BUSINESS NEED SUMMARY TABLE: # Need P Concerns Current Solution Proposed Solution
|
|
- Arline Edwards
- 8 years ago
- Views:
Transcription
1 EXTRACT FRO BUSINESS REQUIREENTS DOCUENT KEY BUSINESS NEEDS Business case drivers, prduct definitin dcumentatin, legal/regulatry, and ther stated requirements r needs that must be met by the final slutin are described as Key Business Needs. They shuld be defined as much as pssible fr further explratin during detailed requirements definitin. These Key Business needs will define the cre applicatin functinality. BUSINESS NEED SUARY TABLE: # Need P Cncerns Current Slutin Prpsed Slutin 1 Centralize Data Entry basic vendr infrmatin t reduce redundant data entry and naming errrs (i.e. ne system enters IB and anther system enters IB Inc. 2 Rule- and rle-based security and access prfiles. 3 Wrkflw-based prcessing t prvide decisin prmpts, date reminders, and ther autmated triggering, tailred based n situatin, user, etc 4 Risk mitigatin-centric apprach t vendr management 5 Risk-based Vendr Classificatin 6 Capacity-based Perfrmance There culd be vendrs entered int sme systems but nt thers. All systems must be synchrnized n a cmmn indicatr such as Vendr ID and Vendr Name. Vendr infrmatin must cntinue t be prtected equivalent r greater than the current prcess. Need t ensure the quality and cmpleteness f required dcumentatin. Vendr management is nt simply Supply Chain anagement r Custmer Relatinship anagement, but must be based n risk assessment and mitigatin ust allw vendr ranking and tiering by risk, vlume, and LOB t rganize vendrs fr apprpriate management. System respnse time and availability must match WFC SLAs. 7 Interface Ease f Use While user friendly is difficult t cnceptualize, there is n cnsistent lk and feel acrss lifecycle mdules 8 dule-based cmprehensive reprts 9 Alignment with OCC and crprate audit standards. 10 Autmate and standardize the current Vendr anagement Prcess and Prcedures Current reprts are manual r limited t basic, 1- system reprting. Successful cmpletin f wrkflw-based prcessing must als ensure all audit requirements are met. Each system invlved in the vendr management lifecycle independently enters vendr infrmatin Access is granted by system access, security prfiles, and vendr management rules. There is n system managed wrkflw prcessing r built-in QA. Risk management is the central fcus, but is siled acrss many services areas. Key applicatins are running n under perfrming hardware platfrms Infrequent users f sme systems find the mdules intimidating. Current reprts are manual r limited t basic, 1-system reprting. Basic vendr infrmatin wuld be entered int 1 system. If many systems are invlved, the System f Recrd wuld then pass infrmatin in the apprpriate frmat t the apprpriate systems. Vendr infrmatin must cntinue t be prtected equivalent r greater than the current prcess. Use wrkflw wizards that launch when key dates r decisins are activated stepping user thrugh the vendr/risk management prcess. Cmbined a full vendr management lifecycle apprach with risk management the key fcus in the Assess and anagement phases. T huse slutin(s) n hardware platfrms with perfrmance mnitring, autmatic lad-balancing, and built-in scalability. Standardize the interface with the [APPLICATION], and make wrkflw driving Develp a library f predefined reprts available n-demand t each area thrugh security. DESIRED FEATURES TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 1 f 6
2 Interviews, requirements gathering, and research have identified the fllwing high-level Desired Features. These features will be matched t Business Needs, refined, expanded, priritized, and/r mdified during the requirements gathering prcess, and updated prir t final release as part f the sizing effrt. FEATURES SUARY TABLE: # Feature P Usability Cncerns 1 The [APPLICATION] shall assign each vendr an ID number that will link vendr t a single name, and be used in all integrated systems. 2 The [APPLICATION] shall prvide rle-based wrkflw management with a specific wrkflw manager wrkspace r interface that guides users thrugh the varius activities such as risk management prcess. 2.a The [APPLICATION] wrkflw manager shall use wizard-like prmpts that are date and/r decisin activated. 2.b The [APPLICATION] wrkflw prmpts shall prvide a recmmended curse f actin, an ptin fr a user-defined curse f actin, and an ptin t verride the wrkflw actin. 2.c The [APPLICATION] will als allw fr user defined activities. 2.d The [APPLICATION] will allw users t track varius data abut each activity such as prgress and status. 2.e The [APPLICATION] shall prvide an Assignment feature t allw electrnic ntificatin and tracking f crss-department assignments and respnsibilities during the executin f the wrkflw activities. 2.f The [APPLICATION] shall include a Scheduling feature that will bth calculate key prcessing events and allw a user defined date t prvide a means t ntify rle-based users f the required event activity. 2.g The [APPLICATION] scheduling feature shall generate autmated alerts in advance f scheduled activity dates, and escalatin when dates have been missed with n respnse. 2.h The [APPLICATION] wrkflw shall be capable f managing activities fr the entire vendr management lifecycle. 3 The [APPLICATION] will supprt detailed security rles t be defined by prcess (Use Case) and by applicatin t ensure data access and infrmatin integrity matches that set fr surce systems tday. 4 The [APPLICATION] will allw fr new Vendrs t be added and apprved. 5 The [APPLICATION] shall prvide lgging f the system and manual event lgs as a QC-based audit trail t understand the activities taken. The System f Recrd cannt prvide value withut standardizing the initial entry f vendrs in the independent systems withut a cmmn identifier and naming standard. While the scpe is in risk-management f vendrs, every vendr in every repsitry string vendr infrmatin must have a cmmn identifier linking the vendr in varius systems (such as vendr ID and vendr name). Cmmn prcessing is required t ensure all the apprpriate risk-based management requirements are addressed and that they are addressed t the published standard. A wrkflw-based system will supprt QA and ease f use requirements, but must be flexible t allw the user accuntable t make judgment decisins within a framewrk abut the cmpletin f the wrk. As ther departments and individuals are invlved the vendr risk management, the handff must be tracked and within certain defined guidelines, such as times t respnd, standard expectatins, and respnsibility t cmplete the requested wrk must be cmmunicated. Scheduling and ntificatin f wrkflw upcming wrkflw activities shuld be date range based (what is due in the next 30 days) as well as vendr based (what are all the pending activities and dates fr vendr XYZ). The Security and Security Prfiles in place fr the existing surce systems will be retained in the A histric perspective f the vendr risk-management prcess will assist all grups in refining and re-engineering their prcesses and cycle times fr a mre balanced and efficient wrkflw. TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 2 f 6
3 # Feature P Usability Cncerns 6 The [APPLICATION] shall supprt dcument strage and retrieval f all vendr dcuments tied t a Vendr. 6.a The [APPLICATION] shall supprt S Wrd, S Excel, S Visi, and PDF dcument types. 7 The [APPLICATION] shall prvide direct linkage t vendr Cntracts and vendr cntract management infrmatin. 8 The [APPLICATION] shall prvide direct linkage t vendr security plans and security-related vendr management infrmatin. 9 The [APPLICATION] shall supprt bth Inherent Risk Assessment (allws LOB t classify, d due diligence, etc.) features and Residual Risk Assessment (BCP, ESC, IT, legal, etc.) features with the wrkflw prcessing. 10 The [APPLICATION] shall prvide expandable reprting features allwing centralized rule- and rlebased reprt access n demand t predefined and ad hc reprting using the data with the 11 The [APPLICATION] shall have business rules bases n the V Dmain Plicy and Plicy Guidebk as well as ther key published legal and regulatry guidance t ensure OCC cmpliance. 12 The [APPLICATION] must be installed n a scalable hardware platfrm and netwrk with perfrmance mnitring, lad balancing, and ther perfrmance and availability requirements f a [Organizatin] missin critical system 13 The [APPLICATION] shall prvide fr ff-line prcessing t prevent wrk stpping during unplanned system utages. 14 The [APPLICATION] shall prvide fr bulk r mass updates when key elements change. 15 The [APPLICATION] shall supprt the ability t tie a Subsidiary Vendr t its Parent. 16 The [APPLICATION] must allw fr rbust search functinality fr dcuments, ntes, frms, and ther key infrmatin. 17 The [APPLICATION] must allw printing f defined vendr prfiles, schedule, wrkflw cmpleted, and management reprts. 18 The [APPLICATION] shall include a Cmmunicatins feature t allw fr the cnslidated tracking f external and internal telephne and cmmunicatins. There must be stre and access functinality in either a centralized dcument strage repsitry based n the [Organizatin] standards r linkage int the existing dcument repsitries by standardized vendr ID. It shuld be seamless t the end user t access dcuments and infrmatin related t the vendr r the risk management prcess frm any repsitry r lcatin prvided they have the crrect rle- and rule-based security. It shuld be seamless t the end user t access dcuments and infrmatin related t the vendr r the risk management prcess frm any repsitry r lcatin prvided they have the crrect rle- and rule-based security. The wrkflw prcessing must supprt, manage, and track the crssfunctinal risk management activities. Access t the infrmatin maintained within the [APPLICATION] must be rganized and accessible t allw all levels executive, managerial, peratinal, and administrative t understand the vendr risk management prcess and KRIs. Crprate audit and OCC cmpliance t ensure the vendr risk-based management is prtecting [Organizatin] and its interests. Slw respnse times and/r limited availability cannt allw the vendr risk management prcess t be interrupted. Key users must be allwed t perfrm manual wrkflw cmpnents ff-line during an unplanned utage, and synchrnize even manually when back n line. While it shuld be the system design gal t limit redundant infrmatin that crsses systems (i.e. linkage shuld limited t the primary unique index such as Vendr ID), any redundant infrmatin stred in bth the [APPLICATION] and in the surce systems shuld be updatable. Examples might include Vendr anager as the key cntact fr a vendr r grup f vendrs. The system must fllw the dmain rules n structuring Parent/Subsidiary vendrs. Users must be able t search dcuments and data using a variety f best practice advanced search capability. Users must be able t print key predefined dcuments frm the system. Cmmunicatins regarding the executin f vendr risk management shuld be included in the viewable infrmatin t ensure everyne is aware f past and pending cmmunicatins and the respnse. TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 3 f 6
4 # Feature P Usability Cncerns 19 The [APPLICATION] shall include a Ntes feature t allw fr the cnslidated tracking infrmal ntes related t the vendr risk management prcess. 20 The [APPLICATION] shall include a Frms and Letters feature that will generate Frms and Letters t be sent t external vendrs, triggered by prcessing events. 21 The [APPLICATION] shall supprt the [Organizatin] standard Dcument Imaging prcess t get a paper dcuments int the 22 The [APPLICATION] will allw fr the maintenance f users. 23 The [APPLICATION] will allw fr the maintenance f Letter and frm templates. 24 The [APPLICATION] will allw fr the maintenance f reprts. 25 The [APPLICATION] shall cnsist f at least 3 layers f user security: - Lg in security - Rule and Rle-based security limiting the user t views f nly vendrs they have assigned management f, and - Rule and Rle-based cntent security limiting users t nly dcuments within the vendr file that meet their security prfile A ntes feature with publicly viewable ntes and ntes restricted t being viewed nly by the assigned Vendr anager/vendr anagement Crdinatr will assist in managing the wrkflw. The main cncern arund the cllectin f current individual systems is the cmplete inability t prvide additinal features r functinality that enhances prductivity and quality fr all users. The risk-based vendr management file must be a paperless prcess with all key decisin-making and histrical event tracking activities lcated within the 26 The [APPLICATION] shall supprt the cncept f a Vendr Directry, a listing f Vendrs with services prvided, status (Apprved, Pending, Under Review, etc.), main ffice lcatin, and key cntacts (vendr cntact and WF vendr management cntact). CRITICAL SUCCESS FACTORS Critical Success Factr T have integrated (either build ne new system r centrally integrate existing slutins) at a minimum the current functinality [KEY SYSTES] int a centralized system f recrd. T have established a centralized Vendr Data Entry prcess that prvides a cmmn Vendr ID and Vendr Name fr all in-scpe vendrs based n a single attribute such as Tax Identificatin Number, allwing users t trace vendrs frm ne system t anther quickly, easily, and accurately. T have prvided a centralized ndemand reprting repsitry autmating key perfrmance indicatr reprts currently generated either manually r thrugh single system activities. Key Success Indicatr (if applicable) Actin Steps t Assure Success Cmplete Prject Definitin Dcument, wrk plan, and integratin business requirements. Client Acceptance prcess Cmplete Prject Definitin Dcument, wrk plan, and integratin Client Acceptance prcess Cmplete Prject Definitin Dcument, wrk plan, and integratin Client Acceptance prcess. TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 4 f 6
5 Critical Success Factr T have incrprated business rules meeting crprate audit and OCC requirements in the wrkflw prcessing. T have standardized the wrkflw prcessing t the apprved tls and systems within the T have maintained system perfrmance and availability within defined SLAs. T cntinue t met all Service Level Agreements currently in place fr the Vendr anagement Dmain, Enterprise Surcing and Cntracts, and Enterprise Gvernance. T have increased user satisfactin (wrkflw fulfillment and system respnse time) Key Success Indicatr (if applicable) Actin Steps t Assure Success Cmplete Prject Definitin Dcument, wrk plan, and integratin Client Acceptance prcess. Cmplete Prject Definitin Dcument, wrk plan, and integratin Client Acceptance prcess. SLA reprting. SLA reprting. Pst-implementatin user survey. Inclusins (In-Scpe) The [APPLICATION] cnsiders any system that maintains vendr infrmatin (see Vendr definitin in [APPLICATION] Glssary f Terms) in scpe accrding t the fllwing level f impact: 1. Replace r Rebuild The [APPLICATION] will rebuild and replace the cre functinality f the fllwing vendr repsitry and cntract strage systems and add the additinal wrkflw management and reprting functinality and system perfrmance requirements: 2. Integrate Data The [APPLICATION] will develp system-t-system integratin t access data fields and/r dcuments - either physically stre in the [APPLICATION] r lgically link s that the wrkflw manager can perate and access t dcuments is seamless t the end user with the fllwing systems: 3. Standardize Vendr The [APPLICATION] will establish the Vendr Identificatin Standards t ensure cmmn naming and identificatin cnventins fr all applicatins in the rganizatin that stre vendr data need t be standardized, even if the data r dcuments are nt integrated within the This will include: Key Assumptins Assumptin All data strage and data prcessing must be installed and functinal n [Organizatin] Prductin Systems. Descriptin Fr security reasns, there will be n data prcessing r strage utside f [Organizatin] primary systems. TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 5 f 6
6 Detailed security rles will be defined by prcess (Use Case) and by applicatin t ensure data access and infrmatin integrity matches that set fr surce systems tday. The business and system requirements defined in supprt f this PDD are t define rder f magnitude sizing summaries, and will nt be sufficient t build. Requirements in place fr existing systems frm the baseline requirements fr the prpsed slutins. Any migratin f data frm surce systems t the target [APPLICATION] system must ccur systematically with n manual prcessing by [Organizatin] emplyees. igratin must ccur between the hurs f 8P and 6A (CST) and must be cmpleted befre the next business day. Data Driven Events and Calculated fields must be installed and functinal n [Organizatin] Prductin systems. The [APPLICATION] will be based n Object Oriented design cncepts t cmpartmentalize prcessing int cmpnents fr a lw maintenance, change friendly system. The Security and Security Prfiles in place fr the existing surce systems will be retained in the We need t establish the high-level wrk effrt estimates. During each iteratin, detailed analysis and design wrk will refine the in-scpe requirements t prvide the detailed design specificatins. Existing applicatins demnstrate what wrks and what needs refinement. This will be assumed as the base requirements. The prpsed slutin is a prductivity enhancing autmatin slutin, and must free the end users frm rutine administrative system prcessing functins, allwing fr risk management decisin-making and actin taking rles. Risk management cannt be interrupted by system maintenance and updates. Fr security reasns, there will be n data prcessing r strage utside f [Organizatin] primary systems. By rganizing the system int a cllectin f cmpnents, we can build in change management and scalability. Fr example, all the prcessing and calculatin business rules shall be built int a separate mdule used by all ther mdules. Changing the business rules due t envirnmental, legal r plicy changes will be limited t ne cmpnent f the TEPLATE_Business Needs Summary_EXAPLE.dc 4/4/2012 Page 6 f 6
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationProject Startup Report Presented to the IT Committee June 26, 2012
Prject Name: SOS File 2.0 Agency: Secretary f State Business Unit/Prgram Area: Secretary f State Prject Spnsr: Al Jaeger Prject Manager: Beverly Maitland Prject Startup Reprt Presented t the IT Cmmittee
More informationInformation Technology Department REQUEST FOR PROPOSALS
Infrmatin Technlgy Department REQUEST FOR PROPOSALS Identity and Access Management Service Design and Technlgy Implementatin January 11, 2013 Prpsals due by 4 p.m. n February 1 st, 2013 Attachment 2 Prject
More informationIncident Management-Roles and Responsibilities
Enterprise Services Incident Management- Rles and Respnsibilities Fr Key Stakehlders Table f Cntents 1. Intrductin:... 2 2. Objective:... 2 3. In Scpe:... 2 4. Out f Scpe:... 3 5. Incident Management is
More informationChapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
More information1.2 Supporting References For information relating to the Company Hardware Request project, see the SharePoint web site.
Hardware Request System Visin 1 Intrductin 1.1 Dcument Purpse and Scpe This dcument utlines the visin fr the Hardware Request system. The purpses f this dcument are t: Identify and agree n the prblems
More informationChange Management Process For [Project Name]
Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management
More informationGUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN
Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationIT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY Effective Date May 19, 2016 Crss-Reference 1. IT Operatins and Maintenance Plicy 2. IT Security Incident Management Plicy Respnsibility Apprver Review Schedule 1. Plicy Statement
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationPort Manager. Microsoft Dynamics CRM for Ports
Prt Manager Micrsft Dynamics CRM fr Prts February 2015 Overview Celedn Partners Prt Manager encapsulates the functinality f many prt related prcesses int an easy t learn and easy t use tl. The slutin leverages
More informationOR 2) Implement and customize an off the shelf product that would suit the requirements
CRM Custmer Relatinship Management Request fr Prpsal (RFP) Created by : Gayathri Jaganathan Rle : Prject Manager Prpsal Date: 10/02/06 Organizatin: AIM Alliance Inspectin Management Cmpany Lcatin : 28235
More informationCASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationDatabase Services - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Database Services t dcument: The technlgy services Database Services prvides t the custmer. The targets fr respnse times, service
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationProfessional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
More informationITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
More informationZimbra Professional Services Portfolio, Purchasing Guide & Price List
In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the
More information1)What hardware is available for installing/configuring MOSS 2010?
1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin
More informationRisk Management Policy AGL Energy Limited
Risk Management Plicy AGL Energy Limited AUGUST 2014 Table f Cntents 1. Abut this Dcument... 2 2. Plicy Statement... 2 3. Purpse... 2 4. AGL Risk Cntext... 3 5. Scpe... 3 6. Objectives... 3 7. Accuntabilities...
More informationENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY
ENTERPRISE RISK MANAGEMENT POLICY Plicy N. 10014 Review Date Octber 1, 2014 Effective Date March 1, 2014 Crss- Respnsibility Vice President, Reference Administratin Apprver Executive Cuncil 1. 1. Plicy
More informationFeature Guide. Virto Commerce Platform
Feature Guide Virt Cmmerce Platfrm Fr mre infrmatin abut Virt Cmmerce, visit virtcmmerce.cm r call + 1 323 570 5588 t speak t a representative. Virt Cmmerce Platfrm: Fundatin fr Yur Business Virt Cmmerce
More informationLoss Share Data Specifications Change Management Plan
Lss Share Data Specificatins Change Management Plan Last Updated: 2/27/2013 Table f Cntents I. Purpse... 3 II. Change Management Apprach... 3 III. Categries f Revisins... 4 IV. Help and Supprt... 6 Lss
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationThe user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.
Learn Basic Single Sign-On Authenticatin Tale s Basic SSO applicatin grants Learn access t users withut requiring that they enter authenticatin lgin credentials (username and passwrd). The access pint
More informationOE PROJECT MANAGEMENT GLOSSARY
OE PROJECT MANAGEMENT GLOSSARY ACCEPTANCE CRITERIA : thse criteria, including perfrmance requirements and essential cnditins that must be met befre the prject deliverables are accepted. ACTIVITY: an actin
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationCase Study Law Firm Profit and Growth LBMS Transforms a Major Law Firm s Market Expansion & Increased Profitability Vision into Reality
Case Study Law Firm Prfit and Grwth LBMS Transfrms a Majr Law Firm s Market Expansin & Increased Prfitability Visin int Reality Cpyright 2011 Elegrity Incrprated. All rights reserved. N part f this dcument
More informationWaitemata District Health Board, 15 Shea Terrace, Takapuna
Date: Octber 2015 Jb Title: Quality and Audit Manager Department: Planning, Funding and Outcmes Unit Lcatin: Waitemata District Health Bard, 15 Shea Terrace, Takapuna Reprting t: Directr Funding Direct
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationCDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Business Case and t describe the practice verview, requirements, best practices, activities, and key terms related t these
More informationElectronic Data Interchange (EDI) Requirements
Electrnic Data Interchange (EDI) Requirements 1.0 Overview 1.1 EDI Definitin 1.2 General Infrmatin 1.3 Third Party Prviders 1.4 EDI Purchase Order (850) 1.5 EDI PO Change Request (860) 1.6 Advance Shipment
More informationTeam Process Data Warehouse Goals and High-Level Requirements
Team Prcess Data Warehuse Gals and High-Level Requirements Backgrund TSP SM is used by teams wrking in a wide variety f prblem dmains (e.g. sftware, hardware, services). Since these activities are nt limited
More informationSymantec User Authentication Service Level Agreement
Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed
More informationOnline Learning Portal best practices guide
Online Learning Prtal Best Practices Guide best practices guide This dcument prvides Micrsft Sftware Assurance Benefit Administratrs with best practices fr implementing e-learning thrugh the Micrsft Online
More informationSystem Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
More informationAppendix A Page 1 of 5 DATABASE TECHNICAL REQUIREMENTS AND PRICING INFORMATION. Welcome Baby and Select Home Visitation Programs Database
Appendix A Page 1 f 5 The items in the list f database technical requirements belw was develped thrugh several meetings between First 5 LA Research and Evaluatin, Infrmatin Technlgy, and Prgram Develpment
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationChris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation
TO: FROM: HR Officers & Human Resurces Representatives Chris Chirn, Interim Senir Directr, Emplyee & Management Relatins Jessica Mre, Senir Directr, Classificatin & Cmpensatin DATE: May 26, 2015 RE: Annual
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationMISSION STATEMENT & CUSTOMER SERVICE CHARTER
MISSION STATEMENT & CUSTOMER SERVICE CHARTER FINANCE DIVISON April 2016 FINANCE DIVISION MISSION STATEMENT The divisin aims t prvide ethical and effective management f the Schl s financial resurces, t
More informationSystem Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
More informationEJttilb Health. The University of Texas Medical Branch Audit Services. Audit Report. Epic In-Basket Management Audit. Engagement Number 2015-008
',. -... : t'f" ' EJttilb Health The University f Texas Medical Branch Audit Reprt Audit Engagement Number 2015-008 July 2015 nie University f Texas Medical Branch 301 University Bulevard, Suite 4.100
More informationVulnerability Management:
Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.
More informationThe Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment
The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University a@iist.unu.edu OVERVIEW 1. THE WG APPROACH 2. APPLICATION
More informationDelaware Performance Appraisal System
Delaware Perfrmance Appraisal System Building greater skills and knwledge fr educatrs DPAS-II Guide fr Administratrs (District Administratrs) Supervisr Rubric fr Evaluating District Administratrs Updated
More informationTITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
More informationMobile Device Manager Admin Guide. Reports and Alerts
Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview
More informationITIL Release Control & Validation (RCV) Certification Program - 5 Days
ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
More informationInternal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
More informationUNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationSaaS Listing CA Cloud Service Management
SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters
More informationEmergency Preparedness Plans. Page 1 of 19
Emergency Preparedness Plans Page 1 f 19 Page 2 f 19 Requirements SUA Respnsibilities t AA Designate a Disaster Aging Officer DADS Disaster Crdinatr - Glen Basn A&I AAA Sectin s Disaster Team Aimee Mick*,
More informationCharlotte-Mecklenburg Schools Elementary School Grading Procedures Plan
Charltte-Mecklenburg Schls Elementary Schl Grading Prcedures Plan CMS Visin Charltte-Mecklenburg Schls prvides all students the best educatin available anywhere, preparing every child t lead a rich and
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationAHI. Foreign Pre-Approval Inspections (PAIs) Points to Consider
AHI Freign Pre-Apprval Inspectins (PAIs) Pints t Cnsider The fllwing suggestins are intended t prvide spnsr guidance fr timeliness and predictability f freign PAIs. The FDA Center fr Veterinary Medicine
More informationCommunity Support Programs N9 Organizational Internship Program
NAVY REGION SOUTHWEST Cmmunity Supprt Prgrams N9 Organizatinal Internship Prgram April 2011 Cntents Prgram... 3 Purpse... 3 Outcme... 3 Duratin... 3 Definitins... 3 Eligibility... 4 Prcess... 5 Participating
More informationTHOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels
More informationArmy DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012
Army DCIPS Emplyee Self-Reprt f Accmplishments Overview Revised July 2012 Table f Cntents Self-Reprt f Accmplishments Overview... 3 Understanding the Emplyee Self-Reprt f Accmplishments... 3 Thinking Abut
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationImplementation Management Guide
Implementatin Management Guide Table f Cntents 1 Overview... 2 2 Implementatin Scpe... 2 3 Implementatin Wrkflw... 3 4 Intrductins and scheduling f Kick-ff Meeting... 4 5 Kick-Off Meeting Objectives &
More informationMontana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management
Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the
More informationOFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager
JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE
More informationPOSITION NUMBER: LOCATION: Vancouver. DATE: February 2009
POSITION TITLE: Team Lead Service Centre DIVISION/BRANCH: IS/IT CURRENT CLASSIFICATION LEVEL: IS27 SUPERVISOR S POSITION NUMBER POSITION NUMBER: LOCATION: Vancuver DATE: February 2009 SUPERVISOR S TITLE/CLASSIFICATION:
More informationOakland County Department of Information Technology Project Scope and Approach
Oakland Cunty Department f Infrmatin Technlgy Prject Scpe and Apprach Prject Name: Web-Based Permanency Database Prject ID: DB1314PD Leadership Grup: Curts Department: Circuit Curt Divisin: Family Prject
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationAddressing Drug and Device Recalls in Hospitals
Addressing Drug and Device Recalls in Hspitals Develped by participants at the meetings f the Califrnia State Bard f Pharmacy s Subcmmittee t Evaluate Drug Distributin in Hspitals January 2010 BOARD MEMBERS
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationLegacy EMR Data Conversions
Legacy EMR Data Cnversins Agenda Abut us Drivers fr EMR Replacement Things t Cnsider Tp 5 Reasns EMR Cnversins Fail Optins fr Legacy EMR Cnversin Case Study Abut Us Health efrmatics is a healthcare IT
More informationNuance Healthcare Services Project Delivery Methodology
NUANCE PROFESSIONAL SERVICES Nuance Healthcare Services 2008 Nuance Cmmunicatins, Inc. All rights reserved. Nuance Healthcare Services 1 INTRODUCTION This dcument describes the prject management methdlgy
More informationURM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.
URM 11g Implementatin Tips, Tricks & Gtchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. i Fishbwl Slutins Ntice The infrmatin cntained in this dcument represents the current view f Fishbwl Slutins, Inc. n
More information2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY
2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationThe actions discussed below in this Appendix assume that the firm has already taken three foundation steps:
MAKING YOUR MARK 6.1 Gd Practice This sectin presents an example f gd practice fr firms executing plans t enter the resurces sectr supply chain fr the first time, r fr thse firms already in the supply
More informationHow to Reduce Project Lead Times Through Improved Scheduling
Hw t Reduce Prject Lead Times Thrugh Imprved Scheduling PROBABILISTIC SCHEDULING & BUFFER MANAGEMENT Cnventinal Prject Scheduling ften results in plans that cannt be executed and t many surprises. In many
More informationSPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010
OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity
More informationStrategic Goal 2. Timely, Accurate, and Responsive Customer Service U.S. OFFICE OF PERSONNEL MANAGEMENT RECRUIT, RETAIN, AND HONOR
U.S. OFFICE OF PERSONNEL MANAGEMENT RECRUIT, RETAIN, AND HONOR Strategic Gal 2 Timely, Accurate, and Respnsive Custmer Service Strategic Plan FY 2014-2018 0 Strategic Gal: 2 Timely, Accurate, and Respnsive
More informationRequest for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply
Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t
More informationJob Profile Data & Reporting Analyst (Grant Fund)
Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract
More information2. Are there any restrictions on when the work can be performed (e.g. only at night, only during business hours, only on weekends)? No.
HIPAA Technical Risk Security Assessment 1. Will yu be issuing additinal directins fr the frmatting f the final prpsal due Nvember 21 st? There is nt specific frmatting requirements, just submit the prpsal
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationHSBC Online Home Loan Application Process
HSBC Online Hme Lan Applicatin Prcess Versin 1.0 Nvember 2005 Cpyright. HSBC Bank Australia Limited 2005 ALL RIGHTS RESERVED N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted,
More informationTITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents
TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh
More informationSchool Psychology Program: Fitness to Practice Policy
Schl Psychlgy Prgram: Fitness t Practice Plicy This Fitness t Practice Plicy applies t all students upn enrllment in the Schl Psychlgy Prgram, and remains in effect until cmpletin f the Prgram. It is imprtant
More informationSecurity in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade
Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small
More informationGeneral Information Project Title. Enterprise Service Management Reporting 7/3/2012 Project Manager Phone Email
Prject Charter General Infrmatin Prject Title Date Enterprise Service Management Reprting 7/3/2012 Prject Phne Email Jdi Muller 415.476.2821 Jdi.Muller@ucsf.edu Executive Spnsr Phne Email Opinder Bawa
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationContract Risk Management
Cntract Risk Management A Practical Apprach frm The Caridn Academy telephne +27 82 651 8897 facsimile +27 86 674 3384 email inf@caridn.net website www.caridn.za.net 1 1 Over-expenditure, fr example thrugh
More informationConfiguring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
More informationHEALTH INFORMATION EXCHANGE GRANTS CRITERIA
1 HEALTH INFORMATION EXCHANGE GRANTS CRITERIA INTRODUCTION On August, 20 th, the federal Office f the Natinal Crdinatr fr Health Infrmatin Technlgy (ONC) released an pprtunity fr states t apply fr between
More informationCDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these
More information