Network Resource Management Policy
|
|
|
- Dustin Allison
- 9 years ago
- Views:
Transcription
1 Office of the Prime Minister Policy document CIMU P0036:2003 Version: 1.0 Effective date: Network Resource Management Policy 1. Policy statement i) General Information and Communications Technology (ICT) resources forming part of the Malta Government Network (MAGNET) are provided for Government of Malta (Government) business use and hence are deemed to be the property of Government. Government seeks to reduce total cost of ownership, improve quality, whilst minimising security risks in support of its ICT resources forming part of the MAGNET; through automated means. Such a concept shall be termed as Network Resource Management (NRM) and shall form part of a wider Enterprise Management Architecture (EMA) Model. In support of the above concept, NRM tool(s) shall be adopted within the Public Service. They shall de facto serve as the means of providing operational support to such ICT resources. The NRM tool(s) shall be regulated by CIMU. Upon consent from CIMU, the NRM tool(s) shall be : implemented by the Agent(s); operated by the Agent(s) and/or Permanent Secretaries,subject to the parameters prescribed herein. CIMU shall consider the scope of such operations by the Permanent Secretaries on a case by case basis; based but not limited to the existing Page 1
2 technical skills capacity falling under the respective Permanent Secretary's responsibility; maintained by the Agent(s). In support of the above operational framework, related requests for services or incidents shall be passed through a centralised Service Call Centre, as directed by CIMU. ii) Implementation The target population for implementation of the Policy and its supporting documents are: (i) Public Service (ii) Agent(s) and (iii) Third Parties that may be contracted to implement and/or operate and/or maintain the NRM tool(s). Implementation shall be within the context of (i) defined corporate strategic design for Network Resource Management in the Public Service (ii) defined service levels (iii) the Information Security Framework (in process), (v) a defined Architecture, subject to each Public Service Entity's connectivity needs, (vi) Convention on Cyber Crime ETS No. 185 (signed by Government on but still to be ratified) and (vii) Laws of Malta and regulations by statutory bodies. Implementation shall be backed by (i) internal audits and (ii) compliance checks. iii) Policy violations Abuse or misuse in NRM in terms of the Data Protection Act, the Computer misuse provisions of the Criminal Code and this Policy and its supporting documents shall be treated as an offence. CIMU reserves the right of withdrawing its consent for any NRM activity by the Agent(s) and/or Permanent Secretaries and/or take any other appropriate measures should any breach of Policy be discovered at any point in time. 2. Purpose The objective of this Policy is to promote the use of NRM tool(s) within the Public Service 3. Who should know this Policy Knowledge of this Policy shall extend to the following: Chief Information Management Officer (CIMO) Information Management Officers (IMOs) CIMU Communications Executive Head of Agent(s) Heads of Public Service entities Users of ICT resources Permanent Secretaries Page 2
3 4. Scope of applicability The provisions of this document apply to the use of NRM tools within the Public Service on the ICT resources, excluding servers, that form part of the MAGNET. NRM is the lowermost layer of a wider Enterprise Management Architecture (EMA) Model for Government. This document, along with its supporting documents, is intended to specifically cover this layer of the EMA Model. However in the absence of similar documents that specifically address the other layers of this Model, this document along with its supporting documents may, where necessary, address items that fall under the other layers. Such items shall be migrated to the appropriate similar documents, once such documents are in place. 5. Definitions Agent a trusted organisation that has the mandate by Government to provide Information and Communications services. Compliance - the process performed by CIMU or an independent body to check that a service provided satisfies the criteria set in a referenced document. Computer desktop - a personal computer designed to fit comfortably on top of a desk. Computer network a network of data-processing nodes that are interconnected for the purposes of data communication. Conformance - the correspondence by a service to the criteria set in a referenced document. Design the act of formulating the Strategic Design for NRM as explained in further detail in the Standards for this Policy. Enterprise Management Architecture (EMA) Model refers to the IT Infrastructure Library (ITIL) model for IT Service Management (ITSM) as proposed for implementation of the Enterprise Management System Format - a specific pre-established arrangement or organisation of data. File header A field that precedes the main file content and describes the length of the content and/or other characteristics of the file. Implement the act of deploying the necessary backend, frontend and control systems that form an integral part of the NRM tools. Information and Communications Technology (ICT) resource any element of a computer, data communications and peripheral data processing equipment and/or software needed to perform required operations. Maintain the act of ensuring that the NRM tools deployed and in use are kept in good working order according to the design characteristics. Network Resource Management (NRM) Tool software, specific for Network Resource Management. Page 3
4 Operate - the act of using the facilities on offer by the NRM tools deployed, normally via a special user interface. Outsourcing the act of hiring an outside source for acquiring services and an alternative delivery mechanism or resourcing alternative. Public Service entity a Government Ministry or Department. Regulate - refers to the setting of the strategic direction for Enterprise Management Architecture (that includes NRM) within the Public Service. It also implies the need to ensure that the necessary governance mechanisms are in place and are functioning well. Service Level Agreement (SLA) - a contractual obligation between parties, which stipulates and commits the service provider to a required level of service. Third Party someone other than the principals directly involved in a transaction or agreement. 6. Roles and responsibilities For the purpose of this Policy, the following roles and responsibilities have been identified: Role Responsibility 1. Chief Information Management Officer (CIMO) i. To maintain this Policy and its supporting documents. ii. To audit for compliance. iii. To regulate the use of NRM tools within the Public Service. iv. To identify Agent(s) v. To manage Service Level Agreement(s) (SLA) established with the Agent(s). 2. CIMU Communications Executive i. To publish and promote this Policy and its supporting documents. Page 4
5 3. Head of Agent i. To establish, endorse, and maintain a corporate strategic design for NRM within the Public Service. ii. To operate NRM tools in confomance to this Policy and its supporting documents. iii. To implement NRM tools in confomance to this Policy and its supporting documents. iv. To maintain NRM tools in conformance to this Policy and its supporting documents. v. To assume responsibility for any outsourcing of the related activities to Third Parties. vi. To establish, conform to and maintain related Service Level Agreement (SLA) with CIMU. vii. To participate in and/or contribute to any compliance checks as conducted by CIMU. 4. Head of Public Service Entity i. To adopt NRM, within the Public Service entity according to this Policy and its supporting documents. ii. To ensure conformance of the Public Service entity according to this Policy and its supporting documents. Page 5
6 5. Permanent Secretary i. To engage the IMO to operate NRM tool (s) within Public Service entity in conformance to this Policy and its supporting documents. ii. To present a business case to CIMU, clearly indicating present technical skills capability to be able to operate the NRM tool(s) within Public Service entity(s) for which he/she is responsible; should he/she request consent from CIMU to undertake this activity, within the parameters prescribed herein. iii. To establish, conform to and maintain a Quality Charter for operations of the NRM tool(s) within Public Service entity (s) for which he/she is responsible; should he/she be granted consent to undertake this activity, within the parameters prescribed herein. iv. To participate in and/or contribute to any compliance checks as conducted by CIMU. 6. Users of ICT resources 7. IMO i. To conform to this Policy and its supporting documents. i. To operate NRM tool(s) within Public Service entity in conformance to this Policy and its supporting documents, upon being delegated authority from the respective Permanent Secretary ii. To assist the Permanent Secretary and the Head of the Public Service Entity, subject to this Policy and its supporting documents. 7. Supporting Documents In support of this Policy, the following Standard and Directives shall be issued: 01.CIMU S0036: CIMU D0036:2003 Network Resource Management Standard Network Resource Management Directive Page 6
7 8. References 01. Information Security Framework (in preparation) 02.CIMU P 0016: CIMU P 0015: CIMU P 0011: CIMU P 0010: CIMU S 0001: CIMU S 0002: 2003 Information Security Policy Password Policy Connectivity to MAGNET Policy Electronic mail and Internet Services Policy Office Automation Hardware Standards Office Automation Software Standards 08.Computer Misuse Handbook for the Public Service 08.Desktop Support Services Handbook 09.Data Protection Act- Chapter Article 337 of the Criminal Code Chapter Convention on Cyber Crime ETS No Code of Ethics for Employees in the Public Sector - Cabinet Office Office of the Prime Minister Malta October Modification history Version Date Changes Release Page 7
8 10. Maintenance and review cycle Maintenance and review of this policy is set for six months after the initial release as indicated in the effective date. Subsequent maintenance to this policy shall be based on a twelve month cycle. Signature and stamp Joseph R Grima Permanent Secretary, Office of the Prime Minister Page 8
Third party Web hosting services security Policy
Office of the Prime Minister Policy document CIMU P 0013:2003 Version: 2.0 Effective date: 09.04.2003 Third party Web hosting services security Policy 1. Policy statement i) General The Government of Malta
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Managed Desktop Support Services
managed enterprise technologies Managed Desktop Support Services MET Managed Desktop Support Service Most organisations spend lots of time and money trying to manage complex desktop environments and worrying
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Service Level Agreement (SLA) for Customer by. Cybersmart ISP. (Cloud Hosting Agreement)
Service Level Agreement (SLA) for Customer by (Cloud Hosting Agreement) Effective Date: Document Owner: Version Version Date Description Author 1.0.2 07-05-2013 Service Level Agreement 1.0.3 22-10-2013
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Remote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
1st June 2005. Internet Access Service Provider (IASP) Sub-Code for the Communications and Multimedia Industry Malaysia
1st June 2005 for the Communications and Multimedia Industry Malaysia TABLE OF CONTENTS PART 1 - INTRODUCTION...2 PART 2- GENERAL RULES OF THE CODE FOR INTERNET ACCESS SERVICE PROVIDERS...6 PART 3- REVIEW
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
PUBLIC SERVICE ACT 2005. An Act to make provision in respect of the public service of Lesotho and for related matters. PART I - PRELIMINARY
PUBLIC SERVICE ACT 2005 An Act to make provision in respect of the public service of Lesotho and for related matters. Enacted by the Parliament of Lesotho Short title and commencement PART I - PRELIMINARY
Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana
Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)
DATA PROTECTION UNIT OPERATIONS AND PROGRAMME IMPLEMENTATION DIRECTORATE OFFICE OF THE PRIME MINISTER MALTA DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs) INTRODUCTION It is within
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
2015 EDUCATION PAYROLL LIMITED STATEMENT OF INTENT
2015 EDUCATION PAYROLL LIMITED STATEMENT OF INTENT Published in August 2015 Education Payroll Limited 2015 EDUCATION PAYROLL LIMITED STATEMENT OF INTENT CONTENTS Foreword 3 Who We Are 4 What We Do 5 How
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact [email protected] http://www.uxcconsulting.com.au This summary
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Act No. 102 of May 31 of 2000
This English translation of the ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Effective April 1, 2001 has been prepared in compliance with the Standard Bilingual Dictionary March 2006 edition.
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6. Date of Issue: June 2015 Ratified: For review:
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Information Governance Framework and Strategy. November 2014
November 2014 Authorship : Committee Approved : Chris Wallace Information Governance Manager CCG Senior Management Team and Joint Trade Union Partnership Forum Approved Date : November 2014 Review Date
IRCA Briefing note ISO/IEC 20000-1: 2011
IRCA Briefing note ISO/IEC 20000-1: 2011 How to apply for and maintain Training Organization Approval and Training Course Certification IRCA 3000 Contents Introduction 3 Summary of the changes within ISO/IEC
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
Act 7 National Audit Act 2008
ACTS SUPPLEMENT No. 4 4th July, 2008. ACTS SUPPLEMENT to The Uganda Gazette No. 34 Volume CI dated 4th July, 2008. Printed by UPPC, Entebbe, by Order of the Government. Act 7 National Audit Act 2008 Section.
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
Accessing Personal Information on Patients and Staff:
Accessing Personal Information on Patients and Staff: A Framework for NHSScotland Purpose: Enabling access to personal and business information is a key part of the NHSScotland Information Assurance Strategy
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Rules for Unibz It And eurac.edu
Index 1 Access...2 2 Applications...2 3 Responsibility...2 4 Personal details...2 5 Commercial Activities...2 6 Rules of use... 3 7 System security... 3 8 Safety... 3 9 Software Use... 4 9.1 Legal aspects...
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
Act on the Supervision of Credit Institutions, Insurance Companies and Securities Trading etc. (Financial Supervision Act)
KREDITTILSYNET Norway Translation updated August 2003 Translated by Government Authorised Translator Peter Thomas This translation is for information purposes only. Legal authenticity remains with the
PERSONAL DATA PROTECTION CHECKLIST FOR ORGANISATIONS
PERSONAL DATA PROTECTION CHECKLIST FOR ORGANISATIONS How well does your organisation protect personal data? This self-assessment checklist is based on the nine personal data protection obligations underlying
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
Encryption Policy Version 3.0
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Shmeisani: Al-Hussary Street Anshasi Sq P.O. Box 940314 Amman 11194 Jordan Telephone: +962-65007335
itil.org Service Management Essentials ITIL V3 Study Guide v1.0.0 Shmeisani: Al-Hussary Street Anshasi Sq P.O. Box 940314 Amman 11194 Jordan Telephone: +962-65007335 Fax: +962-65007300 Email: [email protected]
iso20000templates.com
iso20000templates.com Public IT Limited 2011 IT Service Policy Document Ref. ITSM01001 Version: 1.0 Draft 1 Document Author: Document Owner: V 1.0 Draft 1 Page 1 of 11 Revision History Version Date RFC
Tasmanian Government Information Security Framework
Tasmanian Government Information Security Framework Tasmanian Government Information Security Charter Version 1.0 May 2003 Department of Premier and Cabinet Inter Agency Policy And Projects Unit 1 Purpose
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Part 1 of Schedule 1 of IFSA
Submission Requirements for Application for Approval to Operate a Payment System or to Issue a Designated Payment Instrument or to be Registered to Provide Merchant Acquiring Services A. BACKGROUND With
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
POLICY FOR WEBSITE DEVELOPMENT, HOSTING AND MAINTENANCE Department of Information Technology GOVERNMENT OF PUNJAB
POLICY FOR WEBSITE DEVELOPMENT, HOSTING AND MAINTENANCE Department of Information Technology GOVERNMENT OF PUNJAB INTRODUCTION The Government of Punjab is committed to deploy IT as an effective tool for
Information Governance Framework
Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information
TERMS OF USE 1. Definitions
TERMS OF USE 1. Definitions This website (website) is owned and operated by BATS Trading Limited a company applying to be authorised and regulated by the Financial Services Authority, whose registered
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD 1. PURPOSE & SCOPE: The purpose of security initiative is to enlist the procedures and guidelines, which are
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Law on the Deposit Insurance Agency (Official Gazette of the Republic of Serbia, No. 14/2015) (Unofficial Translation)
Law on the Deposit Insurance Agency (Official Gazette of the Republic of Serbia, No. 14/2015) (Unofficial Translation) I. GENERAL PROVISIONS Article 1 This Law governs the status, organization, powers
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters.
Electronic Transactions and Electronic Signatures Act Act No. [ ] of [ ] An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters. ENACTED by
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
Release Management PinkVerify v2.1. Mandatory Criteria
Mandatory Criteria *CMDB= Configuration Management Database *CI= Configuration Item *DSL= Definitive Software Library *RFC= Request for Change *SLA= Service Level Agreement 1. Does the tool facilitate
ITIL's IT Service Lifecycle - The Five New Silos of IT
The workable, practical guide to Do IT Yourself Vol. 4.01 January 1, 2008 ITIL's IT Service Lifecycle - The Five New Silos of IT By Rick Lemieux In my last article I spoke about IT s evolution from its
Information and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
Policy Title: Information and Communication Technologies (ICT) Service Management Policy. Policy Number: P60122
Policy Title: Information and Communication Technologies (ICT) Service Management Policy Policy Number: P60122 Section Reference Policy Contents Page(s) 1. Policy Administration 2 2. Policy Objective,
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Policy (Board Approved)
Policy (Board Approved) Legal and Regulatory Compliance Policy Document Number GOV-POL-20 1.0 Policy Statement Stanwell is committed to and conducts its business activities lawfully and in a manner that
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
How To Be An Itil Service Desk Manager
Job Description Job Title: Service Desk Manager Location: To be based on any site on which Leeds City College operates Vacancy Ref No: ER035 Salary: Grade LM1(Points 32-35) Commencing 31,006 with progression
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
IT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
DATA PROTECTION LAWS OF THE WORLD. India
DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,
CODE OF PRACTICE. Safety Management. Occupational Safety and Health Branch Labour Department CODE OF PRACTICE ON SAFETY MANAGEMENT 1
CODE OF PRACTICE On Safety Management Occupational Safety and Health Branch Labour Department CODE OF PRACTICE ON SAFETY MANAGEMENT 1 This Code of Practice is prepared by the Occupational Safety and Health
The Electronic Transactions Law Chapter I Title and Definition
The Union of Myanmar The State Peace and Development Council The Electronic Transactions Law ( The State Peace and Development Council Law No. 5/2004 ) The 12th Waxing of Kason 1366 M.E. (30th April, 2004)
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
