Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.
|
|
|
- Lynne Fox
- 10 years ago
- Views:
Transcription
1 Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 06/01/ L Wyatt Addition of storage media 16/03/ Liam Wyatt Update storage media in introduction and update to hardware / software support list
2 Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities within this Standard 3 Maintain an Inventory 3.1 Asset Inventories 3.2 Hardware Inventory 3.3 Component Data Notebook/PC/Server 4 Asset Maintenance 4.1 Inventories 4.2 Removal, Re-use and Disposal of Assets 4.3 Software Licensing 5 Asset Classification 5.1 Principles 5.2 Classification Scheme 6 Equipment Maintenance
3 Page 3 1. Introduction Information and information systems are important corporate assets and it is essential to take all the necessary steps to ensure that they are at all times protected, available and accurate to support the operation and continued success of the Trust. The Trust acknowledges that we must demonstrate to third parties our expertise in security technology and implementing it. To achieve this it is recognised that we must protect our own assets as well as the environment. The aim of the Trust s Security Policy, Security Standards and Work Instructions Manual is to maintain the confidentiality, integrity and availability of information stored, processed and communicated by and within The Walton Centre. These standards, procedures and policies are used as part of the information security management system (ISMS) within The Walton Centre. A mandatory requirement for BS7799 certification is to have a clear understanding of the information assets involved and to document these in an Information Asset Register. The Information Asset Register also forms a key input to the Risk Assessment, another mandatory requirement for certification. The purpose of this Information Asset Register is to identify the different types of information processed, stored and communicated by The Walton Centre. The Information Asset Register is essential to the Risk Assessment and for compliance with BS7799, because it is the foundation for the selection and deployment of security controls. This Information Asset Register includes all information assets relevant to the clients Information Security Management System (ISMS) and details the classification and ownership of each of the information assets. It is important to ensure that the Information Asset Register is kept under control and updated as necessary. The Information Asset Register should be updated every time the details of one of the information assets are changed. This document outlines the standards and procedures for the recording, control, auditing, and disposal of information assets. It also includes standards and procedures for change control and hardware updates.
4 Page 4 An information asset can exist in several formats, both in terms of the physical media on which the data is stored and in terms of whether it is permanently or temporarily stored. This affects the security controls that may be applied as a result of the Risk Assessment, e.g. paper documents may be locked in a cabinet whilst files stored on a network drive may require setting of system access rights for protection. The sub sections below detail each of these basic categories. Paper Electronic Much of the information exists in conventional paper form, although it is likely that originally it would have been produced on a computer. Also in this category are printouts of electronic documents, files and logs. This is data that is stored electronically, either within (the client s) equipment or on electronic media. Data stored within the equipment is most commonly stored on an internal hard disk. Protection of this is ensured through the physical access to the machine and through the logical controls that are managed through the configuration of the operating system. This data may be backed up or copied onto other media, including floppy disks, CD-ROMs/DVD s, tapes, USB devices and Pen Drives. These are protected through physical measures in a similar manner to paper documents. A summary of the media types is given below: Floppy disk These are 3.5-inch diskettes with a storage capacity of 1.44Mb readable by virtually any computer; CD-ROM These have a capacity of 650Mb and exist in two formats, CDR, which can be written to once and cannot be erased and CDRW, which can be rewritten in a similar manner to floppy disks; DVD-ROM These have a capacity of 4.7 Gb and exist in two formats DVDR which can be written to once and cannot be erased and DVDRW, which can be rewrited
5 Page 5 Pen Drives/USB Drives This are portable storage device s which can be rewritten as often as the user likes the size of the storage is up to 4gb and over depending on current technology. Tape storage Tape cartridges that require a specialist device to read and write data to. These can have various capacities, up to several Gbs. 2. Responsibilities Within This Standard Particular responsibilities within the standard are defined as:- Review and Maintenance Approval Local adoption Compliance Monitoring Information Security Officer Information Security and Governance Group Line Managers and Contractors (in scope) All Staff and contractors (in scope) Information Security Officer Information Security Auditor 3. Maintain an Inventory The document incorporates the following sections: Asset Inventories Procedures. Asset Maintenance Procedures. Software Licensing Procedures.
6 Page 6 Document Classification. 3.1 Asset Inventories It is important that we standardise the hardware asset register, using an easy to read, and track naming convention. Each hardware device will have an asset tag placed in a visible location, no tags should be placed over any existing serial numbers. The asset tag should show example Insert detail 3.2 Hardware Inventory Registers All hardware devices are entered onto an electronic asset register accessed only by staff within the Informatics Services Department. The following information will be collected relating to equipment purchased though the Informatics Services Department Manufacturer, product description and model/serial number. Any purchase/lease information where available, (details of lease agreement to be referenced). Owner of equipment. 3.3 Component Data PC/Notebook/Server Manufacturer, product description and model/serial number. Software installed, manufacturer, product and version. Configuration, Build. Business Owner.
7 Page 7 4. Asset Maintenance 4.1 Inventories All Asset registers must be reviewed every 3 months, but constantly updated when changes occur, by the IT Support Manager / Deputy Head of IT A network audit can be carried out at any time using the Audit Wizard software can look at the following information Category (PC,Server,Printer) Make (Dell, Compaq ect) Model (Dell insparon) Hardware o Bios (Date, Manufacturer, Version) o Number of drives including letters (Type, Size, Label, Free Space ) o Environment Strings o Graphics (Adapter, Colour Depth, Monitor, Resolution) o Memory (Type, Size, Number, Capacity) o Motherboard (Processor, Bus type, Co-processor, Speed, Sockets, Voltage) o Network (IP Address, Logon Client, MAC Address, Network Adapter, Protocols, User Name) o Peripherals (All attached peripherals) o Sound, Video and Games Controllers o USB (All Devices) User information Software installed (licences) The software can also check internet history and cookies installed on the machine Software audits and spot checks maybe periodically be carried out at any time. Asset tags must verify the identical information in accordance with the Asset register; any missing or damaged tag must be replaced immediately. If any part of the asset register does not match the piece of hardware/software/data then changes should be made and recorded. Any unlicensed software identified will be removed immediately, and cannot be reinstalled until a license is purchased.
8 Page Removal, Re-use and Disposal of Assets Any equipment considered out of date, redundant or inoperable, beyond cost effective repair will be dealt with in the following manner. The IT department must be consulted when any piece of equipment is deemed to be obsolete or redundant, so they can make the decision as to whether it can be used else where within the company. This must be done prior to its removal. If no alternative use has been identified, then the piece of equipment must be completely sanitised, including the destruction of disks prior to disposal. All asset tags shall be removed and the relevant register amended. The following company has been authorised to dispose of equipment in a safe manner Insert detail Media shall be disposed of in a manner appropriate to the media concerned. This shall comprise:- HARD DISKS - by means of degaussing to remove data FLOPPY DISKS, TAPES and CD S by physical destruction under guidance of IT Documentation by shredding 4.3 Software Licensing The majority of software used by The Walton Centre is covered by corporate license agreements with the vendors, or under natural license agreements. It is the responsibility of IT Systems Manager to ensure that The Walton Centre has the correct numbers of licenses for software that has no agreement in place. All licenses are kept by IT Systems Manager in the filling system setup as part of the Informatics Services Department documentation. Under no circumstances must employees download or bring in unlicensed software, if there is a requirement to test new software, it must first be installed in a staged environment, and once approval has been granted by IT Systems Manager, he/she must ensure that adequate licenses are purchased to support the Company s needs.
9 Page 9 5. Asset Classification 5.1 Principles Information assets represent a valuable resource to the organisation and as such require protection. However, the information held and used by the organisations varies greatly in its value and as such it may be treated with equally varying degrees of security. In order for this to be workable it is necessary to establish a clear classification scheme to apply to all information. This classification scheme, allied to removal, disposal, handling procedures etc will provide guidance to staff in the effective management of information. It is the responsibility of all employees to ensure that all data created, stored or used by them have the correct classification associated with it. If documents fall into the restricted or confidential categories then it is your responsibility to ensure it is labelled and handled correctly. 5.2 Classification Scheme The NHS does not current use, nor does it advocate, any form of information classification. Given the cross organisational delivery of patient care it is not appropriate for individual organisation to develop a classification in isolation of its potential care partners. Work is being undertaken at national level to develop an NHS wide scheme which will be adopted by the Trust in due course. 6. Equipment Maintenance One threat to the Trust s computer-based systems (& hence its business continuity) is that of equipment breakdown or failure. To overcome this, an equipment maintenance strategy has been developed. The servers and other equipment are, generally, extremely reliable so it is not necessary to have regular, planned maintenance carried out by manufacturers engineers. The strategy adopted is a combination of built-in redundancy, call-out maintenance contracts and in-house repair with equipment still under warranty being repaired or replaced by the supplier or manufacturer as required. This section outlines the processes in place to maintain the Trusts equipment.
10 Page 10 The following are contact details for all external support companies used by The Walton Centre to maintain all hardware and software The first point of contact for all quires is the IM&T Help Desk ext Insert detail all calls will be logged then escalated if required;
11 Page 11 Hardware Hardware Department Contact Support Company Contact information Software Software Department Contact IM&T contact Company Contact information
12 Page 12 Software Department Contact IM&T contact Company Contact information
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
Tech Application Chapter 3 STUDY GUIDE
Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Using WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
How To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 2.2 Approved by : Information Governance
Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 8 Secondary Storage McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Distinguish between primary and secondary storage Describe
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Types Of Storage Device
Types Of Storage Device by AA A POG D EE SRM U Outline Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices hold data, even when the
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
Remote Working and Portable Devices Policy
Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review
IT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
Destruction and Disposal of Sensitive Data
Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
Compaq Presario MyMovieSTUDIO. Getting Started
Compaq Presario MyMovieSTUDIO Getting Started Congratulations and welcome to the Compaq Presario MyMovieSTUDIO leading edge digital video editing and DVD authoring desktop computer. You ve purchased a
Walton Centre. Document Control. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain
Page 1 Walton Centre Document Control Document History Date Version Author Changes 01/10/2004 1.0 A Cobain Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This Document
Software Installation and Creating a New Company
Chapter 1 Software Installation and Creating a New Company OBJECTIVES: 1 System Requirements 2 Software Installation 3 Starting QuickBooks and Creating a New Company 4 Backing up Company Data 5 QuickBooks
Chapter 8 Memory Units
Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Secure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
EUCIP IT Administrator - Module 1 PC Hardware Syllabus Version 3.0
EUCIP IT Administrator - Module 1 PC Hardware Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted by ECDL
Graphic Communication
Graphic Communication St Pauls RC Academy Computer Hardware CDT Department Hardware Devices Hardware is the name given to any piece of equipment that is used along side a computer (including the main computer
NCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
Simple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
HSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
VAIO Computer Recovery Options Guide
VAIO Computer Recovery Options Guide This guide provides information about restoring individual software programs, software drivers, drive partition(s), or the hard disk drive to the original factory settings.
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
HP Compaq Thin Client Imaging Tool HP Compaq Thin Client t5000 Series
thin clients april 2003 instructions. HP Compaq Thin Client Imaging Tool HP Compaq Thin Client t5000 Series Table Of Contents Table Of Contents... 1 Abstract... 2 Introduction... 2 System Requirements...
hp pavilion home pc hp dvd writer
hp pavilion home pc hp dvd writer The information in this document is subject to change without notice. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
Countering and reducing ICT security risks 1. Physical and environmental risks
Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:
State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2
ITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Vendor Questions Infrastructure Products and Services RFP # 13-02-038
Vendor Questions Infrastructure Products and Services RFP # 13-02-038 1 We know DCSD recently went through an assessment to help identify how the cloud would fit into your existing environment. Would it
CONTROLLED DOCUMENT. Uncontrolled Copy. RDS014 Research Related Archiving. University Hospitals Birmingham NHS Foundation Trust
University Hospitals Birmingham NHS Foundation Trust CONTROLLED DOCUMENT RDS014 Research Related Archiving CATEGORY: CLASSIFICATION: PURPOSE Controlled Document Number: Version Number: 1 Controlled Document
McGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Technical Product Specifications Dell Dimension 2400 Created by: Scott Puckett
Technical Product Specifications Dell Dimension 2400 Created by: Scott Puckett Page 1 of 11 Table of Contents Technical Product Specifications Model 3 PC Technical Diagrams Front Exterior Specifications
Serial ATA RAID PCI. User's Manual
Serial ATA RAID PCI User's Manual Chapter 1 Introduction Table of Contents 1-1 Features and Benefits. 1 1-2 System Requirements. 1 Chapter 2 RAID Arrays 2-1 RAID Overview.. 2 2-1.1 RAID 0 (striping)...
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers integration note Abstract... 2 Installation requirements checklists... 3 HP ProLiant server checklist...
The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
Introduction To Computers: Hardware and Software
What Is Hardware? Introduction To Computers: Hardware and Software A computer is made up of hardware. Hardware is the physical components of a computer system e.g., a monitor, keyboard, mouse and the computer
Getting started with ELEPHANT Telephone Call Management System
Getting started with ELEPHANT Telephone Call Management System Revision 1.5.0 March 2005 The 116 Group Limited Telephone: 0203 371 3333 [email protected] ELEPHANT Call Management Table of Contents Introduction
Discovering Computers 2008. Chapter 7 Storage
Discovering Computers 2008 Chapter 7 Storage Chapter 7 Objectives Differentiate between storage devices and storage media Describe the characteristics of magnetic disks Describe the characteristics of
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Document Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
Information Technology Acceptable Usage Policy
Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly
ITIL and ISO/IEC 27001 How ITIL can be used to support the delivery of compliant practices for Information Security Management Systems
ITIL and ISO/IEC 27001 How ITIL can be used to support the delivery of compliant practices for Information Security Management Systems Mark Sykes Principal Consultant Fox IT Ltd and Nigel Landman Managing
CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR
SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)
