Corporate ICT Asset Management
|
|
- Susan Bishop
- 8 years ago
- Views:
Transcription
1 Policy Corporate ICT Asset Management Please note this policy is mandatory and staff are required to adhere to the content Summary A comprehensive program to monitor the location, use and value of all Information and Communications Technology (ICT) equipment and facilities must be established and maintained. Table 1 - Document details Publication date April 2009 Review date January 2014 Related legislation/applicable section of legislation Related policies, procedures, guidelines, standards, frameworks Replaces ICT Security Policy April 2009 Policy officer (position) Manager, ICT Infrastructure & Asset Management Policy officer (phone) Policy sponsor (position) Executive director responsible (position and office) Applies to Key words Status Approved by Assistant Director, ICT Technical Services Executive Director, Infrastructure All DECD Employees ICT, asset management Approved Executive Director, Infrastructure Approval date April 2009 Version Corporate ICT Asset Management April 2009
2 Table 2 - Revision record Date Version Revision description 2 Corporate ICT Asset Management April 2009
3 Table of Contents Policy... 1 Corporate ICT Asset Management... Error! Bookmark not defined. 1. Title Purpose Scope Policy detail Roles and responsibilities Monitoring, evaluation and review Definitions and abbreviations Supporting documents References...6 Appendix Corporate ICT Asset Management April 2009
4 1. Title Corporate ICT Asset Management 2. Purpose A comprehensive program to monitor the location, use and value of all Information and Communications Technology (ICT) equipment and facilities must be established and maintained. 3. Scope All DECD employees 4. Policy detail Assets Register Physical Assets Each physical asset above a defined value must be identified and recorded in an Asset Register which is maintained and reconciled by ICT Services. Asset Register Logical Assets All logical Assets comprising packaged software and developed application systems must be identified and recorded in an Asset Register which is maintained and reconciled by ICT Services. Asset Ownership and Protection of Intellectual Property Rights The ownership of, and responsibility for, all ICT equipment and information systems software is vested in ICT Services. This responsibility includes the protection of the Department for Education and Child Development (DECD) Intellectual Property rights over the software. Inventory Review Physical Assets A stock-take of all DECD ICT physical assets must be completed by ICT Services at least annually, and all discrepancies reconciled. Budgets All budgets relating to maintenance, operation and replacement of ICT assets are the responsibility of ICT Services. Asset Replacement A program for regular review and replacement of physical ICT assets must be established to ensure a flexible, effective and cost efficient ICT infrastructure is in place. Appropriate Use 4 Corporate ICT Asset Management April 2009
5 Staff must be conscientious in the business use of DECD information systems and facilities. All use must comply with policies relating to the internet, and acceptable use. Personal Use DECD staff are permitted reasonable personal use of DECD supplied ICT facilities and software as long as that use does not compromise or impact the security of those facilities, DECD information systems and DECD information and does not conflict with the Commissioner for Public Employment s Code of Ethics and DECD policies and standards. Unauthorised Equipment or Software Unauthorised equipment and unauthorised or unlicensed software must not be installed on, attached to or operated on any DECD ICT facilities. Any equipment or software identified as unapproved and/or unlicensed must be removed immediately. Software Inventory Control The purchase, installation, registration, upgrade, disposal and loan of software must be properly coordinated and controlled. Regular reviews must be conducted (via monthly monitoring reports) by the ICT Assets Coordinator Software. Illegal Software Use The number of user licences for approved software must not be exceeded by illegal copying or other means. The requirements of the Copyright Act 1986, as amended, applicable patent law and conditions of use restrictions must be strictly adhered to. 5. Roles and responsibilities Table 2 - Roles and responsibilities Role Authority/responsibility for 6. Monitoring, evaluation and review 5 Corporate ICT Asset Management April 2009
6 7. Definitions and abbreviations Table 3 - Definitions and abbreviations Term Meaning 8. Supporting documents The following whole-of-government policies and DECD policies are relevant and must be read in conjunction with this policy. DECD Policy ICT Security DECD Policy Internet Access and Use DECD Policy Access and Use DECD Standard - Corporate Managed Desktop Environment Information Technology Infrastructure Services Policy Telecommunications Services Policy Personal Computers Policy Microsoft Software MS Select Program Policy ICT Infrastructure Standards Policy 9. References N/A Appendix N/A 6 Corporate ICT Asset Management April 2009
Corporate ICT Change Management
Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced
More informationMobile Communication Device
Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and
More informationInternet Access and Use
Policy Internet Access and Use Please note this policy is mandatory and staff are required to adhere to the content Summary DECD staff must use the Internet in an appropriate and professional manner, and
More informationCorporate ICT Availability
Policy Corporate ICT Availability Please note this policy is mandatory and staff are required to adhere to the content Summary DECD ICT facilities and information must be available during agreed operational
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationJOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER
JOB DESCRIPTION POST TITLE: POST NUMBER: WEB DEVELOPER IT14 GRADE: 9 RESPONSIBLE TO: RESPONSIBLE FOR: LIAISON WITH: BUSINESS DEVELOPMENT & PROJECT MANAGER N/A ICT Team, all users (customers) of MDDC ICT
More informationDraft Internal Audit Report Software Licensing Audit. December 2009
Draft Internal Audit Report Software Licensing Audit December 2009 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
More informationInformation Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
More informationICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
More informationUniversity of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
More informationPlease note this procedure is mandatory and staff are required to adhere to the content
Procedure Glass Replacement Please note this procedure is mandatory and staff are required to adhere to the content This document is currently under review. Please direct any questions regarding this document
More informationAssociated Files: Managing resources. Expected Duration: 2 hours
Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business
More informationLicence Agreement. Document filename. HSCIC Licence Agreement. Directorate / Programme. Solution, Design, Assurance and Standards. Status.
Document filename HSCIC Licence Agreement Directorate / Programme Solution, Design, Assurance and Standards Status Approved Version 1.0 Version issue date 01/04/2013 Licence Agreement INTRODUCTION This
More informationIMPLEMENTATION DETAILS
Policy: Title: Status: 1. Introduction ISP-I11 Software License Regulations Approved Information Security Policy Documentation IMPLEMENTATION DETAILS 1.1. The Software Management Policy (ISP-S13) makes
More informationUniversity of Liverpool
University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review
More informationSOFTWARE ASSET MANAGEMENT POLICY
SOFTWARE ASSET MANAGEMENT POLICY Metadata Author.Contributor Derrick Bates Coverage.spatial UK, Cumbria Creator ICT Client Team Organisational Development Date.issued 1 st May 2008 Description The document
More informationUniversity of Ulster Standard Cover Sheet
University of Ulster Standard Cover Sheet Document Title REMOTE ACCESS STANDARD 2.4 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services Directorate)
More informationCorporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
More informationHarper Adams University College. Information Security Policy
Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationInformation & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
More informationTemporary Records Procedure
Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will
More informationICANWK616A Manage security, privacy and compliance of cloud service deployment
ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1 ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release
More informationResearch Data Management Policy
Research Data Management Policy Version Number: 1.0 Effective from 06 January 2016 Author: Research Data Manager The Library Document Control Information Status and reason for development New as no previous
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationQueensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationThis Policy was approved by 2014.
WEB PUBLISHING POLICY This Policy was approved by Senate onn 4 June 2014 and came into force on 1 July 2014. 1 Introduction Overview This Policy applies to all websites published under the aston.ac.uk
More informationWEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
More informationOpen Data Strategy 2013-2017. Department of Tourism, Major Events, Small Business and the Commonwealth Games. Page 1 of 14
Open Data Strategy 2013-2017 Department of Tourism, Major Events, Small Business and the Commonwealth Games Page 1 of 14 This publication has been compiled by Andrew Dungan, Small Business Division,, Department
More informationAsset management policy
Asset management policy POL-C-002 Version 3.1 26 February 2007 Contents 1. Title... 3 2. Introduction... 3 3. Scope... 3 4. Principles and guidelines... 3 5. Definition of responsibilities... 10 6. References...
More informationData Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
More information(For official use only) 12/12/20/ DEAT/EIA/
DETAILS OF EAP AND DECLARATION OF INTEREST File Reference Number: NEAS Reference Number: Date Received: (For official use only) 12/12/20/ DEAT/EIA/ Application for authorisation in terms of the National
More informationATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
More informationInformation Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
More informationAudit of IT Asset Management Report
Audit of IT Asset Management Report Recommended by the Departmental Audit Committee for approval by the President on Approved by the President on September 4, 2012 e-doc : 3854899 1 Table of Contents EXECUTIVE
More informationEULA - Page 2 of 5 any service, account, computer systems or networks associated with the Internet-based services provided by ESI-TECNALIA.
EULA - Page 1 of 5 END-USER LICENSE AGREEMENT FOR ESI-TECNALIA SOFTWARE IMPORTANT READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
More informationProject Plan (Statement of Work) Data Management Framework PJSM1009
Project Plan (Statement of Work) Data Management Framework PJSM1009 1. DOCUMENT INFORMATION, CONTENT & PURPOSE 1.1 Document Purpose This Statement of Work (SoW) describes the approach to and the management
More informationDraft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
More informationInformation Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
More informationUniversity of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
More informationFELLOWSHIP AND TRAINING GRANTS. Terms and Conditions of Award
FELLOWSHIP AND TRAINING GRANTS Terms and Conditions of Award These terms and conditions relate to fellowships and training grants awarded by the June Hancock Mesothelioma Research Fund (JHMRF). Acceptance
More informationCOMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they
More informationInformation Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
More informationINFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
More informationGrasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
More informationSoftware compliance policy
Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationHighland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
More informationData Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
More informationInformation Security Policy
Information policies and standards Department of Transport and Main Roads Prepared by Enterprise Security Unit Version no. v3.0 Status Final QGCIO ref. QGEA Information Standard, Information Security (IS18)
More informationBAND: 5. 37½ hours per week 1. JOB SUMMARY
POST TITLE: Software Developer BAND: 5 HOURS: ACCOUNTABLE TO: LOCATION: 37½ hours per week Head of Informatics Programme Mamhilad 1. JOB SUMMARY Reporting to Software Development Manager, the post holder
More informationSt Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet
St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources
More informationFiskars Code of Conduct
GROUP POLICY Fiskars Code of Conduct Version history: Person responsible Päivi Timonen, General Counsel Owner Fiskars Ethics Advisory Group Framework 1.A Group Next Revision Date Code Policies Version
More informationIT SECURITY POLICY (ISMS 01)
IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: 12.01.2015 Status: Final Date of Review Recommended by Approved by Information Governance Management Group Trust
More informationAnchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
More informationACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF
ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +
More informationSOFTWARE LICENSING POLICY
SOFTWARE LICENSING POLICY Version 12/12/2012 University of Birmingham 2012 David Deighton, IT Services CONTENTS 1. Policy on Software Licensing... 3 1.1 Software Licensing Compliance... 3 1.2 Software
More informationDate 23 November 2010. Version 02.02. Information Security & Strategy Group. Authorising Body. Chris Drake Julia Harris. Contact
Software Licensing Policies DQ Status Approved Policy DQ Content Authority Supplier Authoriser Contact(s) for Help Description Head of Information security, Julia Harris N/A Software Compliance Manager,
More information1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner
Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner 4. Date created February 2015 5. Date of
More informationREAL ESTATE INSTITUTE OF NEW SOUTH WALES CODE OF PRACTICE
REAL ESTATE INSTITUTE OF NEW SOUTH WALES CODE OF PRACTICE 01. Foreword The Real Estate Institute of Australia encourages the highest standards in real estate practice. Its unceasing aim is that the practice
More informationDocument Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
More informationInformation Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs
Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs NOTE: This is a CONTROLLED Document. Any documents appearing in paper
More informationRemote Access Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationTHE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction
THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the
More informationJoint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009
Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009 The innovative pharmaceutical industry 2 is committed to the transparency
More informationIN THE SPECIAL INCOME TAX COURT - PRETORIA
IN THE SPECIAL INCOME TAX COURT - PRETORIA /jv CASE NO: 10699 DATE: 19/3/2003 In the income tax appeal of: APPELLANT Appellant and THE COMMISSIONER FOR THE SOUTH AFRICAN REVENUE SERVICES Respondent JUDGMENT
More information2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
More informationNew Zealand Institute of Chartered Accountants
New Zealand Institute of Chartered Accountants PS-2 Issued 06/03 Revised 05/08 Amended 07/13 PROFESSIONAL STANDARD NO. 2, 2008 CLIENT MONIES Issued by the Council of the New Zealand Institute of Chartered
More informationProfessional Engineers Acting As Independent Contractors. Prepared by: B. DiStefano P.Eng. / R. Hicks, P.Eng. / L. Mitelman, P.
Professional Engineers Ontario GuidEline Professional Engineers Acting As Independent Contractors Prepared by: B. DiStefano P.Eng. / R. Hicks, P.Eng. / L. Mitelman, P.Eng/ Notice: The Professional Standards
More informationVirginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
More informationAppendix 4C. Quarterly report for entities admitted on the basis of commitments BIOTRON LIMITED. Quarter ended ( current quarter )
Appendix 4C Rule 4.7B Introduced 31/03/00 Amended 30/09/01, 24/10/05, 17/12/10 Quarterly report for entities admitted on the basis of commitments Name of entity BIOTRON LIMITED ABN Quarter ended ( current
More informationTameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
More informationInternal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC
Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC Internal control consists of: Entity level controls these controls relate to the overall control environment and can potentially
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
More informationPolicies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
More informationHow To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
More informationIT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
More informationAPES 310 Dealing with Client Monies
EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies ISSUED: December 2010 Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) Prepared and issued by Accounting
More informationwww.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
More informationIngle Farm East Primary School
Ingle Farm East Primary School Cyber-Safety Policy Endorsed by Governing Council on AUGUST, 2015 Review date AUGUST, 2018 Overview Measures to ensure the cyber-safety of Ingle Farm East Primary School
More informationService Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0
Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations
More informationStaff Member Signature Date Direct Supervisor Related Mater Health Services Position Description attached. Theme Leader Signature Date.
POSITION DESCRIPTION Mothers and Babies Theme Position Title Division Position Purpose Position Scope Occupational Category and Level Reporting Relationship Review Date Next Review Due, Mothers and Babies
More informationDefinitions used in these Grant Conditions can be found at paragraph 13.
GRANT CONDITIONS These Grant Conditions, together with the Award Letter and the Policies and Positions Statements, set out the terms and conditions on which the Grant is made by the Funders to the Host
More informationData Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
More information6 INFORMATION AND TECHNOLOGY RESOURCES
6 INFORMATION AND TECHNOLOGY RESOURCES The City's computer network is available seven days a week, 24 hours a day. The City Clerk s Office, Council and Support Services, provides Members of Council with
More informationCRM in a Day Support Services Agreement
CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft
More information(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
More informationISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
More informationINFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
More informationULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationPolicy and Procedures on Financial Conflict of Interest For Sponsored Programs
PM 2015-02 President Willie Hagan Supersedes PM 01-09 Policy and Procedures on Financial Conflict of Interest For Sponsored Programs 1.0 REFERENCES a) CSUDH PM 01-09 b) California The Political Reform
More informationNOT PROTECTIVELY MARKED. Suffolk County Council DATA QUALITY POLICY
Suffolk County Council DATA QUALITY POLICY This policy is sponsored by the Director of Resource Management on behalf of the Chief Executive of Suffolk County Council. Responsibility for maintaining, reviewing
More information1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationAPES 310 Dealing with Client Monies
M EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) [Supersedes APES 310 Dealing with Client Monies issued
More information