SAM INFORMATION TECHNOLOGY (California Department of Technology) DEFINITIONS (Revised 9/2014)
|
|
|
- Chloe Webster
- 10 years ago
- Views:
Transcription
1 DEFINITIONS The following definitions of administrative and technical terms are provided to assist agencies in their application of information technology policy. The primary source for technical definitions is the Information Processing Systems Technical Report, American National Dictionary for Information Processing Systems, developed by the American National Standards Committee, X3 Information Processing Systems. In some cases the definitions have been modified to meet state needs. Agency: When used lower case (agency), refers to any office, department, board, bureau, commission or other organizational entity within state government. When capitalized (Agency), the term refers to one of the state's super agencies such as the State and Consumer Services Agency or the Health and Human Services Agency. Baseline(d): An approved time phased plan for project work against which project execution is compared to measure and manage cost and schedule performance. A project must be baselined in accordance with the milestones in the approved FSR. A project may not be re-baselined unless an approved SPR is available. California Project Management Methodology. The California Project Management Methodology (CA-PMM) is a customized, orchestrated project management workflow derived from the Project Management Institute s process groups. The CA-PMM identifies 500 hours of effort to be the threshold for requiring CA-PMM project management disciplines. While smaller endeavors are not subject to the CA-PMM, they should still be planned and managed effectively. Cloud Computing: A Model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud Software as a Service (SaaS): The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited userspecific application configuration settings.
2 DEFINITIONS (Cont. 1) Cloud Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems; storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Confidential Information: Information maintained by state agencies that is exempt from disclosure under the provisions of the California Public Records Act (Government Code Sections ) or other applicable state or federal laws. See SAM Section Continuing Costs: Costs associated with the operation and maintenance of an information technology system or application after development and implementation of the system. Critical Application: An application that is so important to the state that the loss or unavailability of the application is unacceptable. With a critical application, even shortterm unavailability of the information provided by the application would have a significant negative impact on the health and safety of the public or state workers; on the fiscal or legal integrity of state operations; or on the continuation of essential agency programs. Data: A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automated means. Data Processing: The systematic performance of operations upon data, e.g., handling, merging, sorting, computing. Synonymous with information processing.
3 DEFINITIONS (Cont. 2) Data Processing System: A system, including computer systems and associated personnel, that performs input, processing storage, output, and control functions to accomplish a sequence of operations on data. Data/Information Storage: The retaining of data/information on any of a variety of mediums (i.e., magnetic disk, optical disk, or magnetic tape) from which the data can be retrieved. Data Transmission: The conveying of data from one functional unit to one or more additional functional units through the transmission of signals by wire, radio, light beam, or any other electromagnetic means. (Voice or video transmissions are not considered data transmission for the purposes of state policy.) Development: Activities or costs associated with the analysis, design, programming, staff training, data conversion, acquisition, and implementation of new information technology applications. Electronic and Information Technology (EIT or E&IT): Includes information technology and any equipment or interconnected system or subsystem of equipment that is used in the creation, conversion, or duplication of data or information. The term electronic and information technology includes, but is not limited to, telecommunications products (such as telephones), information Kiosks and transaction machines, World Wide Web sites, multimedia, and office equipment such as copiers and fax machines. Emergency: A sudden, unexpected occurrence that poses a clear and imminent danger, requiring immediate action to prevent or mitigate the loss or impairment of life, health, property, or essential public services. SAM Section 6560 specifies that emergency expenditures cannot exceed $25,000, unless approved by the Department of Finance. Federated Data Center: A centralized Tier III-equivalent data center providing participating state departments the ability to operate their own environment with a degree of independence in the overall management of their server infrastructure. Federated Data Center (FDC) services will evolve to provide, at a minimum, shared network, storage, and backup infrastructures. Additionally, agencies can plan utilization of the FDC as a disaster recovery site. Hardware: See IT equipment.
4 DEFINITIONS (Cont. 3) Information Processing: The systematic performance of operations upon data, e.g., handling, merging, sorting, computing. Synonymous with data processing. Information Technology: Information technology means all computerized and auxiliary automated information handling, including systems design and analysis, conversion of data, computer programming, information storage and retrieval, voice, video, data communications, requisite systems controls, and simulation. The term "information technology" is commonly abbreviated as "IT". Information Technology Activities: Any activity listed below, or any combination of these activities for a single information technology project, is to be considered an "information technology activity." 1. IT facility preparation, operation and maintenance. 2. Information management planning. 3. Feasibility determination, development and implementation of application systems or programs, or changes to application systems or programs to meet new or modified needs, or maintenance, including: feasibility study preparation, systems analysis, systems design, purchase and installation of software, programming, conversion of data or programs, documentation of systems and procedures, and project appraisal or assessment. 4. Operation of application systems or programs including handling, assembling, or editing of input-output data or media where information technology equipment or information technology personnel are used. 5. Services or equipment received through an EDP Master Agreement. 6. Acquisition, installation, operation, and maintenance of data processing equipment.
5 DEFINITIONS (Cont. 4) 7. Other installation management activities including performance measurement, system tuning, and capacity management. 8. Preparation and administration of requests for proposals or bid solicitations for contracts for any of the above activities. 9. Preparation of contracts, interagency agreements, and purchase estimates for any of the above activities. 10. Employment of personnel in support of, or directly related to, any of the above activities, including: administration, technical services, clerical services, travel, training, and preparation of periodic and special reports. 11. Control functions directly related to any of the above activities. Information Technology Expenditure: The expenditure of funds regardless of source by any state entity for information technology activities, equipment, facilities, personnel, services, supplies and the automated processing of information. Information Technology (IT) Project Oversight Framework: Minimum requirements for IT project management, risk management and IT project oversight activities for departments and agencies. Description of control agency project reporting requirements and processes for assessing department and agency project management and oversight activities. See SIMM Section 45. Information Technology Procurement: Any contract, interagency agreement or purchase estimate to conduct any activity listed below, or any combination of these activities is to be considered an "information technology procurement." 1. IT facility preparation, operation and maintenance. 2. Development and implementation of application systems or programs, or changes to application systems or programs to meet new or modified needs, or maintenance, including: feasibility study preparation, systems analysis, systems design, purchase and installation of software, programming, conversion of data or programs, documentation of systems and procedures, and project appraisal or assessment. 3. Operation of application systems or programs including handling, assembling, or editing of input-output data or media where information technology equipment or information technology personnel are used. 4. Services or equipment received through an EDP Master Agreement.
6 DEFINITIONS (Cont. 5) 5. Acquisition, installation, operation, and maintenance of data processing equipment. 6. Other installation management activities including performance measurement, system tuning, and capacity management. 7. Employment of personnel in support of, or directly related to, any of the above activities, including: administration, technical services, clerical services, travel, training, and preparation of periodic and special reports. 8. Control functions directly related to any of the above activities. Information Technology Project: An endeavor with a defined beginning and end, undertaken to meet unique goals and objectives that encompasses computerized and auxiliary automated information handling, including systems design and analysis, conversion of data, computer programming, information storage and retrieval, data transmission, requisite system controls, simulation, and related interactions between people and machines. Input-Output Unit/Device: A unit or device in an IT system by which data may be entered into the system, received from the system, or both. IT Equipment: Information Technology devices used in the processing of data electronically. The following are examples of IT equipment: 1. Mainframes and all related features and peripheral units, including processor storage, console devices, channel devices, etc.; 2. Minicomputers, midrange computers, personal computers, laptop, tablets, smart phones and all peripheral units associated with such computers; 3. Special purpose systems including word processing, Optical Character Recognition (OCR), bar code readers/scanners, and photo composition; 4. Communication devices used for transmission of data such as: modems, data sets, multiplexors, concentrators, routers, switches, local area networks, private branch exchanges, network control equipment, or microwave or satellite communications systems; and
7 DEFINITIONS (Cont. 6) 5. Input-output (peripheral) units (off-line or on-line) including: display screens, optical character readers, magnetic tape units, mass storage devices, printers, video display units, data entry devices, plotters, scanners, or any device used as a terminal to a computer and control units for these devices. IT Personnel: All state personnel employed in IT or telecommunications classifications as defined by the Department of Human Resources or by the Trustees of the California State University and Colleges, and all personnel of other classifications in state agencies who perform information technology activities for at least 50 percent of their time. Users of personal computers and office automation are not included in this category unless they are in information technology classifications or spend at least 50 percent of their time performing information technology activities. IT Supplies: All consumable items and necessities (excluding equipment defined as IT equipment) to support information technology activities and IT personnel, including: 1. Documents (such as standards and procedures manuals, vendor-supplied systems documentation, and educational or training manuals); 2. Equipment supplies (such as printer forms, punch card stock, disk packs, "floppy" disks, magnetic tape, and printer ribbons or cartridges); and 3. Furniture (such as terminal tables and printer stands). Life Cycle: The anticipated length of time that the information technology system or application can be expected to be efficient, cost-effective and continue to meet the agency's programmatic requirements. Synonymous with operational life system. Maintenance: Activities or costs associated with the ONGOING UPKEEP of operational applications of information technology. Maintenance includes correcting flaws, optimizing existing systems or applications, responding to minor changes in specified user requirements, renewal of equipment maintenance agreements, and meeting normal workload increases using substantially the same equipment, facilities, personnel, supplies and software. Mobile Web: Mobile Web refers to browser-based access to the Internet or Web applications using a mobile device, such as a smart phone, connected to a wireless network.
8 DEFINITIONS (Cont. 7) Network Equipment: Equipment facilitating the use of a computer network. This includes routers, switches, hubs, gateways, access points, network bridges, modems, firewalls, and other related hardware and software. One-Time Costs: Costs associated with the analysis, design, programming, staff training, data conversion, acquisition, and implementation of new information technology applications. See State Information Management Manual (SIMM) Section 20 (Economic Analysis Workbook Package). Open Source Software: Software that includes distribution terms that comply with the following criteria provided by the Open Source Initiative: (The open source definition used here is from the Open Source Initiative and is licensed under a Creative Commons Attribution 2.5 License ( 1. Free Redistribution: The software can be given as part of a package with other applications; 2. Source Code: The code must either be distributed with the software or easily accessible; 3. Derived Works: The code can be altered and distributed by the new author under the same license conditions as the product on which it is based; 4. Integrity of the author's source code: Derived works must not interfere with the original author's intent or work; 5. No discrimination against persons or groups; 6. No discrimination against fields of endeavor: Distributed software cannot be restricted in who can use it based on their intent; 7. Distribution of license: The rights of the program must apply to all to whom the program is re-distributed without need for an additional license; 8. License must not be specific to a product; Meaning that an operating system product cannot be restricted to be free only if used with another specific product; 9. License must not contaminate other software; and 10. License must be technology-neutral.
9 DEFINITIONS (Cont. 8) Operational Life: See life cycle. Operations: Activities or costs associated with the CONTINUED USE of applications of information technology. Operations includes personnel associated with computer operations, including network operations, job control, scheduling, key entry, and the costs of computer time or other resources for processing. Peripheral Unit/Device: With respect to a particular processing unit or device, any equipment that can communicate directly with that unit or device. Power Management: A feature of some electrical appliances, especially copiers, computers and computer peripherals such as monitors and printers, which turns off the power or switches the system to a low-power state when inactive. Previously Approved Effort/Project: An information technology activity or project previously approved by the Department of Technology (or the Office of the State Chief Information Officer (OCIO) prior to January 1, 2011, or Finance prior to January 1, 2008) or the agency's executive officer in accordance with SAM Section Qualification of an activity as a previously approved effort requires an approved Feasibility Study Report (FSR) AND an approved Post-Implementation Evaluation Report. Applicable activities include meeting modified needs, improving the effectiveness of the activity, program or system maintenance, or extension of existing services to new or additional users performing essentially the same functions as those that the project was designed to support. A previously approved effort/project must use substantially the same equipment, facilities, technical personnel, supplies and software to meet substantially the same requirements or to meet normal workload increases. : (Note: "Substantially the same equipment" does not include the addition, upgrade or replacement of a central processing unit.) Program: A sequence of instructions suitable for processing. See information processing or data processing. Programming: The designing, writing, testing, debugging, and documentation of programs. Project: An endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. (See information technology project.)
10 DEFINITIONS (Cont. 9) Project Oversight: An independent review and analysis to determine if the project is on track to be completed within the estimated schedule and cost, and will provide the functionality required by the sponsoring business entity. Project oversight identifies and quantifies any issues and risks affecting these project components. Proprietary Software: Computer programs which are the legal property of one party, the use of which is made available to a second or more parties, usually under contract or licensing agreement. Public Facing Applications: Any web-facing application designed and delivered with the intent of access by individuals or organizations over the public internet. Public facing applications are exposed to the broadest base of potential users (e. g. citizens), and are accessed via a web-browser. Public Information: Any information prepared, owned, used or retained by a state agency and not specifically exempted from the disclosure requirements of the California Public Records Act (Government Code Sections ) or other applicable state or federal laws. Sensitive Information: Information maintained by state agencies that requires special precautions to protect it from unauthorized modification or deletion. See SAM Section Sensitive information may be either public or confidential (as defined above). Server Room: Any space that houses computer operations. Such computer operations could utilize mainframes, servers, or any computer resource functioning as a server. Shutdown: Turning the power off in a controlled manner. Software: Programs, procedures, rules, and any associated documentation pertaining to the operation of a system. (Contrast with hardware.) Statewide Information Management Manual (SIMM): The Statewide Information Management Manual (SIMM) as structured by the Department of Technology contains instructions and guidelines as well as samples, models, forms and communication documents that state agencies either must use, or will find helpful to use, in complying with established state policy relating to IT. For clarity, references in SIMM to "Department of Finance" that are not related to budget documents such as Budget Change Proposals or Finance Letters, should be read as references to the "California Department of Technology".
11 DEFINITIONS (Cont. 10) System Standby: A low power mode for electronic devices such as computers, televisions, and remote controlled devices (aka sleep mode ). These modes save significant electrical consumption compared to leaving a device fully on and idle but allow the user to avoid having to reset programming codes or wait for a machine to reboot. Technology Letter: Letters issued by the Department of Technology conveying official communications regarding state information technology (IT), announcing new (or changes to existing) IT policies and procedures, or announcing new (or changes to existing) state IT services or standards. Telecommunications: Includes voice and data communications, the transmission or reception of signals, writing, sounds, or intelligence of any nature by wire, radio, light beam, or any other electromagnetic means. Tier III-Equivalent Data Center: Data Center facility consisting of multiple active power and cooling distribution paths; however, only one path is active. The facility has redundant components and is concurrently maintainable providing % availability. Validation: The process of evaluating software during or at the end of the development process to determine whether it satisfies specified requirements. [IEEE-STD-610] Verification: The process of evaluating software to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase. [IEEE-STD-610] Virtualization: A framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others. Workload Increase: Employing substantially the same resources (equipment, facilities, personnel, supplies, software) to process a greater volume of the same or similar information. The results of the processing are the same or similar outputs distributed to comparable users.
Enterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE DATA PROCESSING OPERATOR 11425 4-16-89 DATA PROCESSING ASSISTANT
ICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT
InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS
CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS April 2014 Cloud Conceptual Reference Model The ease of use a Cloud Consumer experiences results from a complex, behind-the-scenes, orchestration of interchangeable,
Tutorial on Client-Server Architecture
Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006
Virtualization 101: Technologies, Benefits, and Challenges A White Paper by Andi Mann, EMA Senior Analyst August 2006 Table of Contents Introduction...1 What is Virtualization?...1 The Different Types
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2012
ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2012 Infocomm Development Authority of Singapore 10 Pasir Panjang Road #10-01 Mapletree Business City Singapore 117438 Republic of Singapore Tel: (65) 6211-0888 Fax:
Sample Career Ladder/Lattice for Information Technology
Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
INFORMATION SECURITY OVERVIEW
INFORMATION SECURITY OVERVIEW December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 SECURITY POLICY HIGHLIGHTS... 1 1.1.1 INFORMATION SECURITY POLICY RECAP... 1 1.1.2 NETWORK POLICY RECAP... 2 1.2 COMPUTER
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
HHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro
Cloud definitions you've been pretending to understand Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro You keep using that word cloud. I do not think it means what you think it
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet
Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
CONFIGURATION MANAGEMENT PLAN GUIDELINES
I-680 SMART CARPOOL LANE PROJECT SYSTEM ENGINEERING MANAGEMENT PLAN CONFIGURATION MANAGEMENT PLAN GUIDELINE SECTIONS: PLAN GUIDELINES 1. GENERAL 2. ROLES AND RESPONSIBILITIES 3. CONFIGURATION MANAGEMENT
GRAND ERIE DISTRICT SCHOOL BOARD
D-2-c GRAND ERIE DISTRICT SCHOOL BOARD TO: FROM: RE: John Forbeck, Director of Education & Secretary David Abbey, Assistant Superintendent of Education Information Technology Services Annual Report DATE:
The HIPAA Security Rule: Cloudy Skies Ahead?
The HIPAA Security Rule: Cloudy Skies Ahead? Presented and Prepared by John Kivus and Emily Moseley Wood Jackson PLLC HIPAA and the Cloud In the past several years, the cloud has become an increasingly
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description. DEPARTMENT: Technology Services SALARY: Range 13 Salary Schedule A
SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description TITLE: Database Administrator CLASSIFICATION: Non-Represented Management, Classified SERIES: Coordinator III FLSA: Exempt JOB CLASS CODE: 1972
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
CSO Cloud Computing Study. January 2012
CSO Cloud Computing Study January 2012 Purpose and Methodology Survey Sample Survey Method Fielded Dec 20, 2011-Jan 8, 2012 Total Respondents Margin of Error +/- 7.3% Audience Base Survey Goal 178 security
Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy
Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
INFORMATION SYSTEMS SPECIALIST 8 1488
INFORMATION SYSTEMS SPECIALIST 8 1488 SERIES DESCRIPTION The INFORMATION SYSTEMS SPECIALIST (ISS) classification series has eight levels that describe technical and professional non-supervisory positions
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
CLASS SPECIFICATION Systems Support Analyst II
San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
ICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
MIS PROJECT COST ESTIMATES. 8.1 Costs CHAPTER 8
CHAPTER 8 MIS PROJECT COST ESTIMATES This chapter details the costs involved in implementation of the proposed IS and IT solution for UPID according to the implementation plan provided in chapter 7. These
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Electronic Records Management Guidelines
Electronic Records Management Guidelines Contents Section 1: Authority... 1 Section 2: Purpose and Scope... 1 Section 3: Records Custodian Responsibilities... 2 Section 4: Information Systems that produce,
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
INFORMATION SYSTEMS SPECIALIST 4 1484
INFORMATION SYSTEMS SPECIALIST 4 1484 SERIES DESCRIPTION The INFORMATION SYSTEMS SPECIALIST (ISS) classification series has eight levels that describe technical and professional non-supervisory positions
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
The Key Components of a Cloud-Based UC Offering
The Key Components of a Cloud-Based UC Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech primer and find new
The Key Components of a Cloud-Based Unified Communications Offering
The Key Components of a Cloud-Based Unified Communications Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM Subject: Hardware and Software Management Approval: Brent Wahlquist Subject Number: IT-2 Transmittal
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
How To Run The Library At The University Of Florida
FLORIDA CENTER FOR LIBRARY AUTOMATION Information and Communication Technology Resources Strategic Plan July 1996-June 2001 November 1995 EXECUTIVE SUMMARY Florida Center for Library Automation Mission:
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Ames Consolidated Information Technology Services (A-CITS) Statement of Work
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Senior Network Administrator Page 2
Long Beach Community College District CLASS SPECIFICATION Senior Network Administrator Date Adopted: May 22, 2006 FLSA Status: EEOC Job Category: Union Representation: Non-Exempt Professionals Represented
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Applying CMMI SM In Information Technology Organizations SEPG 2003
Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University
CLASS SPECIFICATION Systems Support Analyst I
San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
Information Systems: Definitions and Components
Information Systems: Definitions and Components What Is an Information System? Information system has been defined in terms of two perspectives: one relating to its function; the other relating to its
NETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
Federal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
Telework and Remote Access Security Standard
State of California Office of the State Chief Information Officer Telework and Remote Access Security Standard SIMM 66A March 2010 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES Initial
Federal Sustainable Print Management Policy Template
Introduction The policy language in this document is provided as an example of the type of language your organization can include in a print management policy, directive, memorandum, or guidance (in italics
Virtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
