Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
|
|
- Dana Taylor
- 8 years ago
- Views:
Transcription
1 Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication and our unified approach to service delivery and change Quality and consistency of the customer experience is increased through a single view of customer and common service design approach Risk to revenue collection and service delivery is minimised by removing inter-lot dependencies Commercial interests are aligned, removing any barriers to innovation and realising future opportunities Interoperability and future strategic flexibility is maintained through a modular, off the shelf solution design Oversight and assurance is simplified through higher quality, comprehensive and transparent reporting and information sharing Specific changes to this module in order to deliver these benefits are annotated throughout this document in this style. Module Db (Technical Solution) Page 1 of 1
2 Contents 1 Introduction Business Operations Solution Architecture {Information Redacted} {Information Redacted} Risks, Mitigations & Dependencies Ability to deliver Licensing... 9 Appendix DbA Bespoke sub-systems Appendix DbB Shared Systems Module Db (Technical Solution) Page 2 of 1
3 1 Introduction 1. Our Technical Solution will fully meet the needs of the business requirements for Business Operations, delivering excellent customer service, and offering a number of advantages to TfL. 2. Through a combination of innovative design, incorporating the use of leadingedge COTS products across all aspects of charging and enforcement operations, we will deliver systems that will reliably meet today s operational needs and have the potential to stretch to meet the emerging, and currently unforeseen, needs of operations well into the future. Standardised & Efficient A world class road user charging service that enhances London's reputation Efficient and cost effective s interaction Enhance the experience and safeguard customer rights Optimised Service Systems Changing World and Communication Channels Protect revenue and reduce fraud. 3. The main advantages of our solution are as follows: An experienced programme and implementation team, with robust methodology, delivering a low risk transition and cut over to new systems and infrastructure {Information Redacted} Heavily COTS focused delivery to provide the majority of the required functionality which will provide both scalability and flexibility by default to reduced risks associated with delivery and on-going support Use of COTS products, with each product providing the benefit of a product roadmap that will deliver new capability into the products that TfL can benefit from Use of proven managed service solution components thereby reducing risk and enabling efficiency gains (Payments, telephony, document handling), while simultaneously minimising capital setup costs Innovative use of technology such as Automated Speech Recognition and mobile applications to deliver a fresh, effective and reliable experience to the public Use of Capita s dynamic hosting and flexible network services to allow the IT to scale up or down, responding easily to changes in demand from TfL customers. 4. We are highly confident that our solution will deliver excellent value for money and also the functionality, security, reliability and performance sought by TfL to protect revenue and support an effective customer experience. 2 Business Operations Solution Architecture 5. Our aim is to offer TfL reliability and cost effectiveness from initial deployment through to ongoing service delivery. We will achieve this using a combination Module Db (Technical Solution) Page 3 of 1 Satisfaction Standardised & Efficient
4 of dedicated hosting and infrastructure solutions, shared service platforms (e.g. for payment processing) and COTS applications. Our solution also minimises the need for bespoke development, with only a very limited number of sub-systems, which are too specialised to source using COTS without overly complex customisation, being created as discrete bespoke implementations (outline designs for these are described at the end of this document). 6. The COTS components proposed will be configured with business logic to precisely meet the functional requirements specified by TfL. This is the level of configuration commonplace with the products we have selected - due to the nature of the markets they operate in. All software configuration will be carried out in accordance with the vendors guidelines, ensuring we are able to safely upgrade to new product versions over the term, while maintaining product support. 7. We will build the service system in accordance with Schedule 3 and Schedule 28 and to meet the requirements of the Scheme Orders and associated laws. [B1.1.4] [Z7.1.1] The ICT solution is designed to: [Z7.2.4] [Z7.2.5] [Z7.2.6] [Z7.2.7] [Z7.2.8] Follow industry standards of modular design and best practice, using COTS products - Reduce the number of components / technologies to simplify integration requirements Be highly configurable and parameter driven with a list of types and value ranges / sets made available to TfL [Z7.2.2] Enable better use of time and resource during implementation Allow us to better manage total cost of ownership Provide extensive search capability, including wildcard combinations [Z7.2.3] Meet the required levels of service standards, security (confidentiality), integrity, availability and capacity - Fully support automated exception alerting and management Provide timely access to data, information and functions on a need-toknow and least privilege basis in line with business rules Incorporate business and configuration rules that minimise manual intervention and data entry Have no single point of failure for critical parts of the system Incorporate automated monitoring to identify any system failure, including trend and pattern analysis for early alerting of potential issues Maximise re-use and minimise the impact of change - Efficiently upgradeable as required, in response to TfL policy changes, without detriment to the business Supporting the implementation of future system extensions which comply with agreed standards Cost effective Cost Reduction Standardised & Efficient Flexible & Scalable Module Db (Technical Solution) Page 4 of 1
5 Scalable to meet possible demand growth without a step change in investment, while retaining the flexibility to scale down as required. Combined solution: The combined solution will enable resource consolidation as many aspects of the solution design and implementation activities within the two Lots are similar, examples include: Messaging standards and the adapter patters Data centre design and implementation Server build specification 3 {Information Redacted} Common product configuration and support guides Service management design and development of operational procedures API design and implementation. As a consequence the combined management team providing governance and assurance will also be smaller than the standalone Lot totals. 4 {Information Redacted} Testing and Assurance 8. Capita Assurance and Testing has a proven approach to the full end-to-end management of testing. Our process addresses all the key activities and deliverables needed for successful project delivery in a controlled manner and in line with ISO9001:2008. The key stages are: Standardised & Efficient Initiate Test Analyse Test Requirements Iterative Testing Construct Tests COTS Configuration Execute Tests Close Testing. 9. The test manager will undertake management of the project stakeholders throughout the work, and liaise with the support functions if they do not have direct control over these items Infrastructure Build 10. The approach to be followed will build on the high level design activities initiated in the Mobilisation phase. The high level design will be broken down into a number of detailed designs that will address each aspect of the infrastructure, servers, network, desktop services, and management tools. 11. The designs will be used to implement each environment in turn: Module Db (Technical Solution) Page 5 of 1
6 Integration Test Pre-Production Disaster Recovery Production and Training. 12. Each implementation configuration will be fully documented and the lessons learnt input into the overall design and build scripts. This progressively improves the design of both the infrastructure and the implementation approach resulting in a reliable consistent implementation. Module Db (Technical Solution) Page 6 of 1
7 4.1.3 Data Migration 13. Our approach to Data Migration will be based on experience from a number of high volume, high sensitivity migrations carried out for organisations; as diverse as UK police forces and UK Insurance Companies. We promote the developing maturity of Data Migration as an industry practice and follow the terminology and methodology espoused by the British Computer Society and described in their publication Practical Data Migration (John Morris 2006) Security Combined solution: The combined data migration solution will create efficiencies through common migration and validation techniques and shared governance structures. Details are presented in 'Quality Module Ic Data Migration Combined'. 14. We will follow a risk based approach following HMG and ISO guidance. Detailed accreditation process will be agreed during dialogue with the accreditor. Insight Led Safe & Secure 15. In conforming to the Data Protection Act Capita can confirm that data held by the system will be held in and accessed from within the UK. All data centres in use and operating centres are UK based. [Z3.4.4b] Service Management Combined solution: The combined security solution will see an improvement to quality and reduction in cost in in the following areas: Single ISO certification scope. Common processes and procedures Shared SIEM infrastructure and Security analysts Single set of security controls to address risks Shared risk assessment and security review scope Single point of engagement with TfL security team removing Reduced risk as cross lot dependencies will be managed within a single scope and contract. In each area implementation and operational savings can be realised through shared service or re-use. In addition cross lot risks are mitigated and TfL will only have one point of contact for all related security issues. Details are presented in 'Quality Module Dj Security Combined'. 16. We will deliver a service management model in line with ITILv3. The design of this service will follow a Capita standard 'Preparation for Service' methodology, updating existing policies and procedures to address the specific needs of TfL. 17. {Information Redacted} Module Db (Technical Solution) Page 7 of 1
8 Combined solution: The combined service management solution will see savings through: reduced overall training, shared resource and reporting. TfL will also benefit from having a single point of contact with the service provider and mitigate risks associated with activities that span both lots. Details are presented in 'Quality Module Dg Service Management Combined'. 4.2 Risks, Mitigations & Dependencies 18. We have a high level of confidence in our proposed solution and our Implementation Plan. Our governance and assurance methodologies include rigorous risk management; identifying, mitigating and monitoring risks. The table below provides visibility of some of the more notable technical risks assessed: ID Risk Mitigation 1 Third party dependencies delay programme - Dependencies on the third party supplier (e.g. the incumbent supplier) for data, information, resource or service fail to be met impacting the delivery time table. 2 Transition of service to live fails due to a third party or unforeseen event. 3 Desired performance levels not achieved - Incorrect sizing of the ICT infrastructure (server, network and storage) that could impact operational performance. 4 Fail to meet security standards -Solution fails to meet the Security standards required for the processing of evidential data and credit card payments. We will ensure that there are clear dependency requirements on third parties and schedule early engagement with them where possible. Extensive system and operational testing will be undertaken including the Simulated Operation and Service Transition. Back-out procedures and mechanisms will be agreed and tested prior to the service transition taking place. Undertaken network and storage sizing based on supplied metrics validated server sizing with key suppliers. Capita has and will continue to engage specialists in HMG and PCI standards to assure that the technology and procedures will address the business need. We will seek early engagement with the TfL accreditor to ensure appropriate and acceptable risk mitigation mechanisms are in place Dependencies Table 1 - Risks and Mitigations 19. During the Commercial dialogue meetings we reviewed the list of potential dependencies on TfL and agreed that a jointly developed statement would be included in our ITS Final Offer. This statement has been included within Quality Module Ib and Module Dc which in turn will form Schedule 28 within the contract Module Db (Technical Solution) Page 8 of 1
9 4.3 Ability to deliver 20. Capita employs the full range of skilled staff required to support the implementation teams in conjunction with our chosen COTS providers. This includes; over 800 employees skilled and experienced in applications design, development and testing and a further 370 skilled and employed in ICT infrastructure design, build and testing. Service Management will be delivered via ITIL certified staff, with over 350 employees certified to foundation level of ITIL (either version 2 or 3), and a further 42 staff certified in other ITIL disciplines. 21. {Information Redacted} 4.4 Licensing 22. Capita has proposed transferable 'Perpetual right to use' based licences for the majority of software. For those elements of our software solution to which TfL have access, Capita will put in place suitable licensing arrangements with the relevant third party suppliers to enable TfL to receive the Services in accordance with Clause 39 (Licensing of Intellectual Property Rights). Module Db (Technical Solution) Page 9 of 1
10 Appendix DbA Bespoke sub-systems While we have actively pursued a policy of building around COTS products, there are several functions required by TfL which are so specialised that we have been unable to identify viable COTS options for them. We believe it will be necessary to develop the following as bespoke sub-systems and a high level design for each of these is included below. {Information Redacted} Reimbursements Sub-system We will implement a Reimbursements Sub-system which allows approved external customers (Hospitals, London Fire Service, plus any others that may be added later) to authorise claims for reimbursement of charges incurred by individuals subject to agreed business rules. All reimbursement claims will be processed through the customer s Secure Online Account. [B7.1.2] [B7.1.3] {Information Redacted} The reimbursements application will be designed to be highly configurable, with system parameters held in a database. These will include a pre-defined list of reasons for a journey which will be pre-loaded with values that have been agreed by TfL prior to the sub-system being released to live operation. [B7.1.5] [B7.1.6] {Information Redacted} High Level Screens We will develop two sets of screens which are listed below. The first are the customer screens which are used to make a claim and report on claims made previously. The second are the administrative screens which will be used by Capita staff to implement data changes requested by TfL, or released to TfL staff to permit them to make the changes. Access to all screens will be dependent on the user logging into the system successfully and having a role which permits access. The reimbursements sub-system will apply an agreed set of business rules to validate all reimbursement claims against TfL s stated requirements before the claim can be authorised and paid. Any claim that violates one or more business rules will be rejected at the point of submission; it will not be possible to submit a claim that is not compliant with all agreed business rules. The reimbursements application will clearly display the reason(s) for any decision to reject the claim. [B7.1.9] [B7.1.14] [B7.1.15] [B7.1.16] [B7.1.17] {Information Redacted} All reimbursement claims will be validated against the record of charge payments made and no claim will be authorised unless it is accompanied by a valid proof that payment has been submitted (e.g. Receipt references and / or CC Auto Pay Charge Payment reference numbers). [B7.1.10] [B7.1.13] It will also check that the charge to which the reimbursement claim relates has not already been reimbursed or cancelled in any other way. [B7.1.11] [B7.1.12] Module Db (Technical Solution) Page 10 of 1
11 Information on the status of the charge in question will be retrieved from the Business Operations accounting systems via a web service function call. Screen Login using password(s) and other security checks [B7.1.2] Begin Reimbursement Claim [B7.1.2] [B7.1.3] Gather mandatory reimbursement claim data [B7.1.4] Specify one or more Charge Payments for the claim [B7.1.8] Submit claim and receive Validation Result [B7.1.9] If approved, value of claim is displayed [B7.1.18] If claim is rejected, reasons displayed [B7.1.16] [B7.1.17] List previous reimbursement claims [B7.1.21] Download details of a claim from displayed list [B7.1.22] Request full statement [B7.1.28] Add / remove approved customer [B7.1.1] Configuration of approved reasons for reimbursements [B7.1.5] [B7.1.6] [B7.1.7] Review claims by specified customer Logout Authorised User(s) (e.g. Hospital, Fire Service); TfL TfL TfL TfL, TfL Table 2 - Reimbursement Screens Back Office Send a Reimbursement Statement to a. This gives a full breakdown of all claims within a specified date range. [B7.1.28] {Information Redacted} Contravention Validation and Verification Checking (CVVC) Requirement Before issuing a Penalty Charge Notice, any potential contravention must first be manually verified. This is to prevent unfounded PCNs from being issued. Module Db (Technical Solution) Page 11 of 1
12 The automated systems can quite possibly misread a VRM, so human confirmation is necessary. To maximise confidence in the verification, each contravention must be independently verified by two operators. If they do not agree, a third operator is brought in to clarify the situation. {Information Redacted} Module Db (Technical Solution) Page 12 of 1
13 Appendix DbB Shared Systems With reference to Clause 6.2.3, and without prejudice to Clauses 45 (Security) and 49 (Information Governance), the following categories of Hardware, Software and Systems may not be dedicated to provision of the Services under this Agreement and may also be used in the provision of services to other clients of Capita and / or in the provision of services under the EOps Services Agreement: Networks Telephony (including IVR) Firewalls Storage Virtual Server Infrastructure Security Systems Finance System Knowledge Management System Service Desk Systems Management Tools Module Db (Technical Solution) Page 13 of 1
Enforcement Operations. Module Db. Technical Solution
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
More informationLot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
More informationMapping and Geographic Information Systems Professional Services
Mapping and Geographic Information Systems Professional Services G-Cloud Services RM 1557 Service Definition Esri UK GCloud 5 Lot 4 Specialist Services Government Procurement Service Acknowledgement Esri
More informationPSN Protective Monitoring. Service Definition
PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights
More informationHydrant E-Learning Management System (HELMS)
Hydrant E-Learning Management System (HELMS) service definition v6.1 Page 1 Service overview Hydrant offer an e-learning Management System (HELMS) on which a variety of e-learning solutions can be built
More informationICT Strategy 2010-2013
ICT Strategy 2010-2013 If you would like to receive this publication in an alternative format (large print, tape format or other languages) please contact us on 01832 742000. East Northamptonshire Council
More informationIT Enterprise Services
IT Enterprise Services Capita Private Cloud Agile Infrastructure-as-a-Service (IaaS) Cloud potential unleashed Cloud computing at its best Cloud is now an integral part of every IT strategy. It reduces
More informationProgram Lifecycle Methodology Version 1.7
Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated
More informationDelivering peace of mind in outsourcing
> Delivering peace of mind in outsourcing How to increase enterprise performance when outsourcing mission critical systems www.thalesgroup.com/security-services AND >> PERFORMANCE OUTSOURCING OF MISSION
More informationGPG13 Protective Monitoring. Service Definition
GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights
More informationMarket Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services
Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range
More informationSCHEDULE 2. Core It Services SOR
SCHEDULE 2 Core It Services SOR The Agreement V5.0 - In Confidence - Page 1 of 46 Table of Contents 1 Appendices... 4 2 Introduction to the Statement of Requirements... 5 2.1 Introduction... 5 2.2 TfL
More informationService Integration &
This is a DRAFT document, being published for review & comment The content is therefore subject to change & revision This document is part of the XGOV Strategic SIAM reference set Service Integration &
More informationMaster Data Management
1 3 Master Data Management Support Services Service Definition MASTER DATA MANAGEMENT SUPPORT SERVICES Service Description The Master Data Management Support Services are part of the Cognizant Information
More informationSTL Microsoft Dynamics CRM Consulting and Support Services
STL Microsoft Dynamics CRM Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk
More informationG-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
More informationCustomer Relationship Management Software Package G-Cloud Service Definition
Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationANNEXURE A. Service Categories and Descriptions 1. IT Management
Service Categories and Descriptions 1. IT Management The ICT Management Services portfolio consists of services traditionally related to the technical or functional governance of an ICT domain, but with
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationHead of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
More informationChristchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
More informationEPC020-08 11.02.2015 SEPA CARDS STANDARDISATION (SCS) VOLUME
EPC020-08 11.02.2015 (Vol Ref. 7.5.1.05) SEPA CARDS STANDARDISATION (SCS) VOLUME BOOK 5 CONFORMANCE VERIFICATION PROCESSES Payments and Cash Withdrawals with Cards in SEPA Applicable Standards and Conformance
More informationSTL Microsoft SharePoint Consulting and Support Services
STL Microsoft SharePoint Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk
More informationG-Cloud 7. Magento Hosting Services September 2015. Prepared by: TIM EDWARDS // ACCOUNT DIRECTOR
G-Cloud 7 Magento Hosting Services September 2015 Prepared by: TIM EDWARDS // ACCOUNT DIRECTOR Synopsis Magento applications require specialist hosting services to ensure high availability and performance.
More informationAssessment of Software for Government
Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented
More informationCurrent Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.
Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationMANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS
MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS 3 THE USE OF BUSINESS SOFTWARE AND SPORTS ARE DEFINITELY QUITE SIMILAR; IF YOU WANT TO PLAY (USE THE SOFTWARE), YOU HAVE TO ACCEPT THE RULES. THIS INCLUDES
More informationCommittees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
More informationGSN Cloud Contact Centre Partnership Datasheet
GSN Cloud Contact Centre Partnership Datasheet Commercial in Reference: GSN Partnership Datasheet Version: 1.1 Global Speech Networks Pty Ltd Level 8, 636 St Kilda Road Melbourne, Victoria 3004 +61 3 9015
More informationUK Permanent Salary Index - 2015
1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible
More informationMicrosoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationInformation Services Strategy 2011-2013
Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at
More informationCurrent Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.
Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our
More informationSCHEDULE 3. Milestones and Deliverables. Redacted Version
SCHEDULE 3 Milestones and Deliverables Redacted Version This Schedule 3 sets out the Service Provider s obligations in respect of the milestones and deliverables relating to the implementation and operation
More informationIPL Service Definition - Data Recovery, Conversion and Migration
IPL Proposal IPL Service Definition - Data Recovery, Conversion and Migration Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 10 IPL Information Processing Limited
More informationLoan Site Management - The Bank of Africa
Challenge ID: Published: Customised, flexible workflow and status reporting solution for managing a loan application process, and online interface between clients and the bank s lending department HELPDESK:
More informationBBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: Spencer.piggott@bbc.co.uk Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
More informationOxford City Council ICT Strategy 2015 2018
Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...
More information<workers> Online Claims and Injury Management
Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and
More informationGuideline on Access Control
CMSGu2011-08 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Access Control National Computer Board Mauritius Version 1.0
More informationMarch 2008 Grant Halverson CEO, GFG Group. Regional Processing Models
March 2008 Grant Halverson CEO, GFG Group Regional Processing Models The search for successful regional and global IT processing models has been a major focus of the last fifteen years across banks, insurance
More informationTransition and Transformation. Transitioning services with minimal risk
IBM Global TECHNOLOGY Servicess and Transformation ing services with minimal risk Summary To transition services is a complex process involving many issues. When outsourcing to IBM, you gain the benefit
More informationFirewall Managed Service. I.T. Security Specialists. Firewall Managed Service 1
Firewall Managed Service I.T. Security Specialists Firewall Managed Service 1 BACKGROUND Caretower Managed Security Service provides remote managed security services for customers. We have extensive experience
More informationENABLE ENHANCE EXCEL www.layerv.co.uk
ENABLE ENHANCE EXCEL ABOUT US LayerV is an IT consultancy and end-to-end cloud service provider. We deliver winning IT strategies to help companies generate new value and manage technological change throughout
More informationMeeting the challenge
Meeting the challenge Working with you to ensure your IT infrastructure delivers Infrastructure Management Services Overview Real solutions to tough challenges Infrastructure Management Services Overview
More informationThe Cadence Partnership Service Definition
The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues
More informationInformation governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More informationThe Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
More informationAppendix A: ICT and Information Management Strategy
Appendix A: ICT and Information Management 2014 2019 Head of Information and Business Change Sarah Caulkin October 2014 1 Version Control: Date Version Author Comments 04/08/14 0.1 Jo Harley First draft
More informationAUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
More informationThe IaaS Server On Boarding Process
SERVICE DEFINITION G-Cloud 7 MANAGED SERVER Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material
More informationITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
More informationG-Cloud 6 Service Definition DCG Enterprise Backup Reporting Service
G-Cloud 6 Service Definition DCG Enterprise Backup Reporting Service G-Cloud 6, Service Description, DCG Enterprise Backup Reporting Service Page 1 of 16 CONTACT INFORMATION Guy Silver T: +44(0) 7990 690087
More informationSenate. SEN15-P17 11 March 2015. Paper Title: Enhancing Information Governance at Loughborough University
SEN15-P17 11 March 2015 Senate Paper Title: Enhancing Information Governance at Loughborough University Author: Information Technology & Governance Committee 1. Specific Decision Required by Committee
More informationOpen Source, Open Standards and Re Use: Government Action Plan
Open Source, Open Standards and Re Use: Government Action Plan Foreword When Sir Tim Berners Lee invented the World Wide Web in 1989, he fought to keep it free for everyone. Since then, not everyone in
More informationUpgrade of Exchange Environment Request for Proposal
Upgrade of Exchange Environment Request for Proposal August 2014 Contents 1. Introduction... 4 1.1. Purpose of document... 4 1.2. Why this document is being issued... 4 1.3. Overview... 4 1.4. Introduction
More informationHYBRID CLOUD SERVICES HYBRID CLOUD
SERVICES SOLUTION SUMMARY SEIZE THE ADVANTAGE From the workplace to the datacenter, the enterprise cloud footprint is growing. It delivers on-demand development resources. It accommodates new digital workloads.
More informationIT Services. Capita Private Cloud. Cloud potential unleashed
IT Services Capita Private Cloud Cloud potential unleashed Cloud computing at its best Cloud is fast becoming an integral part of every IT strategy. It reduces cost and complexity, whilst bringing freedom,
More informationPay per use for Imaging and Printing HP Services
HP Services HP Pay per use for Imaging and Printing delivers improved productivity and a lower total cost of ownership. Consolidate, integrate, and manage your imaging and printing resources No matter
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationXerox Print Monitoring Service (XPMS)
Xerox Print Monitoring Service (XPMS) Service Description G-Cloud : Lot 3 : Software as a Service (SaaS) April 2014 Version 1.0 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are
More informationTelstra Service Management Framework. Your assurance of first-class network support
Telstra Service Framework Your assurance of first-class network support The Service Framework delivers comprehensive, integrated support Service Frame work SERVICE IMPROVEMENT & REPORTING Performance &
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
More informationVoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector.
VoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector. The future of voice communication for education. Together with our partners at New Star Networks,
More informationXerox Remote Infrastructure Monitoring (XRIM)
Xerox Remote Infrastructure Monitoring (XRIM) Service Description G-Cloud : Lot 3 : Software as a Service (SaaS) April 2014 Version 1.0 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and
More informationKMS Implementation Roadmap
KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5
More informationGOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011
APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS
More informationDIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector
DIGITAL MARKETPLACE (G CLOUD 7) OFFERING Sopra Steria Integration Platform Support as a Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation
More informationIT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
More informationITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationehealth Architecture Principles
ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:
More informationDIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector
DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes
More informationLog and Refer Service Desk IL0. September 2013
Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...
More informationNational Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
More informationData Warehousing, Systems Integration and Data Migrations (Lot 3)
Data Warehousing, Systems Integration and Data Migrations (Lot 3) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 2 2. SERVICE OVERVIEW... 3 3. SERVICE FEATURES... 4 4. ON-BOARDING AND SERVICE
More informationContents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance
Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT
More informationDCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0
DCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0 2013, Data Centre Alliance Limited (www.datacentrealliance.org). All rights reserved. This publication may not be reproduced
More informationflexible Enterprise Virtual Data Centre Extreme availability, flexible cost models and highly scalable infrastructure Delivering more performance
Do More evdc Extreme availability, flexible cost models and highly scalable infrastructure Delivering more performance flexible Adapt s enterprise virtual data centre (evdc) is an award-winning virtual
More informationexpense@work Overview Pricing & Features Summary
expense@work Overview Pricing & Features Summary 1 st March 2012 Copyright Notice Produced By: Published: Contact Details: systems@work - Solution Delivery Division Mar-12 systems@work Limited http://www.systemsatwork.co.uk
More informationProject title (in Chinese) 項 目
II Project Information Project title (in English) Project title (in Chinese) HKCAAVQ IT Infrastructure Development 香 港 學 術 及 職 業 資 歷 評 審 局 資 訊 系 統 基 建 發 展 Project 項 目 Project summary (Please provide an
More informationAppendix D Programme Stream 6 CRM Procurement. Programme Stream 6 Remodelling of Customer Services Programme CRM Procurement
Programme Stream 6 Remodelling of Customer Services Programme CRM Procurement Recommendations That the Executive note CRM procurement will be put out to tender in 2010/11 and note the proposed phasing
More informationG CLOUD SERVICE DEFINITION
G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: info@ashtoncourt.com Web: www.ashtoncourt.com
More informationService Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0
Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations
More informationIT Managed Services National (Cat A) Framework
IT Managed Services National (Cat A) Framework This type of framework contract is an excellent offering which combines purchasing power under one framework agreement. John F McClelland CBE Key points Available
More informationSubmitted to: Service Definition Document for Database Management for IT Infrastructure Management
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...
More informationEnsuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
More informationOur Capabilities. 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses.
Our Capabilities 3SIXTY Global, the specialist consulting company for buyers and providers of corporate travel services and expenses. 3SIXTY Global has the experience to improve how your company travels.
More informationPROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution
PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution 1. The Challenge Large enterprises are experiencing an ever increasing burden of regulation and legislation against which they
More informationThe Annual Audit Letter for West Mercia Police and Crime Commissioner and Chief Constable
The Annual Audit Letter for West Mercia Police and Crime Commissioner and Chief Constable Year ended 31 March 2015 October 2015 John Gregory Director and Engagement Lead T +44 (0)121 232 5333 E john.gregory@uk.gt.com
More informationMDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015
OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive
More informationRecommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching
Recommendations from Industry on Key Requirements for Building Scalable Managed Services involving Telehealth, Telecare & Telecoaching Contacts: Angela Single, Chair, Industry Working Group: angela.single@3millionlives.co.uk
More informationMaintaining the operational effectiveness of organisation s Database management systems
Database Administrator Position title Division Business Business Unit Classification Database Administrator Shared Services Information, Communication and Technology (ICT) Operations D Responsible for
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationWhite Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.
White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed
More information