Server Service Level Agreement
|
|
- Eustace Grant
- 8 years ago
- Views:
Transcription
1 Server Service Level Agreement Information Technology Services Department: Service Type: Date:
2 1.0 Introduction: Information Technology Services (ITS) provides technology resources and services for legitimate instruction, research, and administrative computing needs of Eastern Illinois University (EIU). This agreement will identify the services and responsibilities necessary to administer a reliable and secure information technology environment. 2.0 Acceptable Use The complete policy for the acceptable use of EIU s technology resources is stated in the University Internal Governing Policy (IGP) #129 Use of Technology Resources by Employees. Any use of EIU s technology resources unrelated to legitimate administrative, instructional, or research computing is improper. 3.0 ITS Statement of Ethics and Professional Conduct While performing normal duties, ITS personnel may view confidential and/or sensitive information. It is the policy of ITS not to actively monitor or disclose the contents of the information. Additionally, it is the policy of ITS to use the security principle of least privilege. This principle is that a user is provided with the minimum set of rights and privileges needed to perform required functions. Disclosure within the University will be to only those University officials who have a legitimate organizational need to know. When necessary, ITS personnel, in consultation with general counsel, will take appropriate action to protect the University from damage to its name or legal liability. ITS personnel will not install unauthorized or unlicensed applications onto a system. ITS personnel will not search out unauthorized or unlicensed applications, but if discovered, they are obligated to inform the department and the appropriate vice president of this violation. If the unauthorized or unlicensed application is causing a loss of services to the University community, ITS will take the necessary action to restore proper level of service. ITS will solely operate and support all infrastructure servers and server support equipment to include - but not limited to - border, core, distribution, and wireless layers of the University s networks. Additionally, ITS is responsible for allocating all resources and directing recovery of network operations in the event of a disaster. Re-establishing core services will be the priority and ITS may utilize all functional equipment in recovery which includes managed and co-located servers. 2
3 4.0 Services Provided Departments may choose between two types of server services: Managed Servers: Provide service operations for departments that need system administration and management for their servers in an environmentally secure location. ITS will evaluate your server management needs and offer a comprehensive management package for your server environment. Co-located Servers: Provide an environmentally secure location for the housing of a departmental server and the supporting equipment. Your server will be provided with rack space, power, cooling, and network connectivity. 5.0 Managed Servers ITS will provide the following for managed server services: Hardware: Initials ITS s current standard is to deploy new systems in a virtualized environment barring application-specific reasons why this may not be feasible. ITS will work with you to determine the appropriate CPU, OS, memory, and storage requirements to best fit your needs. Initials ITS must be notified in advance of any equipment purchases that will not be acquired by ITS but will be managed by ITS. This will ensure the appropriate resources are available to install and maintain the equipment, plus ensure interoperability between ITS s systems and the purchased equipment. Software: Maintain the operating system on the machine, including initial installation, any interim security patching involved and major upgrades. Maintain our standard environment on the system. 3
4 Manage login access to the system, including the granting and revocation of permissions. Coordinate any changes to the system with the client to address and alleviate any integration issues or client service interruptions that may arise. Provide monitoring of the system for network connectivity, CPU, memory, and disk space utilization. Backups: Conduct differential backups nightly and full backups weekly of the system. Differential backups are retained for a period of 14 days, and full backups are retained for a period of 30 days. We the undersigned acknowledge and understand the above list of responsibilities with our signature. Department: Date: The department will assign a technical contact and if possible an alternate technical contact. Technical Contact: Phone: Alternate Technical Contact: Phone: Initials Department Responsibilities: Gather appropriate documentation before the server is installed. This documentation list includes but is not limited to: - General description of the server Found in Appendix A - Applications housed on the server - List of pre-authorized staff that will need access - Signed Service Agreement Assure that applications used are properly licensed. This applies to all applications except applications that are supplied and licensed by ITS. Provide information about applications that are purchased. ITS will not provide technical support for applications that are not supplied and licensed by ITS. It is ITS s recommendation that client acquire vendor support with the purchase of unsupported ITS applications. 4
5 Ensure that federal and state regulations are complied with to include but not limited to Family Education Right to Privacy Act (FERPA), Payment Card Industry (PCI), and Identity Protection Act (IPA). Notification and information is to be provided to ITS upon the decommission of the server. We the undersigned acknowledge and understand the above list of responsibilities with our signature. Department: Date: ITS: Date: 5
6 6.0 Co-Located Server ITS must be notified in advance of the purchase of any server equipment that will be delivered to ITS for co-located services. This will ensure the appropriate resources are available to install the equipment, plus ensure interoperability between ITS - owned systems and the purchased equipment. ITS personnel will coordinate physical access requirements to the Data Center. ITS will monitor environmental conditions for hardware installed in the Data Center. ITS will provide monitoring of the system for network connectivity and space utilization of the CPU, memory, and disk space. All Windows - based servers will be required to be connected to the University s Windows Active Directory, unless it is determined that security best practices would prevent domain memebership. The department will assign a technical contact and if possible an alternate technical contact. Technical Contact: Phone: Alternate Technical Contact: Phone: Initials Department Responsibilities: Gather appropriate documentation before the server is installed. This documentation list includes but is not limited to: - General description of the server Found in Appendix A - List of pre-authorized staff that needs physical access - Reboot and system status checking procedures - Equipment list with appropriate property tags, s/n, make, and model - Hardware field service contact and hardware maintenance contract information - Signed Service Agreement Assure that applications used are properly licensed. This applies to all applications except applications that are supplied and licensed by ITS. Provide information about applications that are purchased. ITS will not provide technical support for applications that are not supplied and licensed by ITS. It is ITS s recommendation that clients acquire vendor support with the purchase of unsupported ITS applications. 6
7 Maintain and keep current the operating system on the machine, including initial installation, any interim security patching involved and major upgrades. Develop a backup plan that is approved by ITS to ensure compatibility with ITS systems and procedures. Manage login access to the system, including the granting and revocation of permissions. This responsibility may require coordination with ITS System Administration for certain levels of access and/or facilities to do so. Ensure that federal and state regulations are complied with to include but not limited to Family Education Right to Privacy Act (FERPA), Payment Card Industry (PCI), and Identity Protection Act (IPA). Notification and information is to be provided to ITS upon the decommission of the server. We the undersigned acknowledge and understand the above list of responsibilities with our signature. Department: Date: ITS: Date: 7
8 Appendix A: Server General Description Information about the server: Technical Contact: Department: Date: FQDN: Virtual or Physical: VM Name (if applicable): DNS Entries (if applicable): Databases on Server (if applicable): Location: Estimated Decommission Date: 8
Server Operations Managed Servers Service Level Agreement (SLA)
Server Operations Managed Servers Service Level Agreement (SLA) Overview The goal of this SLA is to delineate responsibilities, communication paths, and other details surrounding server support provided
More informationServer Operations Managed Servers Service Level Agreement (SLA)
Server Operations Managed Servers Service Level Agreement (SLA) Overview The goal of this SLA is to delineate responsibilities, communication paths, and other details surrounding server support provided
More informationSystem Administration and Server Management Service Level Agreement (SLA)
System Administration and Server Management Service Level Agreement (SLA) OVERVIEW The goal of this SLA is to delineate responsibilities, communication paths and other details for computing capacity and
More informationi. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections
Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationRESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)
RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006) on-line at www.ccc.edu I. INTRODUCTION All users shall abide by the following provisions contained herein, or otherwise may be subject to disciplinary
More informationIT Security Standard: Computing Devices
IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationCLOUD SERVICE SCHEDULE Newcastle
CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,
More informationOffice of Information Technology Hosted Services Service Level Agreement FY2009
Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationCSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
More informationHow To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
More informationData Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More informationThe Service Provider will monitor the VM for the Customer and provide notifications on an opt in basis, which is strongly recommended.
Virtual Machine Service Level Agreement 1. Agreement This agreement is to define Virtual Server Collocation services provided to a Customer. Typically, services definitions include hours, availability,
More informationUNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
More informationHealth Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
More informationINFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia
INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:
More informationTIMICO LIMITED SERVICE SPECIFIC SCHEDULES
MANAGED DEDICATED SERVERS DEFINITIONS In this Service Specific Schedule, the following expressions shall have the following meanings unless the context otherwise requires: Bug Patch Bug Update Customer
More informationInformation Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
More informationSoftware as a Service (SaaS) Requirements
Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By
More informationIndiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
More informationK-20 Network Acceptable Use Guidelines/Internet Safety Requirements
Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive
More informationCLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
More informationIT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
More informationSTUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
More information2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
More informationM6430a Planning and Administering Windows Server 2008 Servers
M6430a Planning and Administering Windows Server Servers Course 6430A: Five days; Instructor-Led Introduction This five-day instructor-led course provides students with the knowledge and skills to implement,
More informationServer Hosting Request
Server Hosting Request Contact Name: Date: Email Address: Department Information Office: Department: Phone Number: Guidelines Technology Services provides a fee based physical and virtual server hosting
More information70-414: Implementing a Cloud Based Infrastructure. Course Overview
70-414: Implementing a Cloud Based Infrastructure Course Overview This course covers will prepare the student for Exam 70-414: Implementing a Cloud Based Infrastructure. Students will learn how to create
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationAdministrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationCounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
More informationInsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
More informationInformation Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationUsing Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:
Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used
More informationCorporate I.T. Services Limited Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3)
Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3) Course 6415A: Three days; Instructor-Led Introduction This 3 day instructor-led course provides students with an understanding
More informationRL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationUniversity of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
More informationTable of Contents General Policy for service provided by the CLAS Linux Support team... 2
Table of Contents General Policy for service provided by the CLAS Linux Support team... 2 Overview... 2 Defined Support... 2 Support... 2 Operating Systems... 2 Support Restrictions... 3 Software Support...
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
More informationTHE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS This form allows students to grant third parties, including parents, access to their educational records
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationmicros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
More informationRUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology
RUTGERS POLICY Section: 70.2.18 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Server Life Cycle Management Formerly Book: 95-01-11-01:01 Approval Authority: Vice
More informationProduct comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2
Product comparison GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2 General features GFI LanGuard 2014 Microsoft WSUS 3.0 SP2 Scheduled scans Agent-less r Agent-based Integration
More informationDISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
More informationService Level Agreement (SLA)
Service Level Agreement (SLA) Between [Add your department and acronym ()] Technology Systems Division (TSD) Information Technology Unit (ITU) and XYZ For XYZ Service Document Version History Version #
More informationMiami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
More informationProduct comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)
Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active
More informationR345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
More informationTEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationNETWORK SECURITY & PRIVACY SUPPLEMENT
A. ACCOUNT INFORMATION NETWORK SECURITY & PRIVACY SUPPLEMENT THIS SUPPLEMENT IS PART OF THE APPLICATION, INCLUDING A RENEWAL APPLICATION, SUBMITTED BY OR ON BEHALF OF THE APPLICANT FOR THE PROPOSED INSURANCE.
More informationCertification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
More informationManaged ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN - 33 051 775 556
Possibilities that are built in www.telstra.com.au/networkcomputing Managed ICT Services User Guide Corporation Limited ABN - 33 051 775 556 Table of Contents 1. What does this User Guide do?... 3 2. Responsibilities...
More informationAppropriate Use of Campus Computing and Network Resources
The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources Approved by the Council of The Claremont Colleges on 08/20/04 An overall guiding mission of The Claremont
More informationNetwork Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
More informationCLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as
More informationData Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
More informationDISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
More informationCourse Outline: 6436 _ Designing a Windows Server 2008 Active Directory Infrastructure and Services Learning Method: Instructor-led Classroom Learning
Course Outline: 6436 _ Designing a Active Directory Infrastructure and Services Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: At the end of this five-day course,
More informationLunch & Learn Series Subscribe!
Lunch & Learn Series Noon on the 3 rd Tuesday of each month Security.uconn.edu for detailed information L&L RFC Subscribe! Presentation schedule is still being worked out Contact Jason Pufahl (jason.pufahl@uconn.edu)
More informationA Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
More information(PRINT Name of Company) Company Street Address: Company Postal Address: Company Tel/or Cell:
Management Information Systems Support Ministry of Education, Employment & Gender Affairs Representing the Government of the Tender No. DTC-MOE-T1415-001 RECEIPT OF TENDER DOCUMENTS FORM (Notice of Intent
More informationHow To Use A College Computer System Safely
Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in
More informationData Center Application and Equipment Hosting Services Effective April 1, 2009 Revised March 7, 2011
Information Technology Data Center Application and Equipment Hosting Services Effective April 1, 2009 Revised This document outlines the services NUIT provides from the central data centers to host applications
More informationInformation Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
More informationWhat s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
More informationSUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
More informationHIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
Brewster New York 10509 What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an
More information70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day
70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include
More informationvsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationFirewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
More informationOverview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.
Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance
More informationREDCENTRIC MANAGED SERVER SERVICE DEFINITION
REDCENTRIC MANAGED SERVER SERVICE DEFINITION SD062 V1.4 Issue Date 01 July 2014 1) OVERVIEW The Managed Server service (MSS) provides access to Redcentric s 24x7 support capability, technical skills and
More informationDesigning a Microsoft SQL Server 2005 Infrastructure
Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction
More informationDEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
More informationInformation Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
More informationPeter Overgaauw. Solution Consultant. Did you know?
Peter Overgaauw Solution Consultant Virtualisatie in de procesindustrie. 3 November 2013 Did you know? For every dollar spent on a physical machine, approximately 6-8 dollars is spent maintaining it. This
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationDesigning a Windows Server 2008 Active Directory Infrastructure and Services
Designing a Windows Server 2008 Active Directory Infrastructure and Services MOC6436 About this Course At the end of this five-day course, students will learn how to design an Active Directory Infrastructure
More informationPatch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
More informationSERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES
SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied
More informationMANAGED COLOCATION SERVICES TERMS AND CONDITIONS
MANAGED COLOCATION SERVICES TERMS AND CONDITIONS In addition to the General Terms and Conditions, your use of the Managed Colocation Services is subject to the following additional terms and conditions:
More information