Enterprise Information Management & Governance in Statoil
|
|
- Gavin Shields
- 7 years ago
- Views:
Transcription
1 Enterprise Information Management & Governance in Statoil Liv Stordahl Borud, Senior Analyst IT Solutions
2 Content About Statoil Enterprise Information Management Definition and framework Our approach Strategy Organization and roles Policy and process Monitoring and follow up Summary 2
3 About Statoil employees in 35 countries Operates 80% of all oil and gas production in Norway World leader in crude oil sales World s largest operator in waters deeper than 100 meters World leader carbon storage and CO 2 efficiency in oil and gas production 3
4 Enterprise Information Management Definition: A structured program for managing information as a strategic asset (DAMA 2011) In Statoil: Information Management shall be an integrated part of the businesses and processes across our company. To ensure coordination and benefits, a common approach to Information Management is established. 4
5 Enterprise Information Management Frameworks DAMA Framework (Data Management Association, 2009) February 2011 Forrester s Data Management Reference Architecture The Data Management Functional View 5 IBM s Information Governance model
6 IM Strategy Focus on business critical information with necessary quality Ensure that our valuables are not compromised or that the information is misused Appropriate access to information for collaboration 6
7 IM Organisation and roles Corporate IT: IM Strategy, policy, requirements and best practice Process owners: Supporting tools and IM requirements in their process Business areas: Ensure that requirements are implemented and monitored Service provider (GBS): Deliver and support CEO Processes: COA CFO Legal CSO CCOM DPN DPI DPNA MPR TPD EXP GSB
8 IM Professionals in Statoil Subsurface data management Document management in projects LCI network Master data management Collaborative information 8
9 Enterprise Information Model Enterprise architecture An enterprise architecture is a set of views that describe the enterprise 9
10 IM Policy and requirements
11 Purpose Simplify and clarify existing requirements Requirements relevant for information in all phases and process areas Strengthen risk based approach Increase value focus 11
12 IM Policy Our approach We manage information as a key corporate asset We are committed to Prioritizing management of business critical information Managing information according to risk exposure Sharing information to ensure efficient use and experience transfer Making information available for future needs Ensuring information quality How we work We understand requirements and responsibilities for managing information We use, store and archive information in accordance with legal requirements, operational, financial and historical needs We manage and share information according to security classification We ensure that information ownership is clearly defined We use verified sources and approved storage systems 12
13 IM Requirements Governing documentation for Information Management in all processes Relevant to end user Plan information handling Perform and complete information handling Relevant to information owner Maintain information Relevant to process owner and line manager Identify business critical information 13
14 Identification of business critical information Business critical information shall be identified to be able to: Prioritize information types Monitor the right information A supporting tool has been developed for identification of business critical information 14
15 Information criticality analysis How Information must be grouped into information types (at a high enough level) Follow the business process and identify information types used as input or created on sub-process level For each information type the degree of criticality must be set for six different categories/effects In addition information security classification and IT system where information resides should be assessed If necessary several iterations can be done, breaking down information types to a more detailed level 15
16 Effects considered in the analysis Support decision making and management control Information critical input to decision making and used as basis for performance, monitoring and control activities at different levels in the organisation Comply with legal, regulatory and contractual obligations Information critical to comply with legal, regulatory, contractual obligations and operating. Information critical to keep evidence of business transactions to ensure legislative preparedness Meet financial targets Information critical to manage transactions, contracts and customers and other assets, to prevent unforeseen costs, fraud, theft and lost interest Prohibit harm to staff, society or environment Information critical to prohibit harm to environment, society and staff, to ensure sustainability and company reputation Maintain operational efficiency Information critical for operational activities and to avoid loss of competitiveness e.g. delays in the introduction of new production capabilities, products or services Ensure essential learning and experience transfer Information critical to support essential learning and experience transfer and to drive innovation and new ideas 16
17 Example from Supply Chain Management Information type 1 Information type 2 Information type 3 17
18 18
19 How to apply analysis results examples Monitoring Give scope and directions for information monitoring and compliance activities Information systems projects Provide basis for how to prioritize need for system tailoring and configuration Retention and archiving Include retention requirements and used as basis for archiving of information types and retention policies Availability Include availability requirements to information types and provide basis for Service Level Agreements Information asset repository Output of analysis listed in a common repository providing overview of the companies most important information assets 19
20 Summary Management of information as a key strategic asset, - basis for the enterprise approach to Information Management Ensure that we prioritize and target our information management efforts where they are needed according to our business strategy and ambition Tool for identification of business critical information developed to operationalize and support the overall direction 20
21 Comments or questions? 21
22 Enterprise Information Management and Governance in Statoil Liv Stordahl Borud Senior Analyst IT Solutions 22
The oil fields in the NCS are located in the North Sea, Norwegian Sea, and Barents Sea.
A.2 Norway Volumes of Associated Gas Flared on Norwegian Continental Shelf Norway is a major oil producer, and its oil fields are located offshore in the Norwegian Continental Shelf (NCS). 81 In 2002,
More informationGovernance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
More informationIndividuals affected by the breach How many individuals are affected by the breach? Who was affected by the breach: employees, public, contractors, clients, service providers, other organizations? Foreseeable
More informationDigital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
More informationGeneral Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures
General Register Office for Scotland information about Scotland s people Paper NHSCR GB 5/07 NHSCR s quality assurance procedures November 2007 NHSCR SCOTLAND INFORMATION GOVERNANCE STANDARDS Author: Muriel
More informationNatural Capital what do accountants think?
Natural Capital what do accountants think? ACCA_Natural Capital_ExecSumm.indd 1 5/11/12 15:05:12 Introduction During 2012 ACCA, in partnership with KPMG and Fauna and Flora International (FFI), published
More informationOutsourcing and third party access
Outsourcing and third party access This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security
More informationUniversity of Sunderland Business Assurance. Over-arching Information Governance Policy. Document Classification: Public
University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001
More informationInformation Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
More informationHealth, Security, Safety and Environment (HSE)
Health, Security, Safety and Environment (HSE) Content: 1 Objective 2 Application and Scope 21 Application of HSE Directive with underlying documents 22 Scope of HSE Management system 3 Framework for our
More informationCloud Storage Policy (Draft for consultation)
(Draft for consultation) Please note that this draft is under consultation with stakeholders in colleges and university services, before refinement and approval by the appropriate University Committee.
More informationREGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
More informationIssue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
More information3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
More informationData Governance Primer. A PPDM Workshop. March 2015
Data Governance Primer A PPDM Workshop March 2015 Agenda - SETTING THE STAGE - DATA GOVERNANCE BASICS - METHODOLOGY - KEYS TO SUCCESS Copyright 2015 Noah Consulting LLC. All Rights Reserved. Industry Drivers
More informationRisk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email info@centraldesert.nt.gov.au location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
More informationPRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
More informationIT Governance: Guidelines for Directors
Brochure More information from http://www.researchandmarkets.com/reports/1530872/ IT Governance: Guidelines for Directors Description: IT is far too important to be left to the IT department! Your business
More informationStep to the future Life Cycle Information
Step to the future Life Cycle Information LCI Leader Marianne Kalvenes/Mona Nøstvold Classification: Open STEP projects improving our efficiency End-to-end well delivery Standard well design, equipment
More informationInformation Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
More informationWashington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
More informationCombining the power of content and process with the right content management solution. IBM Information Management software
May 2008 IBM Information Management software Combining the power of content and process with the right content management solution 2 Choosing the right data warehouse One of your organization s most valuable
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationEmail Management & Adoption
Email Management & Adoption Peter Buck Managing Director pbuck@hbrconsulting.com 2014 HBR CONSULTING LLC. All rights reserved. Productivity Drivers I worry that I might misplace client materials, between
More informationIBM Software Four steps to a proactive big data security and privacy strategy
Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw
More informationARMA Houston Chapter Spring Seminar April 25, 2012
Spring Seminar 2012 Spring Conference in Implementing Electronic Information Management Jim Coulson, Partner CCIM Consulting LLC Agenda The Gathering Opportunity 1. What is the Opportunity and are you
More informationSolutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
More informationFinansinspektionen s Regulatory Code
Finansinspektionen s Regulatory Code Publisher: Finansinspektionen, Sweden, www.fi.se ISSN 1102-7460 This translation is furnished for information purposes only and is not itself a legal document. Finansinspektionen's
More informationQuality & Safety Manual
Purpose: This Quality & Safety Manual is intended to clarify and document the Quality and Health & Safety policies of GGS Oil and Gas Systems and to describe how the organization organizes its activities
More informationSolvency II. PwC. *connected thinking. Solvency II GAP-analysis: practical experience (life and non-life business)
Solvency II Solvency II GAP-analysis: practical experience (life and non-life business) *connected thinking PwC Decide ambition level for Solvency II Business use Standard model, Total eller partiel Optimizing
More informationSytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
More informationJOB DESCRIPTION. IS teams, Hanover colleagues, third party suppliers. Principal Duties and Responsibilities
JOB DESCRIPTION Job title: IT Security Analyst Grade: Responsible to: Responsible for: Liaises with: Head of IS N/A IS teams, Hanover colleagues, third party suppliers Role Purpose: Location: The purpose
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationGuidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
More informationAPES 325 Risk Management for Firms
APES 325 Risk Management for Firms Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: December 2011 Copyright 2011 Accounting Professional & Ethical Standards Board
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationCan CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?
SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationU & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER
U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER As at 31 March 2014 BOARD CHARTER Contents 1. Role of the Board... 4 2. Responsibilities of the Board... 4 2.1 Board responsibilities... 4 2.2 Executive
More information2 Badger Explorer ASA - 2Q 2007
Quarterly Report 2Q 2007 2 Badger Explorer ASA - 2Q 2007 SUMMARY The development, construction and testing of Badger Explorer progresses with test results as expected. During 2Q 2007 the full scale onshore
More information2013 Statutory report
2013 Statutory report ANNUAL 2013 REPORT /2013 Statutory report in accordance with Norwegian authority requirements Statoil 2014 STATOIL ASA BOX 8500 NO-4035 STAVANGER NORWAY TELEPHONE: +47 51 99 00 00
More informationPOLICY. Number: 7311-10-005 Title: Enterprise Risk Management. Authorization
POLICY Number: 7311-10-005 Title: Enterprise Risk Management Authorization [ ] President and CEO [ X] Vice President, Finance and Corporate Services Source: Director, Enterprise Risk Management Cross Index:
More informationEnergy: Price Comparison Tools BEUC response to the CEER public consultation on the draft advice on Price Comparison Tools
Energy: Price Comparison Tools BEUC response to the CEER public consultation on the draft advice on Price Comparison Tools Contact: Guillermo Beltrà energy@beuc.eu Ref.: X/2012/003-17/01/12 Recommendation
More informationThird Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationLocation of the job: CFO Revenue Assurance
JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance
More informationGuidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
More informationA Changing Commission: How it affects you - Issue 1
A Changing Commission: How it affects you - Issue 1 Contents Overview... 3 Change Programme... 4 Introduction... 4 Reviewing how we regulate and engage... 4 What are the key changes... 5 What does it mean
More informationPolicy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.
International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationOutbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
More informationData Governance Policy. Version 2.0 19 October 2015
Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage
More informationIRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and
More informationData Security Breach Management - A Guide
DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process
More informationDepartment of Information and Technology Management
INFOTEC Overview Department of Information and Technology Management Introduction The Information and Technology Management Department (INFOTEC) is responsible for providing modern, secure, fit for purpose
More informationInformation Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
More informationWEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...
More informationSupply Chain Impacts Measuring and Managing Environmental Impacts for Higher Education
Supply Chain Impacts Measuring and Managing Environmental Impacts for Higher Education Kathy Lindahl Assistant Vice President for Finance & Operations Michigan State University Kim Kokenakes Director of
More informationImplementation progress of the EASEE-gas Common Business Practices (CBP's)
1 Implementation progress of the EASEE-gas Common Business Practices (CBP's) 1. Introduction The European Association for the Streamlining of Energy Exchange-gas, or EASEE-gas, was established on March
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
More informationSECURITY ORGANISATION Security Awareness and the Five Aspects of Security
SECURITY ORGANISATION Security Awareness and the Five Aspects of Security Shift Security simply used to protect information vs. Enabling business initiatives with security Bolt-on/add-on structure to business
More informationTECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA
More informationCRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012.
CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value May 2012 May 2012 1 1. Introduction 1.1. Purpose of the paper In this discussion paper
More informationIBM CommonStore email Archiving Preload Solution
Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end
More informationInformation Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
More informationGUIDANCE PAPER No. 2 ON CORPORATE GOVERNANCE IN INSURANCE COMPANIES
In order to foster more efficient management and supervision of insurers, in line with the core principles of insurance supervision promoted by the International Association of Insurance Supervisors (IAIS),
More informationData Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
More informationADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
More informationBuilding an Effective Business Architecture & Metrics Capability
Building an Effective Business Architecture & Metrics Capability Building an effective business architecture capability is fundamentally about organisational change management. A siloed business architecture
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More information2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
More informationcase study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
More informationCOUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
More informationQuality Programs for Regulatory Compliance
Quality Programs for Regulatory Compliance Roy Garris, IconATG Regulatory Compliance Practice Manager (866) 785-4266 http://www.iconatg.com info@iconatg.com Version 1.00 Application Vulnerabilities Put
More informationData Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
More informationSeminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014
Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues Palace Hotel Saigon, HCMC, November 19 th 2014 Cyber Security and Supply Chain Integrity as Risk Factors
More informationCustomer Experience Functional Lead - BaseCamp. Business Change Manager
Position Profile Position: Customer Experience Functional Lead - BaseCamp Position Incumbent: Company: Location: Reporting to: Meridian Energy Christchurch Business Change Manager Date: December 2008 This
More informationUniversity of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More informationApplications & Operations - Resource Stewardship & Major Projects
Temporary GIS Technician (12 Months) BC Oil & Gas Commission, Fort St John Grid 18 - $55,294.14 - $62,886.67* * Posted salary includes a JFMM Allowance of 10% & a Location Allowance of 3% Applications
More informationOH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained
More informationInformation Security Controls for Website Development and Hosting
Information Security Controls for Website Development and Hosting Version: 1.0 Author: ictqatar Classification: Internal Date of Issue: 18 th August 2011 Information Security Controls for Website Hosting
More informationEA-ISP-001 Information Security Policy
Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:
More informationHenkel s Compliance Management System (CMS)
Henkel s Compliance Management System (CMS) As a company that operates in an ethically and legally correct manner, Henkel s image and reputation is inseparable from the appropriate conduct of each of its
More informationProtective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this
More informationInformation Management Policy London Borough of Barnet
Information Management Policy London Borough of Barnet DATA PROTECTION 11 Information Management Policy - Unrestricted Document Control Document Description Version V.03 Date Created September 2010 Information
More informationInformation and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
More informationPay As You Go, File System Archiving and Storage
Pay-as-you-go ILM Service Pay-as-you-go email & file system data archiving for business Secure business data through automated backup and restore Pay-as-you-go ILM Service Take control of your data don
More informationPOLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives
More informationScope 2 Accounting Guidance: What it means for corporate decisions to purchase environmental instruments
Scope 2 Accounting Guidance: What it means for corporate decisions to purchase environmental instruments January 2015 Corporate Scope 2 accounting has traditionally been relatively straight forward. Common
More informationGeneral Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards
General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents
More informationSubsea - a key area for the industry Vekst i vest Florø, 03.10.2013 Johan Kr Mikkelsen. STL-Vekst i Vest-131003-131002.pptx
Subsea - a key area for the industry Vekst i vest Florø, 03.10.2013 Johan Kr Mikkelsen 0 A strategy for superior profitability and growth 1 mill boepd We have a long term perspective on the NCS 4 3 Industrialisation
More informationPart A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...
Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation
More informationBackground. When the Government Is the Landlord. 1 Norway's oil and gas reserves are all offshore.
Regional Details: Norway In this appendix, we describe the methods the government uses to obtain revenues from oil and gas production in Norway. We present quantitative estimates of revenues as well as
More informationRecords Management and SharePoint 2013
Records Management and SharePoint 2013 SHAREPOINT MANAGEMENT, ARCHITECTURE AND DESIGN Bob Mixon Senior SharePoint Architect, Information Architect, Project Manager Copyright Protected by 2013, 2014. Bob
More informationWebinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015
Webinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015 Here are the answers to the questions we were asked during the webinar. There are a few questions we are still
More informationJob Number: 350002 ROLE DESCRIPTION
Job Number: 350002 ROLE DESCRIPTION Role Title: Senior Advisor Records Management Number and Title of Direct Reports: (2) Directorate: Corporate Services Budget: NIL Reports to: Team Leader Business Support
More information