How is RBAC used in SUS?

How is RBAC used in SUS? Role Based Access Control What is RBAC? SUS is a part of the NHS Care Record Service (NCRS) application from the National Programme for IT (NPfIT) and is accessed from the NHS national data network, the

More information

Guidance document for EMIS Web EPS Release 2 deployment

Guidance document for EMIS Web EPS Release 2 deployment Guidance document for EMIS Web EPS Release 2 deployment Crown Copyright 2011 Contents Guidance document for EMIS Web EPS Release 2 deployment... 1 1 Introduction... 4 1.1 Background... 4 1.2 Purpose...

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

External Audit Reviews. Report by Director of Finance

External Audit Reviews. Report by Director of Finance THE HIGHLAND COUNCIL AUDIT AND STANDARDS COMMITTEE 4 DECEMBER 2003 Agenda Item Report No External Audit Reviews Report by Director of Finance SUMMARY The pages that follow contain a report from the Council's

More information

TEMPLATE DATA MANAGEMENT PLAN

TEMPLATE DATA MANAGEMENT PLAN TEMPLATE DATA MANAGEMENT PLAN ICRIN (QM sub group) Version: XX Date: XXXXXXX Page 1 of 6 1.0 Document Ownership The Data Management Plan (DMP) will be initiated and subsequently owned by the Data Manager

More information

CONTRACT, PROJECT BIDDING AND MANAGEMENT AND PARTNERSHIP PROCEDURE. Date - February 2011

CONTRACT, PROJECT BIDDING AND MANAGEMENT AND PARTNERSHIP PROCEDURE. Date - February 2011 CONTRACT, PROJECT BIDDING AND MANAGEMENT AND PARTNERSHIP PROCEDURE Date - February 2011 CONTRACT & PROJECT BIDDING & MANAGEMENT PROCESS CONTENTS 1 Introduction 2 Pre-Bid 3 Project Bid Submission 4 Accepted

More information

How To Run A Cloud Service For A Large Business

How To Run A Cloud Service For A Large Business Lot: 4 Specialist Cloud Services Service 25: Digital Continuity - ediscovery Solutions An overview of the G-Cloud Service (functional, non functional) Discover Information based on content, metadata and

More information

Offshore and Internet Connection Addendum to the. Data Sharing Agreement. Version 1.3

Offshore and Internet Connection Addendum to the. Data Sharing Agreement. Version 1.3 Offshore and Internet Connection Addendum to the Data Sharing Agreement Version 1.3 Document Control Owners IEP User Group Author Steve Jessop Document Preparation Date Version Author Comment 11/01/12

More information

Structure and Function of the EBS NA Business Unit Project Management Office. EBS NA Project Management Office (PMO): Purpose and Function

Structure and Function of the EBS NA Business Unit Project Management Office. EBS NA Project Management Office (PMO): Purpose and Function TITLE: EBS NA Project Management Office (PMO): Purpose and Function SUMMARY: This document provides standard guidance on the purpose and function of the EBS NA Project Management Office. STATUS: Generic

More information

National Programme for IT

National Programme for IT National Programme for IT Safer Design Key Clinical Safety Activities Safer Design Clinical Risk Guidance Document Clinical Safety Contents FOREWORD 3 1.0 INTRODUCTION 4 2.0 Overview 5 3.0 DESIGN ACTIVITIES

More information

a) To achieve an effective Quality Assurance System complying with International Standard ISO9001 (Quality Systems).

a) To achieve an effective Quality Assurance System complying with International Standard ISO9001 (Quality Systems). FAT MEDIA QUALITY ASSURANCE STATEMENT NOTE 1: This is a CONTROLLED Document as are all quality system files on this server. Any documents appearing in paper form are not controlled and should be checked

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Project Management Policy and Procedure

Project Management Policy and Procedure Project Management Policy and Procedure Author(s): Laura Graham Peter Griggs Approved SMT: October 2006 Issue Date: October 2006 Policy Review Date Ref: Contents: 1. Purpose and Scope 2. Aims and Objectives

More information

UCL Information Governance Framework Trevor Peacock UCL School of Life and Medical Sciences

UCL Information Governance Framework Trevor Peacock UCL School of Life and Medical Sciences UCL Information Governance Framework Trevor Peacock UCL School of Life and Medical Sciences NHS-HE Forum, 28 th November 2013 UCL IG Framework Where we ve got to The IG Framework Services to support the

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Public Records (Scotland) Act 2011. Fife NHS Board Assessment Report. The Keeper of the Records of Scotland. 27 September 2013.

Public Records (Scotland) Act 2011. Fife NHS Board Assessment Report. The Keeper of the Records of Scotland. 27 September 2013. Public Records (Scotland) Act 2011 Fife NHS Board Assessment Report The Keeper of the Records of Scotland 27 September 2013 Contents 1. Public Records (Scotland) Act 2011... 3 2. Executive Summary... 3

More information

What NHS staff need to know

What NHS staff need to know St George s Healthcare NHS NHS Trust Surrey Health Informatics Service Sussex Health Informatics Service Records Management Explained What NHS staff need to know A guide to Records Management Contents

More information

Data Warehousing, Systems Integration and Data Migrations (Lot 3)

Data Warehousing, Systems Integration and Data Migrations (Lot 3) Data Warehousing, Systems Integration and Data Migrations (Lot 3) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 2 2. SERVICE OVERVIEW... 3 3. SERVICE FEATURES... 4 4. ON-BOARDING AND SERVICE

More information

FINAL. Internal Audit Report. Data Centre Operations and Security

FINAL. Internal Audit Report. Data Centre Operations and Security FINAL Internal Audit Report Data Centre Operations and Security Document Details: Reference: Report nos from monitoring spreadsheet/2013.14 Senior Manager, Internal Audit & Assurance: ext. 6567 Engagement

More information

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template G-Cloud Service Pan Government Security Accreditation Scope This form is intended for Suppliers of services on the G-Cloud to complete. Upon receipt, the G-Cloud Programme will check Section A, Reference

More information

CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE

CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE This document is uncontrolled once printed. Please check on the CCG s Intranet site for the most up to date version CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE Document Title: Contracts

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Public Records (Scotland) Act 2011. NHS Health Scotland Assessment Report. The Keeper of the Records of Scotland. 5 th August 2015

Public Records (Scotland) Act 2011. NHS Health Scotland Assessment Report. The Keeper of the Records of Scotland. 5 th August 2015 Public Records (Scotland) Act 2011 NHS Health Scotland Assessment Report The Keeper of the Records of Scotland 5 th August 2015 Contents 1. Public Records (Scotland) Act 2011... 3 2. Executive Summary...

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Exam : 70-458. Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2. Title : The safer, easier way to help you pass any IT exams.

Exam : 70-458. Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2. Title : The safer, easier way to help you pass any IT exams. Exam : 70-458 Title : Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2 Version : DEMO 1 / 7 1.Note: This question is part of a series of questions that use the same set of answer

More information

Internal Audit Report Business Continuity Planning Arrangements

Internal Audit Report Business Continuity Planning Arrangements The Highland Council Community Services Committee 6 November 2014 Agenda Item Report No 19 COM 45/14 Internal Audit Report Planning Arrangements Report by Director of Community Services Summary This report

More information

DATA QUALITY POLICY April 2010 Updated January 2015 1

DATA QUALITY POLICY April 2010 Updated January 2015 1 DATA QUALITY POLICY April 2010 Updated January 2015 1 Contents page 1. Introduction 3 2. Context and Purpose 3 3. Why is data quality important? 4 4. Characteristics of good quality data 5 5. Policy Objectives

More information

Event Ticketing. www.hydrant.co.uk sales@hydrant.co.uk 0845 862 1111

Event Ticketing. www.hydrant.co.uk sales@hydrant.co.uk 0845 862 1111 Event Ticketing Our hosted online ticketing solution provides a simple cloud based software as a service solution where we run all the server technology for you. Via your login we provide simple tools

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015 Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This

More information

Electronic Prescription Service. Guidance for community pharmacy contractors on implementing Release 1

Electronic Prescription Service. Guidance for community pharmacy contractors on implementing Release 1 Electronic Prescription Service The Electronic Prescription Service Guidance for community pharmacy contractors on implementing Release 1 Contents With about 1.3 million prescriptions now being issued

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

Complying with the Records Management Code: Evaluation Workbook and Methodology

Complying with the Records Management Code: Evaluation Workbook and Methodology Complying with the Records Management Code: Evaluation Workbook and Methodology Page 1 of 110 Crown copyright 2006 First edition published February 2006 Author: Richard Blake The National Archives Ruskin

More information

Final. Internal Audit Report. Creditors System

Final. Internal Audit Report. Creditors System Final Internal Audit Report Creditors System Document Details: Reference: 1.2 / 2014-15 Senior Manager, Internal Audit & Assurance: David Jenkins ext 6567 Date: 7 th January 2015 This report is not for

More information

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES TABLE OF CONTENTS A. Overview of HIPAA Compliance Program B. General Policies 1. Glossary of Defined Terms Used in HIPAA Policies and Procedures 2. Privacy

More information

Making Experiences Count Procedure

Making Experiences Count Procedure Making Experiences Count Procedure When a mistake happens, it is important to acknowledge it, put things right quickly and learn from the experience. Listening, Responding, Improving A guide to better

More information

SUBMITTED TO: NORFOLK AND SUFFOLK COLLABORATION PANEL - 3 SEPTEMBER 2014 ERP (ENTERPRISE RESOURCE PLANNING) PROJECT UPDATE

SUBMITTED TO: NORFOLK AND SUFFOLK COLLABORATION PANEL - 3 SEPTEMBER 2014 ERP (ENTERPRISE RESOURCE PLANNING) PROJECT UPDATE ORIGINATOR: CHIEF CONSTABLE PAPER NO: NS14/18 SUBMITTED TO: NORFOLK AND SUFFOLK COLLABORATION PANEL - 3 SEPTEMBER 2014 SUBJECT: ERP (ENTERPRISE RESOURCE PLANNING) PROJECT UPDATE SUMMARY: 1. The Collaboration

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Submitter: Richard Corbridge Sponsorship: Gwyn Thomas 1. Introduction 1.1 This paper proposes

More information

Tracking Database GPSoC Replacement (GPSoC-R) Call-Off Agreement and Schedule A Maintenance

Tracking Database GPSoC Replacement (GPSoC-R) Call-Off Agreement and Schedule A Maintenance Programme: Programme Director: Owner: Author: Tracking Database GPSOC-R CALL-OFF AGREEMENT AND SCHEDULE A MAINTENANCE CONFIGURATION ITEM NO Tracking Database Rob Shaw Kim Hobday Kim Hobday DOC-00568 Version:

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

Service Level Agreement (SLA) for the M Connect 2 System

Service Level Agreement (SLA) for the M Connect 2 System Document filename: M Connect 2 Service Level Agreement Directorate / Programme Systems and Project Service Delivery N/A Document Reference: DOC-00064 Project Manager N/A Status Approved Owner Norman Raphael

More information

Responsive Web Design and UX Consultancy

Responsive Web Design and UX Consultancy Responsive Web Design and UX Consultancy Our responsive design process considers user experience across both desktop, mobile and tablet devices. We apply analysis and science to content architecture and

More information

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management. 3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run

More information

Presenters Sue Ann Lipinski, Cindy Smith, Angela Riley

Presenters Sue Ann Lipinski, Cindy Smith, Angela Riley Presenters Sue Ann Lipinski, Cindy Smith, Angela Riley Authorizes the Chief Technology Officer (CTO) oversight authority on agency information technology (IT) projects Establishes the Project Management

More information

GLASGOW LIFE Debtors and Debt Management. Final Report

GLASGOW LIFE Debtors and Debt Management. Final Report GLASGOW LIFE Debtors and Debt Management Final Report INTERNAL AUDIT May 2012 Glasgow City Council Internal Audit 1 GLASGOW LIFE Debtors and Debt Management Table of Contents Section No Section Title 1

More information

Drupal Theme Development

Drupal Theme Development Drupal Theme Development Our Professional UK Based Drupal themers have been converting designs to Drupal themes that style how webpages look and behave since 2007. We follow a ISO 9001 quality assured

More information

RD SOP17 Research data management and security

RD SOP17 Research data management and security RD SOP17 Research data management and security Version Number: V2 Name of originator/author: Dr Andy Mee, R&I Manager Name of responsible committee: R&I Committee Name of executive lead: Medical Director

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

IAPT Data Standard. Frequently Asked Questions

IAPT Data Standard. Frequently Asked Questions IAPT Data Standard Frequently Asked Questions Version 1.0 March 2012 IAPT FAQs 1.0-1 - Contents Section 1: About the IAPT Data Standard.. 3 Section 2: Who is responsible for doing what?. 5 Section 3: How

More information

Policy Information Management

Policy Information Management Policy Information Management Document Title: Policy Information Management Issue date: October 2013 Document Status: Approved IGC 23 Oct 2013 Review date: October 2014 Page 1 of 17 Document control Document

More information

Appendix 1e DIRECTORATE OF AUDIT, RISK AND ASSURANCE INTERNAL AUDIT SERVICE TO THE GLA

Appendix 1e DIRECTORATE OF AUDIT, RISK AND ASSURANCE INTERNAL AUDIT SERVICE TO THE GLA Appendix 1e DIRECTORATE OF AUDIT, RISK AND ASSURANCE INTERNAL AUDIT SERVICE TO THE GLA REVIEW OF PAYROLL February 2012 DISTRIBUTION LIST Audit Team Karen Welsh, Auditor Prakash Gohil, Audit Manager Distribution

More information

Section 1 - IT Systems for Solicitors

Section 1 - IT Systems for Solicitors l Section 1 - IT Systems for Solicitors Company name Trade or product name Address Contact person Telephone 051 872111 Email How long in business Solicitors accounts system Yes Time recording Yes Full

More information

Application for registration Building contractor (company)

Application for registration Building contractor (company) Government of Western Australia Department of Commerce Application for registration Building contractor (company) Refer to the application guidelines for assistance in completing this application form.

More information

Research funding applications involving Cardiff & Vale UHB. Emma Lewis R&D Coordinator. Cardiff and Vale UHB Bwrdd lechyd Prifysgol Caerdydd a r Fro

Research funding applications involving Cardiff & Vale UHB. Emma Lewis R&D Coordinator. Cardiff and Vale UHB Bwrdd lechyd Prifysgol Caerdydd a r Fro Research funding applications involving Cardiff & Vale UHB Emma Lewis R&D Coordinator Objectives R&D review of grant applications Identifying resources required for your project Attributing costs using

More information

Balancing and Settlement Code BSC PROCEDURE BSCP537. QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs

Balancing and Settlement Code BSC PROCEDURE BSCP537. QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs Balancing and Settlement Code BSC PROCEDURE BSCP537 QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs APPENDIX 3 GUIDANCE NOTES ON COMPLETING THE SAD Version 2.0 Date: 10 September 2007

More information

UNIVERSITY OF LEICESTER, UNIVERSITY OF LOUGHBOROUGH & UNIVERSITY HOSPITALS OF LEICESTER NHS TRUST JOINT RESEARCH & DEVELOPMENT SUPPORT OFFICE

UNIVERSITY OF LEICESTER, UNIVERSITY OF LOUGHBOROUGH & UNIVERSITY HOSPITALS OF LEICESTER NHS TRUST JOINT RESEARCH & DEVELOPMENT SUPPORT OFFICE UNIVERSITY OF LEICESTER, UNIVERSITY OF LOUGHBOROUGH & UNIVERSITY HOSPITALS OF LEICESTER NHS TRUST JOINT RESEARCH & DEVELOPMENT SUPPORT OFFICE STANDARD OPERATING PROCEDURES University of Leicester (UoL)

More information

Service Level Agreement (SLA) for the SSD Secure File Transfer Service

Service Level Agreement (SLA) for the SSD Secure File Transfer Service Document filename: SFT Service Level Agreement Directorate / Programme Systems and Project Service Delivery N/A Document Reference: DOC-00087 Project Manager N/A Status Approved Owner Norman Raphael Version

More information

Organisation Data Service Health & Justice Organisation Identifiers - Change Request

Organisation Data Service Health & Justice Organisation Identifiers - Change Request Title ODS Health & Justice Organisation Identifiers - Change Request Reference SCCI 0090-2020 ODS Health & Justice Organisation Identifiers Sponsor Sean Walsh Status Final Developer Mike Presence Version

More information

HOW TO DO AN INTERNAL AUDIT COMPONENT ASSOCIATION FINANCES

HOW TO DO AN INTERNAL AUDIT COMPONENT ASSOCIATION FINANCES HOW TO DO AN INTERNAL AUDIT OF COMPONENT ASSOCIATION FINANCES Prepared by Lisa Farragut 2000/2001 CAMT Treasurer (California) What is an internal audit? An internal audit is a formal examination of the

More information

IRIS Managed Payroll Service

IRIS Managed Payroll Service IRIS Managed Payroll Service Friendly, reliable, efficient For further information please call the IRIS team on 0844 815 5677 or email earniesales@iris.co.uk About IRIS Managed Payroll Service IRIS have

More information

Senior Governance Manager, North of England. North Tyneside CCG Quality and Safety Committee (01/12/15)

Senior Governance Manager, North of England. North Tyneside CCG Quality and Safety Committee (01/12/15) Corporate IG02: Data Quality Version Number Date Issued Review Date V4 07/12/2015 01/01/18 Prepared By: Consultation Process: Senior Governance Manager, North of England Commissioning CCG Quality & Safety

More information

N3 Protecting the Network through Information Governance and Assurance

N3 Protecting the Network through Information Governance and Assurance N3 Protecting the Network through Information Governance and Assurance NHS CFH Operational Security Team cfh.ost@nhs.net Introductions The NHS CFH Operational Security Team: Tony Hodgson Operational Security

More information

NHS Commissioning Board Business Continuity Management Framework (service resilience)

NHS Commissioning Board Business Continuity Management Framework (service resilience) NHS Commissioning Board Business Continuity Management Framework (service resilience) 1 P a g e NHS Commissioning Board Business Continuity Management Framework Date 7 January 2013 Audience NHS Commissioning

More information

Section 1 - IT Systems for Solicitors

Section 1 - IT Systems for Solicitors Section 1 - IT Systems for Solicitors Section 1 - Supplier Details Company name Trade or product name CRO Reg. No. Address Contact person Telephone Email How long in business How many solicitors firms

More information

POSTING RCT AND VAT TRANSACTIONS ON COMPUTERISED ACCOUNTS SYSTEMS A GUIDE FOR ACCOUNTS PERSONNEL

POSTING RCT AND VAT TRANSACTIONS ON COMPUTERISED ACCOUNTS SYSTEMS A GUIDE FOR ACCOUNTS PERSONNEL POSTING RCT AND VAT TRANSACTIONS ON COMPUTERISED ACCOUNTS SYSTEMS A GUIDE FOR ACCOUNTS PERSONNEL 1 CONTENTS TAS Menu Page Introduction 3 Section 1 TAS SETUP 1. Set up VAT and RCT NOMINAL CODES 111 5 2.

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

REGIONAL CENTRE EUROPE OF THE INTERNATIONAL FEDERATION OF TRANSLATORS

REGIONAL CENTRE EUROPE OF THE INTERNATIONAL FEDERATION OF TRANSLATORS Recommendations on Criteria for Conformity Assessment and Certification under EN 15038 (The numbering of the sections below follows the numbering in the Standard) Note: In the light of practical experience

More information

Information Services IT Security Policies B. Business continuity management and planning

Information Services IT Security Policies B. Business continuity management and planning Information Services IT Security Policies B. Business continuity management and planning Version 1 Date created: 28th May 2009 Approved by Directorate: 2nd July 2009 Review date: 1st July 2010 Primary

More information

INTERNAL AUDIT FINAL REPORT CNES FINANCE AND CORPORATE RESOURCES DEPARTMENT CLOUD IT SYSTEMS AND THE CRM SYSTEM OFFICIAL OFFICIAL

INTERNAL AUDIT FINAL REPORT CNES FINANCE AND CORPORATE RESOURCES DEPARTMENT CLOUD IT SYSTEMS AND THE CRM SYSTEM OFFICIAL OFFICIAL INTERNAL AUDIT FINAL REPORT CNES FINANCE AND CORPORATE RESOURCES DEPARTMENT CLOUD IT SYSTEMS AND THE CRM SYSTEM AUTHOR DISTRIBUTION David Beaton Director of Finance and Corporate Resources Internal Audit

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Overview... Backup & Disaster Recovery... Quality Management...

Overview... Backup & Disaster Recovery... Quality Management... Overview... We provide both a range of energy-efficiency, environmental and sustainability services to service all areas of the Lot 4 Specialist Cloud Services. Our services are offered through both digital

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Supporting all NHS Trusts to achieve NHS Foundation Trust status by April 2014

Supporting all NHS Trusts to achieve NHS Foundation Trust status by April 2014 TFA document Supporting all NHS Trusts to achieve NHS Foundation Trust status by April 2014 Tripartite Formal Agreement between: Walsall Healthcare NHS Trust NHS West Midlands Department of Health Introduction

More information

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents

More information

Records Management and Information Lifecycle Strategy

Records Management and Information Lifecycle Strategy LINCOLNSHIRE PARTNERSHIP NHS FOUNDATION TRUST Records Management and Information Lifecycle Strategy DOCUMENT VERSION CONTROL Document Type and Title: Strategy New or Replacing: Revised/Updated Version

More information

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance Back-up Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Back Up Policy Version Date 10/10/12 Effective

More information

Release: 1. BSBCMN207A Prepare and process financial/business documents

Release: 1. BSBCMN207A Prepare and process financial/business documents Release: 1 BSBCMN207A Prepare and process financial/business documents BSBCMN207A Prepare and process financial/business documents Modification History Unit Descriptor This unit covers the processing of

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:

More information

Quality Management System Process/ Management Review

Quality Management System Process/ Management Review Directorate in charge: Process concerned: Process owner: Executive Directorate Quality Management System Process/ Management Review Quality Section Manager Véronique Magnier Purpose and Scope of the :

More information

Tender for the scanning & data capture of archive microfilms Supplier Background Questionnaire

Tender for the scanning & data capture of archive microfilms Supplier Background Questionnaire Tender for the scanning & data capture of archive microfilms Supplier Background Questionnaire 1 of 15 INTRODUCTION This document must be completed in addition to the main tender submission and proposals

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Project Management Toolkit Version: 1.0 Last Updated: 23rd November- Formally agreed by the Transformation Programme Sub- Committee

Project Management Toolkit Version: 1.0 Last Updated: 23rd November- Formally agreed by the Transformation Programme Sub- Committee Management Toolkit Version: 1.0 Last Updated: 23rd November- Formally agreed by the Transformation Programme Sub- Committee Page 1 2 Contents 1. Introduction... 3 1.1 Definition of a... 3 1.2 Why have

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Securing excellence in IT Services. Operating model for offender health care

Securing excellence in IT Services. Operating model for offender health care Securing excellence in IT Services Operating model for offender health care February 2013 Table of Contents 01 Glossary of terms 02 Introduction Purpose of document Background 03 Offender Health IT Commissioning

More information

Roles & Responsibilities for NHAIS (Exeter) System Key Users

Roles & Responsibilities for NHAIS (Exeter) System Key Users Document filename: NHAIS Key User Roles and Responsibilities.docx Directorate / Programme HSCIC Project SSD Document Reference DOC-00126 Project Manager Sean Walsh Status Approved Owner Norman Raphael

More information

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt Programme, Project & Service Management Analysis Table of Content 1 Executive Summary... 3 1.1 Scope of Work... 3 1.2 Methodology for

More information

Developments to the NHAIS System

Developments to the NHAIS System Developments to the NHAIS System FHS Day - 3 rd March 2010 Graham Ambrose NHAIS and FHS Services GP Payments Total payments for 07/08 of 7.2b Cervical Cancer Screening 3.4m women called for screening Labs

More information

FINAL INTERNAL AUDIT REPORT. To: Steve Allen Managing Director, Finance. Project Document Control and Management Systems. (Conclusion: Audit Closed)

FINAL INTERNAL AUDIT REPORT. To: Steve Allen Managing Director, Finance. Project Document Control and Management Systems. (Conclusion: Audit Closed) FINAL INTERNAL AUDIT REPORT To: Steve Allen Managing Director, Finance Project Document Control and Management Systems (Conclusion: Audit Closed) Ref: 20 September 2013 Fieldwork started 11 July 2013 Fieldwork

More information

EQUESTRIAN SPORTS FINANCIAL MANAGEMENT POLICY & PROCEDURE

EQUESTRIAN SPORTS FINANCIAL MANAGEMENT POLICY & PROCEDURE EQUESTRIAN SPORTS FINANCIAL MANAGEMENT POLICY & PROCEDURE Policy Area: Financial Management Policy Number: EQ 0007 Effective Date: 01 September, 2014 In 2003 as a result of irregularities in the reporting

More information

Information Systems and Technology

Information Systems and Technology As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons

More information

ESKIDMS3 Database management software

ESKIDMS3 Database management software Overview This is the ability to use a software application designed to store and retrieve data needed for a variety of business functions. It also includes an understanding of the features and facilities

More information

A Question of Balance

A Question of Balance A Question of Balance Independent Assurance of Information Governance Returns Audit Requirement Sheets Contents Scope 4 How to use the audit requirement sheets 4 Evidence 5 Sources of assurance 5 What

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information