IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012
|
|
- Cuthbert French
- 7 years ago
- Views:
Transcription
1 IT Asset Management Procedure (QM)DT/001 Support Procedure Written by Martin Crane Version /08/2012 Revision Version Summary of Changes Contributor date 22/08/ Initial Draft Martin Crane 22/07/ Added printer disposal requirements to section 5 and appendix D referencing CfH disposal guidelines 13/09/ Appendix B: Updated asset marking screenshots and descriptions for monitors and new model base units 11/08/ Updated job titles on disposal responsibility and disposal log sheet template link for updated assurance around hard disk disposal within equipment. Addition of appendix E example of waste transfer certificate Martin Crane Martin Crane Martin Crane Change Approval This document forms part of the IT Support and Helpdesk Quality System. The IT Quality Manager should be notified of any changes to this document - 1 -
2 Table of Contents Purpose of this Document... 3 Overview Receipting of Hardware Unpacking hardware Storing hardware for extended periods Managing deployed assets Decommissioning and disposal of hardware Pre-disposal whilst assets are being decommissioned and stored Organising a disposal... 5 Appendix A -IT Purchasing and installation information slip:... 6 Appendix B Marking process... 8 Process... 8 Printer Asset Positions... 9 Monitor Asset Positions... 9 Base Unit Asset Positions... 9 Mini Tower Cases and Dell Desktop form factor... 9 Ultra Small Form Factor... 9 Laptop Positions Appendix C Supportworks inventory data fields Asset Tab Owner Tab Procurement Tab Appendix D CfH Printer Disposal Guidelines Appendix E IT Equipment Transfer Certificate IT Equipment Transfer Certificate
3 Purpose of this Document To comply with audit and quality standards it is essential to have a robust process for receipting, handling and storing valuable goods. All members of IT that are involved in this process should be conversant with this procedure but namely: 2 nd line support Desktop installations IT Procurement Where the nominated groups or staff members listed above are regularly required to perform this function it is also expected that anyone providing cover for their role will also adhere to this procedure. Overview The IT Support Coordinator is responsible for overseeing that this process is carried out and that records kept are accurate and able to be used for any means as required, for example financial forecasting, data on assets per cost centre and IT rollout planning. The records may also be called up for regular audit of stock and in the event of any theft. This document will cover: Receipting of hardware and attaching a paper form to the packaging by IT Procurement Unpacking, recording inventory data within 1 day of receipt. Storing for extended periods e.g. projects or for ad-hoc installs. Updating inventory records for equipment within the Trust. Decommissioning and disposal of hardware. 1. Receipting of Hardware IT Procurement is responsible for the following tasks: 1.1. Hardware items will be dropped by courier. The packaging should be inspected for damage and noted with courier on their paperwork. It is usual for a courier to request signature for proof of delivery IT Procurement will produce a Purchasing and installation slip and attach to the packaging. This provides information which will later be used to enter the item onto the IT Inventory within the Supportworks Helpdesk product. See: \\charlie\itdepartment\itordering and Installs\IT Procurement Officer\PURCHASING AND INSTALLATION INFORMATION.doc copy in Appendix A 1.3. For ad-hoc hardware installs a call should be logged on the Supportworks helpdesk system and allocated to the Desktop Installations support group. See: \\charlie\shared\itdepartment\ittech\documents\procedures\helpdesk\call Handling Process Using Supportworks.doc 1.4. Equipment should be moved still within packaging to the workshop area for preparation
4 2. Unpacking hardware Desktop Installations or 2 nd line support are responsible for the following tasks: 2.1 Unpack hardware items in a secure environment retaining the Purchasing and Installation slip (1.2). 2.2 Dispose of packing in green bins immediately to ensure work areas remain safe. Cardboard should be disposed of in designated cages (on trial by Portering as of Nov 08). Paying particular note to the fire escape route through the IT Workshop. 2.3 Apply Selectamark template to device in the established location see Appendix B. 2.4 Update the Supportworks inventory with the information detailed in the Purchasing and Installation slip (1.2) Log into Supportworks Click File Manage Assets Add New Complete the Asset details on tabs Asset, Owner, Procurement and click Add Record. For detailed information see Appendix C. 2.5 Items should be stored on the For Installation rack pending preparation. The Purchasing and Installation slip should remain attached. 3. Storing hardware for extended periods Where project or revenue funds are required to be spent (e.g. financial year end) there is sometimes a requirement to store hardware for extended periods. Particular consideration needs to be made to ensure the items are secure, tracked and reserved. The above processes should be undertaken and in addition: A designated area should be reserved to keep all items in one place. The IT Support Coordinator will give guidance where required. The shelf or racking should have an itemised list attached referencing the project name. This visually highlights what should be contained in the allocated space. Also acts as a quick check sheet and a visible deterrent from other team members moving items or using elsewhere e.g. spares. As items are deployed in the course of the project in addition to the Supportworks data being updated as per section 2. The item should also be crossed out on the paper list. 4. Managing deployed assets The IT Department is responsible for managing IT assets deployed within the Trust. The Supportworks inventory continues to be used for this function after deployment and data from this system may be presented in report form to IT management, Finance, Information Governance, a contractor, the Police in the event of theft and used for identifying items for replacement. It is therefore necessary to ensure any relocated equipment has details modified in the system Whilst carrying out a move as logged via the IT Helpdesk, obtain the destination room number and the department name if this changes
5 4.2 If this is a PC it s network name should be changed where a department change takes place. Other management systems reliant on the PC name should be updated to reflect this. Please see PC Deployment Procedure. 4.3 As part of the call complete the Supportworks inventory fields to reflect these changes: Department ; Room No and last moved date. 4.4 If by arrangement users are permitted to move their own equipment this information should still be gathered and updated. 5. Decommissioning and disposal of hardware The decommissioning of hardware should be carried out carefully to ensure accurate record keeping and patient confidentiality. Both Trust and legislative waste management policies should be adhered to ensure correct disposal including the WEEE directive; NHS IG protocols as well as guidance issued by the Information Commissioners Office. Read this procedure in conjunction with the PC Decommissioning Procedure which provides breakdown of the technical steps required. 5.1 Pre-disposal whilst assets are being decommissioned and stored Add assets to the current disposal list attached to the outer door of the IT workshop to include asset number; serial number; appliance number; hardware type; make/model; data asset serial number (e.g. hard disk within unit) Remove any patient demographic labels which are often found attached to monitors and dispose of in blue paper shredding bins For PCs/laptops ensure removable media is removed from floppy/cd-rom drives and that the media is returned to the user or disposed of securely Ensure that paper is removed from printers remember official headed paper could be used by another party to commit fraud against the Hospital. Printers which include job storage features (e.g. hard disks) must be flagged to receive confidential media treatment onsite as per PCs/laptops Hardware assets for disposal should be stored in IT Store 2 Room B on the left hand side. 5.2 Organising a disposal When an appropriate level of hardware items are collected the IT helpdesk Coordinator or IT Service & Quality Manager will make arrangements for a hardware disposal using an approved waste management company specialising in IT recycling and destruction of sensitive data, who will undertake CESG approved degaussing, wiping or shredding of data assets (any company used will have signed up to Trust developed contractual conditions and completed a 3 rd party confidentially agreement which will be held by the IG Manager. The contractor will also be Environment Agency registered to handle electronic waste) The IT Helpdesk Coordinator or IT Service & Quality Manger will work with a Helpdesk & Desktop support team member to prepare disposal: The paper list described in section will be checked against the store room contents and typed - 5 -
6 up and saved in the same location as the template with the filename in the format disposalcompanyname_currentdate.doc from the template - \\charlie\itdepartment\itordering and Installs\Hardware Sale and Disposal\blank list.doc (example given in Appendix E) Either the IT Helpdesk Coordinator or a nominated member of staff familiar with these procedures will assist the waste carrier on the day of collection to ensure removal of items, paperwork signed and protect items of value stored in the same area. Any cause for concern should be raised in the first instance with the IT Service & Quality Manager or the IG Manager Items disposed of should have asset records updated in Supportworks to show the department field as ** DISPOSED **, notes box to read Disposed of to xxxx where xxx is the waste carrier and the last moved date changed to the disposal date Management systems including IP address lists; Antivirus console; Active Directory and SMS should be updated to reflect disposal and ensure correct software licensing The IT Service & Quality Manager will a copy of the signed disposed listed items and the Waste Transfer Note provided by the Waste Carrier to the Operational Estates & Environment Manager a copy of the listed items to the Works Superintendent where the disposed items have an Appliance Number as these need to be flagged on the Estates PAT testing register Signed copies of the log paperwork should be filed in the Sale/Disposal of Obsolete IT Equipment folder held by the IT Service & Quality Manager. He will sample items on the list to verify they have been removed/updated on management systems. He will also retain waste transfer notes and supplier produced logs in the same file Quarterly waste summary information will provided by the IT Service & Quality Manager to the Operational Estates & Environment Manager for their ERIC returns. Appendix A -IT Purchasing and installation information slip: PURCHASING AND INSTALLATION INFORMATION Order Number: WSH 1 Supplier: 2 Warranty Start Date: 3 Warranty Period: 4 Purchase Price: 5 1 Order number is supplied from the Powergate IT Procurement System 2 As purchased 3 Date of delivery 4 As guaranteed by the supplier or manufacturer which ever is longer 5 The price per unit - 6 -
7 Funding Source: 6 Requires PA Testing: YES NO 7 Installation Details: 8 6 Central IT Budget; Capital Project; Trust Funds; PCT; Friends of the Hospital Fund; 3 rd Party Recharge 7 Any item that has a power plug and can be moved e.g. PC, printer is classed as portable and therefore should be marked for PAT testing. 8 Additional supporting comments to help Installations team e.g. user contact, known room no
8 Appendix B Marking process Below describes the standard positioning of asset marking on equipment. It is important to maintain the positions as users are used to these when calling the Helpdesk to report IT incidents. Where equipment is made of dark coloured plastic e.g. black Dell computer cases use white compound. Where the equipment is light coloured (silver; white; beige) use blue compound. Process 1. Tear off template backing. 2. Apply the label to the appropriate position on the new equipment. 3. Apply blue or white compound as suited to the colour of the equipment casing. 4. Carefully peel off the template 5. Allow to dry. If the equipment is to be moved be aware of the marking
9 Printer Asset Positions Right hand side of printer Monitor Asset Positions Top edge of monitor centred. Base Unit Asset Positions Mini Tower Cases and Dell Desktop form factor Top edge of base unit so it is visible standing under a desk. Ultra Small Form Factor Front panel beneath CD drive
10 Laptop Positions Area beneath keyboard to the right of the mouse control. Appendix C Supportworks inventory data fields Inventory records to complete within the Supportworks helpdesk system: Asset Tab
11 Owner Tab Procurement Tab
12 Appendix D CfH Printer Disposal Guidelines 20-%20Digital%20Printers%20Copiers%20and%20Multi%20Function%20Devices.pdf
13 Appendix E IT Equipment Transfer Certificate IT Equipment Transfer Certificate This certificate has been issued to the following person upon transfer of ownership of redundant IT equipment from the Trust. Issued to :.. Date : Line No. Asset No. Serial No. Appliance No. Hardware Type. Specification/Make/Mod el Data Asset S/N (Hard disk) Please keep this certificate for proof of transfer. The following items of IT Equipment have been sold or donated to you as redundant/scrap hardware. They are supplied as seen, with no guarantee on their reliability. The West Suffolk NHS Foundation Trust accepts no responsibility for use of these items outside the Trust after you have signed this document in agreement and taken the equipment away. N.B. These items are sold without Windows. The PC s do not have a modem or Internet connection. The IT Department regret that we are unable to provide any support or advice. The hardware is sold As seen Authorised by:. Position: Signed:.Date: / /. Accepted by:. Signed:.Date: / /
Appendices Device Destruction/ Disposal process 7
IM&T Electronic Information Security Policy Classification: Policy Lead Author: Jym Bates, Head of Information Assurance Additional author(s): N/A Authors Division: Corporate (IM&T) Unique ID: TI4(09)
More informationWalton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.
Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationPolicy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media
Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.
More informationHow To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationOUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES
SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning
More informationSecure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
More informationManagement of Assets Policy
CREST Management of Assets Policy Version No: Reason for Update Date of Update Updated By 1 Policy introduced April 2012 Finance Office 2 Review incorporates IT Security Internal Audit review February
More informationSOAS Controlled Procedure CP-PP06 IT Asset Management Procedure
SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the
More informationManagement of Assets Procedure
Management of Assets Procedure Contents 1 Introduction... 3 2 Fixed Assets Register... 3 3 Inventory Registers... 3 4 Capital Asset Purchase... 7 5 Asset Physical Verification... 7 6 Asset Disposal...
More informationPAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
More informationMobile Device Policy
Mobile Device Policy Purpose of this Document This document describes the policy for the management of mobile devices. This document will be reviewed every 12 months Author: Matt Mason Version: 1.1 Date:
More informationData Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
More informationEssex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion
Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action
More informationUniversity of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
More informationREMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationService Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)
APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance
More informationManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
More informationCCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
More informationRemote Access and Home Working Policy London Borough of Barnet
Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and
More informationBOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy
BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy
More informationFujitsu Asset Lifecycle Management Services
Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools
More informationUniversity of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
More informationSECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
More informationLocal Enhanced Service Specification for the Supply of Pharmaceutical Services to Care Homes through Community Pharmacy
Local Enhanced Service Specification for the Supply of Pharmaceutical Services to Care Homes through Community Pharmacy Contents: 1. Introduction and purpose 2. Period of Service 3. Aim of the Service
More informationINFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing
More informationAsset Management Policy
Asset Management Policy Issue Date: August 2011 Author: Head of Finance Approval Body: Senior Leadership Team CONTENTS Page 1. Policy Statement 3 2. Scope 3 3. Definitions 3 4. Accountabilities and Responsibilities
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing
More informationULSTER COUNTY COMPTROLLER S OFFICE Elliott Auerbach, Comptroller
ULSTER COUNTY COMPTROLLER S OFFICE Elliott Auerbach, Comptroller July 28, 2015 Review of Internal Controls over IT Equipment The mission of the Ulster County Comptroller s Office is to serve as an independent
More informationAMS Asset Management Redkite Asset Management System When only the best will do.
Defects AMS Asset Management Redkite Asset Management System When only the best will do. Redkite Systems Ltd 2014 AMS Overview You ll wonder how you managed without it! What can I record on Redkite AMS?
More informationIT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
More informationInformation & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
More informationwww.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
More informationBusiness Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
More informationDell Service Description
Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service
More informationPORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT. Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL
Page 1 of 1 PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL This revision supersedes all previous revisions.
More informationNHS Business Services Authority Records Management Audit Framework
NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationHow To Inspect A Blood Bank
Site visit inspection report on compliance with HTA minimum standards Belfast Cord Blood Bank HTA licensing number 11077 Licensed for the procurement, processing, testing, storage, distribution and import/export
More informationStandard Operating Procedure for Archiving Essential Documentation relating to Clinical Trials of Investigational Medicinal Products (CTIMPs)
archiving\spon_s21_sop_for_archiving V02.doc Page 1 of 13 Standard Operating Procedure for Archiving Essential Documentation relating to Clinical Trials of Investigational Medicinal Products (CTIMPs) SOP
More informationUniversity of St Andrews. Unit Income and Cash Handling Policy
University of St Andrews Unit Income and Cash Handling Policy Last reviewed 17 September 2014 CONTENTS page 1 Introduction and Policy Statement 3 2 Cash Free Units 3 3 Securing Cash 3 4 Receipting Cash
More informationPolicy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
More informationDetermine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections.
IT Office Move - Tips and Check List: Office IT Move Plan Introduction: If you are moving to a New Office and/or Data Center (Cloud), or if this is also a Colocation exercise please note this is a basic
More informationAGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader
AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION
More informationDERBYSHIRE COUNTY COUNCIL. Cabinet. 28th November 2006. Report of the Deputy Chief Executive and Strategic Director Corporate Resources
DERBYSHIRE COUNTY COUNCIL Cabinet 28th November 2006 Report of the Deputy Chief Executive and Strategic Director Corporate Resources County-wide PC Commissioning Unit (Strategic Policy and Budget) 1. PURPOSE
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationOverview. Responsibility
Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed
More informationAsset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
More informationAssociated Files: Managing resources. Expected Duration: 2 hours
Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business
More informationHome Working Policy Version Date Status Comments
Home Working Policy Version Date Status Comments 1.0 June 2010 Draft 1.0 August 2010 Draft Policy sent out for consultation via JCC and Corporate Bulletin Board. 1.0 November 2010 Final Resources Portfolio
More informationPhysical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
More informationInformation Governance Policy
Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route
More informationProtection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
More informationTenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08
- Basic Rancho Cordova Data Center Tenant Guide 2014-08 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 PURPOSE... 3 2 COMPUTER ROOM GUIDELINES... 4 2.1 GENERAL SITE GUIDELINES... 4 2.2 CABINET GUIDELINES...
More informationArdington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.
Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference
More informationYMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY
YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September
More informationAsset Register. 1.2 Definitions
Asset Register 1.2 Definitions Asset is something that is owned by the business that can be converted to cash. Asset management is the system that monitors and maintains the assets of the business. 1 A4
More informationCCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
More informationMFX RELOCATIONS. Data Centre & Computer Room Relocations
MFX RELOCATIONS MFX Relocations is our specialist relocation division and can undertake any type of commercial move but also undertakes specialist moves which includes:- Specialist IT relocations (Data
More informationINFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
More informationWaste Management Policy
HEALTH AND SAFETY ISSUES Waste Management Policy Policy No: 39 Date of issue: October 1998 Review Dates: August 2001, December 2003, July 2008 Date to be Reviewed: July 2010 Page 1 of 13 Date of Issue:
More informationAberdeen City Council IT Asset Management
Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
More informationPurpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)
Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment
More informationBARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY
Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March
More informationInformation Security Policy
Information Security Policy Version August 23, 2010 1 of 8 Table of Contents Introduction Ethics and Acceptable Use Policies Usage Policy Disciplinary Action Protect Stored Data Restrict Access to Data
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationSecurity guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants
2014 Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants This document provides general advice and guidance on security
More informationSo the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
More informationBreckland Council. Printing Strategy
Breckland Council Printing Strategy Version: 0.1 November 2009 Document control Version history Version Date Comments 1(Draft)_0.1 1 December 2009 First Draft Publishers Reference: Author Kevin Taylor
More informationINFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
More informationSERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
More information3. Specification. Tender No. 1716 Tender Name: Panel for External Printing Services 49
3. Specification Tender Name: Panel for External Printing Services 49 Specification 1. Introduction The Port Phillip City Council ( the Council ) invites tenders from suitably experienced organisation(s)
More informationIxion Group Policy & Procedure. Remote Working
Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises
More informationRECORDS MANAGEMENT FRAMEWORK
RECORDS MANAGEMENT FRAMEWORK Policy Number: 253 Supersedes: Standards For Healthcare Services No/s 1, 19, 20 Version No: Date Of Review: Reviewer Name: 1.1 Nov 2011 Alison Gittins 1.2 Mar 2015 Alison Gittins
More informationDATA SECURITY POLICY. Data Security Policy
Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.
More informationTRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
More informationINFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
More informationHow To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
More informationDacorum Borough Council Final Internal Audit Report
Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service
More informationSt Hugh s School. Remote Access Policy
St Hugh s School Remote Access Policy Remote Access Policy v1.0 17/11/15 Item Title Page number 1.0 Introduction 2 1.6 Definitions 2 2.0 Scope and limitations 3 3.0 Available remote services 3-4 4.0 Method
More informationIntroduction to the NHS Information Governance Requirements
Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely
More informationLouisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
More informationRemote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More information2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report.
REPORT TO: SCRUTINY COMMITTEE 25 JUNE 2013 REPORT ON: REPORT BY: INTERNAL AUDIT REPORTS CHIEF INTERNAL AUDITOR REPORT NO: 280-2013 1.0 PURPOSE OF REPORT To submit to Members of the Scrutiny Committee a
More informationShredding. Security. Recycling
Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Medical Devices Management Policy Version: 10 Reference Number: CO16 Supersedes Supersedes: Version 9 Description of Amendment(s): Originator Addition of 4.8 Sharps
More informationNew Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS Page No. INTRODUCTION... 3 PURPOSE... 3 SCOPE... 3 POLICY... 3 INFORMATION TECHNOLOGY EQUIPMENT... 3 INVENTORY... 4 EQUIPMENT RECEIVED BY ITS DEPARTMENT... 4 EQUIPMENT RECEIVED
More informationBusiness Continuity Management For Small to Medium-Sized Businesses
Business Continuity Management For Small to Medium-Sized Businesses Produced by NORMIT and Norfolk County Council Resilience Team For an electronic copy of this document visit www.normit.org Telephone
More informationTEWKESBURY BOROUGH COUNCIL
TEWKESBURY BOROUGH COUNCIL Report to: Executive Committee Date of Meeting: 4 July 2012 Subject: Report of: Director: Lead Member: Number of Appendices: Replacement of the Council s Telephone System Tina
More informationFIXED ASSET AND INVENTORY TRACKING
Rev. April, 2013 FIXED ASSET AND INVENTORY TRACKING I. INTRODUCTION Asset inventory and tracking systems are an essential part of maintaining control of an organization=s assets. It documents ownership
More informationRecords Management Policy
Records Management Policy Document information Document type: Operational Policy Document title: Records Management Policy Document date: November 2014 Author: NHS South Commissioning Support Unit, Information
More informationPOLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
More informationThe guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
More informationSite visit inspection report on compliance with HTA minimum standards. London School of Hygiene & Tropical Medicine. HTA licensing number 12066
Site visit inspection report on compliance with HTA minimum standards London School of Hygiene & Tropical Medicine HTA licensing number 12066 Licensed under the Human Tissue Act 2004 for the storage of
More informationINFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationLSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
More information