STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES

Size: px
Start display at page:

Download "STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES"

Transcription

1 Approved: Shobna Varma Deputy Director Standard Procedure No.: (SP) Responsible Office: Division of Information Technology STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES PURPOSE: The purpose of this Standard Procedure is to ensure uniform standards are followed for the management of all personal computers and workstations software distribution as well as adhered to all laws, regulations, policies and statewide standards for the installation of software used by the Ohio Department of Transportation. The procedures of this policy will ensure standards for properly licensed software to be loaded on all information systems. These standards will reduce the complexity of tracking software on individual hard drives, consistent applications and versions, along with providing manageable supporting needs. It is ODOT s policy to complete timely physical inventories for all assets on an annual basis to ensure accuracy, reliability and compliance to the ODOT Inventory Policy. Quality Assurance Reviews will be conducted by the Division of Information Technology to ensure compliance of these software standards. AUTHORITY: United States Code Title 17: United States Copyright Law ORC , ORC (J)(I) ORC (A), ORC (B)(2), ORC (A), ORC REFERENCES: Ohio DAS Policies ITP A.5 and ITP A.26 ODOT Policy (P), Software Copyright Compliance Policy ODOT Policy (P) Quality Assurance Review Policy ODOT Policy (P) Inventory Policy Software Publishers Association State of Ohio Agreement:

2 Page 2 of 9 SCOPE: All ODOT Divisions, Offices and Districts and all technical and end user personnel, all ODOT consultants, vendors, and contractors who use ODOT computer equipment and software. GENERAL: Maintaining control over software licenses and standards for ease of support by uniformity, ODOT has developed policies and procedures to assist in the task of identifying and inventorying the software resident on personal computers and information systems. The Federal Copyright Act makes no distinction between duplicating software for sale or for free distribution. The law protects the exclusive rights of the copyright holders and does not give users the right to copy proprietary software unless a backup copy is not provided by the manufacturer. It is illegal to make copies of proprietary software for any other purpose unless the license agreement stipulates otherwise. The State of Ohio entered into an agreement with the Software Publishers Association (SPA) with the express intent that all Executive Branch State Agencies will adhere to software license agreements. The Division of Information Technology has set forth a plan to identify standard software builds while maintaining an inventory of software licenses. This plan will assist in reconciling software licenses against software proof of purchase and be able to analyze risk assessments regarding user access beyond controlled servers. Periodic reviews will be conducted to ensure compliance with licensing agreements and risk assessments. This procedure replaces all previously released memoranda regarding this topic. DEFINITIONS: Base Build: A set foundation of the fundamental build containing the underlying software that the organization operates. Standard Build: The agreed upon software load placed on the Standard Office Automation or CADD workstation, using a standardized distribution method. Variance: A deviation from the standard build supplied to the Department, Office or District.

3 Page 3 of 9 PROCEDURE: I. STANDARD BUILD A. All employees, consultants, and contractors must use the base build on ODOT owned computers. Any additions to the base build must be legally licensed, and approved by the Deputy Director of the Division of Information Technology or authorized designee. B. All base builds will follow the Departmental standards and platforms set forth by the Division of Information Technology. II. VARIANCES A. In order to facilitate the Standard Office Automation or CADD workstation standard build the following apply to Departments, Offices, and/or Districts whom must have a variance from the base build (Attachment 3): 1. List reason why there would be a different build. 2. Submit to the appropriate level, Office Manager (or District I.T. Manager) for review and completion. 3. The Office Administrator (or District Business & Human Resource Administrator) will review, comment, approve or disapprove the variance and forward to DD or DDD. 4. The DD or DDD will review, comment, approve or disapprove the variance. 5. The approved variance form from DD or DDD shall be sent to the Division of Information Technology for final approval. 6. The approved form shall be kept by the Office of Resource Management. 7. The authorized designee shall also file and maintain the variance form for the Department, Office or District in which the variance applies. 8. If the variance list is changed this process will repeat for approval. 9. Upon approval, a copy of the software license should be filed with the Division of Information Technology, the original shall be maintained onsite at the appropriate District office. III. SOFTWARE ACQUISITION PROCEDURES A. Procurement of software must follow the Software Purchase Authorization Plan (Attachment 1). B. The Office of Resource Management will monitor the number of users and the number of legal licenses and determine purchasing requirements.

4 Page 4 of 9 IV. SOFTWARE INSTALLATION, MANAGEMENT and REMOVAL A. All technical or user personnel who install software must be authorized to do so. This will minimize the unauthorized installation of software and ensure that software is being used in accordance with license agreements. This process is included in the Software Purchase Authorization Plan (Attachment 1). B. All software license agreements with specific software serial numbers noted will be retained and filed at an ODOT facility (Division of Information Technology or District.) C. All base build software versions throughout the Department will be maintained by the Division of Information Technology. D. A Code of Ethics script will be provided on the base standard build. The script will prompt an identification and reference of the DAS and ODOT policies to assure user awareness. E. All removal of software from specific computer systems will need to follow the Software Removal Plan (Attachment 2) for proper inventory purposes and recording of license distribution. V. COMPLIANCE A. Annual reviews will be performed by the Division of Information Technology in accordance to the Office of Quality, Quality Assurance Review Policy (QAR), to assure license agreements are honored and standards are followed. B. The variance list supplied to the Division of Information Technology will be used in the QAR review. C. Non-compliant software will be noted on the QAR and will be removed. If the software is determined to be necessary for performing a business function, the request for variance should be submitted as per Section II, Part A of the standard procedure. D. The QAR action plan will identify the impact and recommendations associated for non-compliance issues. E. Review findings will be saved to provide a computer history for future reviews and risk assessments.

5 Page 5 of 9 TRAINING: A Code of Ethics script will be supplied on all base standard builds. This script along with the distribution of the Standard Procedures associated with this policy and the Software Compliance Policy to inform all end users of DAS and ODOT policies. Individuals found to be in violation will be identified by conducting annual reviews in the form of a QAR assessment.

6 Page 6 of 9 Attachment 1 Software Purchase Authorization Plan I. All software purchases must be approved by the Deputy Director of the Division of Information Technology, or authorized designee for the pre-approval process or blanket purchase. (Attachment 4) II. III. Software checked for ODOT approved standard. (A list of approved software that can be purchased to maintain standards will be published on the Division of Information Technology website) All software purchases are logged with the following information for inventory and tracking: A. Name of requestor B. Name of installer C. Purchase date D. Version of software E. Description of software F. Type of maintenance provided with software G. Serial number of resident hardware, unless under site license H. Name of authorized user I. Quantity J. Location of: 1. Department that is responsible 2. Office of installed software 3. Registration card 4. License agreement K. Copy of purchase documentation

7 Page 7 of 9 Attachment 2 Software Removal Plan I. List of software removed II. All software removed are logged with the following information for inventory and tracking: A. Name of software B. Name of assigned user C. Serial number of resident hardware D. Location of Department E. Location of Office

8 Page 8 of 9 Attachment 3 See Base Build Variance form on next page

9 Page 9 of 9 Base Build Variance Form Instructions to receive approval for variance: 1) Print or type 2) Provide list of variance from standard base build for workstations 3) Forward form to the Office Administrator FILL OUT FORM COMPLETELY Name: Work # Division/Office: Cost Center: List Variance from Base Build List reason for variance: ADMINISTRATIVE REVIEWS AND SIGNATURES Office Administrator/Manager Approved Disapproved Date Division/District Deputy Director Approved Disapproved Date Division of Information T echnology Deputy Director Approved Disapproved Date Explanation for Disapproval: Instructions: 1.Submit to the appropriate level for review and completion. 2.The Office Administrator (or District Business & Human Resource Administrator) will review, comment, approve or disapprove the variance. 3.The DD or DDD will review, comment, approve or disapprove the variance. Approvals are forwarded to DoIT. 4.DoIT DD approves or disapproves, then forwards to the Office of Resource Management 5.Office of Resource Management processes form and notifies office of status

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION

CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Best Practice exensys Asset Purchases

Best Practice exensys Asset Purchases Best Practice exensys Asset Purchases Table of Contents Introduction:... 3 Overview:... 3 Benefits:... 4 Conclusion:... 4 Introduction: Accounting of fixed assets is a complex task. To effectively manage

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.

This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state. STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23

More information

OP-P 270 Page 1 of 5. Operating Protocol-Procedure #: 270 Category: Employees Office of Primary Responsibility: Human Resources

OP-P 270 Page 1 of 5. Operating Protocol-Procedure #: 270 Category: Employees Office of Primary Responsibility: Human Resources Page 1 of 5 Operating Protocol-Procedure #: 270 Category: Employees Office of Primary Responsibility: Human Resources Approval Date: 12/8/14 Effective Date: 12/8/14 Revised: Purpose (Clearly state the

More information

Software Asset Management Toolkit

Software Asset Management Toolkit Software Asset Management Toolkit Autodesk License Compliance I stay compliant Get the Benefits of Software Asset Management Implementing a software asset management (SAM) program can help you effectively

More information

W Y O M I N G D E P A R T M E N T O F CORRECTIONS Policy and Procedure #1.107 Purchasing Card

W Y O M I N G D E P A R T M E N T O F CORRECTIONS Policy and Procedure #1.107 Purchasing Card W Y O M I N G D E P A R T M E N T O F Page 1 of 8 Authority: Effective Date: September 15, 2015 Wyoming Statute(s): 9-1-403 (c); 25-1-104; 25-1-105 Revision/Review History: 09/01/14 06/15/13 06/15/12 ACA

More information

Denver Public Schools - East High School

Denver Public Schools - East High School Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student

More information

Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses

Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses 1.0 Overview and Objectives Kennebec Valley Community College (KVCC) is requesting proposals from experienced and qualified

More information

Internal Control Guidelines

Internal Control Guidelines Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Stated below are the SCIRE activity level control objectives for purchasing and accounts payable.

Stated below are the SCIRE activity level control objectives for purchasing and accounts payable. SCIRE PURCHASING AND ACCOUNTS PAYABLE AND SUMMARY The goals of the purchasing function at SCIRE are to achieve open, competitive and costeffective buying, while adhering to external funding sources for

More information

KAREN E. RUSHING. Audit of Purchasing Card Program

KAREN E. RUSHING. Audit of Purchasing Card Program KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Audit of Purchasing Card Program Audit Services Jeanette L. Phillips, CPA, CGFO, CIG Director of Internal Audit and Inspector General

More information

LIVINGSTON COUNTY CREDIT CARD PROCEDURES

LIVINGSTON COUNTY CREDIT CARD PROCEDURES LIVINGSTON COUNTY CREDIT CARD PROCEDURES INTRODUCTION Livingston County is introducing an alternative approach to purchasing products and services through the use of credit cards. A credit card purchase

More information

DHHS Directive Number II-12

DHHS Directive Number II-12 DHHS Directive Number II-12 Title: Delegation of Authority to the Director, Division of Information Resource Management Effective Date: November 3, 2008 Revision History: January 1, 2002 Authority: G.S.

More information

Justice Information Sharing Division ( ND CJIS ), and

Justice Information Sharing Division ( ND CJIS ), and Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This

More information

UGA Cooperative Extension Service Credit Card Machine Policy

UGA Cooperative Extension Service Credit Card Machine Policy UGA Cooperative Extension Service Credit Card Machine Policy PCI compliance requires that each office have their own set of policies and procedures for handling credit cards. College wide policies reflect

More information

Vance County Schools Individual School Accounting

Vance County Schools Individual School Accounting Individual School Accounting Internal Controls and Responsibilities Individual School Accounting Internal Controls and Responsibilities Contents Page Principal Statement of Understanding 3 Treasurer Statement

More information

APHIS INTERNET USE AND SECURITY POLICY

APHIS INTERNET USE AND SECURITY POLICY United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This

More information

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment Corporate Property Automated Information System CPAIS Privacy Impact Assessment May 2003 CONTENTS Background...3 Access to the Data...5 Maintenance of Administrative Controls...9 1 Introduction The Office

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

OUR KIDS OF MIAMI-DADE/MONROE, INC. OK Operating NO. 1000-10-007 Revised Date: January 24, 2011 Revised Date: August 25, 2009

OUR KIDS OF MIAMI-DADE/MONROE, INC. OK Operating NO. 1000-10-007 Revised Date: January 24, 2011 Revised Date: August 25, 2009 OUR KIDS OF MIAMI-DADE/MONROE, INC. OK Operating NO. 1000-10-007 Revised Date: January 24, 2011 Revised Date: August 25, 2009 Our Kids Finance Department Merchant Gift Cards 1. Purpose: This document describes

More information

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Procedure for Procurement and Receipt

Procedure for Procurement and Receipt Procedure for Procurement and Receipt 1.0 Purpose - To ensure that all supplies, equipment and services purchased by the State Crime Laboratory (Laboratory) are properly procured and received. 2.0 Scope

More information

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS DIVISION OF CHILD CARE AND EARLY CHILDHOOD EDUCATION HEALTH AND NUTRITION UNIT P O BOX 1437, SLOT S 155 501-320-8982 FAX: 501-682-2334 TDD: 501-682-1550 TO: NON-PROFIT INSTITUTIONS FROM: HEALTH AND NUTRITION

More information

Lyford CISD. Accounts Payable Manual

Lyford CISD. Accounts Payable Manual Lyford CISD Accounts Payable Manual TABLE OF CONTENTS Requisitions.....3 Purchase Orders..5 Open Purchase Orders...7 Emergency Purchases.8 Accounts Payable 8 Check Distribution 10 Double Orders...10 Budget

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

O.R.C. 5120.01; 5120.22

O.R.C. 5120.01; 5120.22 STATE OF OHIO SUBJECT: PAGE 1 OF 7 Inventory, Donation, Transfer & Disposal of DRC IT Hardware & NUMBER: 05-OIT-21 Software RULE/CODE REFERENCE: O.R.C. 5120.01; 5120.22 SUPERSEDES: 05-OIT-21 dated 09/13/11

More information

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Information Security Policy and Handbook Overview. ITSS Information Security June 2015 Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS 1. Introduction Debit and Credit Card Receipt Standards apply to the administration

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

Hardware Inventory Management Greater Boston District

Hardware Inventory Management Greater Boston District Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the

More information

RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL

RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL FIXED ASSETS ACQUISITION PROCESS The fixed assets acquisition process is responsible for the proper recording and distributing of any fixed

More information

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9. 95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of

More information

Finance and Administration Cabinet Manual of Policies and Procedures. Agency Head means an individual who oversees the operations of the agency.

Finance and Administration Cabinet Manual of Policies and Procedures. Agency Head means an individual who oversees the operations of the agency. FAP 111-58-00 PROCUREMENT CARD PROGRAM PROCUREMENT CARD PROGRAM DEFINITIONS Agency means a spending unit. Agency Head means an individual who oversees the operations of the agency. Agency Site Administrator

More information

State of Ohio IT Policy

State of Ohio IT Policy Ohio Office of Information Technology Ted Strickland, Governor R. Steve Edmonson, Director / State Chief Information Officer Statewide IT Policy Investment and Governance Division 30 East Broad Street,

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

The supply of materials and services for the University must be undertaken as follows:

The supply of materials and services for the University must be undertaken as follows: 9.4 PURCHASING 9.4.1 Introduction Bellarmine University operates under a Central Purchasing system. Central Purchasing allows the University to take a comprehensive and coordinated approach to supplying

More information

Welcome to the ODE Secure Web Portal User Guide

Welcome to the ODE Secure Web Portal User Guide Welcome to the ODE Secure Web Portal User Guide If you followed the directions below and cannot complete the sign-up process for some reason, please contact the Security Administrator by clicking this

More information

Procurement Card. Procedures Manual

Procurement Card. Procedures Manual Procurement Card Procedures Manual By: Cindy Lambeth, Purchasing Agent Purchasing Department Santa Rosa County School District (850)983-5130 Updated 09/28/15 1 General Guidelines.....................................3

More information

The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements

The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements Part 1: Regulatory Overview (document updated 1/05) SEC RULE 240.17a-4 ELECTRONIC RECORDS AND RECORDKEEPING

More information

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Guide for the Role and Responsibilities of an Information Security Officer Within State Government Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities

More information

PROCUREMENT CARD AUDIT ANALYTICAL REVIEWS OCTOBER 14, 2013

PROCUREMENT CARD AUDIT ANALYTICAL REVIEWS OCTOBER 14, 2013 PROCUREMENT CARD AUDIT ANALYTICAL REVIEWS OCTOBER 14, 2013 INTERNAL AUDIT DEPARTMENT BOX 19112 ARLINGTON, TX 76019-0112 817-272-0150 www.uta.edu/internalaudit Background Information The ProCard program

More information

Administrative Policies and Procedures Manual 801 PURCHASING GOODS AND SERVICES

Administrative Policies and Procedures Manual 801 PURCHASING GOODS AND SERVICES VER: 1.0 CSA Review Date: 12/2008 Revised: 12/2008 Administrative Policies and Procedures Manual 801 PURCHASING GOODS AND SERVICES POLICY Purchases shall be made by: a purchase order issued by the Administrative

More information

Vulnerability Management Policy

Vulnerability Management Policy Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

THE CITY OF YOUNGSTOWN REGISTRATION OF SPECIALTY CONTRACTORS

THE CITY OF YOUNGSTOWN REGISTRATION OF SPECIALTY CONTRACTORS NOTICE ALL HEATING, VENTILATING, AIR CONDITIONING, REFRIGERATION, ELECTRICAL, OR HYDRONICS CONTRACTORS (SPECIALTY CONTRACTORS) WISHING TO DO BUSINESS IN THE CITY OF YOUNGSTOWN All City licenses for the

More information

VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY

VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY GBEA Goals: The goal of Virtual Learning Academy (VLACS) in providing the technology resources, network services, the Internet

More information

Department of Veterans Affairs VA HANDBOOK 4090 GOVERNMENT FLEET CARD PROCEDURES

Department of Veterans Affairs VA HANDBOOK 4090 GOVERNMENT FLEET CARD PROCEDURES Department of Veterans Affairs VA HANDBOOK 4090 Washington, DC 20420 Transmittal Sheet January 12, 2010 GOVERNMENT FLEET CARD PROCEDURES 1. REASON FOR ISSUE: This handbook prescribes procedures for use

More information

Pitt County Schools Individual School Accounting. Internal Controls and Responsibilities Fiscal Year 2009-10

Pitt County Schools Individual School Accounting. Internal Controls and Responsibilities Fiscal Year 2009-10 Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Contents Page Principal Statement

More information

Prepared by Office of Procurement and Real Property Management. This replaces Administrative Procedure No. A8.255 dated July 2012

Prepared by Office of Procurement and Real Property Management. This replaces Administrative Procedure No. A8.255 dated July 2012 Prepared by Office of Procurement and Real Property Management. This replaces Administrative Procedure No. A8.255 dated July 2012 A8.255 A8.255 Sole Source Procurement 1. Conditions for Use A8.200 Procurement

More information

Index #: 302.12 Page 1 of 7

Index #: 302.12 Page 1 of 7 State of Alaska Index #: 302.12 Page 1 of 7 Department of Corrections Effective: 04/6/2011 Reviewed: Policies and Procedures Due for Distribution: Public Rev: 04/2013 Chapter: Fiscal Management and Prisoner

More information

STATE OF OHIO I. AUTHORITY

STATE OF OHIO I. AUTHORITY STATE OF OHIO SUBJECT: PAGE 1 OF 8. Telecommunication Services SECTION: 05-OIT-12 RULE/CODE REFERENCE: SUPERSEDES: Ohio IT Policy ITP H.2 05-OIT-12 dated 08/19/14 RELATED ACA STANDARDS: EFFECTIVE DATE:

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law)

Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law) Aida S. Montano Bill Analysis Legislative Service Commission Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law) Reps. Oelslager, Flowers, Buehrer, White, Trakas BILL SUMMARY

More information

Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00

Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00 Cost Form This cost form has been provided to assist respondents in submitting costs associated by deliverable. Remember that all costs are to be the firm, fixed price of the deliverable and project total.

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company

Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Attention: Date: 08.02.2015 From: Our Reference: To whom it may concern Oman Rail Company SAOC Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Tender No:- C-001-15 Tender

More information

1. The records have been created, sent or received in connection with the compilation.

1. The records have been created, sent or received in connection with the compilation. Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy

More information

BELTUG Paper. Software Licensing Audits Checklist

BELTUG Paper. Software Licensing Audits Checklist BELTUG Paper Software Licensing Audits Checklist August 2015 Why this Checklist? Software licensing audits are almost always seen as an inconvenience by the targeted organisations. Together with effective

More information

Travel Card Policy and Procedure Manual

Travel Card Policy and Procedure Manual Policy and Procedure Manual Table of contents 1. Introduction... 3 2. Reason for Policies and Procedures... 3 3. Who Needs To Know the Policies and Procedures... 3 4. Definitions... 3 5. Contact Information...

More information