Quality Systems and Procedures Manual Control Copy 4. Contents and Issue Status of Manual. Revision Number

Size: px
Start display at page:

Download "Quality Systems and Procedures Manual Control Copy 4. Contents and Issue Status of Manual. Revision Number"

Transcription

1 Contents and Issue Status of Manual Details of contents Quality Systems and Procedures Manual Section Number Issue Number Revision Number Issue Date Pages All Approved and Issued by: CHAIRMAN, COMPUTER CENTRE Date of issue: Date of Issue: Page No: 1

2 LIST OF CONTROL COPY HOLDERS Control Copy Number Holder Designation 1 Chairman, 2 Office 3 Management Representative - ISO Web Site Date of Issue: Page No: 2

3 QUALITY SYSTEMS AND PROCEDURES MANUAL (QSPM) Amendment Status of QSPM Serial No. Current Issue Amended page Issue Date Procedure Previous Issue Previous Issue Date Comments 1 Full QSPM Date of Issue: Page No: 3

4 . QUALITY MANAGEMENT SYSTEM.1 General Requirements was started in the year 1973 with the commission of IBM Mainframe System to cater the Computing needs of the Students, Faculty and Staff of the Institute who are the Customers. Since then Computer Systems have been upgraded to provide faster and reliable Computational Services for the Customers. Over a period of time, has been evolved and organized into the following verticals currently. 1. Computer Network and Internet 2. High Performance Computing Environment 3. Workflow. E-services 5. Data Centre to provide infrastructure for Hardware. In addition to the above verticals, Helpdesk has separate Professors in charge, System Staff and Project Staff to take care of the smooth operation and maintenance of the above services (APPENDIX I & II)..2. Documentation Requirements.2.1 General: The Quality Policy of the Institute has been displayed at prominent locations in the. The Quality Systems and Procedures Manual for the is the document clearly stating the quality policy and the quality objectives of the. The processes are described in separate charts annexed to this quality manual. The documents and records pertaining to these processes are also listed out separately with unique identification numbers. Some documents and records are in electronic form stored in the Computers. Date of Issue: Page No:

5 .2.2 Quality Manual: The activities of are described in the Quality Systems and Procedures Manual. The Quality System Manual (QSM-I) is the apex manual describing the quality system of the Institute for the that serves, supports and enhances the Computational needs of the Customers, Networking, E-services and Workflow..2.3 Control of documents: Chairman, System Staff, Store Keeper and Office Staff maintain all the documents of the Centre. 1. Quality Systems Manual (QSM I) -Chairman 2. Quality Systems and Procedures Manual - Chairman, CC Office, MR and CC Website The Chairman is the approving authority for this Quality Systems and Procedures manual of the. Whenever a change in the procedure manual is necessitated based on audit findings or request from the users, it is approved by the Chairman and supplied as a new revision. The changes are incorporated in all the Procedure Manuals. Higher Revision Number identifies the changed document. When five revisions are made to any document a higher Issue Number is given. Master copy of this Manual is available with the Chairman marked as MASTER COPY on reverse side. CONTROLLED COPY stamped in colour identifies controlled copies..2. Control of records: List of Records (Appendix III) Chairman, System Staff, Store Keeper and Office Staff maintain all the records of the. APPENDIX III specifies the complete information about records. Date of Issue: Page No: 5

6 5. MANAGEMENT RESPONSIBILITY 5.1 Management Commitment The is committed to provide the support services for smooth and efficient running as stated in the quality objectives. continuously monitors and reviews the quality procedure in order to meet the quality objectives. The commitment to enhance quality of support services is seen from the Quality Policy of the Institute. Customer requirements are addressed in various meetings like HOD s meeting, Staff meeting and CC Committee meeting. Quality Objectives and review on Resources in the are discussed and decided in these meetings. In addition to Quality Policy the Management has a strong commitment in the activities of the, its Upgrades and Infrastructure. Management reviews the activities of in Heads of Department s (HOD) meeting. 5.2 Customer Focus Faculty, Students and Staff of Departments and Sections like Academic, Finance and Accounts, Stores and Admissions Office are the Customers of the. All the Support Services of the are towards facilitating and satisfying the customers. 5.3 Quality Policy The Quality Policy of the Institute is defined in the Quality System Manual (QSM-I). The policy regarding Support services is applicable to. Date of Issue: Page No: 6

7 5. Planning 5..1 Quality Objectives: The quality objectives of the five verticals are specified below. 1. Computer Network: To continuously improve the Computer Networking and Internet facilities in the Campus and achieve excellence in the Customer service. To make Virtual Local Area Network (VLAN) s for faster and better services in all areas of Campus. Monitoring of Network switches every six months and upgrade if need be, based on technology development. Support service response for network complaint is 2 days. 2. High Performance Computing Environment (HPCE): To ensure High Performance Server is available 100% of time for customers. Achieve more than 60% Central Processing Utilization. Response time for HPCE problems will be less than 3 days. 3. Work Flow: Automation of Processes in the Institute Administration, Accounts, Academic, Stores& Purchase and IC&SR. The turnaround time of Support shall be 3 days. Request by Customer for new a process will be reviewed and reported in 5 days. Training for Workflow software modules to users will be given monthly over a period of 1 year.. Date Centre: Zero Downtime for Air conditioners, UPS, BMS and Diesel Generators. Review and carry out Preventive maintenance as per schedule. Plan the Power Capacity and Aircondition on annual basis based on the projected demand. Date of Issue: Page No: 7

8 5. E-Services: To provide all Customers , Authentications like Lightweight Directory Access Protocol (LDAP) and Active Directory Service (ADS), Virtual Private Network (VPN), Antivirus and Web services. Support service response is 3 days Quality Management System Planning: The Quality Management System has been planned keeping in view the Quality Policy of the Institute. To facilitate these activities of the Institute, the Quality System is planned such that the Computer Centre carries out all activities outlined in a structured fashion to achieve the Objectives and ensure integrity of the QSM -I when changes are effected. 5.5 Responsibility, Authority and Communication Responsibility and Authority: The Organisational structure of the is shown in Appendix I. The Duties and Responsibilities of the Chairman and the other Staff of the are shown in Appendix II Management Representative: The Management Representative (MR) is appointed by the Director, Indian Institute of Technology Madras. The MR will co-ordinate all the activities concerned with the Quality Management System of including Internal and External audits. The responsibilities of the Management Representative are listed in QSM-I. Date of Issue: Page No: 8

9 5.5.3 Internal Communication: Most of the Internal Communications are through . A separate account is maintained called ccstaff@iitm.ac.in for common Circulars and Information within the. Communication is also done through Letters and Telephones among the Staff. For External Communications with customers of the Institute is extensively used. Computer Centre also provides a facility in service called announce@iitm.ac.in. Important Circulars and Notices are sent to the announce@iitm.ac.in for information of customers. Information dissemination is also effected through the Website, Management Review The top Management review for the Institute is conducted as defined in QSM-I. The Management reviews the implementation of the Quality System in by the following manner: 1. The Chairman presents the activities of the Centre in HOD s Meeting held once in a month. 2. Internal audits of the Quality System are conducted every six months and the observations, reports and follow up are discussed in the management review conducted twice a year. System Staff Meeting held monthly. 6. RESOURCE MANAGEMENT 6.1 Provision of Resources: IIT Madras provides the following Resources to the to carry out the entrusted activities and to improve the quality of service and enhance customer satisfaction. 1. Manpower 2. Space, Office furniture, Air-conditioners, Computers, Printers and Telephones 3. Photocopying machines, Stationery and consumables. Funds for the services of outside agencies for Infrastructure and Computer Hardware and Software Date of Issue: Page No: 9

10 6.2 Human Resources 6.2.1General: The Staff in the are well versed and trained in their respective fields of activities like Networking, System Administration, Programming and Data Processing. The Staff of are selected based on their qualification and experience to ensure basic level of competency. Project staff and technicians are employed periodically to assist the staff of the computer centre Competence, Awareness and Training: All the Staff members are competent enough in doing their duties and work. System Staff are recruited based on their competence and capability. When augments its resources in the form of new Hardware or Software necessary personnel are sent for Specific Training. In addition Chairman CC maintains performance assessment records of individuals in the department. Based on the assessment, training needs are identified. Training is imparted based on the need identified and the effectiveness is evaluated by re-assessment of the individual s performance after completion of the training. The System Staff are grouped into five categories by the Chairman, namely HPCE, Computer Network, E-services, Data Centre and Workflow. Training for Staff to be imparted is identified based on these Group activities by the Chairman. The staff members of are also sent for training conducted by Human Resource Development (HRD) Section of IIT Madras. 6.3 Infrastructure The has a very good Infrastructure to carry out its services to the Users. It is equipped with High Performance Computer to cater the Customers various Computational works. It has a very High Internet Bandwidth with National Knowledge Network (NKN) and private communications companies. The Institute Backbone Network has the highest available bandwidth of 10Gigabit. All the department buildings are provided with dual backbone connection for fault tolerance. Date of Issue: Page No: 10

11 The Data Centre has facilities like Surveillance cameras, Fire Safety, UPS and Diesel generators to ensure 2/7 power supply and air-conditioning. It has a High Performance Computing Room to host all Servers, Network Room, Network Operator Centre (NOC) to monitor the Campus Network, a Conference room, Staging and Testing Room, UPS Room, Electrical Room, and GAS Cylinder Room. The operation of these facilities is done through Building Management System (BMS). 6. Work Environment has a modern Data Centre hosting all the Compute, Network, Intranet/Internet Servers and Helpdesk service (Tel 5999). The Systems Staff have separate rooms with the provision of Computers, Network and Telephones. Seminar and Store rooms are in the first floor of the Centre. 7. PRODUCT REALIZATION 7.1 Planning of Product Realization The following are the processes of the. Process charts are annexed in this manual. i. High Performance System Administration (PC01) Access to High Performance Computer for Customers is provided by creating User Accounts called Userids. Systems Staff do the technical administration of these Servers for the maintenance of Userids, Passwords, Disk Space, Software and smooth and continuous operation. Backup of the Systems are taken in Hard Disk with the use of procedures running automatically. ii. Network Administration (PC02,PC03 and PC0) Institute has a modern 10Gigabit Backbone network. Network Switches of various configurations are installed in the Campus to provide high speed connectivity for Academic Buildings, Hostels and Residences. System Staff of the do the technical administration and maintenance of the Network. At the NOC, campus network is monitored and logs are maintained for the downtime. Traffic on the leased line to the Internet is monitored using the Network Management Software (NMS). Date of Issue: Page No: 11

12 iii. Workflow Automation (PC05) System Staff are coordinating in the implementation of Workflow for the Sections - Academic, Finance & Accounts, Administration, IC & SR and Stores & Purchase. iv. E-Services (PC06 andpc07) , Virtual Private Network (VPN), Web sites, Web services for Conferences, Authentication (ADS and LDAP) and Antivirus are the support services provided by this process. 7.2 Customer Related Processes Determination of requirements related to the product: and Review of requirements related to the product: Determination of Customer s requirement is done in the CC Committee meetings held periodically, Monthly Staff meetings and s sent to. Generally, customer s needs are High Processing Speed, Fast Internet Bandwidth, Video Conferencing and Virus Alert. Determination of Processing Speed, Internet Bandwidth and Antivirus Software go by the latest technology available in the Computer field Customer communication: Various kinds of communications are followed to reach customers like , Telephones and in Person. has Web site hosting information about the Hardware and Software. The URL is Date of Issue: Page No: 12

13 7.3 Design and Development The on its own does not design any new procedure. development is not applicable to. Hence the design and 7. Purchasing The gets equipment, stationery and consumables for day-to-day office work through Central Stores by periodic indenting. All these are purchased in accordance with the purchase procedures of the Institute. The also purchases service from outside agencies for its smooth and effective running without break and failure. The following are the purchased services: Annual Maintenance Contract (AMC) for High Performance Servers Computer Network switches, Antivirus Security Suite, Maintenance of Generators, Air Conditioners and BMS Purchasing Process: For the Hardware maintenance of the Servers, Network switches and Antivirus Software, AMC is given to the Firms by taking into account their technical capability. Maintenance of air conditioning units is done by authorised service agents selected based on their experience in the field and commercial conditions. An expert committee is constituted by the Chairman to go through this process Purchasing Information: Purchase Orders are placed on the approved Service providers by Central Stores and Purchase Section based on the recommendations of the indicating the approved source and conditions of Purchase Verification of Purchased Product: First level verification of the receipt of the Item as per Purchase Order is done by the Store Keeper. Functional Performance of Computer systems and other Equipment is done by the System Staff and recorded in the Installation report contained in the Invoices. Date of Issue: Page No: 13

14 The performance of the service providers is reviewed periodically before renewing the contract. The performance is reviewed based on the quality of service and response to service calls. 7.5 Production and Service Provision Control of Production and Service Provision: All the processes in the and their measuring and monitoring parameters are described in the annexed flow charts Validation of Processes for Production and Service Provision: The Software development and maintenance of products are checked, approved and validated by the concerned Sections and Departments where the Software are being installed and used. Other Processes are validated for their efficiency during regular Systems Staff meetings Identification and Traceability: While issuing Userids for the Customers, Files are electronically maintained in the respective Servers to trace the userids and identify them. This can be done by simple System Administration commands. Userid forms applied by the Users are maintained by respective System Administrators. DCA, Faculty Advisor and the Users duly sign the forms. They are easily identified and traced. A Computer at the NOC identifies the Network equipment placed at various locations of the Institute. Also documentation (Soft and Hard copies) providing information of the physical locations of these equipments is available with the System Staff for identifying and tracing of the components. The Computers of the Customers placed in the Data Centre are identified by placing stickers prominently on the front of the Computers Customer Property: The Data and Files are the Customers properties residing in various servers belonging to the Computer Date of Issue: Page No: 1

15 Centre. They are easily identified by the Userids issued to them, protected and safeguarded well in Hard disks of the servers. Corruption and Deletion of Files and data are the possible damages that can occur. In these circumstances Customers are informed by the concerned System Administrators of the Servers by or circular. Based on the nature of corruption and customer concurrence necessary damaged data and files are restored by the Administrators from backup. The list of customer s Computers in the Data Centre is shown in APPENDIX IV Preservation of Product: Backup of customer s data and files are taken periodically on Hard Disk as a preventive measure. For the Software products developed and maintained by the, the software will reside in the computers of System Staff and in the Customer Computers as well. They are preserved with Backup. 7.6 Control of Monitoring and Measuring Devices The Data centre is monitored by Building Management System (BMS). Server area Temperatures, Smoke, Fire, Water leakage, Voltage of UPS & EB panel and Surveillance Cameras are covered under BMS. 8. MEASUREMENT, ANALYSIS AND IMPROVEMENT 8.1 General Since the product is essentially, a service, monitoring and measurement is done by the response time to complete the process. Analysis of the service is done by collecting data on the quantum of service rendered and actual time taken to render the service. These data are not only used for System tuning but also for measuring the Servers usage by the Customers. For Network Service, statistical data of Internet bandwidth utilization, statistics on day-to-day customer problem reported and attended are used for analysis and improvement of the service. Date of Issue: Page No: 15

16 8.2 Monitoring and Measurement Customer Satisfaction: Customer Satisfaction will be monitored and measured in the following manner: 1. Systems Staff Meeting held every month. 2. Online Feedback received from Customers twice a year. 3. Monthly HOD s meetings conducted by Director Internal Audits: Internal audits are conducted as specified in the Quality System Manual (QSM-I). The Management Representative will organize and monitor the same Monitoring and Measurement of Processes: and 8.2. Monitoring and Measurement of Product: Since there is no tangible products produced by and it is essentially Service provider, the monitoring and the measurement of the processes are done by the quantum of service rendered and the response to the service in terms of time taken to complete the processes. Measurement for each process is defined in the respective process flow chart. 8.3 Control of Non-conforming Product The typical non-conformances that can occur in the service provided by are nonavailability of server, network, and Internet/Intranet service. The concerned System Staff attends to the problem and ensures that the problem is rectified. Date of Issue: Page No: 16

17 8. Analysis of data Data pertaining to the individual process as defined in the flow chart is collected to monitor the trend of the process. Statistical data of network service like Internet bandwidth utilization graph, data for user problems reported are analysed for improvement. Online feedback data collected for all the services provided by the computer centre is also analysed. The data analysis is also done in the System Staff meeting. 8.5 Improvement Continuous Improvement: Continuous improvement is done in the areas of up-gradation of the hardware, software and service to ensure latest technology is available to our customers of all verticals. Improvements are also done to continuously strive towards achievement of quality objectives Corrective Action: For repeated non-conformances including the customer complaints, the root cause of the problem is identified and action to be taken is determined. The action is initiated and the performance is monitored after initiating the corrective action. The records of corrective action taken are maintained and reviewed for effectiveness Preventive Action: The potential non-conformances are identified and special care is taken to prevent for reoccurring. The records of preventive actions taken are maintained and reviewed for effectiveness. Date of Issue: Page No: 17

18 APPENDIX I ORGANISATIONAL CHART FOR COMPUTER CENTRE CC CHAIRMAN Computer Network E - Services Work Flow HPCE Data Centre Help Desk Office & Stores Prof. In charge& CC Staff Prof. In charge& CC Staff Prof. In charge & CC Staff Prof. In charge & CC Staff CC Staff CC Staff CC Staff Project staff Date of Issue: Page No: 18

19 APPENDIX II DUTIES AND RESPONSIBILITIES Chairman Technical Staff Technical Staff Technical Staff Technical Staff Technical Staff Office & Stores Inte Planning & Administration Goal setting for Computer Centre Action with Customers (HPCE ) System Administration File Management System Security Training to users (NETWORK) Monitoring Campus Network Planning & Implementation Upgrading Internet Bandwidth (WORKFLOW ) Automation of process for sections- Accounts, Academic, IC & SR, Stores & Purchase and Administration. Training to users (e-services) LDAP/ADS VPN Websites Antivirus (DATA CENTRE) Monitoring Air condioners, Generators & UPS Batteries Monitoring BMS Schedule Maintenance File keeping & maintenance and Announcement Purchase orders and AMC files Date of Issue: Page No: 19

20 APPENDIX III MASTER LIST OF RECORDS Sl. No Name of Record Responsibility Hard Copy/ Soft Copy Storage Location Retention Period ID.No 1. User ID Forms HPCE & System Staff Soft Copy CC Website Till User leaves Inst. CC1/CC2 2. Systems Staff Minutes Chairman Soft Copy CC Office 3 Years CCM1 3. HOD Meeting Chairman Hard Copy / Soft Copies CC Office 3 Years CCM2. AMC Service Reports Store Keeper Hard Copy Store Keeper s Office CCAMC1 CCAMC2 CCAMC3 CCAMC 5. Copies of Purchase Orders Store Keeper Hard Copy Store Keeper s Office 3 Years Unique #s given by Store Keeper 6. Staff Training Chairman Hard Copy CC Office CCT1 7. Feed Back Systems Staff Soft Copy Computer Date of Issue: Page No: 20

21 APPENDIX IV LIST OF CUSTOMER S COMPUTERS IN DATA CENTRE SI.NO SERVER 1 GATE 2 JEE 3 CHEMISTRY HOSPITAL 5 LIBRARY 6 ACADEMIC 7 PLACEMENT 8 CPC 9 HOSTEL MANAGEMENT Date of Issue: Page No: 21

22 Process Chart for HPCE PC 01 Sl. No Activity Responsibility Systems Staff Duration Form 1. Customer requests for Computer Account (Userid) CC1-HPCE 2. Customer problems 1 Daily Helpdesk 3. Completion of problems 3 Days 2. Monitoring CPU utilization Daily Measurement Parameter: Response time for the request and problem. CPU utilization above 60%. Date of Issue: Page No: 22

23 Process Chart for Network Administration - PC 02 Sl. No Activity Responsibility Systems Staff Duration Form 1. Customer Complaints 1 Helpdesk 2. Attending the fault 1 Day 2 3. Customer problem (Processing initiation) 3 2 Days Softcopy Measurement Parameter: Response time to attend fault. Date of Issue: Page No: 23

24 Process Chart for Campus Network Administration - PC 03 Monitoring Network Equipments at NOC No Fault FffF aulttt tfaul tfaul t Yes Power, Switch/Link Problem Yes Solved by CC staff within a day Low end switch fault No No Yes Solved by CC staff within a day High End Switch Fault Yes Contact AMC Service Provider Minor fault solved within a day Major fault solved within five days. Measurement Parameter: Response time to attend the fault. Date of Issue: Page No: 2

25 Process Chart for Internet Connectivity - PC 0 Monitoring Internet Link at NOC Fault NO YES Problems at IITM End YES Solved by CC Staff within a day NO Contact Service Provider Solved within a day Measurement Parameter: Response time. Date of Issue: Page No: 25

26 Process Chart Work Flow Automation PC 05 Sl. No Activity Responsibility Duration Forms User Systems Staff 1. Request from Customer for Software Support 1 2 Request from Customer 2. Review of requirement with customer 3 5 Days 3. Software Support Until customer needs Measurement Parameter: Response time for the Review and the Support for the Customer Date of Issue: Page No: 26

27 Process Chart for E-Services PC 06 Sl. No Activity Responsibility Duration Forms User Systems Staff 1. Request from Customer for VPN, Website, ADS,LDAP, Antivirus& Conference Support 1 Help Desk 2. Review of requirement with customer 2 3 Days 3. Technical Support 3 Until customer needs Measurement Parameter: Response time for the Review and the Support for the Customer Date of Issue: Page No: 27

28 Process Chart for E-Services PC 07 Sl. No Activity Responsibility Systems Staff Duration Form 1. Academic/Recruitment send accounts for Customers CC2- 2. Customer problems 1 Daily Helpdesk 3. Completion of problems 2 3 Days Measurement Parameter: Response time to attend calls. Date of Issue: Page No: 28

DATA CENTER SERVICE CATALOG

DATA CENTER SERVICE CATALOG DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI

More information

Network Router Monitoring & Management Services

Network Router Monitoring & Management Services Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER

More information

Server Monitoring & Management Services

Server Monitoring & Management Services Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive

Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive Co-Location Services Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive optimum performance 24x7. SERVICE

More information

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting

More information

Security. Enalyzer A/S

Security. Enalyzer A/S Enalyzer A/S Security At Enalyzer we do our outmost to keep our customer s data safe and our web-based survey systems accessible at any time. Our high level of performance, availability and security are

More information

Dedicated Hosting Services

Dedicated Hosting Services Dedicated Hosting Services Protect and manage your Servers/ Routers/ Switches/ storage devices/ security devices under a highly secure hosting space and get the finest performances out of them. SERVICE

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

DISASTER RECOVERY PLAN

DISASTER RECOVERY PLAN DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

MIS PROJECT COST ESTIMATES. 8.1 Costs CHAPTER 8

MIS PROJECT COST ESTIMATES. 8.1 Costs CHAPTER 8 CHAPTER 8 MIS PROJECT COST ESTIMATES This chapter details the costs involved in implementation of the proposed IS and IT solution for UPID according to the implementation plan provided in chapter 7. These

More information

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements

More information

Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS

Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS Information Disclosure Guidelines for Safety and Reliability IaaS / PaaS Condition 1: Objective information disclosure Information disclosure would be made in a unit each IaaS/PaaS. Condition 2: Definition

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

Dacorum Borough Council Final Internal Audit Report

Dacorum Borough Council Final Internal Audit Report Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA. PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA Milan Paroški 1, Nenad Petrović, Rade Ćirić 2 1 Provincial Authorities Administrative

More information

Discover the Advantage of Having Dyrand at the Controls

Discover the Advantage of Having Dyrand at the Controls Discover the Advantage of Having Dyrand at the Controls Your Virtual IT Department shift Shift Your Focus From IT Concerns To Your Business For most small to mid-sized companies in Canada, an IT Department

More information

SAP HANA Cloud Platform Frequently Asked Questions - Business

SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform 1. What is SAP HANA Cloud Platform? SAP HANA Cloud Platform, the in-memory Platform-as-a-Service offering from SAP,

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

Reduce the cost and delays associated with troubleshooting with the help of round-the-clock Service Desk Support.

Reduce the cost and delays associated with troubleshooting with the help of round-the-clock Service Desk Support. Remote Support Reduce the cost and delays associated with troubleshooting with the help of round-the-clock Service Desk Support. SERVICE DEFINITION: REMOTE SUPPORT SERVICES ITI s Remote Support Service

More information

Cosumnes River College Planning

Cosumnes River College Planning Cosumnes River College Planning TITLE: Information Technology Strategic Plan, March 2014 OFFICE OF PRIMARY RESPONSIBILITY (OPR): COLLABORATIVE GROUPS: REFERENCED DOCUMENTS: Learning Resources and College

More information

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12 Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...

More information

ISO 9001:2015 vs. ISO 9001:2008

ISO 9001:2015 vs. ISO 9001:2008 ISO 9001:2015 vs. ISO 9001:2008 (A side by side comparison) Many people are understandably curious about how the new ISO 9001:2015 stacks up against the existing ISO 9001:2008 standard. Perry Johnson Registrars

More information

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved. KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet

More information

SOLAARsecurity. Administrator Software Manual. 010508 Issue 2

SOLAARsecurity. Administrator Software Manual. 010508 Issue 2 SOLAARsecurity Administrator Software Manual 9499 400 40011 010508 Issue 2 2008. All rights reserved. SOLAAR House, 19 Mercers Row, Cambridge CB5 8BZ.United Kingdom. Telephone +44 (0) 1223 347400, Fax

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Novell ZENworks Asset Management

Novell ZENworks Asset Management Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

General Service Level Agreement

General Service Level Agreement General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop

More information

Powerful Dedicated Servers

Powerful Dedicated Servers Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,

More information

DATA RETENTION POLICY

DATA RETENTION POLICY DATA RETENTION POLICY Contents 1. Key Principles... 3 2. Introduction to the Policy and Guidelines... 3 3. Policy and Guidelines... 4 4. Scottish Ministers Requirements... 5 5. Access to information...

More information

Client Hardware and Infrastructure Suggested Best Practices

Client Hardware and Infrastructure Suggested Best Practices Client Hardware and Infrastructure Suggested Best Practices While it is the responsibility of our Clients to support their hardware and infrastructure, the Pretty Good Practices below are provided for

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

A FAULT MANAGEMENT WHITEPAPER

A FAULT MANAGEMENT WHITEPAPER ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it

More information

Sheridan/Gillette College IT Help Desk Service Level Agreement

Sheridan/Gillette College IT Help Desk Service Level Agreement Sheridan/Gillette College IT Help Desk Service Level Agreement Information Technology Help Desk The IT Help Desk is the single point of contact for all computer, telephone, networking, video conference

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

out of this world guide to: POWERFUL DEDICATED SERVERS

out of this world guide to: POWERFUL DEDICATED SERVERS out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled

More information

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy)

Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) Husborne Crawley Lower School E-Safety Policy (incorporating Computer Network Security Policy) What is E-Safety? E-Safety encompasses Internet technologies and electronic communications such as mobile

More information

Position Summary. Open Position PROGRAMMER III UCD. Non-Exempt. Uncovered DESKTOP SUPPORT/JUNIOR SYSTEM ADMINISTRATOR. Hai Nguyen

Position Summary. Open Position PROGRAMMER III UCD. Non-Exempt. Uncovered DESKTOP SUPPORT/JUNIOR SYSTEM ADMINISTRATOR. Hai Nguyen Page 1 of 5 Position Summary Employee Details Employee First Name: Employee Last Name: Open Position Employee ID: Classification Payroll Title: PROGRAMMER III UCD Payroll Title Code: 7285 Job Group: Overtime

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Supplement to Gaming Machine Technical Standards Consultation

Supplement to Gaming Machine Technical Standards Consultation Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week

Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week IT Services are looking to recruit a Network Support Analyst to be responsible for delivering professional first

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

University of Kent Information Services Information Technology Security Policy

University of Kent Information Services Information Technology Security Policy University of Kent Information Services Information Technology Security Policy IS/07-08/104 (A) 1. General The University IT Security Policy (the Policy) shall be approved by the Information Systems Committee

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5

Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5 Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5 This Service Specification sets out the Service to be provided by Fujitsu under the Agreement. In the event of any conflict between

More information

Samsung Security Solutions

Samsung Security Solutions Print with confidence Samsung Security Solutions For Every Business A4 to A3 Mono to Colour MFPs to Printers Samsung Security Features You may not realise it, but every business can benefit from security.

More information

Microsoft Exchange Online from BT. Service Description (Shared Platform)

Microsoft Exchange Online from BT. Service Description (Shared Platform) Microsoft Exchange Online from BT Version 5.1 January 2004 Confidentiality statement All information contained in this document is provided in confidence for the sole purpose of adjudication, and shall

More information

SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD

SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD 1. PURPOSE & SCOPE: The purpose of security initiative is to enlist the procedures and guidelines, which are

More information

Annual Report 2006-07

Annual Report 2006-07 IT Facilities and Programmes 77 78 Annual Report 2006-07 IT Facilities and Programmes IT Facilities and Programmes In the present era of Information Technology, NISCAIR is making concerted efforts to maximize

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0)

Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Prepared by: State of Indiana Indiana Office of Technology Delivery Services Prepared for: State of

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT HYBRID CLOUD IT PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA Hybrid Cloud

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Network Manager 6.1. Network operations management software. NEC Corporation

Network Manager 6.1. Network operations management software. NEC Corporation Manager 6.1 operations management software NEC Corporation Product Overview Product Features Functions and Features System Examples Product Information (details) Page 2 Page 3 Product Overview MasterScope

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January

More information

The 5 Most Commonly Used Disaster Recovery Process

The 5 Most Commonly Used Disaster Recovery Process DR Risk Assessment White Paper This document provides an overview of Equilibrium s disaster recovery risk analysis and remediation methodology. This methodology was developed over a period of 10+ years

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Method Statement Switchboard Services

Method Statement Switchboard Services CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version 1 Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...

More information

How To Upgrade The Council'S Network Infrastructure

How To Upgrade The Council'S Network Infrastructure Report Asset Management 21 October 2004 I1 ICT INFRASTRUCTURE UPGRADE PROGRAMME 1. Purpose of Report To propose a programme of investment necessary to update our ICT infrastructure, making it fit for purpose

More information

Website Policies 2013

Website Policies 2013 TABLE OF CONTENTS 1. Introduction 2. Website Policies pertaining to NIC Domain 1 2.1 Terms of Use 1 2.2 Website Security Policy 2 2.3 Contingency Management Policy 2 2.4 Copyright Policy 2 2.5 Privacy

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

SolveXia Business Continuity Planning

SolveXia Business Continuity Planning Business continuity planning is the term we use to describe all the steps we take at SolveXia to ensure that our service is up and running when you need it. As a 'Software as a Service' provider, our aim

More information

SITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER. Job Description

SITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER. Job Description SITTINGBOURNE COMMUNITY COLLEGE IT SUPPORT MANAGER Job Description Swale Academies Trust Job Description for Sittingbourne Community College IT Support Manager Sittingbourne Community College IT Support

More information

Private Cloud. One solution managed by Applied

Private Cloud. One solution managed by Applied Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW

More information

ADDENDUM. Dedicated Servers v3.0

ADDENDUM. Dedicated Servers v3.0 ADDENDUM Dedicated Servers v3.0 ICUK is an International Communications company that provides Dedicated Server services to Resellers and Customers, and the said party wishes to obtain those services from

More information

Server application Client application Quick remote support application. Server application

Server application Client application Quick remote support application. Server application The system needs to be Online, with a server hosted as a HTTP/WEB interface. The WEB interface will have a login interface, Administrators can download the server & client application to any desktop to

More information

CLOUD FRAMEWORK & SECURITY OVERVIEW

CLOUD FRAMEWORK & SECURITY OVERVIEW CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

Information Technology Policy

Information Technology Policy Faculty of Computer Science & Information Technology Information Technology Policy Introduction: Faculty of Computer Science and Information Technology mission is to be a Centre of Excellence, internationally

More information

ISP Focus Area 1 IT Infrastructure Assessment

ISP Focus Area 1 IT Infrastructure Assessment ISP Focus Area 1 Bengkel Penyediaan Pelan Strategik IT Universiti Fasa 1 Organized by InfoTech Office 16 17 April 2012 Intekma Resort & Convention Center @ Shah Alam, Selangor, Malaysia To be filled by

More information

This Business Management System Manual is based on ISO 9001:2008 requirements

This Business Management System Manual is based on ISO 9001:2008 requirements Page 1 of 19 (Formerly: Quality Management System Manual) When the ISO 9001:2008 standard is identifying the Quality Manual or Quality Management System, Turbonetics is representing this requirement with

More information

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

North Florida Community College

North Florida Community College North Florida Community College Technology Plan Table of Contents Executive Summary... 3 Technology Vision... 5 Annual Initiatives... 6 2010 Data Center Expansions... 6 The Next 3 Years... 6 Technology

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

North Street Global, LLC. Business Continuity Plan

North Street Global, LLC. Business Continuity Plan Overview North Street Global, LLC. Business Continuity Plan North Street Global holds business continuity for disaster recovery as a high priority. Our goal is to ensure our continued ability to serve

More information