Roles & Responsibilities for NHAIS (Exeter) System Key Users

Size: px
Start display at page:

Download "Roles & Responsibilities for NHAIS (Exeter) System Key Users"

Transcription

1 Document filename: NHAIS Key User Roles and Responsibilities.docx Directorate / Programme HSCIC Project SSD Document Reference DOC Project Manager Sean Walsh Status Approved Owner Norman Raphael Version 4.4 Author Saghir Akbar Version issue date 11/06/2015 Roles & Responsibilities for NHAIS (Exeter) System Key Users Copyright 2013 Health and Social Care Information Centre

2 Document Management Revision History Version Date Summary of Changes /4/2010 First version using controlled document template plus the inclusion of the User Authentication Process /2/2011 S3.3 amended to include SP_M address validity responsibility (Change 3700) S2.1.3 and s3.3.8 amended as per National Service Delivery Manager s comments National Service Delivery Manager approved v /1/14 HSCIC Rebranded Amended with updated links and SDM details S2.1 and s3.3 Exeter Helpdesk number amended, S3.1 Reference to padded envelope inserted Appendix:. Newcastle SDM address updated, Additional Exeter SDMs contact details inserted. Reviewers This document must be reviewed by the following people: Reviewer name Title / Responsibility Date Version Norman Raphael National Service Delivery Manager Approved by This document must be approved by the following people: author to indicate approvers Name Signature Title Date Version Norman Raphael National Service Delivery Manager Glossary of Terms Term / Abbreviation What it stands for Document Control: The controlled copy of this document is maintained in the HSCIC corporate network. Any copies of this document held outside of that area, in whatever format (e.g. paper, attachment), are considered to have passed out of control and should be checked for currency and validity. Page 2 of 11

3 Contents 1. Introduction Background Purpose 4 2. General Responsibilities of the Key User Act as a first point of contact for users of the system relating to day-today issues Act as the first point of contact for the SSD Service Delivery Manager and/or Support Manager Act as an intermediary between Health and Social Care Information Centre and staff using the NHAIS (Exeter) System Act as an intermediary between hardware engineers and Health and Social Care Information Centre Support personnel and/or PCT staff Take responsibility for the User Authentication Process 6 3. Technical Responsibilities of the Key User System Monitoring Tasks: Password/Access Maintenance NHAIS (Exeter) System Access Maintenance GP Payments System Security Other Security responsibilities Miscellaneous Housekeeping 9 4. System Administrator Appendix A: Service Delivery Manager Contact Details 11 Page 3 of 11

4 1. Introduction 1.1. Background Taking on the role of a Key User for the NHAIS (Exeter) System requires a good all-round knowledge and understanding of the business processes for which the system is used, together with a detailed knowledge of day to day operational aspects of the system Registration, Finance, Preventative Healthcare, ICM and System Administration. It is vital for the Key User to understand the importance of routine maintenance to ensure the integrity of the database, although many of the individual tasks may be delegated to other responsible staff. It should be noted that overall responsibility for good practice and effective operation of the system lies with the Key User and should therefore be of primary concern for the person allocated this role Purpose This document is intended as a guide and does not represent an exhaustive list of activities, as it is likely to be the case that responsibilities will vary depending on organisational structure. 2. General Responsibilities of the Key User 2.1. Act as a first point of contact for users of the system relating to day-to-day issues For example: Provide the initial investigation of problems with printers, PCs, terminals, etc.(e.g. checking of cable connections). For further details refer to: - Deal with queries relating to the uploading/downloading of files. - Deal with issues relating to passwords, security, etc. The Remote Site Check Exception Report, which is sent to Key Users monthly, will assist with this. - Remote Site Visit Check 4: relates to Exeter Unix accounts and highlights UNIX accounts without a password, Generic logins, redundant accounts and duplicate accounts. - Remote Site Visit Check 1: checks the nightly application backup and will raise a log if three backups in a row have failed. - Remote Site Visit Check 2: checks that the nightly application backup list is full and complete. - Remote Site Visit Check 39: checks Cache database space on a twice daily basis. - Remote Site Visit Check 3: checks that the ICM system is functioning correctly every half an hour. A support call is raised if the ICM system doesn t appear to be fully functional after 2½ hours. Ensure any problems within the Exeter system are reported to the National Helpdesk in Exeter ( ). Thereafter, to record and monitor incident logs and ensure that problems are resolved in a satisfactory manner. Page 4 of 11

5 2.2. Act as the first point of contact for the SSD Service Delivery Manager For example: Be the addressee for any written communication to the organisation regarding the terms of the NHAIS support service ensuring that documents are passed to the appropriate person for attention (if not themselves). Ensure appropriate colleagues accompany them to Service Review Meetings arranged by the Service Delivery Manager. Liaise with the Service Delivery Manager regarding any ad-hoc consultancy or implementation work that may be required. Take responsibility for ensuring that members of staff using the NHAIS (Exeter) System are provided with the appropriate level of training. Provide information and guidance in respect of any issues arising from the preventative healthcare audits Act as an intermediary between Health and Social Care Information Centre SSD and staff using the NHAIS (Exeter) System For example: Communicate information relating to software updates, feature faxes, etc. to members of staff using the system. In particular, ensure that s received in the generic box are distributed to the appropriate staff. Arrange actual site visits as required (by contacting the Service Delivery Manager) and ensure local users are made aware of any such visits from Health and Social Care Information Centre NHAIS support staff. Notify users of system downtime or restricted availability due to activities of Health and Social Care Information Centre NHAIS Support. Review remote site visit reports and ensure any identified issues are progressed. Attend (or ensure appropriate attendance) at product or area focused User Group meetings and represent the interests of their organisation, including, for example, proposing suggested improvements to or modifications to the NHAIS (Exeter) System. Ensure that any prerequisite activities for on-site work are completed prior to the member of support staff attending. Communicate details of SLA arrangements to staff using the system. Ensure any planned changes to the environment in which the NHAIS (Exeter) System operates in are notified in advance to the Service Delivery Manager. For example, changes to network configuration. Ensure that appropriate staff have specific responsibilities for any jobs that require scheduling. Page 5 of 11

6 2.4. Act as an intermediary between hardware engineers and Health and Social Care Information Centre Support personnel and/or Area Team staff For example: Contact hardware engineers when requested to do so by Health and Social Care Information Centre Support personnel or users. (The most likely reasons for contacting an engineer would be to resolve printer malfunctions and problems with disks or tape drives.) To ensure that maintenance to hardware and software upgrades is carried out with the minimum disturbance to the daily operation of the system. To ensure adequate cover of these duties during periods of absence of the Key User (e.g. holiday) Take responsibility for the User Authentication Process In order to ensure the accuracy of the information held on HPOV (HP Open View the call logging tool used by SSD), the Key User should assume the responsibility of following the process for informing HSCIC of new contacts in advance, or advising of any contacts which can be disabled. The process comprises four main areas: On-going advanced notification of authenticated contacts, or contacts to be disabled from the HPOV system Key Users must provide at least two weeks advanced notification of new contacts or contacts to be disabled from the system. Key Users will provide information via a template (provided by SSD), sent to the Helpdesk and copied to the SDM for information. The Help Desk will confirm that the request has been completed to the Key User (and in the case of a new authenticated contact, the contact themselves). Regular audit of HPOV contacts to ensure that they remain current The Key User will be provided with a report to allow them to audit HPOV contacts this to be repeated every 6 months. The report will contain Organisation, Forenames and Surname. A column will be provided for the Key User to mark contacts as disabled. The report will also indicate whether a contact has raised a HPOV call within the past 18 months. If SSD does not hear back from Key Users within 4 weeks, these contacts will be automatically disabled from HPOV. Should these contacts need to be reinstated, they will be required to follow the authentication process. Unauthenticated caller process The Help Desk staff will not raise service calls for unauthenticated users (whether the request is made by phone, fax or ). The caller will be advised that they are not an authenticated caller for the organisation, and that they are required to follow an authentication process controlled by their NHAIS Key User (Key User details will be provided if necessary). The caller will also be advised to ask a colleague (who is authenticated on the HPOV system) to raise the service call on their behalf. Should the authenticated caller require further contact on the call to be made through the unauthenticated caller, this will need to be made clear when raising the call. Any further Page 6 of 11

7 calls will need to be raised in a similar way until the Key User has followed the process detailed under paragraph i) above. On-going validation of HPOV authenticated caller details At least every 6-9 months, the Help desk will make a spot check on users details when they call the desk to ensure that caller details in the HPOV system are accurate (e.g. telephone numbers, addresses). 3. Technical Responsibilities of the Key User The technical responsibilities can be split into 3 categories of task: System Monitoring; Password/Access Maintenance; and Miscellaneous Housekeeping System Monitoring Tasks: Responsible for ensuring that the daily backup of the NHAIS (Exeter) System is performed and its successful completion is confirmed. - Tapes should be clearly labelled and dated to identify the relevant backup tape should a restore be necessary. - Backup tapes should be kept in a secure environment to ensure that they are available when needed. - Tape drives should be cleaned weekly or in accordance with manufacturer s guidelines. It should be noted that cleaning tapes should be stored in a clean environment and usage recorded in order to avoid any risk of introducing problems to tape drives. - NHAIS (Exeter) System users must be informed as a matter of urgency should there be an instance of back-up failure, to ensure that the impact on work is minimised. - The Key User must ensure that any backup tape sent to SSD has had the contents encrypted via the SSD NHAISBU backup encryption scripts. Additionally, to ensure all tapes/media that are sent to SSD are sent via the Royal Mail's Special Delivery Service and in a padded envelope that is robust in transit.. Responsible for ensuring other backup cycles are completed weekly, monthly, and quarterly. It is important to ensure that there are trained members of staff able to carry out this role in the absence of the Key User. In addition to the automated NHAIS System backup, the Key User should ensure that a regular UNIX backup is performed on a monthly basis. In the case of HP systems this can be performed via the Cache Control Menu. Sites with IBM servers should raise a support log for this to be performed by a member of the Health and Social Care Information Centre Support Team. Responsible for undertaking regular reboots of system elements; UNIX reboots should be undertaken quarterly as a minimum. Monitoring of the Integrity of the Cache databases A check on the integrity of the Cache system should be performed regularly to aid the early detection of problems relating to the internal disk block structure. To achieve this, the Cache utility, VALIDATE, should be performed at a time when updates to the Exeter system are unlikely (for example over the weekend). VALIDATE can be Page 7 of 11

8 scheduled via the Cache Control Menu and it is recommended that this is run weekly Password/Access Maintenance NHAIS (Exeter) System Access Maintenance The Key User is responsible, as the holder of the NHAIS (Exeter) System Master password, for liaising with departmental managers to ensure that appropriate user categories are established. These categories should have carefully considered access rights to the various NHAIS (Exeter) System screens and jobs in order that access rights assigned to individual users are appropriate to their level of responsibility within the department. Obviously, much consideration needs to be given to the sensitivity of the data that can be accessed vis-à-vis the role of the individual user. For detailed guidance on setting up, maintaining, monitoring, log reviewing and hardening security at the local level, the Key User must refer to the Security System User Reference Manual Volume 1: Supervisors & System Administrators. In addition, the Key User must ensure that ordinary users adhere to the Security System User Reference Manual Volume 2: Ordinary Users. Both volumes of the above Security System manual are available at: ys/securdefault The Key User must ensure that procedures are in place to manage the security system in their absence. New NHAIS (Exeter) System screens and Analysis Jobs are issued via the Software Issuing Service. It is a responsibility of the Key User to ensure that the appropriate access to the new software is provided to the relevant staff. The Key User is responsible for monitoring User Access to the system using the SECREP utility as appropriate to check for any attempted unauthorised accesses to the system, and subsequent clear-down of the log files. The Key User is responsible for the removal of User IDs from the password system and UNIX where users either no longer require access or have left the employment of the organisation. Remote Site Visit Check41 relates to this. A support call should be raised with the Exeter Help desk if required. It is recommended that Security System Reports are run and reviewed on a daily basis. Hard copies of Security System Reports should always be requested before the log holding the reports is cleared down GP Payments System Security The Key User must be aware of, and take into consideration, the guidance documented within the New GP Contract Payments User Reference Manual and the Procedures for GP Payments Staff. This guidance relates to aspects of audit and control such as access levels controls on screens, reports, sign-offs, etc. It is the responsibility of Key Users to ensure that user roles are appropriately allocated and segregated to safeguard the security of the Payments process. The New GP Contract Payments User Reference Manual can be found at: x_html Page 8 of 11

9 Other Security responsibilities In addition to the maintenance of the NHAIS (Exeter) System s security system, the Key User may have some responsibility for the maintenance of other passwords, for example, UNIX passwords Miscellaneous Housekeeping These tasks generally relate to the early identification and resolution of errors and the removal of redundant files. The main tasks are listed below: Monitoring of the AJ/Q and FJ/Q, print queues and RR/RP screens for errors and informing the Health and Social Care Information Centre support team of such errors via the Helpdesk ( ), also ensuring that retention periods are appropriate and old entries are deleted when no longer required (from the awaiting and already printed screens). Delegating to the ICM officer or directly monitoring ICM for errors: - Ensuring swift resolution of errors. - Ensuring ICM 'Home' mailbox is turned off if work is carried out on the DTS. - Ensuring link codes from ICM reports are followed up. - Monitoring ICM status screen. Ensuring the prompt update of the Postal Address File (PAF) upon its receipt from the Health and Social Care Information Centre National Services department and that the follow-on work is processed. Ensuring that the SSD Contacts database is kept up to date with user roles via the website - Ensuring the various NHAIS (Exeter) System database integrity checks are performed regularly. - AJ-RIC and AJ-QCIV for the Registration Database. - AJ-CYIC for the Cervical Screening Database. - AJ-BCSI for the Breast Screening Database. Removal of redundant download files from the various user-defined UNIX file systems (e.g. PC letters and GP reconciliation). Remote Site Visit Check 40 checks these download areas - a support log can be raised to request Support to remove the files. It is strongly recommended that the File Back Up and Verification (FBV) Service is used and that tapes are submitted on a monthly basis. Regularly review the addresses within the various groups on the SP-M screen in order to ensure that: - The most appropriate people are associated with each group. - The correct address is recorded for each person. Page 9 of 11

10 4. System Administrator The tasks which are delegated to the System Administrator are at the discretion of the Key User. However, it is essential that the System Administrator or other designated person is in a position to provide cover for all the tasks of the Key User during periods of absence i.e., holiday, sickness etc. The Key User may also wish the System Administrator to carry out jobs such as the printer maintenance and print list jobs, running of the ICM system and the physical changing of the backup tape. Page 10 of 11

11 5. Appendix A: Service Delivery Manager Contact Details Leeds Office Vantage House, Aire Street, Leeds, LS1 4HT Service Delivery Manager Clare Westrop Tel: (Mobile: ) Redditch Office Floor 2, Prospect House, Fishing Line Road, Redditch B97 6EW Service Delivery Manager Mark Hillman Tel: London Office Floor 5, Skipton House, 80 London Road, London SE1 6LH Service Delivery Manager Saghir Akbar Tel: (Mobile: ) Exeter Office Hexagon House, Pynes Hill, Exeter EX2 5SE Service Delivery Manager Mike Hogan Tel: Service Delivery Manager John Martin Tel: Service Delivery Manager Phil Moores Tel: Newcastle Office 9th floor, Durham House, Washington NE38 7SF Service Delivery Manager Graham Ambrose Tel: Page 11 of 11

Service Level Agreement (SLA) for the NHAIS Core System.

Service Level Agreement (SLA) for the NHAIS Core System. Document filename: NHAIS Core SLA Directorate / Programme HSCIC Project SSD Document Reference Doc-00010 Project Manager Sean Walsh Status Approved Owner Norman Raphael Version 1.9 Author Graham Ambrose

More information

Document filename: HSCIC SSD Bowel Cancer Screening System (BCSS) Directorate / Programme. Project. Systems and Service Delivery DOC-00013

Document filename: HSCIC SSD Bowel Cancer Screening System (BCSS) Directorate / Programme. Project. Systems and Service Delivery DOC-00013 Document filename: HSCIC SSD Bowel Cancer Screening System (BCSS) Directorate / Programme Document Reference: Systems and Service Delivery DOC-00013 Project Project Manager N/A Status Final Owner Phil

More information

Service Level Agreement (SLA) for the SSD Secure File Transfer Service

Service Level Agreement (SLA) for the SSD Secure File Transfer Service Document filename: SFT Service Level Agreement Directorate / Programme Systems and Project Service Delivery N/A Document Reference: DOC-00087 Project Manager N/A Status Approved Owner Norman Raphael Version

More information

Service Level Agreement (SLA) for the M Connect 2 System

Service Level Agreement (SLA) for the M Connect 2 System Document filename: M Connect 2 Service Level Agreement Directorate / Programme Systems and Project Service Delivery N/A Document Reference: DOC-00064 Project Manager N/A Status Approved Owner Norman Raphael

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement Ezi Managed Services Pty Ltd 108 The Promenade Camp Hill, QLD 4152 Ph: 07 3324 6150 Fax: 07 3324 6101 www.ezims.com.au info@ezims.com.au

More information

Developments to the NHAIS System

Developments to the NHAIS System Developments to the NHAIS System FHS Day - 3 rd March 2010 Graham Ambrose NHAIS and FHS Services GP Payments Total payments for 07/08 of 7.2b Cervical Cancer Screening 3.4m women called for screening Labs

More information

TSM Backup Service. Standard Service Level Agreement

TSM Backup Service. Standard Service Level Agreement TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3

X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 Date : 09/08/06 Issue: 6 This is an unpublished work the copyright in which vests in X2 Connect Limited. All rights reserved. The

More information

Lab Link via Host File Server

Lab Link via Host File Server Lab Link via Host File Server Programme NHS CFH Document Record ID Key Sub-Prog / Project Cervical Screening DOC - 00460 Prog. Director Owner Jill Jobson Version 1.1 Author Jill Jobson Version Date 14.11.2012

More information

Your IT Helpdesk and On-Site and Remote Support Terms and Conditions. Document Revision 1 Sept 09

Your IT Helpdesk and On-Site and Remote Support Terms and Conditions. Document Revision 1 Sept 09 Your IT Helpdesk and On-Site and Remote Support Terms and Conditions These terms and conditions are in addition to our standard Terms of Business (available at http://www.tripod-it.co.uk) Our company details

More information

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13 Customer Guide Helpdesk & Product Support [Customer Name] www.four.co.uk Page 1 of 13 Table of Contents HELP DESK AND PRODUCT SUPPORT SUMMARY... 3 1 FOUR HELP DESK STRUCTURE AND CALL ESCALATION... 6 2

More information

: Office System Environment

: Office System Environment Document Type Client Systems Document Title Document Version : Service Level Agreement (SLA) : : Office System Environment : : 1.0 Ethical IT, PO Box 254, Bicester, Oxfordshire, OX25 2ZX UK T +44 (0) 870

More information

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES IN CONFIDENCE TABLE OF CONTENTS 1 CONTACT DETAILS 1 1.1 The Client Contract Management

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

External Audit Reviews. Report by Director of Finance

External Audit Reviews. Report by Director of Finance THE HIGHLAND COUNCIL AUDIT AND STANDARDS COMMITTEE 4 DECEMBER 2003 Agenda Item Report No External Audit Reviews Report by Director of Finance SUMMARY The pages that follow contain a report from the Council's

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

HP PC Helpdesk Service

HP PC Helpdesk Service HP PC Helpdesk Service HP Care Pack Services Technical data HP PC Helpdesk Service gives professionals in small and medium-sized businesses access to advice and assistance for popular software applications,

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING

THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING Date and reference no. of approval/modification resolutions by the Board of Directors: Date and reference no. of approval by Supervisory

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Vital Records Electronic Registration System (ERS-II) Technical Resource Guide and Support Procedures

Vital Records Electronic Registration System (ERS-II) Technical Resource Guide and Support Procedures Vital Records Electronic Registration System (ERS-II) Technical Resource Guide and Support Procedures Vital Records Support Line: (402) 471-8275 Frequently Asked Questions Problem: User cannot access the

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

[Type text] SERVICE CATALOGUE

[Type text] SERVICE CATALOGUE [Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service

More information

Service Level Agreement: Support Services (Version 3.0)

Service Level Agreement: Support Services (Version 3.0) Service Level Agreement: Support Services (Version 3.0) This Service Level Agreement ("SLA") is attached to the Agreement (Number [ ]) entered into between Uniware Systems Limited ("Uniware") and the Customer

More information

REGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions

REGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions T r a n s l a t e d i n H S E E x p e r t T r a n s l a t i o n C e n t r e 1 APPROVED by Directive No. 31.1-04/771 of the State University Higher School of Economics dated October 22, 2010 REGULATIONS

More information

IT Support for London

IT Support for London IT Support for London London Systems IT Support Your Helpdesk What s included; We are your IT Department, we are at the end of a phone to listen and work with you to resolve the situation no matter where

More information

4. Specification. Contract No: 1752 Title: Provision of Print Devices and Print Management System 61

4. Specification. Contract No: 1752 Title: Provision of Print Devices and Print Management System 61 4. Specification Management System 61 Introduction Tenders are invited for the provision of print devices and a print management system; inclusive of Supply, Delivery, Installation and Configuration, in

More information

ITD BACKUP MANAGEMENT PROCEDURE

ITD BACKUP MANAGEMENT PROCEDURE ITD BACKUP MANAGEMENT PROCEDURE PURPOSE The purpose of this document is to ensure that effective and efficient processes are in place to identify and safeguard data required to run and support applications

More information

Cloud-based Managed Services for SAP. Service Catalogue

Cloud-based Managed Services for SAP. Service Catalogue Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...

More information

APPENDIX 5 TO SCHEDULE 3.3

APPENDIX 5 TO SCHEDULE 3.3 EHIBIT K to Amendment No. 60 - APPENDI 5 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 5 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT K to Amendment No.

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

Managed ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN - 33 051 775 556

Managed ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN - 33 051 775 556 Possibilities that are built in www.telstra.com.au/networkcomputing Managed ICT Services User Guide Corporation Limited ABN - 33 051 775 556 Table of Contents 1. What does this User Guide do?... 3 2. Responsibilities...

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Informatics Policy. Information Governance. Network Account and Password Management Policy

Informatics Policy. Information Governance. Network Account and Password Management Policy Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

To provide an effective, professional and customer focussed ICT Service Desk service to the customers of the Council, NHS and all Hoople customers.

To provide an effective, professional and customer focussed ICT Service Desk service to the customers of the Council, NHS and all Hoople customers. JOB DESCRIPTION Job ination as shown on organisation chart Job Title: ICT Service Desk Post No: Analyst Directorate: Transation & Technology Division/ Department: ICT Operations, ICT Service Desk Grade:

More information

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7 Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.

More information

IT Support & Maintenance Contract

IT Support & Maintenance Contract IT Support & Maintenance Contract This document has been produced by STOCK IT Ltd, www.stockit.co.uk, an IT company offering technology advice & support for small businesses. Company Registration No: 9060944

More information

TVision Support Service Guidelines

TVision Support Service Guidelines TVision Support Service Guidelines TVision Technology Ltd 1 st Floor Premier House 15-19 Church Street West Woking Surrey GU21 6DJ MainTel: + 44 (0) 1483 751888 Support Tel: + 44 (0) 1483 713480 Fax: +

More information

Managing Expense Claims

Managing Expense Claims Managing Expense Claims Page 1 of 14 Version 1.2, July 2012 Introduction Functionality provided by People Inc. Employee Intranet enables you to process expense claims electronically. This is done via the

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

CAMMS ONLINE SUPPORT PORTAL USER MANUAL

CAMMS ONLINE SUPPORT PORTAL USER MANUAL CAMMS ONLINE SUPPORT PORTAL USER MANUAL September 2014 PREPARED BY CAM Management Solutions Level 17, 45 Grenfell St, Adelaide SA 5000 Telephone: 08 8212 5787 Facsimile: 08-8212-5288 www.cammanagementsolutions.com

More information

Data Quality Strategy 2006/2008

Data Quality Strategy 2006/2008 Scarborough Borough Council Data Quality Strategy 2006/2008 Data Quality Strategy Introduction... 1 Roles and Responsibilities... 1 Collection of Data... 2 Verification of Data... 4 Validation of Data...

More information

People Inc. Managing Timesheets P&A Software Solutions Page 1 of 13 Version 1.3 January 2015

People Inc. Managing Timesheets P&A Software Solutions Page 1 of 13 Version 1.3 January 2015 Managing Timesheets Page 1 of 13 Version 1.3 January 2015 Introduction Functionality provided by People Inc. enables you to register timesheets electronically. This is done via the web browser on your

More information

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Responsible for: To provide 1 st and 2 nd line support to users of the College ICT facilities and assist with software and hardware installation.

Responsible for: To provide 1 st and 2 nd line support to users of the College ICT facilities and assist with software and hardware installation. JOB DESCRIPTION Job Details Post: ICT Helpdesk Technician Grade: Pay Scale Range Point 12-17 Responsible to: Responsible for: Key Purpose: ICT Services Manager None To provide 1 st and 2 nd line support

More information

Complete Managed Services. Proposal for managed services for the City of Tontitown

Complete Managed Services. Proposal for managed services for the City of Tontitown Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Software Update Bulletin

Software Update Bulletin Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking

More information

U.S. Environmental Protection Agency ELECTRONIC SIGNATURE AGREEMENT

U.S. Environmental Protection Agency ELECTRONIC SIGNATURE AGREEMENT U.S. Environmental Protection Agency ELECTRONIC SIGNATURE AGREEMENT In accepting the electronic signature credential issued by the U.S. Environmental Protection Agency (EPA) to sign electronic documents

More information

University of Sunderland. Oracle 12 i-expenses. Full Administration Training Guide. Version 1.0 09/05/14

University of Sunderland. Oracle 12 i-expenses. Full Administration Training Guide. Version 1.0 09/05/14 Oracle 12 i-expenses Full Administration Training Guide Version 1.0 09/05/14 Table of Contents 1 TRAVEL POLICY AT A GLANCE... 2 2 PROCEDURES... 4 2.1 I-Expenses Procedure... 7 3 LOGIN... 8 Login Problems...

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose

More information

10.3.2015 Company Name IT Support

10.3.2015 Company Name IT Support 1 New Bond St t:+44 (0)20 7403 4031 London WC1 w:www.networkfish.com 10.3.2015 Company Name IT Support We are your reliable London based IT Support department Because you can achieve more. We are the backbone

More information

TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for PLACEMENT TESTING LAB

TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for PLACEMENT TESTING LAB IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for PLACEMENT TESTING LAB IT Services Service Level Agreement:Placement Testing Lab This service level agreement

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram

More information

Administrators Guide Multi User Systems. Calendar Year

Administrators Guide Multi User Systems. Calendar Year Calendar Year 2012 Enter Facility Name Here HIPAA Security Compliance Workbook For Core Measure 15 of Meaningful Use Requirements Annual Risk Analysis Administrators Guide Multi User Systems 1 HIPPA Compliance

More information

Remote IT Support. What is RITS?

Remote IT Support. What is RITS? Remote IT Support Many businesses, charities and other organisations rely heavily on their computer systems. We are committed to providing you with a fast response to problems as they occur, and working

More information

Computer System Validation for Clinical Trials:

Computer System Validation for Clinical Trials: Computer System Validation for Clinical Trials: Framework Standard Operating Procedure (F-SOP) Author: Tim Cross Version History: 0.1di DRAFT 24-April-2013 0.2 DRAFT 12-June-2013 Current Version: 1.0 17-June-2013

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

[Area] Technology Managing Agent Contractor Contract. Service Information. Annex SI 27 Regional Control Centre Technical Support Service

[Area] Technology Managing Agent Contractor Contract. Service Information. Annex SI 27 Regional Control Centre Technical Support Service [Area] Technology Managing Agent Contractor Contract Annex SI 27 Regional Control Centre Technical Support Service A27-1 SERVICE INFORMATION FOR TECHMAC CONTRACT ANNEX SI 27 CONTENTS AMENDMENT SHEET Revision

More information

Tracking Database GPSoC Replacement (GPSoC-R) Call-Off Agreement and Schedule A Maintenance

Tracking Database GPSoC Replacement (GPSoC-R) Call-Off Agreement and Schedule A Maintenance Programme: Programme Director: Owner: Author: Tracking Database GPSOC-R CALL-OFF AGREEMENT AND SCHEDULE A MAINTENANCE CONFIGURATION ITEM NO Tracking Database Rob Shaw Kim Hobday Kim Hobday DOC-00568 Version:

More information

GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic

GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Basic Service. If you require more detailed technical information, please contact

More information

HP Foundation Care Service

HP Foundation Care Service Technical data HP Foundation Care Service HP Services HP Foundation Care Service (HP Foundation Care) is composed of comprehensive hardware and software services aimed to help increase the availability

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

Supplement to the Guidance for Electronic Data Capture in Clinical Trials

Supplement to the Guidance for Electronic Data Capture in Clinical Trials Supplement to the Guidance for Electronic Data Capture in Clinical Trials January 10, 2012 Drug Evaluation Committee, Japan Pharmaceutical Manufacturers Association Note: The original language of this

More information

Land Registry Paying for Land Registry services by variable direct debit. Version 12, January 2016. Land Registry Variable Direct Debit Scheme

Land Registry Paying for Land Registry services by variable direct debit. Version 12, January 2016. Land Registry Variable Direct Debit Scheme Land Registry Paying for Land Registry services by variable direct debit Version 12, January 2016 Land Registry Variable Direct Debit Scheme Variable direct debit scheme details A variable direct debit

More information

END-USER REMOTE SUPPORT AND HELPDESK SERVICES SERVICE DEFINITION

END-USER REMOTE SUPPORT AND HELPDESK SERVICES SERVICE DEFINITION END-USER REMOTE SUPPORT AND HELPDESK SERVICES Complete IT Support for Business Westgate IT End-User Remote Support and Helpdesk Services: Service Definition Service Name End-User Remote Support and Helpdesk

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

ICT SUPPORT SERVICES

ICT SUPPORT SERVICES ICT SUPPORT SERVICES SERVICE LEVEL AGREEMENT 2008 2009 Period of agreement: This document will run from 1st April 2008 to 31 st March 2009 and remains valid until superseded by a revised document. The

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Enterprise UNIX Services - Systems Support - Extended

Enterprise UNIX Services - Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for

More information

Electronic Data Transfer. Guidebook

Electronic Data Transfer. Guidebook Electronic Data Transfer Guidebook All possible measures are exerted to ensure accuracy of the contents of this manual; however, the guidebook may contain typographical or printing errors. The public is

More information