Hospital Authority. Enhanced Contingency Planning for IT System Failures
|
|
- Jasmin Andrews
- 8 years ago
- Views:
Transcription
1 For discussion on AOM-P325 Hospital Authority Enhanced Contingency Planning for IT System Failures Purpose This purpose of this paper is to highlight enhancements to HAHO and IT Contingency Planning in response to the recent Sasser Worm infection of some Personal Computers across HA. Background 2. Since the inception of HA, IT is a major focus of development. With the growing use of IT in different areas of the HA, nowadays the clinical services are heavily relying on the use of IT systems. Clinicians order over 95% of medications electronically. As major risk is imposed on IT system breakdown and failures, IT contingency plans, back up and recovery procedures have been developed in various service areas both at HAHO and hospital levels to ensure that critical clinical services will still be able to operate probably in a degraded mode and have the capability to be resumed in the case of IT system failures. These include the use of down time, manual systems, standby and backup facilities. The contingency plans and procedures are reviewed from time to time both by the ITD and hospital management. 3. Apart from the traditional threats, e.g. hardware, application software, network, power supply, that may cause failures of IT systems, new threats have been emerging in the IT arena. These threats include the IT hackers, computer virus and worms that are generated external to the HA and can affect the operations of IT systems very rapidly and may potentially cause major IT service interruptions across the whole of the HA. The Sasser Worm Incident 4. On Monday May 3, just before 11:00 am, the Sasser Worm was introduced into the HA Network, most likely via a personal laptop being connected to the network. The Sasser Worm attacked a known vulnerability in the Microsoft Operating System. In the past, code (viruses and worms) to exploit known Microsoft vulnerabilities took about 6 weeks to be released by Hackers providing reasonable time for organizations to test in-house applications before applying the Microsoft supplied software patched to protect against such attacks. In this case the worm appeared within 18 days of Microsoft announcing the vulnerability resulting in a large number of organizations not updating their software in time, including HA. As is the
2 - 2 - case with all ant-virus tool vendors, they can only develop signatures and removal tools once they get access to the actual virus/worm and time to release fixes various greatly between vendors. 5. Even though HA ant-virus software could protect against Sasser Variant A and B, it was Variant C that entered HA with no anti-virus signature available to HA yet. Our anti-virus software vendor supplied a beta version directly from their development laboratories at 13:30 the same day and was subsequently rolled out across HA and the outbreak was contained, infected systems cleaned and most services to end-users restored later the same day. Immediate Corrective Actions 6. In view of this increasing risk of a broader IT service outage affecting most Clusters, the IT Division cancelled a Strategic Planning Session scheduled for Friday 7 May and convened an urgent meeting with key stakeholders to critically assess the potential impacts of these emerging threats, problem identifications and focus on areas of improvements. Briefings were conducted to inform and update the Directors Meeting, Senior Executive Meeting, and the Supporting Services Development Committee. The following immediate actions have been agreed and are being implemented: - Desktop PC Environment 7. On the technical aspect, it was decided to strengthen the control of the desktop PC environments, particularly on the timeliness of application of the latest patches and update of the latest Anti-virus definition files. The use of more automated software and tools to assist in the application of software patches will be employed. Policies and guidelines will be reviewed to assist project teams and hospital users to take precautionary measures on the desktop PC environment to protect against computer virus attacks. Aligning IT Contingency Planning with HA Contingency Planning 8. Historically in HA, IT outages was contained to the failure of a single application or more localized technical infrastructure components limiting the impact on service delivery to patients. As the Sasser incident demonstrated, some IT failures can and will affect the broader HA organization and may occasionally seriously impact in service delivery to patients as HA relies on IT for high volume throughput efficiencies. It became now necessary to align IT Contingency Planning with overall HA Contingency Planning and to start focusing more on business recovery and continuity. 9. A 3-tier problem definition framework has been developed to better define the impacts on critical clinical services that are caused by these major IT system failures. The corresponding responses and escalation procedures have also been developed against different levels of severities. (Refer to Annex I: Checklist for IT Disaster Control Team):
3 - 3 - (i) (ii) (iii) Response Level 1: substantial disruption in clinical services due to IT problem in one cluster and cluster IT contingency plan is being activated. Response Level 2: substantial disruption in clinical services due to failure of IT system in more than one cluster Response Level 3: substantial disruption in clinical services due to failure of mission critical IT system in most clusters Problem Handling and Communication IT Disaster Control Team 10. To improve the efficiency on handling critical IT problems, it was decided to establish an IT Disaster Control Team in case of major IT system failures to centralize the coordination of problem assessment, monitoring of service impacts and external information dissemination. This team will be headed by the HAHO clinical service coordinators and supported by the IT Cluster Liaison officers and technical staff. On Response Level 3, the highest level of emergencies, the IT Disaster Control Team will be under the direct command of CE. The Communication Plan 11. The communication channel under IT disasters is outlined in Annex II, which defines the problem escalation procedures between ITD, cluster and senior management. The levels of IT disasters, service impacts and recovery time will be communicated to cluster coordinators, HAHO senior management and other relevant parties when necessary. (Refer to Annex 2 - The Communication Channel under IT Disasters) 12. In order for the IT Disaster Control Team to assess and monitor the service impacts, clusters are required to report on hourly basis to the IT Disaster Control Team through a Situation Report. Advice Sought 13. Members are invited to comment on the enhancements to HA/IT Contingency Planning outlined in this paper. Hospital Authority AOM\PAPER\ May 2004
4 Annex 1 to AOM-P325 Checklist for IT Disaster Control Team IT Contingency Communication & coordination Definition Disaster Control Team Members Data collection and Dissemination IT Response Response Level 1 Response Level 2 Response Level 3 Substantial disruption in clinical services due to IT problem in one cluster and cluster IT contingency plan is being activated Cluster IT disaster control coordinator & team Head Office IT Disaster control team (HOITDC) - Establish channel of data communication & dissemination from Hospital to HAHO - Situation report from affected cluster hourly - Feedback to cluster on time for recovery - Assess need to inform other cluster Cluster IT Contingency Plan HO Support for - damage control & - disaster recovery - activate system- specific contingency Situation monitoring Substantial disruption in clinical services due to failure of IT system in more than one cluster + DD(IT)/ D(F) +Activate HO IT Disaster control centre + Establish communication channel to other clusters + alert non-affected clusters + focus recovery on prioritised clinical areas,e.g. SOPD, pharmacy, A&E, on mission critical systems + estimated time for recovery Substantial disruption in clinical services due to failure of mission critical IT system in most clusters +CE, D(F), Central Command Committee (if major disaster) +Activation of communication channel to all clusters for assessment of service disruption and for updating progress in all clusters (initial hourly communication) Same as 2
5 - 2 - IT Contingency Communication & coordination Service reorganization Response Level 1 Response Level 2 Response Level 3 Consider reprioritisation of service. Direct patient service should continue as far as possible. Closure of service is not expected. If closure of service of a limited section of the hospital is unavoidable, the authority for decision making rest with CCE. CE should be informed. Same as 1. If there is closure of services involving more than one cluster or the closure involve major service implications, CE s endorsement should be sought Same as 2 Clinical management According to contingency plan Same as 1 Same as 2 HR Activate deployment at hospital level if Activate deployment at cluster required level if required Activate deployment at HA level if required Communication- internal Notify D(F) Alert & notification to Head Office Duty Officer Communication to other clusters if needed + Notify CE, + notify cluster IT coordinators - clinical informatics - hospital admin - cluster/hospital IT + Notify Directors/CCE, Chief Pharmacy Office, Finance. Communication- external Alert & notify Public Affairs Section Situation report to Public Affairs Section Liaise with other As appropriate for incident at local level As appropriate for incident at Government Departments central level Activate notification network as per major disaster Situation report to Public Affairs Section As appropriate for incident at higher level Governance As in routine Subsequent reporting CE to inform Chairman and Board with updating. Hospitals to inform Hospital Governing Committee.
6 Annex 2 to AOM-P325 The Communication Channel under IT Disasters ITD Problem Escalation Procedure Cluster IT Contingency Plan Activation COMMUNICATION CHANNEL BEYOND ITD Health Informatics (HI)Team Disaster Coordination Officer (Dr KH Lee/Dr James Kong) (via IT disaster hotline) Situation Level 1 (Discussed with DD(IT) Inform D(F)) Situation monitoring Affected cluster to send report on the hour (00 to 15 min) until stand down Assess need to inform other cluster Inform Head Office Duty Officer, Public Affairs, Chief Pharmacy Office Level 2 (discuss with D(F) and DD(IT) Affected cluster to send report on the hour (00 to 15 min) until stand down Activate IT control Inform other cluster Inform Head Office Duty Officer, Public Affairs, Chief Pharmacy Office, Finance, Human Resources, Finance Management Activate IT control centre All cluster to send report on the hour (00 to 15 min) until stand down Level 3 (HI/D(F) to check with CE) Consider Activating Central Command Committee Declare to all hospital IT Co - ordinator
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
More informationEnterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
More informationESXi Cluster Services - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and IST Infrastructure Services (IST-IS) to document: The technology services IST-IS provides to the customer The targets
More informationFor more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
More informationEmergency Recovery. Corporate Business Continuity Plan
` Emergency Recovery Corporate Business Continuity Plan Section Summary: This document is for use when an incident or emergency affects our ability to provide a normal service to our partner responders
More informationIT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationSuccess or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper
Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an
More informationPATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationGAO. INFORMATION SECURITY Agencies Face Challenges in Implementing Effective Software Patch Management Processes
GAO For Release on Delivery Expected at 1:30 p.m. EDT Wednesday, June 2, 2004 United States General Accounting Office Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental
More informationBUSINESS CONTINUITY PLANNING
Policy 8.3.2 Business Responsible Party: President s Office BUSINESS CONTINUITY PLANNING Overview The UT Health Science Center at San Antonio (Health Science Center) is committed to its employees, students,
More informationHARDWARE JUMPSTART YOUR PERFORMANCE SERVICE CORE
BE FREE BE FREE OF HARDWARE JUMPSTART YOUR PERFORMANCE SERVICE CORE TALK TO OUR EXPERTS 1.877.222.8615 www.bestit.com Copyright 2013 BestIT.com Inc. JUMPSTART YOUR PERFORMANCE The BestIT Jumpstart Your
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationTitle: DISASTER RECOVERY/ MAJOR OUTAGE COMMUNICATION PLAN
POLICY: This policy is intended to address organizational wide communication executed during a or major IS service outage. When a disaster occurs or when any critical system/infrastructure component is
More informationGet what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationOhio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
More informationThe Service Provider will monitor the VM for the Customer and provide notifications on an opt in basis, which is strongly recommended.
Virtual Machine Service Level Agreement 1. Agreement This agreement is to define Virtual Server Collocation services provided to a Customer. Typically, services definitions include hours, availability,
More informationRSA SecurID Tokens Service Level Agreement (SLA)
RSA SecurID Tokens Service Level Agreement (SLA) 1. Agreement This Agreement defines RSA SecurID services provided to a Customer. Service definitions include responsibilities, hours, availability, support
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationManaged Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
More informationAgilent Technologies Electronic Measurements Group Computer Virus Control Program
Agilent Technologies Electronic Measurements Group Computer Virus Control Program Agilent Technologies Electronic Measurements Group (EMG) recognizes the potential risk of computer virus infection that
More informationHow To Monitor A Threat Condition
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 5420.6, Revision 1 1/26/2005 I. PURPOSE HOMELAND SECURITY THREAT CONDITION RESPONSE INFORMATION
More informationContinuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
More informationReport on Hong Kong SME Cloud Adoption and Security Readiness Survey
Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly
More informationInformation and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
More informationThe University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
More informationBUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES
BUSINESS CONTINUITY MANAGEMENT REQUIREMENTS FOR SGX MEMBERS NEW RULES FOR INCLUSION IN SGX-ST RULES New rule Current Rule Proposed Rule 4.6.21 Business Continuity Requirements The following requirements
More informationBUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY PLANNING INDEX Description Page Index 1 Template 1 - Plan Version Control 2 Background 3 Purpose of Business Continuity Plan 3 Roles and Responsibilities 3 Complimentary Links 4 Service/
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationi. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections
Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,
More informationBusiness Continuity Management Policy and Plan
Business Continuity Management Policy and Plan 1 Page No: Contents 1.0 Introduction 3 2.0 Purpose 3 3.0 Definitions 4 4.0 Roles, Duties & Responsibilities 4 4.1 Legal And Statutory Duties, Responsibilities
More informationDesigntech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy
Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii
More informationThe Office of the Government Chief Information Officer INFORMATION SECURITY INCIDENT HANDLING GUIDELINES [G54]
The Office of the Government Chief Information Officer INFORMATION SECURITY INCIDENT HANDLING GUIDELINES [G54] Version: 5.0 September 2012 The Government of the Hong Kong Special Administrative Region
More informationEMERGENCY MANAGEMENT POLICY
Effective Date: November 2, 2009 Supersedes/Amends: VRS-50/December 2006 Originating Office: Office of the Vice-President, Services Policy Number: VPS-50 SCOPE This policy applies to all members of the
More informationPSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding
PSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding Table of Contents -I. Summary -II. Service Description-Scope of OnBase Document Imaging and Workflow Service Integration
More informationGEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
More informationManaged Storage Service Level Agreement (SLA)
Service Level Agreement Page 1 of 8 Managed Storage Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Parties to the Agreement This service level agreement is valid from the start
More informationHow To Manage A Patch Management Process
PATCH MANAGEMENT: CHANGE, CONFIGURATION AND RELEASE OR SOMETHING MORE? By Grant Adams Principal Consultant Fox IT March 2007 Fox IT 2007 Page 1 of 6 PATCH MANAGEMENT Ask many IT Managers what Patch Management
More informationBirkenhead Sixth Form College IT Disaster Recovery Plan
Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service
More informationNHS Lancashire North CCG Business Continuity Management Policy and Plan
Agenda Item 12.0. NHS Lancashire North CCG Business Continuity Management Policy and Plan Version 2 Page 1 of 25 Version Control Version Reason for update 1.0 Draft for consideration by Executive Committee
More informationDRAFT Disaster Recovery Policy Template
DRAFT Disaster Recovery Policy Template NOTE: This is a boiler plate template much information is needed from to finalizeconsider this document pre-draft FOREWARD... 3 Policy Overview...
More informationOREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN
OREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN Last Edit 2/8/2011 OVERVIEW This document provides a management framework for responding to incidents that may threaten the health and safety of
More informationWhen Your Networkʼs Down, Call Crown
When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,
More informationIT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
More informationABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and
More informationInformation Services. Standing Service Level Agreement (SLA) Firewall and VPN Services
Information Services Standing Service Level Agreement (SLA) Firewall and VPN Services Overview This service level agreement (SLA) is between Information Services (IS), and any unit at the University of
More informationData Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationHIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
More informationSymmetry Networks. Corporate Managed Services Schedule
Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You
More informationRemote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More informationKaren Winter Service Manager Schools and Traded Services 01823 355267 KWinter@somerset.gov.uk
Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager
More informationINFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012 Program Description Network Services is a service unit in Information Technology Services responsible for designing, acquiring, deploying, operating,
More informationCarahsoft End-User Computing Solutions Services
Carahsoft End-User Computing Solutions Services Service Description Horizon View Managed Services Bronze Package Managed Services Package Options # of Desktops to be Managed Desktop Type Duration of Services
More informationData Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
More informationManaged IT Services. Maintain, manage and report
Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as
More informationNetwork Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
More informationINFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS Revised: 12/5/2011 Table of Contents Overview... 3 Roles and Responsibilities... 4 Management Process Definition... 6 Management Process
More informationMiServer and MiDatabase. Service Level Expectations. Service Definition
MiServer and MiDatabase Service Description Service Definition As part of the NextGen Michigan initiative, Information and Technology Services has engaged in building a private cloud offering to support
More information1 Introduction. 2 Design and Functionality. 3 Client Support
Changefirst Enterprise Service Level Agreement 1 Introduction This Service Level Agreement between Changefirst and the Client describes the support processes and services which Changefirst provides to
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationSentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement
Page 1 of 6 1. Term of Agreement This Agreement between, herein referred to as Client, and Word of Mouth Computers and Electronics, LLC hereinafter referred to as Service Provider, is effective on the
More informationIT Disaster Recovery and Business Resumption Planning Standards
Information Technology Disaster Recovery and Business IT Disaster Recovery and Business Adopted by the Information Services Board (ISB) on May 28, 1992 Policy No: Also see: 500-P1, 502-G1 Supersedes No:
More informationSupplemental IT Solutions: More Reliable Networks Are Our Business
Supplemental IT Solutions Logo Supplemental IT Solutions: More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888
More informationLHRIC Network Support - Additional Service Features
LHRIC Network Support - Additional Service Features It is important to note that costs associated with LHRIC Network Support service not only cover an on-site support engineer but also include a number
More informationManaged Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
More informationCall us today 1300 724 599. Managed IT Services. Proactive, flexible and affordable
Call us today 1300 724 599 Managed IT Services Proactive, flexible and affordable We believe technology is at its best when it s invisible. When you can focus on the task you are achieving, not the technology
More information28400 POLICY IT SECURITY MANAGEMENT
Version: 2.2 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. The objective of this policy is to provide direction and support for IT
More informationBusiness Continuity Management
Business Continuity Management Version 1 approved by SMG December 2013 Business Continuity Policy Version 1 1 of 9 Business Continuity Management Summary description: This document provides the rationale
More informationColumbia College Process for Change Management Page 1 of 7
Page 1 of 7 Executive Summary Columbia College's Process for Change Management is designed to provide an orderly and documented method in which changes to the College's computing environment are requested
More informationMicrosoft Security Systemats
Investigate and Resolve Vulnerability Reports Staff public reporting alias Monitor security lists Single point of coordination and communications Microsoft Security Response Process Own and coordinate
More informationDisaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
More informationStatement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
More informationFortiCompanion to Technical Support
FortiCompanion to Technical Support Consistent service and the reliability of your security infrastructure are critical to the business success of your organization. To address these requirements the FortiCare
More informationCITY UNIVERSITY OF HONG KONG Business Continuity Management Standard
PUBLIC Version: 1.0 CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief
More informationDepartmental On-Site Computing Support (DOCS) Server Support SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The
More informationTHORNBURG INVESTMENT MANAGEMENT THORNBURG INVESTMENT TRUST. Business Continuity Plan
THORNBURG INVESTMENT MANAGEMENT THORNBURG INVESTMENT TRUST Business Continuity Plan June 2012 Purpose The purpose of this Business Continuity Plan ( BCP ) is to define the strategies and the plans which
More informationUniversity of Nottingham Emergency Procedures and Recovery Policy
University of Nottingham Emergency Procedures and Recovery Policy Guidelines for High Hazard Schools and Departments 1. Introduction The University of Nottingham is committed to the identification and
More informationG-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W: www.dcggroup.com Data Continuity Group Limited, Bridge
More informationIT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More information<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
More informationATTACHMENT J WINDOWS PLATFORM
1 DESCRIPTION OF SERVICE 1.1 WINDOWS CAPACITY UNIT Provides processing capacity when dedicated server resources are required to support the associated Windows Managed Server service. Capacity Units are
More informationFrequently Asked Questions: Notice on Technology Risk Management
Frequently Asked Questions: Notice on Technology Risk Management Q1: Which categories of financial institutions ("FIs") are subject to the Notice on Technology Risk Management ( Notice )? A1: The FIs to
More informationEHRs and Information Availability: Are You At Risk?
May 2006 Issue EHRs and Information Availability: Are You At Risk? The EHR initiative is changing the face of disaster and the nature of prevention planning. By Jim Grogan On April 27, 2004, the age of
More informationBetter secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
More informationOffice of Information Technology Hosted Services Service Level Agreement FY2009
Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Computer Security Incident Response Center Is Operating As Intended, Although Some Enhancements Can Be Made September 2005 Reference Number: 2005-20-143
More informationAPPENDIX 7. ICT Disaster Recovery Plan
APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 20 th October 2015 Signed: Chair of Governors Date: Version Authorisation Approval
More informationService Level Agreement. Server Hosting
Service Level Agreement Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard MIT Data Center (HMDC) 15 October 2009 1. Overview This service level agreement defines the baseline
More informationUsing Windows Update for Windows 95/98
Using Windows Update for Windows 95/98 Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
More informationRemote IT Support. What is RITS?
Remote IT Support Many businesses, charities and other organisations rely heavily on their computer systems. We are committed to providing you with a fast response to problems as they occur, and working
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationService Definition. ADNS Domain V0.4. Signoff. Name Role Signature & Date. Jim Leeper. Windows Platform. Page 1
Service Definition ADNS Domain V0.4 Signoff Name Role Signature & Date Jim Leeper Houssein Hallani Luc Betbeder-Matibet Greg Fallon Windows Platform Service Management Faculty IT Director Portfolio Manager
More informationDynamics CRM - Support Service Description
Service Description Contents CRM SUPPORT PLANS... 3 SUPPORT DEFINITIONS... 4 Incident Management... 4 Request Fulfilment... 4 Event Management... 4 Service Availability... 4 Response Time... 5 Resolution
More information