Project Implementation Plan
|
|
|
- Lindsey Hart
- 10 years ago
- Views:
Transcription
1 Incident Based Automation Project An NWCG Sponsored Project Project Implementation Plan Working Copy Version 2.0 September 15, 2011
2 VERSION HISTORY Document Revision and History Revision Date Author Comments Version 1.0 Version 1.01 Version 1.02 Version 1.03 Version 1.04 Version 1.05 Version 1.06 Version 1.07 Version 1.08 Version 1.09 Version 2.0 April 19, 2010 Sue Shirts Original Version June 11, 2010 Sue Shirts Updated based on comments received from G. Bald 6/3/2010 and discussions from meeting on 6/7-11/10 at McClellan. July 20, 2010 Sue Shirts Updated based on browser, hardware, software info from SabiOso September 16, 2010 Sue Shirts Updated based on meeting discussion Gina, Sue, SabiOso. October 1, 2010 Sue Shirts Removed bulk of training section to separate document titled e-isuite Training Strategy. March 10, 2011 Sue Shirts Transferred to updated template. July 20, 2011 Sue Shirts Revised per review by Jon Skeels and Gina Bald on July 8, August 31, 2011 Sue Shirts Updated September 9, 2011 Sue Shirts Revised per review by PM and Deputy PM September 15, 2011 Sue Shirts Revised and submitted for final review September 15, 2011 Sue Shirts Approved by PM, converting document to Working Copy e-isuite Implementation Plan Page 2 of 29
3 e-isuite Implementation Plan Page 3 of 29
4 Table of Contents 1 INTRODUCTION PURPOSE SYSTEM OVERVIEW System Description Assumptions and Constraints System Organization GLOSSARY MANAGEMENT OVERVIEW DESCRIPTION OF IMPLEMENTATION POINTS-OF-CONTACT IMPLEMENTATION SCHEDULE TABLE 2.4 IMPLEMENTATION SCHEDULE SECURITY AND PRIVACY IMPLEMENTATION SUPPORT RISK AND CONTINGENCIES 13 5 IMPLEMENTATION VERIFICATION AND VALIDATION.14 6 ACCEPTANCE CRITERIA..14 APPENDIX A: Project Implementation Plan Approval...15 APPENDIX B: References APPENDIX C: Glossary APPENDIX D: Sample Agency Implementation Plan... Error! Bookmark not defined. e-isuite Implementation Plan Page 4 of 29
5 1 Introduction 1.1 Purpose The purpose of this plan is to outline the implementation strategy and specific activities for successful deployment of e-isuite. This is intended to be a working document which will be updated continuously in order to serve as a useful reference to project and Incident Management personnel. 1.2 System Overview The National Wildfire Coordinating Group (NWCG) sanctioned the Incident Based Automation (IBA) Project in 2003 to review the current business practices for incident management and develop recommendations for process improvement. The business tool used by incident management teams, I-Suite, was included in this review. The IBA Project was divided into phases: Phase 1 was the I-Suite Stabilization and Support Project; Phase 2 was the Incident Based Automation Strategic Planning Project. The IBA Strategic Plan dated April 10, 2006, recommended that the current client/server I- Suite application be replaced by a browser-based system to better utilize improved technology and updated processes. In June 2006, the NWCG chartered Phase 3 of the IBA Project to implement the action item from the Strategic Plan in developing a browser-based application. This project is known as e-isuite, with the USDA Forest Service as the sponsoring agency System Description e-isuite is the next generation of I-Suite, and is being designed to continue to provide a useful tool for the business management of all types and complexity of incidents. Version 1.0 will be the initial version implemented, and will include all functionality currently available in I-Suite with some enhancements that can be incorporated easily with the updated technology used in the development of e-isuite. Updates, changes and further enhancements will be included in future versions as identified by the IBA Project Team, Business Lead, users, and the Change Management Board (CMB). e-isuite consists of two areas: Site and Enterprise. Each area is explained below. e-isuite Site is intended to be used as a networked application on an incident, similar to how I-Suite is used today with the exception that e-isuite will be accessed via a web browser. e-isuite Site will be utilized primarily for Type 1 and 2 complexity incidents by Incident Management Teams (IMTs) to create and manage Incident Action Plans (IAP), costs, payment documents, track supplies received and issued, track injuries and illnesses for preventive actions, and generate reports for the incident. An incident may be started on e-isuite Enterprise with the initial response information, and then transferred to a Site database for use by an IMT. Data will be transferred to e-isuite Enterprise at the end of the IMT s tenure so that a complete record of the incident e-isuite Implementation Plan Page 5 of 29
6 resides on the Enterprise system. Access to e-isuite Site functionality will be rolebased, with users being given roles according to their expected duties on an incident. e-isuite Enterprise can be accessed via internet browser (office, virtual workplace, etc.) and used for any complexity of wildland fire or other all-hazard incidents to create and manage IAPs, costs, payment documents, track supplies received and issued, track injuries and illnesses for preventive actions, and generate reports for the local unit. e- ISuite Enterprise will provide the ability to document initial response efforts using the resources inventoried in the Enterprise database. The initial response data can be transferred from Enterprise to the Site level should an incident transition to a higher complexity (e.g. Type 1 or Type 2 incident). Similarly, the Type 1 or Type 2 incident data can be accessed via the Enterprise level when transferred back to the local unit. The data will be stored in an Operational Data Store and available to meet diverse needs of stakeholders. This will provide new capability to capture the entire history of an incident in one database, and to capture all incident activity for upward reporting to the Geographic Areas and National offices to respond to Congressional inquiries, FOIA requests, or as needed by Agency officials. Since the Enterprise level provides potential access to the entire database, it will be divided into Work Areas defined by the user s dispatch center boundaries responsible for dispatching a defined set of resources. A user will be given rights and roles to manage resources and incidents within their Work Area according to their expected duties. e-isuite will also allow the flexibility for users to be given access to other Work Areas as needed Assumptions and Constraints Assumptions: Implementation of the application is complete by the target date, or an acceptable timeframe has been negotiated with the software developer. Actual funding is in line with the requested budget amount. Design, development and implementation were completed within the approved funding levels. Application testing has been completed and performance is as designed and expected. The application has received agency certification and accreditation (C&A), and has been granted Interim Authority to Operate or Final Approval for production use. A service level agreement (SLA) is in place between the Forest Service and the host location. The production version of the application and all supporting application/services have been installed and tested at the host location. Network and back-up connectivity performance has been verified (i.e. users on various networks can access e-isuite). e-isuite Implementation Plan Page 6 of 29
7 An application operations and maintenance (O&M) organization is in place to perform ongoing system maintenance and upgrade work, and to configure and test future releases of the software with any modifications. User guides and training materials (e.g. PowerPoint presentations, classroom curriculum, Quick Reference Cards, etc.) have been developed and tested. The Interagency Helpdesk is trained and ready to provide user support. Constraints: Interface with other systems is dependent on web services still being developed by other project teams. A slow fire season or lack of other all-hazard occurrence would potentially reduce the scope of initial deployment in terms of number of offices utilizing the application to its full potential. Some Geographic Areas historically do not have a large occurrence of fire or other all-hazard events, so utilization of the application after training could be up to one to two years in those areas. This could require additional training or refresher training not currently estimated. Implementation may be affected by employees normal work schedule preventing them from training with and using the new application. The number of potential users to train versus the number of available trainers will impact full utilization of the application should trainers be unavailable due to budget reductions or lack of supervisory support System Organization e-isuite Implementation Plan Page 7 of 29
8 1.3 Glossary The glossary is attached to this document as Appendix C. 2 Management Overview Implementation of e-isuite will be accomplished by the IBA Project Team, under the oversight of the Project Business Lead and the Senior Project Manager. The Deputy Project Manager has responsibility for the day-to-day activities of the Project Team, and to ensure overall goals and timeframes are met within the identified project budget. Primary responsibility for documentation, planning and preparation resides with the Lead Implementation Subject Matter Expert (SME). The Lead Technical SME has primary responsibility for accuracy of business requirements and ensuring that functionality meets or exceeds what is available in current I-Suite. (See Section 2.2 Points of Contact for individual names). Other involved stakeholders/managers include the Incident Business Specialists and Fire and Aviation Management Directors for each NWCG affiliated agency, as well as agency financial payment centers. The scope of this project involves the following major implementation tasks: Preparation of project management documents in addition to this Implementation Plan Expected Deliverables Resources Required Operating Principles document Deputy Project Manager Staffing Plan Lead Implementation SME Communication Plan Software development contractor Roles Description Review and approval by Senior Project Concept of Operations Manager and Business Lead Security Plan Disaster Recovery Plan Contingency Plan Configuration Management Plan Training Plan Organization Chart Glossary of Terms Operations and Maintenance Plan Quality Assurance Expected Deliverables Business requirements accurately reflect intended functionality Current business practices are included accurately I-Suite functionality is considered in the overall development Defects found during development are corrected or scheduled to be Resources Required Business Lead Senior Project Manager Deputy Project Manager Lead Technical SME IBA Project Team e-isuite Implementation Plan Page 8 of 29
9 corrected Change requests are addressed and prioritized Design of application is flexible in order to incorporate changes in future business practices Application is tested and ready to deploy Communication with stakeholders and potential users Expected Deliverables Resources Required Education on the application and its uses Business Lead Senior Project Manager Benefits of using e-isuite Deputy Project Manager Recommendations for successful implementation by the Agency(s) IBA Project Team Timeframes for training and deployment Updates on any changes to the implementation schedule Preparation of the tools that will assist in using the application Expected Deliverables Resources Required User Guide Software development contractor Quick Reference Cards Deputy Project Manager Help within the application IBA Project Team On-line help Review and approval by Senior Project Manager Testing Expected Deliverables The system has been fully and successfully tested Field testing on actual incidents Testing for system updates is planned for in the O&M Plan Training Expected Deliverables Preparation of the training materials Training & Practice Instances set up and ready for use Train-the-Trainer sessions are scheduled Assist individual Agencies and/or offices in conducting training Development of Webinars as training tools Resources Required Software development contractor Deputy Project Manager IBA Project Team Other subject matter experts as needed Resources Required Software development contractor Deputy Project Manager IBA Project Team Other subject matter experts as available e-isuite Implementation Plan Page 9 of 29
10 Importing ROSS data for use in the Work Areas (initial set-up) Expected Deliverables Resources Required Prepare ROSS data export Software development contractor Import ROSS data into each Work Area of e-isuite ROSS Reports SME Lead Technical SME Review to ensure data integrity IBA Project Team Establish database at host and back-up locations Expected Deliverables Resources Required Database set up and tested Senior Project Manager o Host location Deputy Project Manager o Back-up location Host location personnel Service Level Agreement is signed Back-up location personnel Software development contractor Support personnel are identified and in place Change Management process established Expected Deliverables Resources Required Initial review to reject the change, Change Management Board combine with another request, or o Business Lead accept and refer for level of effort o Senior Project Manager Review after level of effort to o IBA Core Team approve, prioritize, defer, or reject o Other SMEs as needed change Software development contractor Develop business requirements to implement approved changes Test prior to implementation Release change in future software version 2.1 Description of Implementation e-isuite will be developed using a two phase approach with each phase divided into increments, however deployment/implementation of e-isuite will begin when all functional areas are designed and tested successfully so that the entire application is available. Changes, enhancements and new functionality will be contained in future version releases. e-isuite will be available for use by all Agencies in concert with their individual implementation plans as their needs arise. The decision to have all functional areas included in the initial deployment of e-isuite, as opposed to releasing them incrementally, is based on the following points: e-isuite Implementation Plan Page 10 of 29
11 Each functional area is dependent to a certain degree on others; releasing the application with full functionality makes the most sense Current I-Suite has been widely used by all agencies for 10 years; the users are experienced with the full application and would not want to be limited with incremental release Time and funding for the project is better spent on e-isuite alone after it is deployed rather than continuing with updates to I-Suite and design of e-isuite simultaneously I-Suite will be decommissioned after successful deployment of e-isuite; no further updates will be implemented and support of I-Suite will be discontinued Taking advantage of the business requirements already in place for I-Suite with some enhancements is less time consuming than if e-isuite was being developed from scratch Providing e-isuite in whole meets the requirements outlined by NWCG and better meets the needs of stakeholders and users Agency implementation plans (see a sample plan in Appendix D) should include the following considerations: Direction from headquarters offices to use e-isuite Utilization for their local and project incidents Identification of individuals/positions responsible for using e-isuite at the local offices Identification of individuals who will attend the train-the-trainer sessions Identification of individuals who need e-isuite training Training schedule Training materials will be developed as a part of an increment in Phase 2. Due to the large number of potential users, the e-isuite Project Team will initially conduct train-thetrainer sessions and will be available to assist with future training sessions. Each Agency will be responsible for identifying employees to attend the train-the-trainer session, and conducting further training sessions for their users. The Interagency Incident Helpdesk will be trained by the e-isuite Project Team in a separate training session. The train-the-trainer sessions will begin in May 2013, with other training sessions conducted prior to the scheduled release date of June Reference the e- ISuite Training Plan for additional information on training. User support materials are scheduled for design as part of an increment in Phase 2. These materials will include a User Guide, Quick Reference Cards, and withinapplication help and tips. User support materials will be available with the deployment of the e-isuite application. e-isuite Implementation Plan Page 11 of 29
12 2.2 Points-of-Contact Role Business Lead Project Manager Deputy Project Manager Lead Implementation Subject Matter Expert Lead Technical Subject Matter Expert Information Systems Security Officer Name / Agency / Location Sarah Fisher, USFS WO Fire/Aviation Management, Boise, ID, [email protected] Jon Skeels, Senior Project Manager, USFS WO Fire/Aviation Mgmt, Information Systems Project Office, Lakewood, CO, [email protected] Gina Bald, USFS WO Fire/Aviation Mgmt, Salt Lake City, UT, [email protected] Sue Shirts, USFS WO Fire/Aviation Mgmt, Lincoln, CA [email protected] Donna Tate, USFS WO Fire/Aviation Mgmt, Camptonville, CA, [email protected] Robert Anderson, USFS WO Fire/Aviation Management, IT Programs, Boise ID [email protected] Table 2.2 Points-of-Contact 2.3 Implementation Schedule Date Action Dependencies March 2012 Training materials development begins Requirements and Design complete August October 2012 User Acceptance testing Scenario testing completed Field testing on incidents successfully October 2012 Software issues and Change UAT testing complete Requests from field testing addressed May 2013 Training instance set up Software issues resolved and change requests complete as necessary June October 2013 System rollout into Production Training complete or substantially complete Table 2.3 Implementation Schedule 2.4 Security and Privacy The e-isuite system will be hosted at the US Forest Service Fire and Aviation Management National Enterprise Support Service (NESS), and is officially owned by the Forest Service as the Managing Agency. e-isuite Implementation Plan Page 12 of 29
13 Security and privacy of the e-isuite Enterprise system will follow the guidelines outlined by the NESS Application Portal (NAP) processes. e-isuite Site will require the user to accept a Rules of Behavior form prior to logging into the system, which will be stored in the system and available for audit purposes. Separation of duties will be accomplished through the role(s) assigned to a user account. There are two types of user accounts in e-isuite: 1) privileged, and 2) nonprivileged. Account Manager access to the system is defined as privileged access. Access to the functional areas in the system is considered non-privileged. A privileged user account will not have access to any non-privileged area of the system. Similarly, a non-privileged user account will not be able to access the privileged area, and will have access to the system according to non-privileged roles assigned by an Account Manager. Reference the e-isuite Roles document for further information on access to the e-isuite system for each type of user account and role. 3 Implementation Support 3.1 Client Hardware e-isuite will be hosted on the National Enterprise Support Service (NESS) Environment. The NESS is located at the USDA National Information Technology Center in Kansas City, MO and the USGS EROS Data Center in Sioux Falls, SD. No special client hardware requirements exist for e-isuite other than the need for a laptop or personal computer that meets the following minimum standards (at the time of this writing): Intel (or compatible) Processor 2.5 Ghz or higher Operating System Windows XP or Windows 7 (32 or 64 bit) 2 GB of memory or better 200 GB hard drive with 100mgs of available hard drive because Internet Explorer may cache some data on the hard drive Wireless Network ( b/g/n) if a laptop is being used Good quality, high resolution video card 3.2 Software User software utilization and installation requirements include Adobe Flash Player version 9, and MS Internet Explorer version 7 or higher. The system will accommodate newer versions of Adobe Flash Player and Internet Explorer as they are released. Future e-isuite releases will accommodate other browser types as determined by the user community. e-isuite Implementation Plan Page 13 of 29
14 Production, training and practice databases will all be available for users and will reside at the host location. New releases, patches and emergency bug fixes will be deployed based on the Configuration Management Plan. 3.3 Outstanding Issues There are no known issues or problems related to implementation planning at this time. The host site has been identified and has agreed to host the application. The Service Level Agreement will be developed by the Senior Project Manager and other appropriate FS leadership as required. A back-up site has been identified. No restrictions or limitations requiring consideration relevant to implementation planning have been identified. Risks specific to implementation are identified in the next section. 4 Risks and Contingencies Risk Consequences Contingencies/Mitigation Need for additional Deputy PM to evaluate severity and review of finalized impact to continued testing. Options: requirements would Continue testing impact schedule Stop testing for a short Delay to project duration to allow contractor to implementation address issues Application deployed with Stop testing and reschedule errors An unacceptable number of defects and/or bugs are detected System completely fails Application not deployed on schedule Application not deployed Host location failure No accessibility to application to test Delay to deployment Not able to deploy application at all Agency(s) not adequately prepared to implement Agency(s) budget shortfall prevents travel for training users Impact to number of trainees Impact to training schedule Additional train-the-trainer sessions needed System not utilized effectively Benefits of the system not fully recognized or used Impact to train-the-trainer schedule Impact to overall training Deputy PM to consult with PM and software development contractor and evaluate next steps. PM to consult with FS leadership and NESS to resolve issues Initiate the Contingency Plan Delay deployment Utilize Back-up location as the main host until NESS is available Ensure widespread distribution of the sample Agency Implementation Plan Communication and presentations at interagency meetings Business Lead assistance in communicating with stakeholders Utilize trained individuals from nearby offices to prevent the need for travel e-isuite Implementation Plan Page 14 of 29
15 schedule System not utilized effectively Benefits of the system not fully recognized or used Provide on-line training and Webinars Provide independent study training materials 5 Implementation Verification and Validation At this time, no outside independent review is planned. Internal reviews will be conducted to ensure project management principles and best practices are adhered to and software design meets stated requirements and expectations. Thorough testing will be accomplished prior to the decision to implement the system. See the Risks and Contingencies section above for information should the system fail to operate as expected. 6 Acceptance Criteria Acceptance of the software for transition into production will be based on the following: All of the intended functionality is included User Interface testing has been completed successfully Regression testing has been completed successfully The initial ROSS data import has been successfully completed and verified Training materials have been tested and are ready for use User guide/help documents are ready for use The helpdesk is trained in the use of the application Internal reviews indicate the system is ready to deploy Interagency IT testing and acceptance has been accomplished The Managing Agency has given approval e-isuite Implementation Plan Page 15 of 29
16 APPENDIX A: Project Implementation Plan Approval The undersigned acknowledge that they have reviewed the e-isuite Implementation Plan and agree with the information presented within this document. Changes to this Project Implementation Plan will be coordinated with, and approved by, the undersigned, or their designated representatives. Signature: /s/ Jon C. Skeels Date: 9/15/2011 Print Name: Jon C. Skeels, PMP Title: Senior Project Manager e-isuite Implementation Plan Page 16 of 29
17 APPENDIX B: REFERENCES The following table summarizes the documents referenced in this document. Document Name Description Location IBA Strategic Plan April 2006 Identify automation and business process changes Click on the Strategic Plan link e-isuite Charter 2006 NWCG Charter for the e-isuite Project Implementation As titled Documents e-isuite Glossary Definition of terms used in the Attached as Appendix C e-isuite application Sample Agency Implementation Plan Attached as Appendix D Example of a document to assist an Agency in implementing e-isuite e-isuite Implementation Plan Page 17 of 29
18 APPENDIX C: Glossary A Accounting Code A combination of numbers and letters entered by the user to identify the financial account to which transactions will be charged. An accounting code is used when creating payment documents or performing certain transactions (e.g. posting time) that support payment documents for services rendered on an incident. The type of accounting code used is based on the type of incident and response an agency provides. Adjustments A transaction entered in the Time module that either deducts from or adds to an invoice, based on commodities or categories of items. In e-isuite, those commodities or categories include, but are not limited to, commissary, meals, medical expenses, or travel costs. Agency A government organization that is responsible for the administration of specific functions, such as managing National Forests. In the Incident Command System, agencies are defined as either jurisdictional (having statutory responsibility for incident management) or as assisting or cooperating (providing resources or other assistance). Governmental organizations are most often responsible for an incident, although in certain circumstances, private-sector organizations may be included. Additionally, non-governmental organizations may be included to provide support. Assign Assign is the act of associating a resource with an active incident. The resource will participate in the operational tactics of the incident, and their costs will be charged to the incident s accounting code. Assignment An Assignment is the period of time that a resource is associated, or assigned, to an incident. A typical assignment in wildland fire or other emergency is 14 days, but could last from only a few days to 30 days. An assignment may also be defined as a task that is given to a resource to perform within a given operational period. The operational period is defined in the Incident Action Plan. e-isuite Implementation Plan Page 18 of 29
19 C Contractor A person or organization holding a contract with the government to perform a certain task or provide a certain item for the government in support of managing an incident. Cooperator Cooperator is a term used to describe a government entity holding an agreement with another government entity to perform a certain task or provide a certain item in support of managing an incident. Cost Group A Cost Group is a set of data within an incident that allows a user to identify a portion of costs for which a given agency is responsible. There are multiple Cost Groups for an incident, which are usually identified according to a Cost Share Agreement for that incident. Custom Work Area A subset of resources and incidents from one or more Standard Work Areas. Any user can create a Custom Work Area. (See Work Area definition) D Delete Delete is a user-initiated action that marks data so that it does not appear within the e-isuite application and is no longer usable. Typically, a user will perform the delete action to remove data that was accidentally or incorrectly entered and needs to be removed. Deleted data will still reside in the database and may be present in backup files and system logs. Disable Disable is the act of preventing an item from displaying in e-isuite so that it can no longer be assigned to an incident, without deleting the data. The resource will display when viewing incidents where the resource was previously assigned. Once disabled, the resource may be viewed by a user with the appropriate role in the View Disabled Resources screen. This user may also return the resource to an enabled state. A user would disable a resource when the resource has dependent data associated with it that prevents it from being deleted (e.g., a resource with time postings that will no longer be used). A user may also want to temporarily prevent a resource from being used with the intent of enabling the resource at a future time. e-isuite Implementation Plan Page 19 of 29
20 Dispatch Center The agency or jurisdictional facility that has the responsibility to assign resources to incidents. E e-isuite e-isuite is a web-enabled application used as a tool for managing an incident. There are two versions of the e-isuite system: Enterprise and Site. e-isuite Enterprise The Enterprise system is a centralized application that users can access from a common URL. The e-isuite Enterprise system requires internet connectivity and can be accessed through a web browser. As a centralized database, the e-isuite Enterprise system will contain all e-isuite data (both Enterprise and Site data). A user will login to the Enterprise system and select a Work Area in order to access their data. (See definition for Work Area below) e-isuite Site e-isuite Site is accessed through a browser, but will not require internet connectivity. It will be run independently from Enterprise to assist an Incident Management Team (IMT) at a remote site. When internet connectivity is available, data can be transferred to and received from Enterprise and will facilitate communication with other applications such as ROSS, ICBS-R, etc. Employment Type Within the e-isuite system, employment type is associated with a government employee using three different mnemonics: FED, AD and OTHER FED employment type is assigned to resources that are employed by a federal government agency regardless if they are permanent or seasonal employees. AD employment type is assigned to resources hired under the federal Administratively Determined pay plan, or Pay Plan or Emergency Workers. OTHER employment type is assigned to all other government employees, including but not limited to state, county or local governments. Enable Enable is the act of allowing a previously-disabled item to be accessible by a functional user. This action is only available to a privileged user. Event Type Event type is a category that identifies the kind of incident being managed for example wildfire, flood, hurricane, etc. e-isuite Implementation Plan Page 20 of 29
21 F Fire Code A Fire Code is a type of Accounting Code that applies to multiple Federal agencies for the same Incident. An Incident will only have one Fire Code but may have multiple Accounting Codes. A Fire Code is only applicable to the following five Federal agencies: Forest Service Bureau of Land Management Bureau of Indian Affairs Fish and Wildlife Service National Park Service Forest Service Region/Unit An established set of data that identifies the Forest Service office with jurisdiction for an incident. This information is used in conjunction with the accounting code for the incident. For example, the Region/Unit for an incident on the Willamette National Forest in the Pacific Northwest Region would be I Incident An incident is a type of emergency event that poses a threat to people or property. An incident can be a natural event such as wildfire, hurricanes or tornados; or a man-made event such as an oil spill, bombing or shuttle disaster. Incident Action Plan (IAP) The Incident Action Plan (IAP) is a set of strategies and information used to implement objectives for an incident. The IAP outlines where resources will be assigned and what duties they are responsible for carrying out during a given operational period. Incident Group A grouping of incidents that allows a user to view and manage all resources associated with the incidents in the group in a flattened view (i.e., all resources will display as if they were assigned to the same incident). Incident Jurisdiction The government organization that has authority for an incident. e-isuite Implementation Plan Page 21 of 29
22 Item Code An Item Code is a shortened version of an incident qualification and reflects the position of that resource on an incident. For example, the Item Code FFT1 indicates that a resource is assigned to that incident as a Type 1 Fire Fighter. Item Name The description for an Item Code (see Item Code above). J Jurisdiction See Incident Jurisdiction N NAP NESS Application Portal The NESS Application Portal is a web-based interface to provide a secure unified access point through which information from the NESS will be aggregated to application-specific ports. NESS National Enterprise Support Service Located at the National Information Technology Center, this is the organization that is responsible for providing computer operating environments for US Department of Agriculture information technology systems. Non-Privileged User Account A user account that cannot perform administrative functions within e-isuite, such as creating a user account and assigning roles to that user account. A non-privileged user account only has access to the functionality in e-isuite associated with their assigned role(s), such as Cost or Time. P Permanent Resource A permanent resource is used in e-isuite Enterprise only, and refers to a resource that will reside in a user s Work Area as an inventory item. A permanent resource is typically a local resource that will be used multiple times throughout the year. Primary Resource Primary resource references the main name of a resource. For example: A crew of 20 individual firefighters is called the Zig Zag IHC, which would be the primary resource name recorded on the resource order, C-3. The individual crew members would be subordinate resources to the Zig Zag IHC, and would have resource e-isuite Implementation Plan Page 22 of 29
23 orders using the crew s order number i.e. C-3.1 for Joe M Superintendent, C-3.2 Scotty Squadboss, C-3.3 Filipe Faller, etc. In most cases, the subordinate resources are rostered to the primary resource, creating a hierarchy of resources. Privileged User Account A user account limited to the ability to change the roles of another user account. A privileged user account does not have access to any of the functional areas within e-isuite, such as Cost or Time. Q Quick Stats An area in the e-isuite application where a user can quickly view statistics on the number and type of resources assigned to an incident. R Reassign Reassign generally means a change in the assignment of a resource during the same mobilization period. Example 1: Jose Rivas was originally assigned to the Rattle incident as a Field Observer. The Rattle incident no longer needs Jose Rivas and he has time left on his 14 day assignment. The Done Rock incident puts an order in for a Field Observer, and the order if filled with Jose. The user reassigns Jose Rivas from Rattle to Done Rock in e-isuite. Example 2: Jose Rivas was initially assigned to Rattle as a Field Observer. The IMT decides they really need a Safety Officer, which is also one of Jose s qualifications. Jose is reassigned within the Rattle incident as a Safety Officer. Reference Data A common set of values a user can select when adding or editing data. Request Number A number assigned to a resource when the resource is dispatched to an incident through the Resource Ordering and Status System. Also known as a Resource Order Number. Restricted Incident An incident that was set up so that only specified user accounts have access to manage the resources. This term applies to e-isuite Enterprise only. Restricted Work Area A Work Area that includes restricted incidents that can only be managed by specific users. Each user account will have a Restricted Work Area that includes the restricted incidents to which that user has access. e-isuite Implementation Plan Page 23 of 29
24 Role When assigned a particular role, a user account is authorized to access specific data and perform specific functions within the e-isuite system. A user account may have more than one role associated to it, but will not have both privileged and nonprivileged access combined. For example: a user account assigned the Check-In role will only be able to perform the functions associated with checking in a resource at an incident. A privileged user account is the only user account that can assign or edit roles. ROSS The Resource Ordering and Status System used by dispatch offices nationally to dispatch resources to wildland fire and other emergency incidents. Roster Roster is the act of associating one resource to another resource with one resource being the primary resource and the other being a subordinate resource, creating a hierarchy of resources. This association can be created from within the e-isuite application or passed from the ROSS application to e-isuite. Example: An e-isuite user wants to manage an engine and crew members as one resource. The user performs the steps to associate, or roster, the crew members to the engine. S Shared Work Area A Standard or Custom Work Area where access was given to one or more user accounts that would not otherwise have access to that Work Area. Standard Work Area A Work Area that is based on the primary dispatch center associated with a user account. See Work Area definition below. Status The status of a resource identifies in which state the resource resides on an incident in the e-isuite system. The following is a list of the terms that define the state of a resource: Filled the order for a resource has been filled, but the resource has not yet checked in. Checked-in the resource is at the incident in an active state. Pending Demob the resource will soon be leaving the incident. Demobed the resource is no longer assigned and has left the incident. Reassigned the resource was given a new assignment at a new incident. Subordinate Resource e-isuite Implementation Plan Page 24 of 29
25 A resource that is secondary in a hierarchy to the Primary Resource. For Example: A crew member is a subordinate resource to the Crew; an engine operator is a subordinate resource to the Engine. (See Primary Resource) T Task Force Different types of resources that have been grouped together to perform a specific set of duties on an incident. U Un-Roster Un-roster is the act of removing the association of a subordinate resource from its primary resource. The subordinate resource becomes an individual resource and is no longer associated with the primary resource for future actions. Unit ID A national system used to shorten the name and location of a government entity. For example, the Unit ID of Yosemite National Park in California is CA-YNP. User A user is an individual who has access to the e-isuite software via a user account login. There are two general types of users: A functional user, who has access to the operational aspects of e-isuite (e.g., resources, time, cost) and an account manager, who has access to system functions (e.g., user accounts). An account manager user account cannot have access to operational areas of e-isuite. Example of a functional user: A user that has access to the Cost functions. Example of an Account Manager: A user that has access to create user accounts. User Group A set of user accounts that facilitates quickly adding users to an incident, incident group or shared work area. W Work Area Work Area applies to e-isuite Enterprise only, and determines the incidents and resources to which a user will have access, based on the dispatch center boundaries e-isuite Implementation Plan Page 25 of 29
26 associated with that user. There are three types of Work Areas: Standard, Custom and Shared. Standard Work Area: A Standard Work Area is the user s default home page when logging into Enterprise. It reflects a collection of incidents and resources within a geographic area defined by the dispatch center boundaries associated with the user. For example: a user assigned to the Shoshone National Forest would have access within e-isuite to all units, incidents and resources that are managed by the Cody Interagency Dispatch Center. Custom Work Area: A Custom Work Area is a subset of resources and incidents from one or more Standard Work Areas. Any user can create a Custom Work Area. Shared Work Area: A Standard or Custom Work Area where access was given to one or more user accounts that would not otherwise have access to that Work Area. e-isuite Implementation Plan Page 26 of 29
27 APPENDIX D: Sample Agency Implementation Plan Date: May, 2011 Prepared by: Topic: Implementation Plan for e-isuite History The I-Suite application is a portable, client/server application that can be used at any incident to capture data and to help manage resources and costs at remote incident locations. The application is organized into modules based on the Incident Command System (ICS). The data captured within I-Suite includes check-in data, plans, demobilization, time, cost, injury/illness, and supply. e-isuite is the next generation version of I-Suite and, when fully implemented, will replace the current I-Suite application. The e-isuite system is a web browser (i.e., Internet Explorer) enabled application for use at the Incident Command Post (ICP) and in agency offices to manage emergency incidents and planned events. Used in agency offices, e-isuite Enterprise will bring most of the current I-Suite capabilities to users connected to agency networks via the internet. At that level, it can be used for activities such as initial attack, type 3, 4, and 5 incidents, search & rescue incidents, and to generate invoices or timesheets for casual hires supporting activities such as training, dispatch, and cache work. e-isuite Remote Site will be used at an incident similar to the way current I-Suite is used, with capability to interface with e- ISuite Enterprise. If access to the internet is not available, the incident data can be loaded onto a portable media device and downloaded to e-isuite Enterprise. e-isuite Enterprise will have the ability to store the entire life-cycle of the incident and provide upward reporting capability previously not available in I-Suite. There is no software to be installed on the user s computer and no software licenses required to use e-isuite. Each user will only require a web browser to run the application. Benefits Integration with other systems o ROSS o FireCode o Albuquerque Service Center o Other Agency payment centers and financial systems as capability is developed Centralized Enterprise system o Ability to track costs beginning with initial-attack on a local unit o Issue payment documents as needed for local incident o Data Warehouse/Operational Data Store allows for data-mining capability Ability to manage data based on incident type (e.g. hurricane, oil spill, fire, special event) Ability to transfer information between Site and Enterprise Ability to gather information on a local/geographic/national scale for upward reporting Enhanced security Ease in preparing local pay documents Ability to track costs for the entire life-cycle of an incident e-isuite Timelines: Implementation of e-isuite is targeted to begin in June 2013, with full implementation by the end of October The target date to de-commission the current I-Suite program is December 2014, however after e-isuite is implemented only limited updates to I-Suite will be provided (e.g. AD rates will be updated and the Helpdesk will still address questions). Once I-Suite is e-isuite Implementation Plan Page 27 of 29
28 decommissioned, no further development or support by the IBA Project Team or the Interagency Incident Application Helpdesk will be provided to the current I-Suite application. Testing Timelines: A two-phased approach will be used for subject matter expert (SME) testing that will incorporate both the Site and Enterprise functional areas in each phase. The Phase 1 SME testing target is January 2012 and will include login, user accounts, incidents, resources, time, ROSS import, and associated reports. The Phase 2 SME testing target is November 2012 and will include the cost module, IAP, custom reports, additional audit functionality, financial export, supply, and injury & illness. Field/user acceptance testing target dates are March - May The following individuals have volunteered to assist in field testing e-isuite: (Insert names) Implementation Plan: All units hosting an incident or event shall use e-isuite Site to record time, print timesheets and track and report costs. e-isuite Enterprise will be used by all units with high occurrences of SAR, all-hazard incidents, prescribed burn projects, step-up or severity funding. e-isuite will require that each Agency establish Account Managers. The Account Manager will have the following responsibilities: Retrieve requests for User Accounts (This process is still under development and will be available prior to deployment) Review and approve User Accounts Establish User Accounts (both other Account Managers and regular User Accounts) Edit or delete an existing User Account Enable or disable a User Account Add, edit or delete a User Group The following positions have been identified as Account Managers for (Agency) for e-isuite: (Insert names) Within e-isuite, access to the different functional areas will be governed by roles that are requested at the time the User Account request form is submitted. A User Account may have one or more of the roles assigned, and the roles should be consistent with their expected performance either at the Enterprise level or at the Site level. However, a functional area User Account will not have the Account Manager role assigned to it, which is not to say that an Account Manager cannot be a functional user or vice versa. In that case, the user will have two User Accounts; one that allows the Account Manager access, the other to allow access to the functional areas. The roles in e-isuite are as follows: Check-in/Demob IAP Time Cost Injury/Illness Supply Supply Clerk Supply Communications Data Steward e-isuite Implementation Plan Page 28 of 29
29 The (Agency) has identified the following positions as responsible for the use of e-isuite Enterprise at the local unit: Name of position Name of position Training Plan: The e-isuite Project Team will conduct Train-the-Trainer sessions for all personnel identified by their respective agencies. The following individuals volunteered to enroll in the Train-the- Trainer course for e-isuite: (Insert names) These trainers will be responsible to train the local unit users on a (Regional, Park, geographic area basis whatever is determined to be the best approach). The trainers will have responsibility to coordinate, schedule and conduct training sessions until all of the individuals in the positions identified above have been trained. Key (Agency) contacts: (Agency) points of contact will be, all of whom will be tasked with: promoting the use of e-isuite; communicating issues to the e-isuite Project Team; answering questions from the users or managers on agency implementation; and staying current with the application, the project team, and the (Agency) national incident business lead. Fire & Aviation Management will fully support these employees and units who have agreed to become trainers by fully funding one train-the-trainer session (including travel costs for trainers and trainees). Units will also provide the time and funding for the individuals identified in the Plan to attend training sessions to become proficient in the use and application of e-isuite. It is understood that trainers will be available to units that need assistance with the e-isuite program. (Agency) fully supports the e-isuite initiative and will implement its use Service-wide for (include all program areas intended to use e-isuite, e.g. all incidents/events, including suppression, severity, step-up, prescribed fire projects, and all-hazard incidents). Reviewed by: Approved by: (Approval and/or Review according to Agency protocol) e-isuite Implementation Plan Page 29 of 29
Access Control and Account Management Plan Version 2.2
Incident Suite (I-Suite) Access Control and Account Management Plan Version 2.2 USDA FOREST SERVICE Prepared by: FIRE AND AVIATION MANAGEMENT Date: August 2, 2011 Document Information Owner Details Name
National Interagency Resource Ordering and Status System. Change Management Procedures
National Interagency Resource Ordering and Status System Change Management Procedures Working Copy June 9, 2003 Table of Contents 1. Purpose...3 2. Change Control Board Description and Roles... 3 3. Change
THIRTYMILE ACCIDENT PREVENTION ACTION PLAN
United States Department of Agriculture Forest Service THIRTYMILE ACCIDENT PREVENTION ACTION PLAN Preface The attached action plan was developed from the recommendations made by the Accident Review Board.
National Interagency Resource Ordering and Status System (ROSS) Project Communications Plan
National Interagency Resource Ordering and Status System (ROSS) Project Communications Plan WORKING COPY Updated May 10, 2004 communication_plan_5_10_04.doc 1 TABLE OF CONTENTS GOALS... 4 RESPONSIBILITIES...
NWCG Training Curriculum History
NWCG Training Curriculum History DISPATCH D-105 Entry Level Dispatcher* D-110 Expanded Dispatch Recorder D-111 Entry Level Dispatcher* D-310 Expanded Support Dispatcher 4/92 changed to D-111 in 2/00; reference
State of Colorado Incident Management System. Incident Management Program Qualifications System Guide
State of Colorado Incident Management System Incident Management Program Qualifications System Guide In Cooperation With: Colorado Association of Chiefs of Police Colorado Department of Local Affairs,
NIMS Study Guide. Lesson One: What Is the National Incident Management System (NIMS)? What is NIMS?
NIMS Study Guide Lesson One: What Is the National Incident Management System (NIMS)? What is NIMS? NIMS is a comprehensive, national approach to incident management that is applicable at all jurisdictional
FROM THE INTERAGENCY DISPATCH OPTIMIZATION PILOT PROJECT (IDOPP)
NATIONAL TOOLBOX FROM THE INTERAGENCY DISPATCH OPTIMIZATION PILOT PROJECT (IDOPP) January 31, 2013 TABLE OF CONTENTS 1 Introduction... 1 2 Project Start-Up... 1 3 Data Requests... 2 3.1 Information Needs
Part III. Supporting Documents. Standardized Emergency Management System (SEMS) Glossary of Terms
Standardized Emergency Management System (SEMS) Glossary of Terms INTRODUCTION The Glossary contains definitions of terms commonly used in the Standardized Emergency Management System (SEMS). The Glossary
Wildland Fire Position Descriptions
Wildland Fire Position Descriptions This document gives brief position descriptions. The career tracks and career timelines are color coded to the Fire Management Career Ladders graphic. Operations Early
ICS ORIENTATION Saskatchewan
INCIDENT COMMAND SYSTEM Canadian Version CANADIAN NATIONAL TRAINING CURRICULUM ICS ORIENTATION Saskatchewan Module 1 I - 100 INCIDENT COMMAND SYSTEM Canadian Version CANADIAN TRAINING CURRICULUM MODULE
FEDERAL EMERGENCY MANAGEMENT AGENCY (FEMA) INDEPENDENT STUDY COURSE INTRO TO INCIDENT COMMAND SYSTEM FOR FEDERAL WORKERS (IS-100.
This Study Guide has been created to provide an overview of the course content presented in the Federal Emergency Management Agency (FEMA) Independent Study Course titled IS-100.FWA Intro to Incident Command
ICS 300 Incident Command System
Lesson 1: Welcome/Overview Lesson Overview The Welcome/Overview lesson will provide a brief tutorial on the structure of the course. It will also review the purpose of the course, present an overview of
Lesson 1: What Is the National Incident Management System (NIMS)? Summary of Lesson Content
Lesson 1: What Is the National Incident Management System (NIMS)? Lesson Overview On February 28, 2003, President Bush issued Homeland Security Presidential Directive 5. HSPD 5 directed the Secretary of
Software Test Plan (STP) Template
(STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This
United States Department of the Interior
United States Department of the Interior NATIONAL PARK SERVICE 1849 C Street, N.W. Washington D.C. 20240 IN REPLY REFER TO: DIRECTOR'S ORDER #55: INCIDENT MANAGEMENT PROGRAM Effective Date: Sunset Date:
Evolving Incident Management. Phase 2: Strategic Implementation Plan Narrative
Evolving Incident Management Phase 2: Strategic Implementation Plan Narrative A Project Report to the National Wildfire Coordinating Group Executive Board July 24, 2012 Table of Contents Executive Summary...
NIMS ICS 100.HCb. Instructions
NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers
ICS-400: Advanced ICS for Command and General Staff, Complex Incidents and MACS for Operational First Responders (H-467)
ICS-400: Advanced ICS for Command and General Staff, Complex Incidents and MACS for Operational First Responders (H-467) Student Manual August 2006 National Fire Academy U.S. Fire Administration Directorate
California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9 th Street, Room 141 Sacramento, CA 95814
IT Project Status Report For an MHSA-Funded IT Project Please send the Signed Original to the following address: California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9
Interagency Interoperability Oversight Group
Interagency Interoperability Oversight Group DOI-USDA/FS Access / Authentication Project Charter 1. Project Overview It is well known that the wildland firefighting community is a highly integrated, cooperative
Preface. The Leadership Committee of the NWCG Training Working team sponsored this project. Project team members were:
Preface This workbook is intended to assist in the development and use of Standard Operating Procedures (SOPs) for critical tasks, primarily in an operational environment. An SOP is a guideline that clearly
Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015
Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document
2015 CRAIG INTERAGENCY FIRE MANAGEMENT GROUP (CIFMG) ANNUAL OPERATING PLAN
2015 CRAIG INTERAGENCY FIRE MANAGEMENT GROUP (CIFMG) ANNUAL OPERATING PLAN Craig Interagency Dispatch Center (CRC) Bureau of Land Management () Northwest District, Including Little Snake (LSD), Kremmling
Project Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
Management Efficiency Assessment of the Interagency Wildland Fire Dispatch and Related Services. Executive Summary
Management Efficiency Assessment of the Interagency Wildland Fire Dispatch and Related Services Executive Summary The purpose of this management efficiency assessment is to review the Wildland Fire Dispatch
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010
SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")
ICS for LAUSD EOC and DOC Operation
ICS for LAUSD EOC and DOC Operation Below is some background information on the Incident Command System (used at our schools and in other field operations) and how it applies in an EOC environment. From
ON-SITE INCIDENT MANAGEMENT
ON-SITE INCIDENT MANAGEMENT Capability Definition Onsite Incident is the capability to effectively direct and control incident activities by using the Incident Command System (ICS) consistent with the
Optimos Enterprise Helpdesk Automation Solution Case Study
Optimos Enterprise Helpdesk Automation Solution Case Study IT Help Central National Science Foundation Optimos Incorporated 4455 Brookfield Corporate Drive Chantilly, VA 20151 Telephone: (703) 488-6900
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
Chapter 01 Federal Wildland Fire Management Policy and Guidance Overview
FEDERAL FIRE PROGRAM POLICY AND GUIDANCE OVERVIEW CHAPTER 0 0 0 Chapter 0 Federal Wildland Fire Management Policy and Guidance Overview Scope The Interagency Standards for Fire and Fire Aviation Operations
FIELD MANAGER S COURSE GUIDE APPENDIX A ERRATA SHEETS
APPENDIX A ERRATA SHEETS NWCG Field Manager s Course Guide ERRATA SHEET #1 Effective Date: October 1, 2001 Changes: The Field Manager s Course Guide (FMCG) has been entirely revised. Specific items to
Geographic Area Command
Geographic Area Command Appendix to: Georgia Emergency Operations Plan- ( Georgia Hurricane Plan ) 2013 Purpose INTRODUCTION Geographic Area Command shall be established to oversee the management of an
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
Parent and Community- Funded Contributions for Programs at School Sites
Parent and Community- Funded Contributions for Programs at School Sites A guide to: ü How School Trust Accounts Work ü Paying Consultants or SFUSD Employees ü Contracts, MOUs and Facilities Use Permits
Capacity Plan. Template. Version X.x October 11, 2012
Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business
SIT209. ICS-209 PROGRAM (NIMS) User s Guide. Program. Intelligence Operations. January 2014
SIT209 Program Intelligence Operations ICS-209 PROGRAM (NIMS) User s Guide January 2014 Table of Contents Table of Contents... 2 Introduction... 6 Background... 6 System Function... 7 System Users... 7
Organization. Project Name. Project Overview Plan Version # Date
Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents
MINIMUM QUALIFICATION STANDARDS
MINIMUM QUALIFICATION STANDARDS SENIOR FIREFIGHTER (advanced level firefighter with specialized skills and knowledge) OPM Standard Requirements - GS-455/462 Technician Series One year of specialized experience
Draft Document STATE OF MICHIGAN. SACWIS Planning Department of Human Services Strategic Implementation Plan: Project Staffing
STATE OF MICHIGAN SACWIS Planning Department of Human Services Strategic Implementation Plan: Project Staffing Executive Summary The State of Michigan has dedicated integrated team of resources for the
<name of project> Software Project Management Plan
The document in this file is adapted from the IEEE standards for Software Project Management Plans, 1058-1998, which conforms to the requirements of ISO standard 12207 Software Life Cycle Processes. Tailor
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.
PRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - AEM 6.0 Sites: Managed Services Basic (2015v1) The Products and Services described in this Product Description and Metrics ( PDM ) document are subject to the
COMPENSATION-FOR-INJURY MANAGER (INJR)
A Publication of the National Wildfire Coordinating Group Sponsored by United States Department of Agriculture United States Department of the Interior NATINAL INTERAGENCY INCIDENT MANAGEMENT SYSTEM TASK
MASTER COOPERATIVE WILDLAND FIRE MANAGEMENT AND STAFFORD ACT RESPONSE AGREEMENT. Between UNITED STATES DEPARTMENT OF THE INTERIOR
MASTER COOPERATIVE WILDLAND FIRE MANAGEMENT AND STAFFORD ACT RESPONSE AGREEMENT Between UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Oregon and Washington Agreement # OR-RFPA09-1001
AGREEMENT- LEXMARK ENTERPRISE SOFTWARE, LLC
TULSA COUNTY PURCHASING DEPARTMENT MEM DATE: SEPTEMBER 30, 2015 FROM: PURCHASING DIRECTO ~ TO: SUBJECT: BOARD OF COUNTY COMMISSIONERS AGREEMENT- LEXMARK ENTERPRISE SOFTWARE, LLC SUBMITTED FOR YOUR APPROVAL
IQSweb Reference G. ROSS Migration/Registration
ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:
PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History
Training Opportunities
FEMA Independent Study Courses IS-288.A: The Role of Voluntary Organizations in Emergency Management To complete the above course please visit the FEMA Independent Study Website at: http://training.fema.gov/is
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
National Interagency Aviation Council (NIAC) Phase III Strategy
National Interagency Aviation Council (NIAC) Phase III Strategy I am happy to be here today. Aviation remains a key component to wildland fire management. The future for the agencies will undoubtedly involve
Creating a Business Continuity Plan for your Health Center
Creating a Business Continuity Plan for your Health Center 1 Page Left Intentionally Blank 2 About This Manual This tool is the result of collaboration between the Primary Care Development Corporation
South Dakota Training Program
South Dakota Training Program 2014-2016 Table of Contents Background Page 2 Program Details. Pages 3-4 Recommended Courses..Page 5 Scheduling of Courses..Page 6 Instructor Qualifications/Requirements.
Clinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Published: January 2015 Table of Contents Emergency Notification Contacts Primary... 2 Emergency Notification Contacts Backups (in case primary is unavailable)...
SENTINEL AUDIT V: STATUS OF
SENTINEL AUDIT V: STATUS OF THE FEDERAL BUREAU OF INVESTIGATION S CASE MANAGEMENT SYSTEM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 10-03 November 2009 Redacted
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
Altiris Helpdesk Solution 6.0 SP5 Product Guide
Altiris Helpdesk Solution 6.0 SP5 Product Guide Notice Helpdesk Solution 6.0 SP5 2000-2007 Altiris, Inc. All rights reserved. Document Date: August 29, 2007 Information in this document: (i) is provided
Construction Management System (CMS) Deliverable Review Process
Construction Management System (CMS) Deliverable Review Process State of California Department of Transportation Division of Construction December 21, 2009 Version 1.0 Approvals Name: Title: Mark Leja
Search & Rescue Merit Badge
FEMA Course IS-100b Introduction to the Incident Command System for Search & Rescue Merit Badge Visual 1.1 Search & Rescue Merit Badge (requirement #5) Complete the training for ICS-100, Introduction to
Guidance for Implementation of Federal Wildland Fire Management Policy
Guidance for Implementation of Federal Wildland Fire Management Policy February 13, 2009 Page 1 Foreword The Review and Update of the 1995 Federal Wildland Fire Management Policy (January 2001) is the
Oracle Insurance Policy Administration System Quality Assurance Testing Methodology. An Oracle White Paper August 2008
Oracle Insurance Policy Administration System Quality Assurance Testing Methodology An Oracle White Paper August 2008 Oracle Insurance Policy Administration System Quality Assurance Testing Methodology
CALIFORNIA MASTER COOPERATIVE WILDLAND FIRE MANAGEMENT AND STAFFORD ACT RESPONSE AGREEMENT UNITED STATES DEPARTMENT OF THE INTERIOR
CALIFORNIA MASTER COOPERATIVE WILDLAND FIRE MANAGEMENT AND STAFFORD ACT RESPONSE AGREEMENT Between UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT California and Nevada CA Agreement
Ubertas Cloud Services: Service Definition
Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud
Upgrading to Websense Web Security v7.6
Upgrading to Websense Web Security v7.6 Webinar April 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
Scholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
This page intentionally left blank.
This page intentionally left blank. This page intentionally left blank. CONTENTS List of Tables...vii List of Figures...vii What Is the National Incident Management System?...1 PREFACE... 3 INTRODUCTION
Re: RFP # 08-X-39202 MOTOR VEHICLE AUTOMATED TRANSACTION SYSTEM (MATRX) FOR MVC ADDENDUM #10
State of New Jersey DEPARTMENT OF THE TREASURY JON S. CORZINE DIVISION OF PURCHASE AND PROPERTY BRADLEY I. ABELOW Governor PURCHASE BUREAU State Treasurer P.O. BOX 230 TRENTON, NEW JERSEY 08625-0230 September
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
CDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
Massachusetts Department of Fire Services Implementation Plan for State and Local Level National Incident Management Systems (NIMS)
Massachusetts Department of Fire Services Implementation Plan for State and Local Level National Incident Management Systems (NIMS) June 2005 Incident Commander Public Information Officer Safety Officer
Managing IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements.
Managing IBM Lotus Notes Domino 7 Servers and Users Course Code: 190-722 Course Title: Managing IBM Lotus Notes Domino 7 Servers and Users Duration: 3 classroom equivalent days Price: 990 USD + IVA Course
Information Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
SUPPLEMENTAL QUALIFICATION STANDARD FOR THE U.S. DEPARTMENT OF AGRICULTURE, FOREST SERVICE AND THE U.S. DEPARTMENT OF THE INTERIOR
SUPPLEMENTAL QUALIFICATION STANDARD FOR THE U.S. DEPARTMENT OF AGRICULTURE, FOREST SERVICE AND THE U.S. DEPARTMENT OF THE INTERIOR GS-0401 FIRE MANAGEMENT SPECIALIST This document supplements the requirements
Type 3 All-Hazard Incident Management System Credentialing Guide
Florida Division of Emergency Management Type 3 All-Hazard Incident Management System Credentialing Guide DSOC Approved March 7, 2013 Florida Division of Emergency Management Type 3 All-Hazard Incident
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
WEBs-AX Enterprise Security
WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed
How To Teach An Iowa Emergency Management System Course
To schedule an ICS or NIMS class contact Todd Moomaw [email protected] (515) 294-1211 IS-700 NIMS An Introduction This course introduces and overviews the National Incident Management System (NIMS).
Change Management for Rational DOORS User s Guide
Change Management for Rational DOORS User s Guide Before using this information, read the general information under Appendix: Notices on page 58. This edition applies to Change Management for Rational
December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
Strategies for a Successful E2E Systems Integration Test. Fiona Charles Let s Test May 9, 2012
Strategies for a Successful E2E Systems Integration Test Fiona Charles Let s Test May 9, 2012 This session Describes key project management strategies I have used to manage large- scale Systems Integration
Training Plan CONTOSO, LTD MICROSOFT DYNAMICS AX SOLUTION
Training Plan CONTOSO, LTD MICROSOFT DYNAMICS AX SOLUTION Prepared for Contoso, Ltd Prepared by Eric Swift, Functional Consultant Proseware, Inc. Contributors Terry Anderson, Project Manager Proseware,
