ECU Technology Governance Guidelines
|
|
- William Hill
- 7 years ago
- Views:
Transcription
1 ECU Technology Governance Guidelines These guidelines must be read in conjunction with the ECU Technology Governance Policy. Intent Organisational Scope Definitions Objectives of Technology Governance Guideline Content Accountabilities and Responsibilities for Guidelines Related Documents Contact Information Approval History 1. INTENT 1.1 The aim of the Technology Governance guidelines is to provide detail on the operation of Technology Governance across the University. The guidelines outline how the framework, governing bodies, processes and controls integrate with ECU s annual planning cycle and how they will be used to enable ECU to meet its strategic objectives. 1.2 Any change or modification to ECU s, information, application and infrastructure architectures will be required to comply with ECU technology governance processes and controls as described in these guidelines and associated processes 2. ORGANISATIONAL SCOPE ECU Technology Governance encompasses all areas of ECU. 3. DEFINITIONS ii
2 TERM/ABBREVIATION DEFINITION Information Technology Roadmap Information Technology Architecture Information Technology Architecture Principles ITIL FBSC PMO RASC SAMF AAB CAB ITGC SAB SLA SAMF Explains the path of the current state to the desired state and is the basis for planning and decision-making for Technology investment. A structured multi-layered approach to the design of Information Systems. The guiding principles to inform investment in Technology decisions. Information Technology Infrastructure Library a set of practices for IT service management that focuses on aligning IT services with the needs of the business. Finance and Business Service Centre Program Management Office Risk Assurance Service Centre Strategic Asset Management Forum Architecture Advisory Board Change Advisory Board IT Governance Committee Service Advisory Board Service Level Agreement Strategic Asset Management Forum For consistency all acronyms will be used throughout the document iii
3 4. OBJECTIVES OF TECHNOLOGY GOVERNANCE ECU technology governance encompasses all areas of ECU and supports the strategic, operational and technical decision-making processes required to make sure technology enables the University to deliver its objectives. The key objectives of technology governance are: 4.1 At the Strategic Level: Appropriately skilled people make decisions; Technology decisions guided by enterprise architecture principles; Proposals will reflect the total cost of ownership; Technology related risks managed within the University's risk framework. 4.2 At the Change Delivery Level: Technology projects will be managed as one, i.e. people, business process, technology; The ITSC Program Management office will have oversight of technology related projects; Appropriate project methodologies will be applied, including checkpoints and controls for effective monitoring. 4.3 At the Operational Level: Services delivered in accordance with policies; The defined services delivered to the agreed service levels; Controls and process in place to minimise the risk of business disruption; Information assets are secure. iv
4 5. GUIDELINE CONTENT Technology at the University is governed through a collection of tools, templates, committees, processes, decision delegations and controls at the strategic, change and operational levels across the University. This guideline seeks to provide a summary view of these. 5.1 ECU Technology Governance Framework and Governing Bodies The ECU governance framework and governing bodies incorporates input to technology requirements by all areas of the University. 5.2 Responsibilities for Technology Governance The University Strategic Plan, the target technology architectures and roadmap together with the University technology architectural principles will inform Technology Governance at all levels. The following provides further direction to key stakeholders in respect of Technology Governance IT Governance Committee The objective of the ITGC is to make sure that University wide compliance to technology governance is addressed in a structured manner and recommendations made to the SAMF are based on sound governance practices that have been designed to deliver the University s objectives for Information Technology. The ITGC will meet bimonthly or as required, with additional meetings in the July/August timeframe to accommodate the investment prioritisation process and make decisions on competing priorities Project Board The role of the Project Board is to make sure that the project is delivered to the specifications set out in the Business Case Office of the CIO On behalf of the ITGC, the Office of the CIO is custodian of the University s technology governance and monitors compliance to all aspects including: Implementing and maintaining effective and relevant reporting for all levels of Governance; Acting as custodian of the architectures and roadmap; Negotiation and approval of all technology related contracts; The primary contact for all vendors who provide technology related services or products. A number of Boards operate within the Office of the CIO with specific responsibility for governance for the three areas of service provision. These are: The Architecture Advisory Board - The role of the AAB is to make sure ECU wide compliance to the ECU enterprise architecture and roadmap and to make recommendations to the BIG on technology investments. The Change Advisory Board - The role of the CAB is to minimise negative impacts of change to ECU s production environment through the use of change governance processes and controls. The Service Advisory Board - The SAB monitors the performance of the ECU production environment against the service levels established through the Service v
5 Catalogue and makes recommendations to the ITGC on areas for service improvement. 5.3 Technology Governance Processes and Controls Strategic Technology Governance process The strategic technology governance process defines the decision-making rights and controls that take place between the business idea and the decision to fund and initiate the work as a project. The process is underpinned by a number of detailed processes and controls to enable effective Technology Governance. These include: Enterprise architectures and roadmaps; Policies and Guidelines; Technology risk profile; Planning cycle and prioritisation process; ECU procurement guidelines; Monitoring, measurement and reporting. The planning cycle and prioritisation process is an important aspect of Governance as it identifies those investments that best support the achievement of ECU s strategic goals in a resource constrained environment Change Delivery Technology Governance Process The change delivery process commences once work has been approved, funded and scheduled. A high level process flow described below is supported by a number of detailed Governance processes and controls which include: PMO; Defined Project Methodology; Project stage gate reviews and project audits; Monitoring, measurement and reporting; ITIL Change Management Operational Technology Governance Process The Operational process commences once the production warranty period has been completed. A high level process is supported by a number of governance processes and controls which include: Service Catalogue and Service Level Agreements; ITIL processes and controls; Operational Policies and Standards; Disaster recovery plans and tests; Monitoring, measurement and reporting. vi
6 6. ACCOUNTABILITIES AND RESPONSIBILITIES FOR GUIDELINES Guidelines Owner The Chief Information Officer is custodian of the University s governance over technology and on behalf of the ITGC, has overall responsibility for the content of this guideline and its operation in ECU. 7. RELATED DOCUMENTS: 7.1 The Guideline supports the following Policy: ECU Technology Governance Policy 7.2 Other documents which are relevant to the operation of this Guideline are as follows: Information Technology Architecture Guiding Principles Strategic Procurement Policies, Guidelines and Procedures. Terms of References covering the following Advisory Boards AAB, CAB and SAB. Terms of Reference covering the Project Board. 8. CONTACT INFORMATION For queries relating to this document please contact: Guideline Owner Chief Information Officer All Enquiries Contact: Manager IT Strategy & Planning Services Telephone: address: ITSCStrategy&PlanningServices@ads.ecu.edu.au 9. APPROVAL HISTORY Guidelines Approved by: Date Guidelines First Approved: Date last modified: Revision History: Next Revision Due: TRIM File Reference vii
R U N D O. The ECU Technology Governance Framework A brief guide
PLAN R U N D O DO The ECU Technology Governance Framework A brief guide The ECU Technology Governance Framework A brief guide The ECU Technology Governance Framework is made up of a set of processes, effected
More informationIT Change Management Policy
Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.
More informationITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary
More informationInformation and Communication Technology
Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication
More informationRoles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
More informationU.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
More informationISO/IEC 20000 ITIL Service Management V.2 V s V.3 Project ACE Andy Evans Programme Director and Strategic Programme Advisor
ISO/IEC 20000 ITIL Service Management V.2 V s V.3 Project ACE Andy Evans Programme Director and Strategic Programme Advisor Introduction Andy Evans 7 years with the Global Brand Leader in IT Service Management
More informationSpecialist Cloud Services Lot 4 Cloud EDRM Consultancy Services
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 5.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationThe Value of ITAM To IT Service Management. Presented by Daryl Frost. Copyright Burswood Information Solutions Limited 2015
The Value of ITAM To IT Service Management Presented by Daryl Frost What The!! We buy all this IT equipment Where is it!! How much are we buying it seems to cost a fortune! Are we getting any value from
More informationNSW Data & Information Custodianship Policy. June 2013 v1.0
NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...
More informationHow To Manage A Disruption Event
BUSINESS CONTINUITY FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational
More informationSpecialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4
More informationGoverning and optimising the design, build and run of new generation IT services
Governing and optimising the design, build and run of new generation IT services harold.petersen@uxcconsulting.com.au www.uxcconsulting.com.au Leadit Conference, Melbourne 13-15 August 2014 Harold Petersen
More information1 Why should monitoring and measuring be used when trying to improve services?
1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve
More informationBring Your Own Device Assessment
Lot 4 Service Specification Bring Your Own Device Assessment OVERVIEW Bring Your Own Device (BYOD) is the fastest growing mega trend in the IT industry. CIOs are under pressure as employees demand to use
More informationBlue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com
Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and
More informationRelease: 1. BSBCCO407A Administer customer contact technology
Release: 1 BSBCCO407A Administer customer contact technology BSBCCO407A Administer customer contact technology Modification History Release Release 1 Comments This version first released with BSB07 Business
More informationEmergency Management and Business Continuity Policy
www.surreycc.gov.uk Making Surrey a better place Emergency Management and Business Continuity Policy 4 TH EDITION June 2011 Title Emergency Management and Business Continuity Policy Version 4.0 Policy
More informationInformation Technology Services Core Services SLA
Information Technology Services Information Technology Services Core Services SLA This Service Level Agreement defines the levels of service provided by Information Technology Services to Victoria University
More informationAPPENDIX 50. Enterprise risk management - Risk management overview
APPENDIX 50 Enterprise risk management - Risk management overview Energex regulatory proposal October 2014 ENTERPRISE RISK MANAGEMENT Risk Management Overview (RMO) 06 11 2013 Table of Contents 1. INTRODUCTION...
More informationAgenda. Introduction to IT Governance Swinburne s IT Governance suite Working under IT Governance IT Architecture
IT Governance Agenda Introduction to IT Governance Swinburne s IT Governance suite Working under IT Governance IT Architecture Agenda Introduction to IT Governance Why do we need IT Governance policies?
More informationA print infrastructure that guarantees efficiency, productivity and cost savings.
A print infrastructure that guarantees efficiency, productivity and cost savings. Managed Print Services you can A Canon Managed Print Service genuinely manages your print environment to deliver significant
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationWhat s the Path? Information Life-cycle part of Vendor Management
Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered
More informationProject Governance. New Corporations Unit (NewCo) PWC Structural Separation Program
New Corporations Unit (NewCo) Department of the Chief Minister Level 14, NT House, 22 Mitchell Street, Darwin PWC Structural Separation Program Project Governance January 2014 Table of Contents 1. Introduction...
More informationSenate. SEN15-P17 11 March 2015. Paper Title: Enhancing Information Governance at Loughborough University
SEN15-P17 11 March 2015 Senate Paper Title: Enhancing Information Governance at Loughborough University Author: Information Technology & Governance Committee 1. Specific Decision Required by Committee
More informationInformation Technology Governance Overview and Charter
Information Technology Governance Overview and Charter Prepared by: Project #: Date submitted Document version: IT Governance Charter v03.05.2012 1.0 48.0 - Page 1 of 34 Document History Version Date Author
More informationAn example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com
An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM
More information_experience the commitment TM. Seek service, not just servers
The complete cloud Creating and preserving cloud savings, security and service quality transition planning and service management ABOUT THIS PAPER Creating and preserving cloud infrastructure savings,
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationSince its inception, the PMO has functioned to support government entities in implementing project management practices through the:
South Carolina IT Project Management Office Executive Summary As the benefits offered through the use of project management became more apparent to public and private institutions, governmental entities
More informationWhich statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
More informationPosition Description
Position Description Position Title: Group/Division/Team: WebCenter / UCM Technical Support Business Technology Services Group / IT Operations Division Date: December 2011 Reports To: Roles Reporting To
More informationRole Reporting Information. Role Family Analyst (Why the family exists and how it adds value to EnergyAustralia)
Role Reporting Information Role Title Business Analyst Position Number Role Reports Directly To Practice Leader EnergyAustralia Group Executive Manager Chief Information Officer Date 10/08/2015 Role Family
More informationService Integration &
This is a DRAFT document, being published for review & comment The content is therefore subject to change & revision This document is part of the XGOV Strategic SIAM reference set Service Integration &
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.2 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationThe joint EU Telematics governance model
The joint EU Telematics governance model The joint EU Telematics governance model EU Telematics Management Board The EU Telematics Management Board provides the vision for, and strategic oversight of,
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 4.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationIT Organisation in Change
IT Organisation in Change ENTERPRISE SOFTWARE ENGINEERING & SOFTWARE ENGINEERING IN THE ENTERPRISE IT change Quality of IT s Costs of IT s change Future Now Perfect IT s Business Demands Can we deliver?
More informationGuideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
More informationASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
More informationGuidelines for Best Practices in Data Management Roles and Responsibilities
Guidelines for Best Practices in Data Management Roles and Responsibilities September 2010 Data Architecture Advisory Committee A subcommittee of Information Architecture & Standards Branch Table of Contents
More informationCITY OF HOUSTON. Executive Order. Information Technology (IT) Governance
CITY OF HOUSTON Executive Order E.O. No: 1-44 Effective Date: December 20, 2012 1. AUTHORITY 1.1 Article VI, Section 7a, of the City Charter of the City of Houston. 2. PURPOSE 2.1 The City of Houston seeks
More informationContract management roles and responsibilities
Contract management roles and responsibilities This White Paper describes the formal arrangements for managing the relationship with the provider through a demand and supply organization. This is a governance
More informationFoundation. Summary. ITIL and Services. Services - Delivering value to customers in the form of goods and services - End-to-end Service
ITIL ITIL Foundation Summary ITIL and s Design s - Delivering value to customers in the form of goods and services - End-to-end ITIL Best Practice - Scalable and not prescriptive - Gathered from Users,
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationRole Description Enterprise Architect and Solutions Delivery Manager
Role Description Enterprise Architect and Solutions Delivery Manager Cluster Agency Division Location Classification/Grade/Band Kind of Employment NSW Health Cancer Institute NSW Information Technology
More informationPOSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas
POSITION DESCRIPTION Position Title Manager, Technical Services Support Position Number Reports to Manager Technology Services Functional Auth HRM Auth Region IT Services Centre Head Office Date Feb 2011
More informationInformation Management Service Catalogue October 2012 Version 1.2
Information Management Service Catalogue Page 1 of 47 Information Management Service Catalogue October 2012 Version 1.2 Author: Information Management Group Contact Details: Chief Information Officer (CIO)
More informationOverview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
More informationWhat are the three types of metrics that an organization should collect to support Continual Service Improvement (CSI)?
ITIL Foundation mock exam 1 1. The Process Owner is responsible for which of the following? 1. Documenting the process 2. Defining process Key Performance Indicators (KPI) 3. Improve the process 4. Perform
More informationBusiness Continuity & Crisis Management
Group Standard Business Continuity & Crisis Management The need to plan and respond effectively is critical to the successful management of any crisis situation. Business Continuity Management is the holistic
More informationCorporate Governance Framework June 2015
Corporate Governance Framework June 2015 This publication has been compiled by Don Clunes of the Office of the Director-General, Department of Energy and Water Supply. State of Queensland, 2015. The Queensland
More informationTECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
More informationJoint ICT Service ICT Strategy 2014-17
Document History Document Location This document is only valid on the day it was printed. The source of the document will be found in (see footer) Revision History Date of this revision: 19 th May 2014
More informationDisaster Recovery Policy
Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is
More informationITSM Process Maturity Assessment
ITSM Process Maturity Assessment April 2011 Prepared by: Brian Newcomb TABLE OF CONTENTS Executive Summary... 3 Detailed Assessment Results and Recommendations... 5 Advisory Group Survey Results (External
More informationSocial Sciences and Humanities Research Council of Canada
Social Sciences and Humanities Research Council of Canada Annex to the Statement of Management Responsibility including Internal Control over Financial Reporting (Unaudited) Fiscal year 2014-15 Table of
More informationN e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
More informationBusiness Continuity Plans
Version Number Issue 2 Business Continuity Policy Date Revision Complete Policy Owner Author Reason for Revision Proof Read April 2016 Business Improvement Manager Emma Earle, Business Services Officer
More informationEdith Cowan University. Document and Records Management Procedure. Safety and Employment Relations..
Document and Records Management Procedure Procedure Owner: Director Human Resources Services Centre Keywords: 1) Document 2) Records 3) Health and Safety TABLE OF CONTENTS 1. INTENT... 1 2. ORGANISATIONAL
More informationRISK AND COMPLIANCE COMMITTEE CHARTER
1. GENERAL SCOPE AND AUTHORITY 1.1 Introduction This charter governs the operations of the Risk & Compliance Committee of Redflex Holdings Limited (RHL or Company). 1.2 Purpose The Risk & Compliance Committee
More informationCACI Cloud Consulting Services
Index 1. Summary... 3 2. Services provided... 3 2.1. Advisory... 3 2.2. Strategy and Architecture... 4 2.3. Cloud Application Development... 7 2.4. Cloud Service Management... 8 3. Pricing... 10 Page 2
More informationESKISP6046.02 Direct security architecture development
Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable
More informationITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
More informationehealth Architecture Principles
ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:
More informationAUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE
AUDIT OF INFORMATION TECHNOLOGY Management (Action Plan) Responses February 2005 # PRIORITY DESCRIPTION MANAGEMENT RESPONSE Ref: Chapter 3.1 GOVERNANCE FRAMEWORK Information Technology Steering Committee
More informationRISK MANAGEMENT FRAMEWORK
RISK MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational Development
More informationProtecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
More informationCHAPTER 2016-138. Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033
CHAPTER 2016-138 Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033 An act relating to information technology security; amending s. 20.61, F.S.; revising the
More informationProcurement Solutions. Business Plan 2013 18
Procurement Solutions Business Plan 2013 18 CONTENTS Vision 1 We will 1 Procurement Solutions Business Values 2 Probity 2 Innovation 2 Transparency 2 Flexibility 2 Equity 2 Professionalism 2 Our Strategic
More informationPOSITION PROFILE. Classification: PM4 Date of evaluation: February 2010 Date Reviewed: March 2012
POSITION PROFILE Position Title: Infrastructure Position Number: 125692 / Leader: Service Delivery Business Unit: Location: Service Delivery Brisbane Classification: PM4 Date of evaluation: February 2010
More informationInformation Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
More informationBusiness Continuity Management Policy
Governance: Business Committee Policy Owner: Chief Superintendent, Corporate Services Department: Corporate Services Policy Number: 002 Version: 3.0 Policy Writer: Business Continuity Co-ordinator Effective
More informationConfident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
More informationDefining a Governance Model for Portals
Defining a Governance Model for Portals Tushar Sachdev The need for governance While implementing portals, the focus is often only on technology. The implicit assumption being that the portal is yet another
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
More informationService Level Management
Process Guide Service Level Management Company ABC Service Improvement Program (SIP) Process Guide Service Level Management Table of Contents Document Information... 3 Approval... 4 Section 1: Process
More informationICAICT704A Direct ICT in a supply chain
ICAICT704A Direct ICT in a supply chain Release: 1 ICAICT704A Direct ICT in a supply chain Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
More informationIT Governance. Key Initiative Overview
Michael Gerrard Research Vice President and Distinguished Analyst IT governance addresses two major topics: demand governance ( doing the right things ) and supply-side governance ( doing things right
More informationAmbulance Victoria. Position Description
Position Description Position Title: Data Management Specialist Reports To: Manager Infrastructure Division: Information and Technology Department: Service Management Direct Reports: Nil Employment Conditions:
More informationDHHS Directive Number II-12
DHHS Directive Number II-12 Title: Delegation of Authority to the Director, Division of Information Resource Management Effective Date: November 3, 2008 Revision History: January 1, 2002 Authority: G.S.
More informationCONTRACT MANAGEMENT POLICY
CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of
More informationWhat Every Project Manager should know about ITIL s Service Lifecycle Framework. Daniel Cayouette PMP - daniel@cayouette.
What Every Project Manager should know about ITIL s Lifecycle Framework Daniel Cayouette PMP - daniel@cayouette.com Sept 19, 2009 1 Presentation Objectives This presentation will provide a high-level view
More informationBYOD / Mobile Strategy Alchemmy Service for G-Cloud 7
BYOD / Mobile Strategy Alchemmy Service for G-Cloud 7 Page 1 of 8 Contents Service Overview...3 Complementary Services...4 Pricing...5 About Alchemmy...6 Our Services...7 Contact Us...8 Page 2 of 8 Service
More informationPosition Title: Management Info Chief. Working Title: Technical Project Management Section Chief
Position Title: Management Info Chief Working Title: Technical Project Management Section Chief This management position directs the operational activities of the Project Management Office whose mission
More informationFree ITIL v.3. Foundation. Exam Sample Paper 3. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass
Free ITIL v.3. Foundation Exam Sample Paper 3 You have 1 hour to complete all 40 Questions You must get 26 or more correct to pass Compliments of Advance ITSM www.advanceitsm.com 1 A Service Level Package
More informationENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving
More informationA. This Directive applies throughout DHS, unless exempted by statutory authority.
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department
More informationService Support. Change
Service Support Change Management ITIL Change Management - 1 Module Objective Define the scope of the Service Support function of Change Management in the IT Infrastructure Library (ITIL) Provide an overview
More informationCollege Governance Statement of Principles, Scheme of Delegation and Terms of Reference
College Governance Statement of Principles, Scheme of Delegation and Terms of Reference 1. Principles: 1.1 Background This document sets out the principles underpinning the College Corporation s work.
More informationBetter Practice Guide
Better Practice Guide June 2008 Risk Management COMCOVER Commonwealth of Australia 2008 ISBN 1 921182 78 4 print ISBN 1 921182 79 2 online Department of Finance and Deregulation This work is copyright.
More informationCorporate Governance. lan 2013 2015 Stewardship Dcis Values Internal Controls Professiona
orporate Governance Framework Leadership Innovation Budget Mana olicy & Legislation Transparency Corporate Statement Ethical Behavio lan 2013 2015 Stewardship DCIS Values Internal Controls Profession xceed
More informationCOMMONWEALTH OF MASSACHUSETTS
COMMONWEALTH OF MASSACHUSETTS Implementation Roadmap February 2003 February 2003 Page 165 of 191 February 2003 Page 166 of 191 A. INTRODUCTION The findings and recommendations of the Enterprise IT Strategy
More informationJob Description Solutions Lead
Solutions Lead Department: Group: Direct Line Manager: Direct Reports: Business Support Manager - Information Services Database Applications Analyst, Technical Business Analyst Delegations: Primary Location:
More informationNovember 12, 2015. I.T. Change Management Why Bother?
November 12, 2015 I.T. Change Management Why Bother? Why do it? The true intent of your I.T. Change Management process is to: a) Pass an Audit or b) Mitigate Risk to the Business Mitigate Risk to the Business
More informationRequest for Proposal. Supporting Document 3 of 4. Contract and Relationship Management for the Education Service Payroll
Request for Proposal Supporting Document 3 of 4 Contract and Relationship December 2007 Table of Contents 1 Introduction 3 2 Governance 4 2.1 Education Governance Board 4 2.2 Education Capability Board
More informationNSW SENIOR EXECUTIVE SERVICE
NSW SENIOR EXECUTIVE SERVICE NSW DEPARTMENT OF EDUCATION AND TRAINING Position Description POSITION DETAILS Position Title: Reports to: Location: Directorate: Chief Financial Officer Deputy Director-General,
More informationSuperseded by T MU AM 04001 PL v2.0
Plan T MU AM 04001 PL TfNSW Configuration Management Plan Important Warning This document is one of a set of standards developed solely and specifically for use on the rail network owned or managed by
More information