Review of Information Technology Expenditure Summary 16 November Dr John Hogan. Registrar

Size: px
Start display at page:

Download "Review of Information Technology Expenditure Summary 16 November 2011. Dr John Hogan. Registrar"

Transcription

1 Review of Information Technology Expenditure Summary 16 November 2011 Dr John Hogan Registrar

2 Recap on scope The objective of the review was to recommend ways to improve the University s value for money over Information Technology (IT) expenditure. The University identified the following areas as being in scope of the review: Review IT expenditure and benchmark this against other universities; Consider the options for how each major element of IT could be performed; Identify areas for cost reduction where little or no detriment to service may result in improved ways of working; Review the IT strategy to identify potential areas for improvement; Review the approach undertaking to social media and mobile computing; Review the use of cloud, data storage, outsourcing and the approach to sustainable IT; and Review IT procurement.

3 Recap on scope cont d ISS, the Library, Schools and Institutes were reviewed, therefore this included technologies such as SAP, NESS, Blackboard and MyProjects. Items excluded from the review included University printing and research on computing.

4 Review of IT Expenditure KPMG approach involved understanding how technology is used and delivered across the University, including ISS, the Library, Schools and Institutes. Perform IT maturity assessment Understand IT effectiveness Understand and benchmark IT costs Understand the use of technology Reporting

5 Review of IT Expenditure Summary of Findings Key findings from the review are: Strengths Weaknesses Stable and scalable ISS provided core infrastructure. Examples of IT being used as an enabler to support effective teaching, learning and research. Skills and capabilities of some staff across ISS, the Library, Schools and Institutes. Examples of local responsive service delivery within Schools and Institutes. Examples of using outsourcing to deliver improved technology and services to staff and students. The approach to IT service delivery is incurring unnecessary cost and does not represent good value for money. Inconsistent service delivery. Low IT maturity across the University is reducing the overall effectiveness of IT to support: - learning and teaching; and - research. The current approach to IT service delivery is exposing the University to significant operational, financial and legislative risk.

6 The Good The core University infrastructure that is provided by ISS is determined as being fit for purpose and has 99.85% uptime. This is unique amongst the large number of other universities KPMG work with and should be further exploited through continued investment. Effective IT service delivery model is being used by the Schools, Institutes and the Library, however with weak governance arrangements.

7 The Not So Good NSS Q17 feedback scores have declined from 92% in 2006 to 82% in NSS feedback identifying that the student IT experience is inconsistent. Students unable to obtain a financial statement from SAP. Spend on IT is low at 4.3% of total expenditure. Single points of failure within academic units due to resourcing arrangements Computing Officers are waiting 3 days for a response to calls logged with the ISS Service

8 The Not So Good cont d Only 19% of ISS research data storage capacity is currently used, however a schools/institutes are contracting with third parties to provide similar services. University intellectual property rights are at risk (e.g. storage with Google and Amazon). Reduced research focused activity (research staff are involved in delivering IT systems and services). Research staff are unable to access key SAP research budgeting reports. Data is not always backed up, confidential data not fully protected. Research grants may be withdrawn or lost due to the data storage and curation arrangements.

9 The Not So Good cont d Over 422 unsecured entry points exist to the University network. 18 server rooms exist across the University. Staff and student data security is being compromised (e.g. third party drop box software and non-eu processing of data). Aged School hardware is causing interruptions to learning and teaching (e.g desktops have no replacement cycle, 180 servers are over 4 years old and 42% of all laptops are out of support). Duplicated systems are established, including service desks, content management and other systems.

10 The Not So Good cont d Significant price purchase variances (e.g. a laptop was purchased by one School at 1,317, whilst another identical laptop was purchased at 640). 23 different types of desktop build were purchased during 2010/11 and are now required to be supported and maintained. Key University systems not working as expected. Systems lack robust testing and are being developed in programming languages that are difficult to support and maintain.

11 And the physically unattractive An example of why IT maturity needs to improve:

12 Key recommendations The recommendations address the University wide use and provision of IT, not just that provided by ISS. They should not be considered in isolation and strong dependencies exist between each. 1. Establish a common University infrastructure Undertake a discovery phase to understand and agree the requirements of the infrastructure with each Faculty, ISS and the Library. Migrate servers and data storage responsibility to the new Newcastle University IT team (NU-IT). Establish and agree the IT disaster recovery arrangements that will be based on the University business impact assessment.

13 Key recommendations cont d 2. Rationalise the IT staff model Establish a NU-IT organisational model, including a number of important new roles such as Faculty relationship managers and an enterprise architect who is able to link the University objectives and processes to the IT strategy. Transition University wide IT staff to an NU-IT reporting line, however IT staff who support local academic systems could continue to be based locally. This should not include the transition of staff who support specialist equipment (e.g. microscopes and specialist scanners

14 Key recommendations cont d 3. Professionalise service management The University should continue to implement a service management framework, however this should ensure that appropriate consideration is given to key service processes, including incident, event, service catalogue, service level, configuration, release and change management. New technologies should be considered and implemented. This should include remote assistance and increasing self service for staff and students

15 Key recommendations cont d 4. Develop a University wide IT strategy and governance model Agree an Executive Board member and develop a University wide IT strategy through detailed discussions with each Faculty, ISS and the Library. Provide a clear mandate and supporting budget for NU-IT, by clarifying the type of IT services that they should provide to the University. Develop an overall understanding of the University wide systems and how these support University activities. Develop a high level architecture vision and a supporting set of standards that should be adhered to by all. Strengthen the existing governance arrangements and establish a Change Control Board that is able to support SISG and effectively prioritise NU-IT effort in the future.

16 Key recommendations cont d 5. Realise IT procurement efficiencies Short to long term activities will include regularly consulting with each Faculty, ISS and the Library to agree a standardised list of IT hardware that is fit for purpose (e.g. Apple ipads and laptops), however allowing variation with justification. The University IT procurement policy should be enforced.

17 Timescales 5 key recommendations and a number of other important recommendations. They will need strong Executive Board level sponsorship to implement successfully. Work programme 0 Establish programme governance 1 Establish a common University infrastructure 2 Rationalise the IT staff model 3 Professionalise service management 4 Develop a University wide IT strategy and governance model 5 Realise IT procurement efficiencies 6 - Other recommendatio ns 0 to 6 months 6 to 12 months 12 to 18 months Establish Steering Group and programme of work Implement service management processes Strengthen University governance Implement change management Infrastructur e Discovery Phase Establish programme of work and quick wins Establish IT disaster recovery Migrate the IT infrastructure Establish organisationa l model Establish relationship managers IT strategy, framework and architecture development Appoint enterprise architect 18 to 24 months 24 to 36 months Revised roles and phased transition of IT staff Implement new service desk software and remote solutions Medium to long term efficiency activities Project and programme management Information security Ongoing programme governance and assurance IT strategy update Continue with tactical business projects / maintain architecture SAP management / green IT / cloud computing / social media and mobile computing 36 to 42 months Update and maintain infrastructure and IT disaster recovery IT procurement strategy update IT strategy update IT procurement strategy update 42 to 48 months

18 Cost Review of IT Expenditure IT maturity will make the University's approach to IT more professional. Over a period of time it will release resources from day-to-day activities to support the strategic and tactical initiatives of the University, thereby enhancing the value that IT is perceived to be delivering, and is actually delivering to the University. 2 - Quick wins will deliver early improvements and savings (e.g. IT procurement and infrastructure). 1 - Historically, running effort and costs are growing at the expense of new projects that could enhance teaching, learning and research. 3 IT maturity will initially eat into transformational change investment (i.e. new projects). 4 - As IT maturity takes hold, longer term benefits and savings will be realised. Review of IT Expenditure 5 - Total effort of delivering transformational change will reduce as a result of IT maturity. 6 - The outcome is a University IT service and investment that is focused far more on transformational change, whilst reducing operational risk and increasing effectiveness. Current Implementation of recommendations Future Costs to keep the lights on Costs to improve IT maturity Costs of delivering transformational change (i.e. new projects)

19 How much? The spend on University IT during 2010/11 was 16.4m. This presents 4.3% of total University expenditure. External benchmark data identifies that the wider education sector spend is between 4.8% to 8%. The analysis identified that the University spent 16.4m on IT during 2010/11. Cost type Information Systems and Services ( ) Medical Sciences ( ) Science, Agriculture and Engineering ( ) Humanities and Social Sciences ( ) Central Departments ( ) Total ( ) Hardware (e.g. desktops, servers, handhelds) 1,518k 570k 1,175k 397k 250k 3,910k Software (e.g. licenses and media) 1,305k 170k 190k 100k 60k 1,826k Third party services (e.g. consultants and contractors) 588k 178k 46k 27k 0k 839k Staff pay costs (University staff only) 5,761k 1,437k 998k 710k 900k 9,806k Total 9,172k 2,354k 2,409k 1,234k 1,211k 16,381k Figure 15 Total 2010/11 IT Spend Breakdown: Spend by University area and cost type. 56% 14% 8% 15% Medical Sciences Humanities and Social Sciences Science, Agriculture and Engineering Central Services 7% ISS Figure 17 Total 2010/11 IT Spend Breakdown: Spend by University area.

20 How many? The University wide spend on IT staff in 2010/11 was 9.8m. University IT staff costs as a percentage of total IT expenditure is high. ISS staff costs are 63% of the total ISS IT expenditure and the wider University cost is 56% The Gartner 2010 education sector benchmark is 51.3%. But there is no recommendation to reduce staff numbers just change the way we work. This is due to the current IT service delivery model that is established across the University, the overall low maturity of University processes, duplication of activities and the investment that has been made to develop and support a number of IT systems inhouse, including SAP. IT is provided using a devolved model across the University, including staff from across Schools, Institutes, the Library, Finance and ISS being responsible. 142 ISS Full Time Employees (FTEs) and 118 FTEs across the wider University are responsible for IT. 998k (25 FTE) 900k (27 FTE) Medical Sciences Humanities and Social Sciences 710k (23 FTE) 6,661k 5,761k (142 FTE) Science, Agriculture and Engineering Central Services 1,437k (43 FTE) ISS Figure /11 IT Spend Breakdown: Staff costs by University area with non Faculty IT spend exploded (inc. FTE figures)

21 Questions? Yes, lots of them but the answers will take sometime to evolve. It is essential that we act as a joined-up organisation one university.

Oxford City Council ICT Strategy 2015 2018

Oxford City Council ICT Strategy 2015 2018 Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

PERFORMANCE MANAGEMENT

PERFORMANCE MANAGEMENT PERFORMANCE MANAGEMENT integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web-based solution incorporating complete project and programme performance management

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Roles within ITIL V3. Contents

Roles within ITIL V3. Contents Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for

More information

ICT Strategy 2010-2013

ICT Strategy 2010-2013 ICT Strategy 2010-2013 If you would like to receive this publication in an alternative format (large print, tape format or other languages) please contact us on 01832 742000. East Northamptonshire Council

More information

UK Government ICT Storyboard July 2010

UK Government ICT Storyboard July 2010 UK Government ICT Storyboard July 2010 1 SOME BASICS: ICT across the Public Sector has key challenges that have arisen through the silo d and individual development of ICT Today s Challenge ICT costs and

More information

BUSINESS CONTINUITY MANAGEMENT FRAMEWORK

BUSINESS CONTINUITY MANAGEMENT FRAMEWORK BUSINESS CONTINUITY MANAGEMENT FRAMEWORK Document Author: Civil Contingencies Service - Authorised by the CCS Joint Management Board - Version 1.0. Issued December 2012 Page 1 FRAMEWORK STATEMENT Business

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management

More information

ICT Digital Transformation Programme

ICT Digital Transformation Programme Officer and Date Item Cabinet 11 th May 2016 Public ICT Digital Transformation Programme Responsible Officer: Clive Wright, Chief Executive Email: Clive.wright@shropshire.gov.uk Tel: 01743 252007 1.0 Summary

More information

Penn State University IT Assessment. Opportunity Analysis - Advisory Committee March 30, 2011

Penn State University IT Assessment. Opportunity Analysis - Advisory Committee March 30, 2011 + Penn State University IT Assessment Opportunity Analysis - Advisory Committee March 30, 2011 + Opportunity Analysis 2 n Email/Calendar n Storage n Virtualization/Co-location n Support n Networking n

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Australian Government ICT Trends Report 2013-14

Australian Government ICT Trends Report 2013-14 Australian Government ICT Trends Report 2013-14 VERSION 1.0 JUNE 2015 Australian Government ICT Trends Report 2013-14 VERSION 1.0 JUNE 2015 Contents Contents 2 1. Executive Summary 5 2. Notes 6 2.1 Agency

More information

DIGITAL STRATEGY 2014-2017

DIGITAL STRATEGY 2014-2017 DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology

More information

ICT Indicators. The scope of the ICT function covers all aspects of infrastructure, systems, processes and disciplines required to support:

ICT Indicators. The scope of the ICT function covers all aspects of infrastructure, systems, processes and disciplines required to support: ICT Indicators ICT value for money indicators guidance 1) Introduction This document sets out the indicators for the ICT Function. The guidance below starts by defining the scope of the function and goes

More information

MANAGING DIGITAL CONTINUITY

MANAGING DIGITAL CONTINUITY MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

How To Use Concerto.Com

How To Use Concerto.Com ASSET AND FACILITIES integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web based, property asset management suite of software incorporating comprehensive

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION 1. Introduction This document has been written for all those interested in the future approach for delivering ICT

More information

Hosted Exchange for Business

Hosted Exchange for Business Your complete guide to Hosted Exchange Hosted Exchange for Business 1 Table of Contents Hosted Desk- 3 What is Hosted Exchange? 3 What are the benefits of Hosted Exchange? 4 How easy is it to migrate to

More information

Cabinet Member for Corporate Relations

Cabinet Member for Corporate Relations Cabinet Member for Corporate Relations Proposal for new customer experience October 2015 Report by the Executive Director Residents Services and the Director of Customer Services Ref No: CR05(15/16) Key

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

How To Get Cloud Computing For A Fraction Of The Cost

How To Get Cloud Computing For A Fraction Of The Cost Cloud Computing Keeping Up With IT During Recession Table of Contents Introduction...3 What is Cloud Computing?...3 Importance of robust IT Systems...4 Benefits of Cloud Computing...4 Lower Expenses: capital

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

The following criteria have been used to assess each of the options to ensure consistency and clarity:

The following criteria have been used to assess each of the options to ensure consistency and clarity: 4 Options appraisal 4.1 Overview We have appraised each of the options identified in section 3: Maintain the status quo Implement organisational change and service improvement Partner / collaborate with

More information

Desktop as a Service (DaaS): A Solution for Modern Agencies

Desktop as a Service (DaaS): A Solution for Modern Agencies Desktop as a Service (DaaS): A Solution for Modern Agencies Control unpredictable costs, increase efficiency, and enhance security with a cloud-based approach to desktop management. A solution for modern

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Appendix A: ICT and Information Management Strategy

Appendix A: ICT and Information Management Strategy Appendix A: ICT and Information Management 2014 2019 Head of Information and Business Change Sarah Caulkin October 2014 1 Version Control: Date Version Author Comments 04/08/14 0.1 Jo Harley First draft

More information

Essex County Council. Architecture Excellence

Essex County Council. Architecture Excellence Essex County Council Architecture Excellence the customer overview Customer Essex County Council Website www.essex.gov.uk Number of employees Approx 9000 Country or region Essex, United Kingdom Industry

More information

Managed Desktop Support Services

Managed Desktop Support Services managed enterprise technologies Managed Desktop Support Services MET Managed Desktop Support Service Most organisations spend lots of time and money trying to manage complex desktop environments and worrying

More information

ITSM & Enterprise Mobility Management

ITSM & Enterprise Mobility Management ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does

More information

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Security in the Cloud: Visibility & Control of your Cloud Service Providers Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,

More information

POSITION DESCRIPTION. Service Desk Analyst. Information Technology Services

POSITION DESCRIPTION. Service Desk Analyst. Information Technology Services POSITION DESCRIPTION Service Desk Analyst Information Technology Services Vacancy 14-31 October 2014 1 POSITION DESCRIPTION Service Desk Analyst Context Lincoln University is New Zealand s specialist,

More information

IT Charter and IT Governance Framework

IT Charter and IT Governance Framework IT Charter and IT Governance Framework Status: Custodian: Approved Director: Information Technology Date approved: 2013-12-04 Implementation date: 2013-12-05 Decision number: SAQA 02102/13 Due for review:

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

Business Continuity Management Policy and Framework

Business Continuity Management Policy and Framework Management Policy and Framework Version: Produced by: Date Produced: Approved by: Updated: 7 University Manager with the assistance of the Operational Group 11 th March 2010 Steering Group (14 December

More information

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary

More information

ITC 19 th November 2015 Creation of Enterprise Architecture Practice

ITC 19 th November 2015 Creation of Enterprise Architecture Practice ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG

More information

Technology Review Feedback Vale of Glamorgan Council

Technology Review Feedback Vale of Glamorgan Council Technology Review Feedback Vale of Glamorgan Council Audit year: Annual Improvement Assessment 2011 Issued: October 2011 Document reference: 538A2011 Status of report The person who delivered the work

More information

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8 THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

HEAD OF STRATEGIC INFORMATION & TECHNOLOGY SUBJECT: REVIEW OF CORPORATE TECHNOLOGY SENIOR MANAGEMENT ROLES

HEAD OF STRATEGIC INFORMATION & TECHNOLOGY SUBJECT: REVIEW OF CORPORATE TECHNOLOGY SENIOR MANAGEMENT ROLES MANCHESTER CITY COUNCIL REPORT FOR RESOLUTION REPORT TO: REPORT OF: PERSONNEL COMMITTEE HEAD OF STRATEGIC INFORMATION & TECHNOLOGY DATE: 20 JUNE 2007 SUBJECT: REVIEW OF CORPORATE TECHNOLOGY SENIOR MANAGEMENT

More information

ICT Strategic Plan 2008 2011 Executive Briefing

ICT Strategic Plan 2008 2011 Executive Briefing ICT Strategic Plan 2008 2011 Executive Briefing Prepared by SMS Management and Technology April 2008 Executive Briefing Introduction In November 2007 1, The Australian Fisheries Management Authority (AFMA)

More information

Anglia Ruskin University opts for a VDI deployment

Anglia Ruskin University opts for a VDI deployment Case Study Anglia Ruskin University opts for a VDI deployment Reducing power consumption and creating an excellent user experience for over 32,000 students were both central motivators in Anglia Ruskin

More information

Global Mobility Outsourcing

Global Mobility Outsourcing Vodafone Global Enterprise Global Mobility Outsourcing Whitepaper Vodafone Global Enterprise The bottom line: By 2012, the number of mobile workers is expected to reach one billion worldwide (Source IDC,

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

Is your business still wasting time and money on PCs and Servers?

Is your business still wasting time and money on PCs and Servers? Hosted Managed Desktop Cloud Computing Is your business still wasting time and money on PCs and Servers? Our service is a cheaper and simpler alternative to owning and managing your own business IT network.

More information

Clarifications of EPSRC expectations on research data management.

Clarifications of EPSRC expectations on research data management. s of EPSRC expectations on research data management. Expectation I Research organisations will promote internal awareness of these principles and expectations and ensure that their researchers and research

More information

Joint ICT Service ICT Strategy 2014-17

Joint ICT Service ICT Strategy 2014-17 Document History Document Location This document is only valid on the day it was printed. The source of the document will be found in (see footer) Revision History Date of this revision: 19 th May 2014

More information

BENCHMARK EVALUATION. Highways and Public Works Information and Communications Technology

BENCHMARK EVALUATION. Highways and Public Works Information and Communications Technology Identification Section BENCHMARK EVALUATION Position Title: Supervisor s Title: Department: Branch/Unit: Network Solutions Specialist Network Solutions Architect Highways and Public Works Information and

More information

Mahler Consulting Problem Solved, Smart Solutions for your Business

Mahler Consulting Problem Solved, Smart Solutions for your Business Mahler Consulting Problem Solved, Smart Solutions for your Business Cloud Service Desk Management Service Mahler Services Mahler Consulting Service Definition Document P a g e 0 Index Page Table of Contents

More information

TECHNOLOGY STRATEGY AUDIT

TECHNOLOGY STRATEGY AUDIT TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series

More information

How are companies currently changing their facilities management delivery model...?

How are companies currently changing their facilities management delivery model...? Interserve and Sheffield Hallam University market research 2012 Page 2 www.commercial.interserve.com How are companies currently changing their facilities management delivery model...? we have a strategy

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

, Head of IT Strategy and Architecture. Application and Integration Strategy

, Head of IT Strategy and Architecture. Application and Integration Strategy IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL

More information

IT Assurance - Business Continuity and Disaster Recovery

IT Assurance - Business Continuity and Disaster Recovery Audit Summary Report October 2006 PAPER D IT Assurance - Business Continuity and Disaster Recovery Audit 2006/2007 Paper D - 1 External audit is an essential element in the process of accountability for

More information

Project Assessment Framework Establish service capability

Project Assessment Framework Establish service capability Project Assessment Framework Establish service capability July 2015 Component of the Project Assessment Framework (PAF) This document forms part of the Project Assessment Framework, as outlined below.

More information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY

More information

Job Description and Person Specification. Post Number: HCI.C24 JE Ref: JE028

Job Description and Person Specification. Post Number: HCI.C24 JE Ref: JE028 Job Description and Person Specification Job Title: Business Analyst Post Number: HCI.C24 JE Ref: JE028 Grade: PO1 (SCP 35 39) Other payments: Service: Progression: Hours per week: Accountable to: N/A

More information

NOT PROTECTIVELY MARKED. A087 Version 1.0

NOT PROTECTIVELY MARKED. A087 Version 1.0 POLICY Security Classification Disclosable under Freedom of Information Act 2000 Yes POLICY TITLE Vulnerability & Patch Management POLICY REFERENCE NUMBER A087 Version 1.0 POLICY OWNERSHIP DIRECTORATE

More information

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS.

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. 2015 Learning Possibilities Ltd, 506 Centennial Park, Centennial Avenue, Elstree, Herts, WD6 3FG Email: info@cloudpossibilities.com Telephone: +44 (0) 20 8236

More information

CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT:

CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT: CASE STUDY 6 SECTOR: NHS DELIVERABLE: NEW MULTIFUNCTION SERVICE DESK THE CLIENT: The Queen Elizabeth Hospital King s Lynn NHS Foundation Trust (QEH) is a 514 bed general hospital providing services to

More information

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Achieve Economic Synergies by Managing Your Human Capital In The Cloud Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid

More information

I.T. Service Management

I.T. Service Management I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased

More information

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019

The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 Peter Kendal Associate Director for Information Management and Technology Development 01/12/2014 1 Page

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

BUSINESS CONTINUITY PLAN

BUSINESS CONTINUITY PLAN Business Logo Here BUSINESS CONTINUITY PLAN FOR SMALL TO MEDIUM SIZED BUSINESSES DATE :??? VERSION:?? PRODUCED BY DURHAM CIVIL CONTINGENCIES UNIT BUSINESS CONTINUITY PLAN LIST OF CONTENTS 1. DISCLAIMER...4

More information

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition Informed Solutions InformedINSIGHT Big Data V1.0.0 **PROTECT COMMERCIAL** London 11 Old Queen Street, Westminster, London, SW1H 9JA, UK Tel: +44(0)20 3042 2000 Fax: +44(0)20 3042 2015 www.informed.com

More information

<risk> Enterprise Risk Management

<risk> Enterprise Risk Management Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,

More information

University of Exeter. Print and Copy Guidelines July 2012

University of Exeter. Print and Copy Guidelines July 2012 University of Exeter Print and Copy Guidelines July 2012 Revision History: Date Revision Author Reason 24/7/2012 Original 5/3/2013 1.1 KD Formatting changes; updated references 7/3/2013 1.2 PB Student

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting I wandered lonely as a cloud... The academic, globe-trotting years: 1992 1993: Parallel software for PET scanner images in Geneva

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM

More information

Software Asset Management: Risk and Reward. March 2015

Software Asset Management: Risk and Reward. March 2015 Software Asset Management: Risk and Reward March 2015 Agenda What Are the Risks Direct Risks Indirect Risks Future Risks How to Assess the Risks Maturity Frameworks Compliance Assessments Mitigating the

More information

Option for Change. Option Ref. 1. Service Area Business Support Centre 2. Option Title 3. Summary of Option A26

Option for Change. Option Ref. 1. Service Area Business Support Centre 2. Option Title 3. Summary of Option A26 Option for Change Option Ref A26 1. Service Area Business Support Centre 2. Option Title 3. Summary of Option Maintain an in-house service and explore the opportunities to sell services to other organisations

More information

The Outsourced IT Hiring Guide

The Outsourced IT Hiring Guide The Outsourced IT Hiring Guide 8 Steps to Help You Find Your Perfect Tech brought to you by 1) Maintenance vs. Issue Resolution Know the difference. With regularly scheduled maintenance, you ll experience

More information

The Power to Take Control of Software Assets

The Power to Take Control of Software Assets The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets The Benefits of SAM: Building the case for Conducting a SAM Assessment and Implementing a

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Agenda Item No.6 (j) DERBYSHIRE COUNTY COUNCIL CABINET. Report of the Director of Transformation

Agenda Item No.6 (j) DERBYSHIRE COUNTY COUNCIL CABINET. Report of the Director of Transformation DERBYSHIRE COUNTY COUNCIL CABINET 26 th September 2012 Report of the Director of Transformation Agenda Item No.6 (j) INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) STRATEGY Purpose of Report To seek Cabinet

More information

Business Plan: Information Technology Services (ITS)

Business Plan: Information Technology Services (ITS) Business Plan: Information Technology Services (ITS) How does this service contribute to the results identified in the City of London Strategic Plan? A Sustainable Infrastructure A Caring Community Fundamental

More information

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing Contents Introduction Why GRC Assessment Benefits of Cloud computing and Problem Statement Key Speculations & Problems faced by Cloud service user s in Today s time Threats, Vulnerabilities and related

More information

What is the Cloud and Saas? Introducing the Cloud and its Benefits

What is the Cloud and Saas? Introducing the Cloud and its Benefits Powerful Cloud based Accounting Software for Mid-Sized Businesses including Multiple Company Consolidation. What is the Cloud and Saas? Introducing the Cloud and its Benefits The Cloud refers to the practice

More information

Big Data Cloud Services

Big Data Cloud Services Big Data Cloud Services G-Cloud IV Service Definition Lot 4 - SCS Contact us: Danielle Pratt Email: G-Cloud@esynergy-solutions.co.uk About is a leading provider of IT Consultancy Services operating within

More information

Systems Management Domain Roadmap

Systems Management Domain Roadmap Systems Management Domain Roadmap DOCUMENT CONTROL Document Details Document Owner Tony Bright Document Author Neil Battell, Mark Cooper, Nick Morgalla Current Version 1.1 Issue Date 23 rd April 2008 Programme

More information

Role Profile. Job No. (Office Use) A79

Role Profile. Job No. (Office Use) A79 Role Profile Job Title Team Leader Service Desk Job No. (Office Use) A79 Band/Band Range- (for career grades) Grade I Directorate Corporate Support Department ICT Division Operational Service Delivery

More information

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT

Introduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT INFORMATION SECURITY: UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT FACTSHEET This factsheet will introduce you to Business Continuity Management (BCM), which is a process developed to counteract systems

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information