IT Service Management
|
|
|
- Suzan Woods
- 9 years ago
- Views:
Transcription
1 RL Consulting People Process Technology Organization Integration IT Service Management Change Management Methods and Implementation Best Practices White Paper Prepared by: Rick Leopoldi June 19, 2002
2 Change Management Implementation Methods Change Management is the process of planning and coordinating the implementation of all changes (any planned alteration or addition to the operating environment including application systems) into the production environment in a logical and orderly fashion. It does not develop changes, nor does it implement them. Change Management Objectives: 1) To minimize the adverse impact of necessary changes on system integrity, security and the service level agreements. 2) To allow the coordination and planning of changes in order to provide a stable production environment. 3) To maximize the productivity of persons involved in the planning, coordinating and implementation of "quality" changes. Change Management Mission: 1) To ensure the documentation of all proposed changes prior to installation in the production environment. 2) To ensure verification of technical completeness: Accuracy of Technical impact and risk analysis Plans for final test, install, backout and recovery Identification and review of all technical dependencies including effect on concurrent changes 3) To ensure that the timing of change executions does not conflict with the business cycles or priorities. 4) To ensure appropriate management involvement and approval: Required sign-offs (i.e. justification, user acceptance, affected areas) Approval, deferral, or disapproval of change installations 5) To ensure the verification of successful testing to the degree required by organization standards before change introduction to the production environment. 6) To ensure the documentation of actual change installations and/or change backouts: To enable communication of change results To provide a history of changes To support the maintenance of systems documentation Change Management Guidelines: 1) All changes (including those to application systems) must be monitored and controlled. 2) In the information business, change is the normal mode of operation, not the exception. 3) One formal Change Management system, with "system wide" scope and influence must be in place. 4) A Change Coordination function with "clout" (backed by senior management) must be established to control the day-to-day activities of the Change Management system, with authority to reject those changes that do not adhere to the guidelines. Change Management Life Cycle Functions: 1) Change Request Initiation The person or group requesting a change will complete the submitter section of Request for Change Template (displayed later). If a user is involved, IT can help complete the form or screen. 2) Change Priority (Impact and Risk Assessment)
3 The impact the change will have on the production environment and the services provided to the user and the business reasons for the change are determined and approved (see Sample Change Priority Guidelines). 3) Change Development As part of the change development, based on the installation's standards, a plan for installation is required. A suggested checklist of items to include in the plan is: - Test procedures followed, with results - Backout procedures (must be available) - Resource plan - Description of any training required - Required and supplied documentation - Proposed installation schedule - Business reason for the change - Management approvals 4) Change Coordination This function controls the day-to-day activities of the Change Management system with the goal of meeting the Change Management Objectives. A weekly Change Management meeting (see Suggested Change Management Meeting Agenda) is chaired by the Change Coordinator. Other Change Coordination Functions: - Change request forms are filed and a Change Log kept current (or this is done through a Problem/Change Management system, if applicable). - All items listed in the Change Management Mission are reviewed for all major (High and Medium risk) changes. Based on installation standards, all items must be acceptable for the change to be scheduled for installation. - All approved changes are scheduled for installation. - A ten day detailed change installation schedule and three-month major change schedule are updated and produced weekly. - All changes are tracked and when required, follow-up is done. - Other Management reports such as Highlights of Major Changes Planned and Results of Major Changes Installed (History of Changes) are produced. Suggested Change Management Meeting Agenda 1) To review the effects of significant changes (high and medium risk) and confirm schedules for implementing these changes. The meeting is the focal point for all planned change information and management controls. 2) To review planned changes for the next ten days. Based on the day of the change meeting, this ten-day projection should cover two (2) weekends or PM windows. Discuss any emergency changes since the last change meeting. 3) To review any schedule or procedural violations within the past week along with the results of the changes. 4) Accurate minutes should be taken, distributed to all attendees and saved for history purposes. Purpose: The meeting is conducted to review the suitability of changes scheduled for implementation and to verify the coordination and cooperation of participating areas. The results of this meeting will be the basis for a summary report for Management. It is the function of this meeting to review the business and technical assessment and to review and approve the schedule of each change; to verify that the change meets the business objectives, and will not have a negative effect on the business community. In
4 addition, all changes are reviewed to see if and how they affect the Disaster Recovery Plan or recovery strategy. If it is determined that the change is not needed or is untimely, it will be canceled or rescheduled. This meeting marks the change request deadline. All change requests that are issued after the meeting begins will be deferred until the next meeting. If the request cannot be postponed (i.e. emergency), it may be discussed at the current meeting. Meeting Participants: - Change Coordinator (meeting chairperson) - Technical Support - Operations Management - Processing Services - Applications Group - Help Desk - Network Management - Change Requestors/Implementers - Hardware Group - Vendors (if applicable) Sample Change Priority Guidelines Change Risk Level Risk Lead Level Time Description H 3 wks Very Difficult or impossible to backout. Major impact if it fails. Involves several or critical systems. Large staff involved in implementation. Will disrupt hardware, software, data if unsuccessful. M 2 wks Backout is difficult or lengthy. Involves several systems. May disrupt hardware, software, data if unsuccessful. L 1 wk Small impact on failure. Involves non-critical systems. Backout is simple or not needed. E None Immediate business requirement with no advance warning. High severity. These MUST result from a Severity 1 problem and have been entered in the system with a Problem number assigned. Sample: C H A N G E P R I O R I T Y G R I D Change Problem Impact Risk- CRITICAL HIGH MEDIUM LOW HIGH Changes receive priority for resources and scheduling based on priority assigned. MEDIUM LOW EMERGENCY
5 Suggested Change Planner/Developer Responsibilities Note: The Change Planner/Developer's responsibilities differ from those of the Change Coordinator so they are listed here for comparison. Change Planner/Developer: One who requests/creates a change to be moved into production. Objective: To supply the Change Management system (or Change Coordination Function) with a change description, dates requested and purpose of the change. This includes testing and supplying all supporting documentation. To communicate the difficulty and/or success of the development process back to the change management system or Change Coordination Function. Responsibilities: - Obtain approvals from their management before the request for change is scheduled. - Review the testing results from change development. - Develop and/or prepare the change for production. - Complete and supply all required documentation to appropriate personnel. - Update all affected procedures (i.e. operational, user and offsite if applicable). - Develop backout and recovery procedures so Operations personnel can use them if necessary. - Develop test procedures. - Schedule and run test procedures. - Use test results as part of change documentation. - Notify all individuals that will be impacted by the change (i.e. Help Desk staff, Operations, Technical Support, the Client Community, etc.). - Update the change system (or notify Change Coordination) throughout the development process. - Notify management affected by the change of any adjustment to the planned schedule. Suggested Change Coordinator Responsibilities Change Management Coordinator: The person responsible for maintaining the Change Management process. Objective: To ensure that policies and procedures are adhered to and that senior management has the information (i.e. reports, feedback) needed to ensure that the Change Management approach is meeting all objectives. Responsibilities: - Chair the Change Management meetings. - Mediate all conflicts regarding scheduling, lack of approval or lack of documentation prior to implementation of the change. - Revise the change procedures if needed and advise management. - Act as focal point for suggestions regarding change procedures. - Audit the Change Log or mainframe system reports to ensure that the changes are being updated properly. - Produce statistical and trend reports for managements use to analyze Change Management system effectiveness. - Advise management of procedural violations or omissions through management reports.
6 - Maintain an awareness of all projects that will introduce change to the production environment. - Provide advice on change process techniques and contribute to change implementation decisions. - Distribute the change schedule prior to the weekly meeting or instruct attendees to print off their own copy for personal use. - Review documentation that accompanies each change and verify that it is complete, including management approvals. - Verify the success of the change and its correlation to the original request of the user.
Draft Copy. Change Management. Release Date: March 18, 2012. Prepared by: Thomas Bronack
Draft Copy Change Management Release Date: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 10. CHANGE MANAGEMENT... 5 10.1. INTRODUCTION TO CHANGE MANAGEMENT... 5 10.1.1. PURPOSE OF
The purpose of this document is to define the Change Management policies for use across UIT.
UNIVERSITY OF UTAH - IT OPERATIONS POLICY UIT CHANGE MANAGEMENT POLICY Chapter or Section: Information Technology ID SOP-CNFM.001 UIT Configuration Management Policy Rev Date Author Change 4.4 9/29/11
Policies of the University of North Texas Health Science Center
Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic
General IT Controls Audit Program
Contributed February 5, 2002 by Paul P Shotter General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews
Overview of how to test a. Business Continuity Plan
Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: [email protected] BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test
Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice.
ROLES, RESPONSIBILITIES, PROCEDUREs Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice. IT Operations Change Manager: The steward of the Change Management
IMO Systems Change Management Procedures. IMO Systems Change Management Procedures for Market Participants
IMO Systems Change Management Procedures for Market Participants Version 1.0 25 January 2007 1 Approvals The undersigned have approved the release of Version 1.0 of the IMO s IT Change Management Procedures
Change Management Process Guide
XXXXX (XX) IT Operational Process Change Management Process Guide XXXXX Information Technology Preface The purpose of this document is to outline the procedures that govern the Change Management process
White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows
White Paper: BMC Service Management Process Model 7.6 BMC Best Practice Flows October 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website,
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS Revised: 12/5/2011 Table of Contents Overview... 3 Roles and Responsibilities... 4 Management Process Definition... 6 Management Process
CCIT Change Management Procedures & Documentation
CCIT Change Management Procedures & Documentation 1.0 Introduction A major challenge within any organization is the ability to manage change. This process is even more difficult within an IT organization.
State Data Center. VMAX Data Migration Guide
State Data Center VMAX Data Migration Guide Version 1.0 June 26, 2013 Prepared by: Steve Lovaas, Enterprise Projects Client Liaison Contents DOCUMENT REVISION HISTORY... 3 INTRODUCTION AND PURPOSE... 4
Page 1 of 8. Any change, which meets the following criteria, will be managed using IM/IT Change Management Process.
Page 1 of 8 1. Introduction This policy describes the Authority s Information Management/Information Technology (IM/IT) change management procedures. IM/IT manages changes to applications, infrastructure
OPERATING PROCEDURE IT CHANGE MANAGEMENT PROCEDURES MANUAL. PREPARED BY: AEMO DOCUMENT NO: Enter Document ID VERSION NO: 6.
OPERATING PROCEDURE IT CHANGE MANAGEMENT PROCEDURES MANUAL PREPARED BY: AEMO DOCUMENT NO: Enter Document ID VERSION NO: 6.6 STATUS FINAL Approvals The undersigned have approved the release of Version 6.6
Prepared by: Rick Leopoldi November 22, 2003
RL Consulting Project Best Practices for the Application ment Process Prepared by: Rick Leopoldi November 22, 2003 Copyright 2003 RL Information Consulting LLC. All rights reserved. Duplication of this
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Information & Technology. Change Management Policy
Makana Information Technology Division Corporate Services Information & Technology Change Management Policy 1 Information & Technology Change Management Policy Table of Contents Approval Table of Contents
Audit of NSERC Award Management Information System
Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT
ITIL Example change management procedure
ITIL Example change management procedure An example change process diagram Change Intiators outside IT (users/customers/supplier/etc.) Change Initiators IT SERVICE DESK Filters change requests RFC REJECT
Data Center Services
Data Center Services Production Support Providing Call, Incident, and Change Management for customers throughout the Johns Hopkins Enterprise The Johns Hopkins Health Systems And The Johns Hopkins University
Contract and Vendor Management Guide
Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier
[name of project] Service Level Agreement
[name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off
Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack
Recovery Management Release Data: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 8. RECOVERY MANAGEMENT... 4 8.1. INTRODUCTION TO RECOVERY MANAGEMENT... 4 8.1.1. DEFINITION... 4 8.1.2.
Enterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
Information & Technology Management Branch Ministry of Education. Change Management Policy
Author: Change Advisory Board Creation Date: March 26, 2001 Last Updated: June 29, 2007 Document Number: 6840 00/Change Control Version: 2.3.5 Approval Renate Butterfield ITMB Director Signature Date CIO
BTInet Backup-to-Disk Managed Backup Service (EMC Avamar) Service Level Agreement (SLA) Table of Contents
BTInet Backup-to-Disk Managed Backup Service (EMC Avamar) Service Level Agreement (SLA) Table of Contents 1 GENERAL OVERVIEW... 2 2 SERVICE DESCRIPTION... 2 3 ROLES AND RESPONSIBILITIES... 3 3.1 BTINET
HP Global Call Management Service
HP Global Call Management Service HP Services Technical data HP Global Call Management (GCM) Service will provide your enterprise with a single point of contact that will log, route, and manage support
For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
Project Implementation Process (PIP)
Vanderbilt University Medical Center Project Implementation Process (PIP).......... Project Implementation Process OVERVIEW...4 PROJECT PLANNING PHASE...5 PHASE PURPOSE... 5 TASK: TRANSITION FROM PEP TO
CDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
Release Management. ProPath. Office of Information and Technology
Release Management ProPath Office of Information and Technology Table of Contents Release Management Process Maps... 1 Process: Release Management... 7 Release Management and Goals... 9... 9 Goals... 9
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
Disaster Recovery Plan Review Checklist. A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans
Disaster Recovery Plan Review Checklist A High-Level Internal Planning Tool to Assist State Agencies with Their Disaster Recovery Plans November 2008 DISASTER RECOVERY PLAN REVIEW CHECKLIST - FOR INTERNAL
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Corporate ICT Change Management
Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced
Infrastructure Change Management. The process and procedures for all changes to the live environment
Infrastructure Change Management The process and procedures for all changes to the live environment Version 4.1 October 2012 1.0 Introduction... 3 2.0 The Change Process... 4 2.1 Why raise a change?...
Change Management Best Practices
General Change Management Best Practices Practice Area Best Practice Criteria Organization Change management policy, procedures, and standards are integrated with and communicated to IT and business management
Colorado Department of Health Care Policy and Financing
Colorado Department of Health Care Policy and Financing Solicitation #: HCPFRFPCW14BIDM Business Intelligence and Data Management Services (BIDM) Appendix B BIDM Project Phases Tables The guidelines for
Change Management Process. June 1, 2011 Version 2.7
Change Management Process June 1, 2011 Version 2.7 Contents Document Control... 3 Overview... 4 Definition of a Change... 5 Description... 5 Objectives... 5 Key Terms & Definitions... 6 Change Management
Change Management. Change Management Procedure. Table of Contents. (Revision Date: 1/30/2014)
Change Management Change Management Procedure (Revision Date: 1/30/2014) Table of Contents I. Introduction... 2 II. Scope... 2 III. Objective... 2 IV. Definition of a Change... 2 V. Roles and Responsibilities...
Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: [email protected] Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
Managed Support Policy
TABLE OF CONTENTS 1. SERVICE DESCRIPTION 2 2. SUPPORT OPTIONS 2 3. SERVICE SUPPORT HOURS 3 4. MONITORING AND OUTAGES 3 5. SERVICE LEVEL AGREEMENT 4 6. PLANNED MAINTENANCE AND UPGRADES 5 7. TARGET UPTIME
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
This policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Title: DISASTER RECOVERY/ MAJOR OUTAGE COMMUNICATION PLAN
POLICY: This policy is intended to address organizational wide communication executed during a or major IS service outage. When a disaster occurs or when any critical system/infrastructure component is
Technology Delivery Co Ordinator
Technology Delivery Co Ordinator Information Package Full Time Technology Delivery Co Ordinator (IT Project & Service Desk Co Ordinator) The Sydney Anglican Schools Corporation caters for the academic,
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
HUIT Change Management with ServiceNow. [email protected] September 2013
HUIT Change Management with ServiceNow [email protected] September 2013 Module 1: Basic Training - Change Requester/Implementer Change Management with ServiceNow Agenda Session Overview HUIT Change Management
Government Insights: Possible IT Budget Cuts
Tactical Guidelines, J. Kost Research Note 6 January 2003 Government Insights: Possible IT Budget Cuts In tough economic times, government leaders pressure CIOs to reduce IT budgets. Although IT investments
Checklist For Business Recovery
Checklist For Business Recovery Completed By: Name: Company: Room: Street: City, State, Zip: Phone #: Business Recovery Plan for: Business Recovery Plan (BRP)--LEVEL 1 (Executive Awareness/Authority) 1.
Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview
Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview 1/1 Table of Contents 1. Introduction...3 2. Executive Summary...4 3. Program Definition...5 3.1. Program
AUGUSTA, GA INFORMATION TECHNOLOGY CHANGE MANAGEMENT POLICY & PROCEDURES
AUGUSTA, GA INFORMATION TECHNOLOGY CHANGE MANAGEMENT POLICY & PROCEDURES September 28, 2012 LEAVE THIS PAGE BLANK Contents... 3 Augusta IT Change Management... 5 Objective of Change Management... 5 Augusta
Change Management Process
Change Management Process Version 1.0 1 Table of Contents 1 About This Document... 3 1.1 Document Objective... 3 1.2 Process Objectives... 3 2 Change Request Lifecycle Stages... 4 3 Change Request (CR)
HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
Information Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
IT Service Management
RL Consulting IT Service Management Service Outsourcing Questionnaire Prepared by: Rick Leopoldi November 10, 2003 Copyright 2003 RL Information Consulting LLC. All rights reserved. Duplication of this
Dissertation Handbook
Dissertation Handbook Revised July 1, 2014 University of the Rockies 555 E. Pikes Peak Avenue Colorado Springs, Colorado 80903-3612 (719) 442-0505 www.rockies.edu QUICK GUIDE SYMBOLS AND ABBREVIATIONS
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Yale University Change Management Process Guide
Yale University Management Process Guide Yale University Management Process 1 of 29 Table of Contents Introduction... 3 Purpose... 3 Scope... 3 Management Overview... 3 Management Key Concepts... 4 Management
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
TIMEPIECE ADMINISTRATIVE REGULATION
GREENBURGH-NORTH CASTLE UNION FREE SCHOOL DISTRICT TIMEPIECE ADMINISTRATIVE REGULATION INTRODUCTION The Greenburgh-North Castle Union Free School District (GNCUFSD) uses an electronic real-time, fully
Columbia College Process for Change Management Page 1 of 7
Page 1 of 7 Executive Summary Columbia College's Process for Change Management is designed to provide an orderly and documented method in which changes to the College's computing environment are requested
North European Functional Airspace Block Avinor, Norway EANS, Estonia Finavia, Finland LGS, Latvia. NEFAB Project CHANGE MANAGEMENT MANUAL
NEFAB Project CHANGE MANAGEMENT MANUAL Version 0.5 Page 1 of 38 Revision history Version Date Description Approved 0.5 14/12/2011 Page 2 of 38 Table of Contents 1. Introduction... 4 1.1. The Scope of this
Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
The Role of ITIL in IT Governance
The Role of ITIL in IT Governance Leveraging IT Governance around IT Service Management Presented By: Rick Leopoldi RL Information Consulting LLC Q2 2005 People Process Technology Why Focus on IT Governance
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
Process Owner: Change Manager Version: 1.0
BMC REMEDY 8.1 CHANGE MANAGEMENT USER GUIDE Process Owner: Change Manager Version: 1.0 DOCUMENT REVISION HISTORY Revision Description Date Approved by Number V1.0 Initial Release 6/25/2015 6/25/2015 Page
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians
Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to:
Brown County Information Technology Aberdeen, SD Request for Proposals For Document Management Solution Proposals Deadline: 9:10am, January 12, 2016 Submit proposals to: Brown County Auditor 25 Market
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
CITY UNIVERSITY OF HONG KONG Change Management Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September 2015) PUBLIC Date of Issue:
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
Creating a Business Continuity Plan. What We ll Cover... What is a BCP? Micky Hogue, CRM
Creating a Business Continuity Plan Micky Hogue, CRM Sandia National Laboratories Albuquerque, NM 505-844-6640 [email protected] What We ll Cover... What is a Business Continuity Plan Why create a BCP?
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
IT SERVICES MANAGEMENT Service Level Agreements
IT SERVICES MANAGEMENT Service Level Agreements Sample Agreements, Reports, and Checklists White Paper PREPARED BY: RICK LEOPOLDI May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
How To Manage Change Management At Uni
Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED
Introduction... 4. Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4. RFC Procedures... 5
Remedy Change Management Version 3.0 Modified: 10/27/2015 Table of Contents Introduction... 4 Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4 RFC Procedures... 5 Process Flow
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions
White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
Configuration Management. Process Guide
Configuration Management Process Guide Table of Contents 1. PREFACE... 3 2. MISSION... 5 3. OBJECTIVES... 6 3.1 INTRODUCTION... 6 3.2 DEFINITIONS... 6 3.3 OBJECTIVES... 6 4. GUIDING PRINCIPLES... 9 4.1
University at Buffalo Learning Management and Performance Management System Request for Information # 14CBW0036
University at Buffalo Learning Management and Performance Management System Request for Information # 14CBW0036 Background The University at Buffalo (UB), The State University of New York is a major public
ITIL Example emergency change management procedure
ITIL Example emergency change management procedure An example emergency change process diagram Emergency RFC Actually logging of the emergency request for change can all be done retrospectively Emergency
