Title: DISASTER RECOVERY/ MAJOR OUTAGE COMMUNICATION PLAN
|
|
|
- Aubrie Jacobs
- 10 years ago
- Views:
Transcription
1 POLICY: This policy is intended to address organizational wide communication executed during a or major IS service outage. When a disaster occurs or when any critical system/infrastructure component is unavailable for more than two hours the following procedure should be followed to ensure the appropriate contact occurs with management and end users. Examples of events or Major Outage are but not limited to Catastrophic loss of a Data Center Enterprise wide intrusion by hackers or a Computer virus/worm/trojan Horse Any complete outage of a critical system for more than 2 hours SCOPE: This policy applies without exception to all, and OCIO staff s. DEFINITIONS: I. Critical System Any application listed in the attached Critical Application List PROCEDURE: This section describes the detailed steps to be executed when this policy is activated ACTION 1. When any staff suspects may be experiencing a or Major Outage event follow the Identification. 2. Does the Identification indicate a or Major Outage a) If yes, refer to Policy # X.X.X: Problem Management Call Referral and Escalation / Notification b) If no, call the Help Desk to ensure the issue has been logged and assigned appropriately. End RESPONSIBLE PARTY DR-006 Recovery Communication Plan 9/8/2015 Page 1 of 5
2 ACTION 3. Is this a full scale expected to last more than 24 hours ( to be confirmed )? If yes, refer to Policy # X.X.X: DR Team Activation and go to step 4 If no, continue to step 6 4. Initiate Damage Assessment to determine the extent of the refer to Policy # X.X.X: Damage Assessment RESPONSIBLE PARTY 5. Does the DR Hot Site need to activated? Notify Executive Leadership of intent to declare. Contact Hot Site Vendor to activate the DR Hot Site. If yes, refer to Policy # X.X.X: Recovery Declaration If no, continue to 6 6. Is the / Major outage expected to last more than 8 hours (to be confirmed)? If yes, refer to Policy # X.X.X: Command Center Activation If no, continue to step 7 7. Ensure accurate and timely notifications and updates are distributed throughout management and user community. Refer to Policy # X.X.X Recovery / Major Outage Communication OCIO/ / Management Team 8. Refer to Policy # X.X.X / Major Outage Recovery Steps 9. Refer to Policy # X.X.X Post / Major Outage Analysis RELATED PROCEDURES: Identification. Problem Management Call Referral and Escalation / Notification DR Team Activation Damage Assessment Recovery Declaration Command Center Activation Recovery / Major Outage Communication / Major Outage Recovery Steps DR-006 Recovery Communication Plan 9/8/2015 Page 2 of 5
3 Post / Major outage Analysis ATTACHMENTS: A. Critical Application List B. Communication Scripts C. Management Notification Sheet D. Root Cause Analysis Report Template E. End User Contact Listings POLICY EXCEPTIONS: Date # Description Justification Signature None at this time DR-006 Recovery Communication Plan 9/8/2015 Page 3 of 5
4 PROCEDURAL PROCESS FLOW DIAGRAM: This Process flow represents the major steps to be taken in the event of a or Major Outage Staff Member identifies a or Major Outage / Major Outage Event Step1: Qualify / Quantify the extent of the Outage / 1 / Major Outage Identification No Notify Help Desk to ensure event has been resolved End Step 2: Ensure all, and staff are alerted to the severity of the situation 2 Call Escalation / Notification Step 4: Mobilize Damage Assessment Team to determine the full extent of the outage. Step3: Is the Outage / expected to last more than 24 hours. Initial Assessment Estimate Outage Duration < > hours Damage Assessment Declaration? < 24 hours Step 6: If the Outage / Is expected to last more than 8 hours the Command Center should be established Outage Duration to last more than 8 hours > 8 hours Command Center Activation Recovery Declaration procedure Step 5: Notify hot site vendor of intent to declare. Notify senior management of intent to declare disaster No Step 7: Ensure Management and users are fully informed during the Outage to facilitate patient safety and business continuity. Recovery Major OutageCommunication Step 8: This step outlines some guiding principles that should be observed throughout the recovery process. / Major Outage Recovery Post Major Outage Analysis Recovery / Outage Report and Action Plan Step 9: This procedure describes the analysis required to determine the root cause of the event and creation of a future avoidance plan DR-006 Recovery Communication Plan 9/8/2015 Page 4 of 5
5 POLICY IDENTIFICATION: Policy Title: Recovery/ Major Outage Communication Plan Category: Recovery Original Date: Author: Approved By: Title Signature Stakeholder Representatives Executive Executive REVIEW/REVISION HISTORY: Version Review Date Next Review Date Changes (Y or N) Description of Change (section and description) Review/Revision by Revision(s) approved by Title Signature Title Signature 1.0 Original Initial draft DR-006 Recovery Communication Plan 9/8/2015 Page 5 of 5
Incident Manager. Notified. Major Incident? YES. Major Incident Declared. Initial Communication Drafted. MIH At A Glance. Major Incident Ended
www.majorhling.com www.braunsblog.com A Major Hling Plan Model Desk Manager Business Resolver Teams (BRT) Communications Step 1 Record / Event Recieved Step 2 Classify Refer as Potential Major Manager
Title: DESKTOP TICKET MANAGEMENT PROCEDURE
POLICY: This policy describes the methods by which help desk tickets will be accepted, managed and resolved by. A consistent, high-level process for ticket management is essential to the delivery of high-quality,
Title: SLA INTRANET/EXTRANET
POLICY: Intranet/Extranet availability and response time will be monitored, tracked, and recorded by the Manager of I Net Development to: Insure that acceptable performance of the intranet and extranet
How To Manage Change Management At Uni
Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED
Disaster Recovery Plan Documentation for Agencies Instructions
California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to
Technology Recovery Plan Instructions
State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
Organization. Project Name. Project Overview Plan Version # Date
Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents
Technology Event Notification and Escalation Procedures. Procedure: Technology Event Notification and Escalation. Procedure Date: 10/27/2009
Procedure: Technology Event Notification and Escalation Procedure Date: 10/27/2009 1.0 Purpose Information Technology Services (ITS) provides and manages technology in support of the College mission. Changes
[name of project] Service Level Agreement
[name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off
Fermilab Computing Division Service Level Management Process & Procedures Document
BMC Software Consulting Services Fermilab Computing Division Process & Procedures Document Client: Fermilab Date : 07/07/2009 Version : 1.0 1. GENERAL Description Purpose Applicable to Supersedes This
Policies of the University of North Texas Health Science Center
Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic
DOCUMENT HISTORY LOG. Description
Effective Date: 02/26/2013 Page 2 of 16 DOCUMENT HISTORY LOG Status (Baseline/ Revision/ Canceled) Document Revision Effective Date Baseline 1.0 02/19/2003 Revision 1.1 03/12/2003 Description Revision
White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows
White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows October 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website,
Annex E 24/7 EMERGENCY CONTACT PROTOCOL
Annex E 24/7 EMERGENCY CONTACT PROTOCOL PRIMARY AGENCY: Cascade City-County Health Department INTRODUCTION Purpose The purpose of this protocol is to provide a point of contact for coordinating the response
DIRECTIVE NUMBER: 141.03.04.001 v2.0. SUBJECT: Correctional Integration Systems Change Management Plan
DEPARTMENT OF CORRECTION SUPPORT Management Services DIRECTIVE NUMBER: SUBJECT: Correctional Integration Systems Change PAGE NUMBER: 1 of 10 Adopted: 12-15-03 01.00.00. POLICY OF THE DEPARTMENT It is the
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
Business Continuity Plan. Components and sequencing description
Business Continuity Plan Components and sequencing description This document is designed to help explain the contents of an example Business Continuity Plans, so that team members will have a better understanding
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information
IT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
Attachment N CPIC Vendor Resiliency Business Continuity Planning Questionnaire
Instructions: Citizens Property Insurance Corporation (CPIC) distributes this survey to vendors and business partners used by groups within the Firm, who are critical to the operational readiness of Citizens
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
SERVICE LEVEL AGREEMENT. CUIT Converged Infrastructure: Infrastructure Services for VM Hosting
SERVICE LEVEL AGREEMENT CUIT Converged Infrastructure: Infrastructure Services for VM Hosting Version: 1.0 Author: CUIT Date: August, 2015 Table of Contents 1.0Document Change History 2.0 Overview 2.1
Creating a Business Continuity Plan. What We ll Cover... What is a BCP? Micky Hogue, CRM
Creating a Business Continuity Plan Micky Hogue, CRM Sandia National Laboratories Albuquerque, NM 505-844-6640 [email protected] What We ll Cover... What is a Business Continuity Plan Why create a BCP?
BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES
BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES New rule Current Rule Proposed Rule 4.6.21 Business Continuity Requirements The following requirements
Enterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
Internal Help Desk. Bizagi Suite
Internal Help Desk Bizagi Suite Internal Help Desk 2 Table of Contents Internal Help Desk... 4 Process Elements... 6 Case Opening... 6 Start... 6 Open Case... 6 Element... 7 Close Case... 7 Notify Case
Hospital Authority. Enhanced Contingency Planning for IT System Failures
For discussion on 27.5.2004 AOM-P325 Hospital Authority Enhanced Contingency Planning for IT System Failures Purpose This purpose of this paper is to highlight enhancements to HAHO and IT Contingency Planning
Analytics Reporting Service
1. Rate per month $19.00 per user 2. General Overview: The provides the technologies for transforming large quantities of raw data into useable information serving the agency s functions. includes interactive
Manage IT Service Continuity and Availability
Manage IT Service Continuity and Availability Description School jurisdictions are increasingly dependent upon IT services to support day-to-day activities. The process of managing IT ensures that IT services
Critical Systems Guidelines
Architecture, Standards and Planning Branch Office of the CIO Province of BC Document Version 1.0 April 2015 Table of Contents 1.0 Document Control... 3 2.0 Introduction... 4 3.0 Roles and Responsibilities...
IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY
Department of Health Government of Western Australia IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY 2004 Document Control Date Version Notes Author 10/11/2003 0.1 Initial
SapphireIMS Service Desk Feature Specification
SapphireIMS Service Desk Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
State of Ohio Private Cloud Managing Severity 1 Tickets
State of Ohio Private Cloud Managing Severity 1 Tickets April 29, 2014 Table of Contents 1 Document Overview... 3 1.1 Scope... 3 1.2 Action or Event that Requires the Procedure... 3 1.3 Goal of the Procedure...
IT Disaster Recovery and Business Resumption Planning Standards
Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:
Continuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
Service Desk Management Process
Service Desk Management Process [Month, year] Document No. : Version.Rev : Authorized by: Signature/: Date Prepared by Title Location Version no. Version date Document control sheet Contact for enquiries
Service Level Management
Process Guide Service Level Management Company ABC Service Improvement Program (SIP) Process Guide Service Level Management Table of Contents Document Information... 3 Approval... 4 Section 1: Process
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Patent Public Advisory Committee Meeting. OCIO Update
Patent Public Advisory Committee Meeting OCIO Update John B. Owens II Chief Information Officer September 27, 2012 USPTO Seal IT INFRASTRUCTURE IMPROVEMENT PORTFOLIO - ROAD MAP The Business Problem [In
Improving. Summary. gathered from. research, and. Burnout of. Whitepaper
Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
Position Description
Position Description Position Title: Group/Division/Team: WebCenter / UCM Technical Support Business Technology Services Group / IT Operations Division Date: December 2011 Reports To: Roles Reporting To
Incident Management Policy
Incident Management Policy Draft SEC Subsidiary Document DCC Public 01 July 2015 BASELINED VERSION 1 DEFINITIONS Term Black Start CPNI Code of Connection Crisis Management Disaster HMG Incident Party Interested
CISM Certified Information Security Manager
CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective
Disaster Recovery and Business Continuity
Disaster Recovery and Business Continuity Barbara Nollau Rupert King/Getty Images Computer Systems Quality and Compliance discusses practical aspects of computer systems and provides useful information
State Data Center. VMAX Data Migration Guide
State Data Center VMAX Data Migration Guide Version 1.0 June 26, 2013 Prepared by: Steve Lovaas, Enterprise Projects Client Liaison Contents DOCUMENT REVISION HISTORY... 3 INTRODUCTION AND PURPOSE... 4
RSA SecurID Tokens Service Level Agreement (SLA)
RSA SecurID Tokens Service Level Agreement (SLA) 1. Agreement This Agreement defines RSA SecurID services provided to a Customer. Service definitions include responsibilities, hours, availability, support
Contracting Guidelines with EHR Vendors
Doctors Office Quality - Information Technology (DOQ-IT) Project Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written
Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745
ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0 April 2011 Table of Contents 1 Purpose... 3 2 Terminology... 5 3 Identifying a Privacy Breach... 5 4 Monitoring for Privacy Breaches... 6 5
Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack
Recovery Management Release Data: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 8. RECOVERY MANAGEMENT... 4 8.1. INTRODUCTION TO RECOVERY MANAGEMENT... 4 8.1.1. DEFINITION... 4 8.1.2.
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department
Template K Implementation Requirements Instructions for RFP Response RFP #
Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship
8 Best Practices for IT Incident Management
Solutions for Unified Critical Communications 8 Best Practices for IT Incident Management With Dan Barthelemy, Endurance International Group Agenda Webinar with Endurance International Group + Introduction
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
Attachment M Explore IRP Change Control Process
Attachment M Explore IRP Change Control Process 1.0 Purpose This project is a joint effort between The Michigan Department of State and Explore Information Services, LLC for the implementation of an IRP
How to Plan for Disaster Recovery and Business Continuity
A TAMP Systems White Paper TAMP Systems 1-516-623-2038 www.drsbytamp.com How to Plan for Disaster Recovery and Business Continuity By Tom Abruzzo, President and CEO Contents Introduction 1 Definitions
SERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) applies for all Services agreed through a Yorcard Limited Order Form. All issues and queries (hereafter referred to as issues) should first be
DETAILED RISK ASSESSMENT REPORT
DETAILED RISK ASSESSMENT REPORT Executive Summary During the period June 1, 2004 to June 16, 2004 a detailed information security risk assessment was performed on the Department of Motor Vehicle s Motor
Agenda. Creating a Robust Testing Program. Notification Tests. Overview of Testing. Beverly Schulz, CBCP
Agenda Overview of Testing Notification Tests Tabletop or Walk-through Tests Simulations Technology Outage Tests Third Party Outage Tests Workplace Outage Tests Workforce Outage Tests Reporting Creating
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release
NEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
N e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
Six sigma project management
Six sigma project management Bizagi Suite Six sigma project management 1 Table of Contents Six Sigma Project Management... 3 Process Elements... 9 Project Charter... 9 Define... 11 Measure...12 Analyze...12
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians
Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: [email protected] Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Incident Management help topics for printing Document Release Date: July 2014 Software Release Date: July
Networx Training Q+As Repairs / Trouble Tickets
For repair tickets, what's the difference between CLOSED and RESOLVED? Resolved status means the issue reported has a fix and Verizon is pending verification by the customer before the ticket is closed.
Blackboard Managed Hosting SM Disaster Recovery Planning Document
BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...
Support and Service Management Service Description
Support and Service Management Service Description Business Productivity Online Suite - Standard Microsoft Exchange Online Standard Microsoft SharePoint Online Standard Microsoft Office Communications
Overview of Service Support & Service
Overview of Service Support & Service Delivery Functions ITIL Service Support / Delivery- 1 Service Delivery Functions Availability Management IT Services Continuity Management Capacity Management Financial
Customer Care Center Details
Enterprise IT Shared Services Service Level Agreement Customer Care Center Details (Revision Date: October 7, 2010) Going From Good to Great DOCUMENT CONTROL REVISION HISTORY DATE DESCRIPTION 9.15.10 INITIAL
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
SECURITY THROUGH PROCESS MANAGEMENT
SECURITY THROUGH PROCESS MANAGEMENT Jennifer L. Bayuk Price Waterhouse, LLP Headquarters Plaza North Morristown, NJ 07962 [email protected] Overview This paper describes the security management
Oregon Public Employees Retirement System
Oregon Public Employees Retirement System Signature Paul Cleary Policy/: Security Breach Response Objective: References: Posted date November 24, 2009 Approval date November 13, 2009 Number Page 1 of 5
Annex 9: Technical proposal template. Table of contents
UNFCCC/CCNUCC Page 1 Annex 9: Technical proposal template Table of contents Annex 9... 3 9.1 Technical proposal... 3 9.1.1 Vendor s name... 3 9.2 Engagement model... 3 9.2.1 Type of engagement... 3 9.2.2
Business Continuity. Client Briefing
Business Continuity Client Briefing About this document This document describes Mediaocean s disaster recovery and business continuity policy. Mediaocean LLC. Mediaocean Systems Limited 2015 This manual
MEASURING FOR PROBLEM MANAGEMENT
MEASURING FOR PROBLEM MANAGEMENT Problem management covers a variety of activities related to problem detection, response and reporting. It is a continuous cycle that encompasses problem detection, documentation
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Service Desk help topics for printing
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Service Desk help topics for printing Document Release Date: July 2014 Software Release Date: July 2014 Legal
For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
IT Help Desk Call Priorities
Author Zachary Nashed Document Name Call Priorities Version Control IT Help Desk Priorities_1.01 03/07/08 -Updated IT Help Desk Priorities_1.02 05/08/09-Updated IT Help Desk Priorities_1.03 24//08/09-Updated
