UCD International UCD IT Services. IT12 - Device Security & Encryption Strategy. Project Initiation Document. Version nd December 2014

Size: px
Start display at page:

Download "UCD International UCD IT Services. IT12 - Device Security & Encryption Strategy. Project Initiation Document. Version 1.0 2 nd December 2014"

Transcription

1 UCD International UCD IT Services IT12 - Device Security & Encryption Strategy Project Initiation Document Version nd December 2014 Version History Version Date Summary of Changes Changed by 1.0 2/12/2014 Initial Draft John Curran

2 -Contents 1 Objectives & Scope Project Objective Project Scope Change Control 3 2 Project Plan Project Approach Milestone Plan 5 3 Project Structure Roles & Responsibilities Meetings 7 4 Costs Project costs: Initial Risk & Issue Log Ongoing Management of Risks and Issues 8 5 Stakeholder Plan 10 Endpoint Security & Encryption- Project Initiation Document Page 2 of 10

3 1 Objectives & Scope This Project Initiation Document (PID) defines Device (End Point) Security & Encryption Project in detail including objectives, scope, approach, deliverables, timescale and structure of the project so that it can be understood and agreed by all stakeholders. 1.1 Project Objective The objective of this project is to provide pilot implementations of services for UCD staff to secure their devices and sensitive data held on mobile devices and in cloud services to meet security and compliance obligations. 1.2 Project Scope The scope of the project will be to evaluate, in conjunction with Customer Support and Research IT, candidate solutions to provide device encryption and mobile data management services for use by UCD staff users in areas managing sensitive data. 1.3 Change Control The Project Initiation Document will be approved on commencement of the project by the Project management group. Following this, an ongoing Project Plan will be maintained and updated to accommodate any minor changes that occur. Once the scope is agreed herein, any further changes to scope or major deviation from the proposed timeframes will be the subject of a change control procedure. Endpoint Security & Encryption- Project Initiation Document Page 3 of 10

4 2 Project Plan 2.1 Project Approach The project will proceed in three main phases- Phase 1: Preliminary market review of technology solutions from current UCD suppliers. Phase 2: Needs assessment and preliminary assessment of product feasibility with identified representative groups and units within UCD Administrative and Research Communities. A necessary consideration of the project is that though potential users of the service understand their requirements in terms of security, the usability of potential solutions and fitness for purpose is not usually clear from the outset. For this reason, the overall solution will be implemented following a prototyping methodology i.e. the project will deliver first cut solutions for small communities of representative users at the earliest opportunity, based on tested solution configuratiosn and then iterate around these to facilitate the development of services with strong deployment and support characteristics that also meet security requirements Existing platform solutions will be deployed where possible rather than the procurement of new solutions- in particular: a. Google Apps mobile will be used as a trial service for mobile device encryption and self-management services for both ios and Android platforms. b. Office 365 Intune services will be trialled for suitability as a data security management solution for rights-controlled document management in high assurance areas. c. Existing technologies (Apple Filevault, Windows Bitlocker and Truecrypt) will be supplemented by a centrally managed encryption solution to be selected via a suitable procurement process following the completion of Phase 1. Phase 3: Review of solutions with stakeholders and feasibility assessment for deployment The scope of the solution has been defined and on this basis, the project has been divided into three strands: (1) Research support strand. Deployment of services to support research groups with high assurance needs Endpoint Security & Encryption- Project Initiation Document Page 4 of 10

5 (2) Data Management support strand to improve the way that users can meet their own needs. (3) Analysis & Information Strand to improve the existing reporting which is available in relation to the recruitment of students with a particular focus on improving the international analysis of the information and improving the information available on preapplication prospective students. 2.2 Milestone Plan The following milestones, deliverables and target delivery dates have been defined for the project: Milestone Deliverable Responsibility Reviewers/ Approvers 0.1 Project Scope Defined 0.2 Project Initiation Document Approved 0.3 Summary of Requirements Identified 0.4 Communications Planned Project Scope Document (& Diagram) Project Initiation Document Summary Statement of Requirements Communications Plan 0.5 Solutions Defined Overall Solution Diagram Due Date Endpoint Security & Encryption- Project Initiation Document Page 5 of 10

6 3 Project Structure The project comprises a and a Steering Group. The Steering Group will agree project schedules, approve major deliverables and resolve any critical issues that arise during the lifetime of the project. The will manage the project on a daily basis and will report regularly to the Steering Group. 3.1 Roles & Responsibilities Role Responsibilities Names Steering group Ensure that the project direction is appropriate to the achievement of the ultimate objectives Review progress reports from the Project Team and determine actions needed to address deviations Provide guidance to the on high level principles to be complied with Review and approve deliverables Monitor and proactively manage risks as they arise. David Coughlan Ciara Acton Fred Clarke Mary Hogan (UCD legal\ Data Protection) Project Managers Prepare the Project Plans Determine resource requirements and ensure that appropriate resources are allocated Manage the project to ensure that the desired results are achieved within agreed time-scales Monitor progress and report on a regular basis to the Steering Group Prepare project deliverables and their presentation for approval Project team Conduct the tasks and activities of the project in accordance with the Project Plan Prepare the project deliverables by the agreed due dates Report progress to the Project Manager Elaine Timmons John Curran Elaine Timmons John Curran (other resources from Research IT, Customer support, Servers & storage, Web services as requested) Endpoint Security & Encryption- Project Initiation Document Page 6 of 10

7 3.2 Meetings The following are the scheduled project governance meetings: Team Attendees Frequency Project Steering Group Project Board Bi-Monthly as per schedule TBC Project team Project team Weekly or as required 4 Costs 4.1 Project costs: Pilot phase implementations of all technologies will have no new software licence requirements. Deployment of device encryption solutions for Windows clients will require a licensed solution. Support and deployment of the solution will require a number of test devices for use with the project as follows- these devices will also be required for testing on other operational projects e.g. eduroam update. PC based laptops for windows operating systems are expected to be available from IT Services loan services. Item Description Costs (approx.) Apple Macbook x1 Entry level macbook air for 1400 Filevault testing and documentation development for multiple OSX versions. ipad Mini x1 Entry level ipad for testing 300 and documentation development for multiple OSX versions. Android phones x2 Old (e.g. recovered from 200 IT Admin) and new SIMunlocked Android handset (Motorola Moto G or similar) Total 1900 Endpoint Security & Encryption- Project Initiation Document Page 7 of 10

8 Risks & Issues 4.2 Initial Risk & Issue Log The following project risks or issues have been identified on commencement of the project. These initial tasks to address these risks or issues are outlined. Risk / Issue Staff working on the project may not be able to commit the time necessary to meet the milestones arising from operational commitments. Technical solutions may not gain acceptance from users. Privacy implications of technologies (e.g. location aware technology) in use may limit acceptance among wider staff community. Identified solutions may not be deployable in a wider user base due to resource requirements associated with solution delivery. Probability H M L Impact H M L Actions to Mitigate Y Y Each phase of the project will be allocated, if necessary reducing scope (but based on prioritised requirements) to achieve timeline. Additional technical resources may be sourced externally. Y Y Close coordination of deployment with pilot groups to identify and resolve issues quickly. Y Y IT Services to propose appropriate policies for the use of such data within UCD. Y Y Solutions under consideration in most scenarios reflect a high ab initio feasibility for self management and deployment. Current experience with device encryption indicates that very little ongoing support is required for deployed systems. Responsibility Project team 4.3 Ongoing Management of Risks and Issues Endpoint Security & Encryption- Project Initiation Document Page 8 of 10

9 Any additional risks and issues identified will be maintained on an ongoing basis by the Project Manager in separate Risks and Issues logs. Endpoint Security & Encryption- Project Initiation Document Page 9 of 10

10 5 Stakeholder Plan The following table highlights the communication and interaction activities planned for each stakeholder group: Stakeholder Actions Responsibility Corporate & Legal affairs Communication Plan to be developed to co-incide with rollout of Recruitment Partner Portal Staff in Pilot Units Communication Plan to be developed to co-incide with rollout of pilot solutions though local champions, training, and web based resource materials. Project team Endpoint Security & Encryption- Project Initiation Document Page 10 of 10

IT1T Integrated Recruitment Systems 2015

IT1T Integrated Recruitment Systems 2015 UCD IT Services IT1T Integrated Recruitment Systems 2015 Project Initiation Document Version 1.0 2 December 2014 Version History Version Date Summary of Changes Changed by 1.0 02/12/2014 Initial Draft

More information

IT11 - Cloud Services for Off-Site Resilience

IT11 - Cloud Services for Off-Site Resilience UCD IT Services IT11 - Cloud Services for Off-Site Resilience Project Initiation Document Version 1.0 December 2 nd 2014 Version History Version Date Summary of Changes Changed by 1.0 02/12/2014 Initial

More information

UCD IT Services. Research Data. Project Initiation Document. Version 1.0 03 rd December 2014. Version History

UCD IT Services. Research Data. Project Initiation Document. Version 1.0 03 rd December 2014. Version History UCD IT Services Research Data Project Initiation Document Version 1.0 03 rd December 2014 Version History Version Date Summary of Changes Changed by 1.0 03/12/2014 Initial Document 1.1 09/12/2014 Minor

More information

IT Services Website Redevelopment

IT Services Website Redevelopment UCD IT Services IT01 IT Services Website Redevelopment Project Initiation Document Version 1.0 1, December 2014 Version History Version Date Summary of Changes Changed by 1 1/12/2014 Brian Morrissey IT

More information

It0x Enhanced data storage services Sharepoint Teamsites

It0x Enhanced data storage services Sharepoint Teamsites UCD IT Services It0x Enhanced data storage services Sharepoint Teamsites Project Initiation Document Version 1.0 2, December 2014 Version History Version Date Summary of Changes Changed by 1 2/12/2014

More information

UCD IT Services. IT13 - Wireless Expansion. Project Initiation Document. Version 1.0 02 December 2014. Version History

UCD IT Services. IT13 - Wireless Expansion. Project Initiation Document. Version 1.0 02 December 2014. Version History UCD IT Services IT13 - Wireless Expansion Project Initiation Document Version 1.0 02 December 2014 Version History Version Date Summary of Changes Changed by 1.0 02/12/2014 Initial Draft Anthony Grenham

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

Chapter 6 Implementation Planning

Chapter 6 Implementation Planning Chapter 6 Planning Planning- Division into Work Packages The following are the recommended Work Packages Overall Change Programme Work Package 1 E-Cabinet Model Work Package 2 Security Policy Design Work

More information

CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT:

CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT: CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT: The Queen Elizabeth Hospital King s Lynn NHS Foundation Trust (QEH) is a 514 bed general hospital providing services to

More information

Evolving in the global digital scenario. Politecnico di Torino

Evolving in the global digital scenario. Politecnico di Torino Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino ECDL Foundation Philadelphia Dublin Brussels Cairo Dubai Singapore Over 13 Million ECDL Candidates

More information

Project Roles and Responsibilities

Project Roles and Responsibilities Project s and This template can be used to define roles and responsibilities Below is a few typical examples of the different types of roles involved in delivering a project and their respective responsibilities.

More information

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015 OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients

More information

Evolving in the global digital scenario. Politecnico di Torino

Evolving in the global digital scenario. Politecnico di Torino Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino Trends: Time Machine Before Now http://www.baekdal.com/analysis/market-of-information 29/10/2013

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management

More information

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01 QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,

More information

Client Communication Portal Project

Client Communication Portal Project Client Communication Portal Project In 2014 Sunnyfield was awarded a grant by the Organisation Transition Fund to develop a Client Communication Portal. The aim of the project was to enhance person centred

More information

IBAPro Project Management Methodology

IBAPro Project Management Methodology IBAPro Project Management Methodology A description of the IBApps Project Management Methodology and Implementation Process Version 2.2, June 2013 Contents 1. Project Management... 3 2. Phases... 3 2.1.

More information

20696B: Administering System Center Configuration Manager and Intune

20696B: Administering System Center Configuration Manager and Intune 20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015 Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or

More information

Senior Project Manager (Web Content Management)

Senior Project Manager (Web Content Management) Senior Project Manager (Web Content Management) IT Services Portfolio & Project Management Office Salary Grade 8-40,046 to 45,053 per annum Fixed term contract for 2 years (** see below for contract information)

More information

Programme Governance and Management Plan Version 2

Programme Governance and Management Plan Version 2 PROCESS FOR CHANGE - Detailed Design Programme Governance and Management Plan Version 2 1 INTRODUCTION In October 2008, the Council approved the selection of seven opportunity themes to take forward from

More information

Release Notes: Onsight Connect for Android Software Release Notes. Software Version 6.7.8. Revision 1.0.0

Release Notes: Onsight Connect for Android Software Release Notes. Software Version 6.7.8. Revision 1.0.0 Release Notes: Onsight Connect for Android Software Release Notes Software Version 6.7.8 Revision 1.0.0 September 2015 TABLE OF CONTENTS Document Revision History... 3 OVERVIEW... 4 Software Installation...

More information

ICT Service Desk Creation

ICT Service Desk Creation ICT Service Desk Creation Project Initiation Document Document: ICT Service desk Creation: PID Issue Date: 26 th November 2010 Version: 0.1 Draft Version Number: 1.0 Change Control Quality Assurance Document:

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,

More information

Flinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013

Flinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013 Flinders University Telehealth in the Home Video Strategy Discussion Paper 2 October 2013 Further information: Alan Taylor, Project Manager alan.taylor@flinders.edu.au Page 1 of 14 A AUTHORS A.1 Project

More information

Contents. Project Management: August 2005 Page 2 Clinical Research Operational Standards for Professional Practice for Professional Practice

Contents. Project Management: August 2005 Page 2 Clinical Research Operational Standards for Professional Practice for Professional Practice Project Management: August 2005 Contents Introduction........................................................... 4 About this standard: what is the importance of project management?................. 4

More information

KMS Implementation Roadmap

KMS Implementation Roadmap KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5

More information

Mobile Device Management horizons for CERN Managed ios and Mac Self-Service. Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS)

Mobile Device Management horizons for CERN Managed ios and Mac Self-Service. Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS) Mobile Device Management horizons for CERN Managed ios and Mac Self-Service Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS) Today s agenda Introduction MDM market CERN numbers and trends CERN

More information

Course 20688A: Managing and Maintaining Windows 8

Course 20688A: Managing and Maintaining Windows 8 Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Statement of Work. Systems Center Configuration Manager. Prepared for School Board of Sarasota County Thursday, 12 June 2008 Version 1.3.

Statement of Work. Systems Center Configuration Manager. Prepared for School Board of Sarasota County Thursday, 12 June 2008 Version 1.3. Statement of Work Systems Center Configuration Manager Prepared for School Board of Sarasota County Thursday, 12 June 2008 Version 1.3.1 Released Prepared by Dom Vila Program Manager dom.vila@microsoft.com

More information

The Current Landscape

The Current Landscape SMALLER SCALE HAS MORE SPACING INSIDE LOGOMARK LARGE SCALE HAS LESS SPACING INSIDE LOGOMARK MOBILE APPLICATIONS MANAGEMENT December 2013 Prepared by Clarity Innovations Contributors: Steve Burt, Marie

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Web Based Application Tool (WBAT) For SMS Implementation!

Web Based Application Tool (WBAT) For SMS Implementation! Web Based Application Tool (WBAT) For SMS Implementation! Non-Compliance could kill the Viability of your Business Aircraft Operations! FDTL (Fixed & Rotary Wing) Safety Data Management Hazard Identification

More information

The Cloud Case Study - Student Software Development

The Cloud Case Study - Student Software Development Learner Focused Applications in the Cloud Case Study Colleges and Projects Barnsley College Blackburn College Grimsby Institute Leeds City College North East Worcestershire College Oxford and Cherwell

More information

End User Devices Security Guidance: Apple OS X 10.10

End User Devices Security Guidance: Apple OS X 10.10 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best

More information

Casper Suite. Security Overview

Casper Suite. Security Overview Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite

More information

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report.

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report. REPORT TO: SCRUTINY COMMITTEE 25 JUNE 2013 REPORT ON: REPORT BY: INTERNAL AUDIT REPORTS CHIEF INTERNAL AUDITOR REPORT NO: 280-2013 1.0 PURPOSE OF REPORT To submit to Members of the Scrutiny Committee a

More information

UNIVERSITY OF STIRLING: INFORMATION SERVICES Review of Progress: Service Area Plan 2012 2015

UNIVERSITY OF STIRLING: INFORMATION SERVICES Review of Progress: Service Area Plan 2012 2015 UNIVERSITY OF STIRLING: INFORMATION SERVICES Review of Progress: Service Area Plan 2012 2015 Progress against the key priorities for 2012 as identified in the Service Area Plan 2012-15 are summarised in

More information

DCC Release Management Strategy

DCC Release Management Strategy DCC Release Management Strategy Version 1 24/03/2015 DRAFT Document Control Version Number Date Version 1 24/03/2015 Initial Draft for publication Documentation Approval Name Role Date Signature Dave Broady

More information

Project Management in the Rational Unified Process

Project Management in the Rational Unified Process CS2 Software Engineering note 3 Project Management in the Rational Unified Process In the last two Software Engineering lectures we have considered the outline description of the Rational Unified Process

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

Project Charter Updated

Project Charter Updated Enterprise IT Service Management Pilot Proof of Concept Project Charter Updated Prepared By: M. Riley & J. Foster Date of Publication: March 13, 2006 Date Last Revised: April 25, 2007 PMO CH1, 8/01 Document

More information

SCHEDULE 8 Generalist Project Services Framework 2015

SCHEDULE 8 Generalist Project Services Framework 2015 SCHEDULE 8 Generalist Project Services Framework 2015 Nominal Insurer And Schedule 8 (Project Services Framework) Page: 1 of 6 Schedule 8 Generalist Project Services Framework Contents Overview... 3 1.

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

PROJECT MANAGEMENT FRAMEWORK

PROJECT MANAGEMENT FRAMEWORK PROJECT MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Executive Assistant to

More information

Introduction to Hosted Desktop Services (HDS)

Introduction to Hosted Desktop Services (HDS) Introduction to Hosted Desktop Services (HDS) Powerdial Services Ltd Introduction to Hosted Desktop Service Overview 2014 Hosted Desktops What are they? It s your computer but hosted in the Cloud It s

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

Information Technology Services Project Management Office Operations Guide

Information Technology Services Project Management Office Operations Guide Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...

More information

15/03. 1 Date / title of meeting. 29 th January 2015. NHSBT Board Meeting. 2 Title New NHSBT Desktop Liverpool Beta Trial.

15/03. 1 Date / title of meeting. 29 th January 2015. NHSBT Board Meeting. 2 Title New NHSBT Desktop Liverpool Beta Trial. 15/03 1 Date / title of meeting 29 th January 2015 NHSBT Board Meeting 2 Title New NHSBT Desktop Liverpool Beta Trial 3 Status Official 4 Tweet NHSBT New Desktop pilot to be extended to Liverpool 5 Executive

More information

Deploying. Mac. Five best practices

Deploying. Mac. Five best practices Deploying Mac Five best practices Deploying Mac Today more than ever, IT teams are looking to support Mac users at work. These five best practices used by medium and large organizations like yours will

More information

LGS Project Management Methodology

LGS Project Management Methodology Page: 32 LGS Project Management Methodoy The LGS project management methodoy is integral to our overall delivery methodoy. Based on inpro, one of the LGS inspiration series documents, our methodoy is compliant

More information

Department of the Environment and Local Government. Project Management. Public Private Partnership Guidance Note 7. 14 April 2000

Department of the Environment and Local Government. Project Management. Public Private Partnership Guidance Note 7. 14 April 2000 Project Management Project Management Public Private Partnership Guidance Note 7 14 April 2000 Guidance Note 7 14 April 2000 Project Management Contents Section Page I INTRODUCTION...1 SCOPE AND PURPOSE

More information

DLS Central Reporting Office Setup Action Plan

DLS Central Reporting Office Setup Action Plan DLS Central Reporting Office Setup Action Plan 21 Mar 2012 Edition 0.4 Executive Summary This document describes the necessary steps to be taken to establish the DLS CRO and proposes an owner and timescale

More information

MS 20688 Managing and Maintaining Windows 8

MS 20688 Managing and Maintaining Windows 8 P a g e 1 of 9 MS 20688 Managing and Maintaining Windows 8 About this Course In this course, students learn how to plan and implement the installation, management, and maintenance of Windows 8. Course

More information

Comparing Antivirus Business Solutions. A small business running 25 work stations and 2 servers require an antivirus solution that

Comparing Antivirus Business Solutions. A small business running 25 work stations and 2 servers require an antivirus solution that Ron Lakin 1 Ronald Lakin CIS 130 Nick Romano November 28 2015 Comparing Antivirus Business Solutions A small business running 25 work stations and 2 servers require an antivirus solution that will meet

More information

Peer Review Panel Report. Information Technology Services

Peer Review Panel Report. Information Technology Services Peer Review Panel Report Information Technology Services 21 st October 2008 Introduction As part of s commitment to quality assurance it is the policy of the Institute to review key academic and other

More information

Terrace Consulting Services

Terrace Consulting Services Terrace Consulting Services Overview: Every project will require some degree of Planning before Implementation can begin. Analysis and Planning are essential in order to confirm requirements, define the

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

IT Services. Service Level Agreement

IT Services. Service Level Agreement IT Services Service Level Agreement Contents 1 Purpose... 3 2 IT Services Objectives... 3 3 IT Helpdesk... 3 3.1 Issues... 3 3.2 Service Requests... 4 3.3 Development Requests... 4 4 Priorities... 4 5

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

How To Improve Your University'S Reputation

How To Improve Your University'S Reputation 2015 Work Programme other projects Customer Services Projects Review Start of Term for 2015 Rollout of new AJ build in conjunction with Teaching and Learning IT Lab Removals Preparation of communications

More information

Disaster Recovery Policy

Disaster Recovery Policy Disaster Recovery Policy INTRODUCTION This policy provides a framework for the ongoing process of planning, developing and implementing disaster recovery management for IT Services at UCD. A disaster is

More information

Project Charter and Scope Statement

Project Charter and Scope Statement Prepared by: Mike Schmidt Version: 1.0 Last Revision Date: April 14, 2010 Create Date: May 6, 2010 EXECUTIVE SUMMARY... 3 1 INTRODUCTION... 4 2 PROJECT OBJECTIVES... 4 2.1 MISSION... 4 2.2 OBJECTIVES...

More information

MNLARS Project Audit Checklist

MNLARS Project Audit Checklist Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?

More information

ITSD 2014-2015 GOALS

ITSD 2014-2015 GOALS P a g e 1 ITSD 2014-2015 GOALS Advance Student Success and Development Student Training Program: Develop and implement a student training program that allows our students to learn new technologies and

More information

LONDON CYCLE HIRE SCHEME AGREEMENT. Schedule 10 Contract Management and Reporting. Schedule 10 Contract Management and Reporting REDACTED VERSION

LONDON CYCLE HIRE SCHEME AGREEMENT. Schedule 10 Contract Management and Reporting. Schedule 10 Contract Management and Reporting REDACTED VERSION LONDON CYCLE HIRE SCHEME AGREEMENT Schedule 10 Contract Management and Reporting Transport for London - Version Final CCS0000151079 SCHEDULE 10 Contract Management and Reporting Procedure 1. Introduction

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

SafeGuard Enterprise 6.10 Peter Skondro

SafeGuard Enterprise 6.10 Peter Skondro SafeGuard Enterprise 6.10 Peter Skondro Sales Engineer 1 Agenda Sophos SafeGuard 6.10 Webinar Sophos Data Protection Strategy SafeGuard Enterprise 6.10 & Live Demo New Features Windows Mac Licensing &

More information

Senior Project Manager

Senior Project Manager Senior Project Manager IT Services Portfolio & Project Management Office Salary Grade 8-40,046 to 45,053 per annum Open Ended Contract Ref: CSE00868 At Leicester we re going places. Ranked in the top-12

More information

Ambulance Victoria. Position Description

Ambulance Victoria. Position Description Position Title: IT Project Manager Team Leader Position Description Division: Information & Technology Department: Solution Delivery Reports To: Manager Solution Delivery Direct Reports: IT Project Managers

More information

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants...

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants... Contents Workstation Refresh & Virtual Desktop Infrastructure Program Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2 Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student

More information

e-tourism Marketing Specialist

e-tourism Marketing Specialist ! Role Profile for e-tourism Marketing Specialist e-jobs-observatory.eu European Profiles in e-tourism Functions e-tourism Marketing Specialist 1 e-tourism Marketing Specialist 1. Role Profile Role title

More information

Change Management Practitioner Competencies

Change Management Practitioner Competencies 1 change-management-institute.com Change Management Institute 2008 Reviewed 2010, 2012 Change Management Practitioner Competencies The Change Management Practitioner competency model sets an independent

More information

Need to teach students how to write lesson plans? There s an App for that!

Need to teach students how to write lesson plans? There s an App for that! Need to teach students how to write lesson plans? There s an App for that! Presenters: Professors Jane Thielemann-Downs, Janice Nath, Ping Chen, and Irene Chen University of Houston Downtown CSOTTE 2012

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM MICROSOFT DYNAMICS CRM SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S MICROSOFT DYNAMICS CRM CAPABILITY INTRODUCTION Lockheed Martin offers a

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

CRESCERANCE SERVICES

CRESCERANCE SERVICES CRESCERANCE SERVICES The following definitions, billing methodologies, service descriptions and additional terms are applicable to the purchase and use of Crescerance s various products and Services and

More information

PROGRAMME MANAGEMENT AND BUSINESS PLANNING

PROGRAMME MANAGEMENT AND BUSINESS PLANNING PROGRAMME MANAGEMENT AND BUSINESS PLANNING This paper describes what lessons were learned from the programme management and business planning which was done to support the operation of the Help Scheme

More information

Consultation on DCC Enduring Release Management Policy. Consultation opens: 18 September 2015

Consultation on DCC Enduring Release Management Policy. Consultation opens: 18 September 2015 Consultation on DCC Enduring Release Management Policy Consultation opens: 18 September 2015 Consultation closes: 16 October 2015 Classification: DCC Public Table of Contents 1 Introduction... 4 1.1 Objective...

More information

Microsoft Office 365 Request For Proposal

Microsoft Office 365 Request For Proposal Microsoft Office 365 Request For Proposal A survey of the formal RFP process currently underway at The Scripps Research Institute to migrate from on premise Exchange 2007 to Office 365 Current Exchange

More information

Access What are the HIT requirements to support recommendations of the Equity & Access Council to guard against under-service or patient selection?

Access What are the HIT requirements to support recommendations of the Equity & Access Council to guard against under-service or patient selection? HEALTH INFORMATION TECHNOLOGY (HIT) COUNCIL Charter This work group will develop for recommendation to the Healthcare Innovation Steering Committee, a proposal for HIT requirements 1 and technology components

More information

G-Cloud 6 Service Definition DCG Cloud Backup Service

G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6 Service Definition DCG Cloud Backup Service G-Cloud 6, Service Description, DCG Cloud Backup Service Page 1 of 16 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W:

More information

The Gateway Review Process

The Gateway Review Process The Gateway Review Process The Gateway Review Process examines programs and projects at key decision points. It aims to provide timely advice to the Senior Responsible Owner (SRO) as the person responsible

More information

LOCAL GOVERNMENT NEW ZEALAND TECHNICAL ASSISTANCE FACILITY

LOCAL GOVERNMENT NEW ZEALAND TECHNICAL ASSISTANCE FACILITY PacificTA LOCAL GOVERNMENT NEW ZEALAND TECHNICAL ASSISTANCE FACILITY COOK ISLANDS MINISTRY OF INFRASTRUCTURE AND PLANNING NOVEMBER 2013 This report has been prepared for the Ministry of Infrastructure

More information

Master Level Competency Model

Master Level Competency Model Change Manager Master Level Competency Model The Change Manager Master competency model sets an independent industry benchmark for SENIOR level change management practitioners. The model was launched in

More information

ST JOHNS PARK HIGH SCHOOL BYOD POLICY

ST JOHNS PARK HIGH SCHOOL BYOD POLICY ST JOHNS PARK HIGH SCHOOL BYOD POLICY What is BYOD? Bring Your Own Device" (BYOD) refers to students bringing a personally owned device to school for the purpose of learning. A personally owned device

More information

Data Integration Project

Data Integration Project Data Integration Project Summary The purpose of the data integration project is to provide a mechanism of housing consistent programme and module data for all programme types across all relevant information

More information