STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES
|
|
|
- Marshall Cox
- 10 years ago
- Views:
Transcription
1 Approved: Shobna Varma Deputy Director Standard Procedure No.: (SP) Responsible Office: Division of Information Technology STANDARDIZED SOFTWARE STANDARD BUILD STANDARD PROCEDURES PURPOSE: The purpose of this Standard Procedure is to ensure uniform standards are followed for the management of all personal computers and workstations software distribution as well as adhered to all laws, regulations, policies and statewide standards for the installation of software used by the Ohio Department of Transportation. The procedures of this policy will ensure standards for properly licensed software to be loaded on all information systems. These standards will reduce the complexity of tracking software on individual hard drives, consistent applications and versions, along with providing manageable supporting needs. It is ODOT s policy to complete timely physical inventories for all assets on an annual basis to ensure accuracy, reliability and compliance to the ODOT Inventory Policy. Quality Assurance Reviews will be conducted by the Division of Information Technology to ensure compliance of these software standards. AUTHORITY: United States Code Title 17: United States Copyright Law ORC , ORC (J)(I) ORC (A), ORC (B)(2), ORC (A), ORC REFERENCES: Ohio DAS Policies ITP A.5 and ITP A.26 ODOT Policy (P), Software Copyright Compliance Policy ODOT Policy (P) Quality Assurance Review Policy ODOT Policy (P) Inventory Policy Software Publishers Association State of Ohio Agreement:
2 Page 2 of 9 SCOPE: All ODOT Divisions, Offices and Districts and all technical and end user personnel, all ODOT consultants, vendors, and contractors who use ODOT computer equipment and software. GENERAL: Maintaining control over software licenses and standards for ease of support by uniformity, ODOT has developed policies and procedures to assist in the task of identifying and inventorying the software resident on personal computers and information systems. The Federal Copyright Act makes no distinction between duplicating software for sale or for free distribution. The law protects the exclusive rights of the copyright holders and does not give users the right to copy proprietary software unless a backup copy is not provided by the manufacturer. It is illegal to make copies of proprietary software for any other purpose unless the license agreement stipulates otherwise. The State of Ohio entered into an agreement with the Software Publishers Association (SPA) with the express intent that all Executive Branch State Agencies will adhere to software license agreements. The Division of Information Technology has set forth a plan to identify standard software builds while maintaining an inventory of software licenses. This plan will assist in reconciling software licenses against software proof of purchase and be able to analyze risk assessments regarding user access beyond controlled servers. Periodic reviews will be conducted to ensure compliance with licensing agreements and risk assessments. This procedure replaces all previously released memoranda regarding this topic. DEFINITIONS: Base Build: A set foundation of the fundamental build containing the underlying software that the organization operates. Standard Build: The agreed upon software load placed on the Standard Office Automation or CADD workstation, using a standardized distribution method. Variance: A deviation from the standard build supplied to the Department, Office or District.
3 Page 3 of 9 PROCEDURE: I. STANDARD BUILD A. All employees, consultants, and contractors must use the base build on ODOT owned computers. Any additions to the base build must be legally licensed, and approved by the Deputy Director of the Division of Information Technology or authorized designee. B. All base builds will follow the Departmental standards and platforms set forth by the Division of Information Technology. II. VARIANCES A. In order to facilitate the Standard Office Automation or CADD workstation standard build the following apply to Departments, Offices, and/or Districts whom must have a variance from the base build (Attachment 3): 1. List reason why there would be a different build. 2. Submit to the appropriate level, Office Manager (or District I.T. Manager) for review and completion. 3. The Office Administrator (or District Business & Human Resource Administrator) will review, comment, approve or disapprove the variance and forward to DD or DDD. 4. The DD or DDD will review, comment, approve or disapprove the variance. 5. The approved variance form from DD or DDD shall be sent to the Division of Information Technology for final approval. 6. The approved form shall be kept by the Office of Resource Management. 7. The authorized designee shall also file and maintain the variance form for the Department, Office or District in which the variance applies. 8. If the variance list is changed this process will repeat for approval. 9. Upon approval, a copy of the software license should be filed with the Division of Information Technology, the original shall be maintained onsite at the appropriate District office. III. SOFTWARE ACQUISITION PROCEDURES A. Procurement of software must follow the Software Purchase Authorization Plan (Attachment 1). B. The Office of Resource Management will monitor the number of users and the number of legal licenses and determine purchasing requirements.
4 Page 4 of 9 IV. SOFTWARE INSTALLATION, MANAGEMENT and REMOVAL A. All technical or user personnel who install software must be authorized to do so. This will minimize the unauthorized installation of software and ensure that software is being used in accordance with license agreements. This process is included in the Software Purchase Authorization Plan (Attachment 1). B. All software license agreements with specific software serial numbers noted will be retained and filed at an ODOT facility (Division of Information Technology or District.) C. All base build software versions throughout the Department will be maintained by the Division of Information Technology. D. A Code of Ethics script will be provided on the base standard build. The script will prompt an identification and reference of the DAS and ODOT policies to assure user awareness. E. All removal of software from specific computer systems will need to follow the Software Removal Plan (Attachment 2) for proper inventory purposes and recording of license distribution. V. COMPLIANCE A. Annual reviews will be performed by the Division of Information Technology in accordance to the Office of Quality, Quality Assurance Review Policy (QAR), to assure license agreements are honored and standards are followed. B. The variance list supplied to the Division of Information Technology will be used in the QAR review. C. Non-compliant software will be noted on the QAR and will be removed. If the software is determined to be necessary for performing a business function, the request for variance should be submitted as per Section II, Part A of the standard procedure. D. The QAR action plan will identify the impact and recommendations associated for non-compliance issues. E. Review findings will be saved to provide a computer history for future reviews and risk assessments.
5 Page 5 of 9 TRAINING: A Code of Ethics script will be supplied on all base standard builds. This script along with the distribution of the Standard Procedures associated with this policy and the Software Compliance Policy to inform all end users of DAS and ODOT policies. Individuals found to be in violation will be identified by conducting annual reviews in the form of a QAR assessment.
6 Page 6 of 9 Attachment 1 Software Purchase Authorization Plan I. All software purchases must be approved by the Deputy Director of the Division of Information Technology, or authorized designee for the pre-approval process or blanket purchase. (Attachment 4) II. III. Software checked for ODOT approved standard. (A list of approved software that can be purchased to maintain standards will be published on the Division of Information Technology website) All software purchases are logged with the following information for inventory and tracking: A. Name of requestor B. Name of installer C. Purchase date D. Version of software E. Description of software F. Type of maintenance provided with software G. Serial number of resident hardware, unless under site license H. Name of authorized user I. Quantity J. Location of: 1. Department that is responsible 2. Office of installed software 3. Registration card 4. License agreement K. Copy of purchase documentation
7 Page 7 of 9 Attachment 2 Software Removal Plan I. List of software removed II. All software removed are logged with the following information for inventory and tracking: A. Name of software B. Name of assigned user C. Serial number of resident hardware D. Location of Department E. Location of Office
8 Page 8 of 9 Attachment 3 See Base Build Variance form on next page
9 Page 9 of 9 Base Build Variance Form Instructions to receive approval for variance: 1) Print or type 2) Provide list of variance from standard base build for workstations 3) Forward form to the Office Administrator FILL OUT FORM COMPLETELY Name: Work # Division/Office: Cost Center: List Variance from Base Build List reason for variance: ADMINISTRATIVE REVIEWS AND SIGNATURES Office Administrator/Manager Approved Disapproved Date Division/District Deputy Director Approved Disapproved Date Division of Information T echnology Deputy Director Approved Disapproved Date Explanation for Disapproval: Instructions: 1.Submit to the appropriate level for review and completion. 2.The Office Administrator (or District Business & Human Resource Administrator) will review, comment, approve or disapprove the variance. 3.The DD or DDD will review, comment, approve or disapprove the variance. Approvals are forwarded to DoIT. 4.DoIT DD approves or disapproves, then forwards to the Office of Resource Management 5.Office of Resource Management processes form and notifies office of status
Anchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Best Practice exensys Asset Purchases
Best Practice exensys Asset Purchases Table of Contents Introduction:... 3 Overview:... 3 Benefits:... 4 Conclusion:... 4 Introduction: Accounting of fixed assets is a complex task. To effectively manage
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
OP-P 270 Page 1 of 5. Operating Protocol-Procedure #: 270 Category: Employees Office of Primary Responsibility: Human Resources
Page 1 of 5 Operating Protocol-Procedure #: 270 Category: Employees Office of Primary Responsibility: Human Resources Approval Date: 12/8/14 Effective Date: 12/8/14 Revised: Purpose (Clearly state the
Software Asset Management Toolkit
Software Asset Management Toolkit Autodesk License Compliance I stay compliant Get the Benefits of Software Asset Management Implementing a software asset management (SAM) program can help you effectively
W Y O M I N G D E P A R T M E N T O F CORRECTIONS Policy and Procedure #1.107 Purchasing Card
W Y O M I N G D E P A R T M E N T O F Page 1 of 8 Authority: Effective Date: September 15, 2015 Wyoming Statute(s): 9-1-403 (c); 25-1-104; 25-1-105 Revision/Review History: 09/01/14 06/15/13 06/15/12 ACA
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses
Competitive Bid Request for Proposal Re-Keying Project Fairfield & Alfond Campuses 1.0 Overview and Objectives Kennebec Valley Community College (KVCC) is requesting proposals from experienced and qualified
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Stated below are the SCIRE activity level control objectives for purchasing and accounts payable.
SCIRE PURCHASING AND ACCOUNTS PAYABLE AND SUMMARY The goals of the purchasing function at SCIRE are to achieve open, competitive and costeffective buying, while adhering to external funding sources for
KAREN E. RUSHING. Audit of Purchasing Card Program
KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Audit of Purchasing Card Program Audit Services Jeanette L. Phillips, CPA, CGFO, CIG Director of Internal Audit and Inspector General
LIVINGSTON COUNTY CREDIT CARD PROCEDURES
LIVINGSTON COUNTY CREDIT CARD PROCEDURES INTRODUCTION Livingston County is introducing an alternative approach to purchasing products and services through the use of credit cards. A credit card purchase
DHHS Directive Number II-12
DHHS Directive Number II-12 Title: Delegation of Authority to the Director, Division of Information Resource Management Effective Date: November 3, 2008 Revision History: January 1, 2002 Authority: G.S.
Justice Information Sharing Division ( ND CJIS ), and
Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This
UGA Cooperative Extension Service Credit Card Machine Policy
UGA Cooperative Extension Service Credit Card Machine Policy PCI compliance requires that each office have their own set of policies and procedures for handling credit cards. College wide policies reflect
Vance County Schools Individual School Accounting
Individual School Accounting Internal Controls and Responsibilities Individual School Accounting Internal Controls and Responsibilities Contents Page Principal Statement of Understanding 3 Treasurer Statement
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Corporate Property Automated Information System CPAIS. Privacy Impact Assessment
Corporate Property Automated Information System CPAIS Privacy Impact Assessment May 2003 CONTENTS Background...3 Access to the Data...5 Maintenance of Administrative Controls...9 1 Introduction The Office
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
OUR KIDS OF MIAMI-DADE/MONROE, INC. OK Operating NO. 1000-10-007 Revised Date: January 24, 2011 Revised Date: August 25, 2009
OUR KIDS OF MIAMI-DADE/MONROE, INC. OK Operating NO. 1000-10-007 Revised Date: January 24, 2011 Revised Date: August 25, 2009 Our Kids Finance Department Merchant Gift Cards 1. Purpose: This document describes
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Procedure for Procurement and Receipt
Procedure for Procurement and Receipt 1.0 Purpose - To ensure that all supplies, equipment and services purchased by the State Crime Laboratory (Laboratory) are properly procured and received. 2.0 Scope
MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS
DIVISION OF CHILD CARE AND EARLY CHILDHOOD EDUCATION HEALTH AND NUTRITION UNIT P O BOX 1437, SLOT S 155 501-320-8982 FAX: 501-682-2334 TDD: 501-682-1550 TO: NON-PROFIT INSTITUTIONS FROM: HEALTH AND NUTRITION
Lyford CISD. Accounts Payable Manual
Lyford CISD Accounts Payable Manual TABLE OF CONTENTS Requisitions.....3 Purchase Orders..5 Open Purchase Orders...7 Emergency Purchases.8 Accounts Payable 8 Check Distribution 10 Double Orders...10 Budget
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
O.R.C. 5120.01; 5120.22
STATE OF OHIO SUBJECT: PAGE 1 OF 7 Inventory, Donation, Transfer & Disposal of DRC IT Hardware & NUMBER: 05-OIT-21 Software RULE/CODE REFERENCE: O.R.C. 5120.01; 5120.22 SUPERSEDES: 05-OIT-21 dated 09/13/11
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS
TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS 1. Introduction Debit and Credit Card Receipt Standards apply to the administration
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Hardware Inventory Management Greater Boston District
Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the
RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL
RIVERSIDE SCHOOL DISTRICT NO. 2 FIXED ASSETS PROCEDURES MANUAL FIXED ASSETS ACQUISITION PROCESS The fixed assets acquisition process is responsible for the proper recording and distributing of any fixed
CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.
95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of
Finance and Administration Cabinet Manual of Policies and Procedures. Agency Head means an individual who oversees the operations of the agency.
FAP 111-58-00 PROCUREMENT CARD PROGRAM PROCUREMENT CARD PROGRAM DEFINITIONS Agency means a spending unit. Agency Head means an individual who oversees the operations of the agency. Agency Site Administrator
State of Ohio IT Policy
Ohio Office of Information Technology Ted Strickland, Governor R. Steve Edmonson, Director / State Chief Information Officer Statewide IT Policy Investment and Governance Division 30 East Broad Street,
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
The supply of materials and services for the University must be undertaken as follows:
9.4 PURCHASING 9.4.1 Introduction Bellarmine University operates under a Central Purchasing system. Central Purchasing allows the University to take a comprehensive and coordinated approach to supplying
Welcome to the ODE Secure Web Portal User Guide
Welcome to the ODE Secure Web Portal User Guide If you followed the directions below and cannot complete the sign-up process for some reason, please contact the Security Administrator by clicking this
Procurement Card. Procedures Manual
Procurement Card Procedures Manual By: Cindy Lambeth, Purchasing Agent Purchasing Department Santa Rosa County School District (850)983-5130 Updated 09/28/15 1 General Guidelines.....................................3
The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements
The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements Part 1: Regulatory Overview (document updated 1/05) SEC RULE 240.17a-4 ELECTRONIC RECORDS AND RECORDKEEPING
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
PROCUREMENT CARD AUDIT ANALYTICAL REVIEWS OCTOBER 14, 2013
PROCUREMENT CARD AUDIT ANALYTICAL REVIEWS OCTOBER 14, 2013 INTERNAL AUDIT DEPARTMENT BOX 19112 ARLINGTON, TX 76019-0112 817-272-0150 www.uta.edu/internalaudit Background Information The ProCard program
Administrative Policies and Procedures Manual 801 PURCHASING GOODS AND SERVICES
VER: 1.0 CSA Review Date: 12/2008 Revised: 12/2008 Administrative Policies and Procedures Manual 801 PURCHASING GOODS AND SERVICES POLICY Purchases shall be made by: a purchase order issued by the Administrative
Vulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
THE CITY OF YOUNGSTOWN REGISTRATION OF SPECIALTY CONTRACTORS
NOTICE ALL HEATING, VENTILATING, AIR CONDITIONING, REFRIGERATION, ELECTRICAL, OR HYDRONICS CONTRACTORS (SPECIALTY CONTRACTORS) WISHING TO DO BUSINESS IN THE CITY OF YOUNGSTOWN All City licenses for the
VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY
VIRTUAL LEARNING ACADEMY CHARTER SCHOOL POLICY EMPLOYEE ACCEPTABLE USE POLICY GBEA Goals: The goal of Virtual Learning Academy (VLACS) in providing the technology resources, network services, the Internet
Department of Veterans Affairs VA HANDBOOK 4090 GOVERNMENT FLEET CARD PROCEDURES
Department of Veterans Affairs VA HANDBOOK 4090 Washington, DC 20420 Transmittal Sheet January 12, 2010 GOVERNMENT FLEET CARD PROCEDURES 1. REASON FOR ISSUE: This handbook prescribes procedures for use
Pitt County Schools Individual School Accounting. Internal Controls and Responsibilities Fiscal Year 2009-10
Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Contents Page Principal Statement
Prepared by Office of Procurement and Real Property Management. This replaces Administrative Procedure No. A8.255 dated July 2012
Prepared by Office of Procurement and Real Property Management. This replaces Administrative Procedure No. A8.255 dated July 2012 A8.255 A8.255 Sole Source Procurement 1. Conditions for Use A8.200 Procurement
Index #: 302.12 Page 1 of 7
State of Alaska Index #: 302.12 Page 1 of 7 Department of Corrections Effective: 04/6/2011 Reviewed: Policies and Procedures Due for Distribution: Public Rev: 04/2013 Chapter: Fiscal Management and Prisoner
STATE OF OHIO I. AUTHORITY
STATE OF OHIO SUBJECT: PAGE 1 OF 8. Telecommunication Services SECTION: 05-OIT-12 RULE/CODE REFERENCE: SUPERSEDES: Ohio IT Policy ITP H.2 05-OIT-12 dated 08/19/14 RELATED ACA STANDARDS: EFFECTIVE DATE:
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law)
Aida S. Montano Bill Analysis Legislative Service Commission Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law) Reps. Oelslager, Flowers, Buehrer, White, Trakas BILL SUMMARY
Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00
Cost Form This cost form has been provided to assist respondents in submitting costs associated by deliverable. Remember that all costs are to be the firm, fixed price of the deliverable and project total.
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company
Attention: Date: 08.02.2015 From: Our Reference: To whom it may concern Oman Rail Company SAOC Tender # C-001-15; Implementation of Cloud ERP solution for Oman Rail Company Tender No:- C-001-15 Tender
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
BELTUG Paper. Software Licensing Audits Checklist
BELTUG Paper Software Licensing Audits Checklist August 2015 Why this Checklist? Software licensing audits are almost always seen as an inconvenience by the targeted organisations. Together with effective
Travel Card Policy and Procedure Manual
Policy and Procedure Manual Table of contents 1. Introduction... 3 2. Reason for Policies and Procedures... 3 3. Who Needs To Know the Policies and Procedures... 3 4. Definitions... 3 5. Contact Information...
