POLICY ON COMPUTER PROVISIONING
|
|
|
- Charles Butler
- 9 years ago
- Views:
Transcription
1 Effective Date: July 1, 2013 Supersedes /Amends: November 16, 2010 Originating Office: Office of the Vice-President, Services Policy Number: VPS-32 PURPOSE Client Computers (as defined below) are intended to support the overall objectives and operations of the University. This Policy sets out University-wide standards for computer provisioning in order to reduce the cost of ownership, provisioning delays and to provide reliable information technology ( IT ) support to University members. The objectives of this Policy are to: Achieve and maintain a computing environment that provides a high level of productivity for University members Reduce the total cost of ownership of Client Computers across the University through volume acquisition Maximize the life cycle of Client Computers Promote the planned and coordinated renewal of IT assets through an inventory process and a needs prioritization Establish a standardized Baseline Computing Environment Enhance technology compatibility throughout the University Facilitate deployment of standardized software applications and update releases Improve technical support to University members Ensure that best sustainability practices are applied in the provisioning and disposal of Client Computers. SCOPE This Policy applies to all departments and units of the University that purchase Client Computers. All departments and units are required to purchase standard computers from any source of funds with the exception of the exempt funds as defined below. Nothing in this Policy shall replace or supersede any provisions set out in other University s Official Policies but it shall supersede any Faculty, Departmental or Research Unit policy or guidelines with respect to the purchase of computers.
2 Page 2 of 5 DEFINITIONS For the purposes of this Policy: Standard Client Computer means End User computer and related components and accessories configured according to the specifications of the University. This excludes Tablets which are identified as a mobile device that can establish a network connection using ONLY a wireless connection (WiFi and/or Bluetooth), and optionally with cell phone carrier. Non-standard Client Computer means End User computer and related components and accessories configured differently from the Standard Client Computers above. Baseline Computing Environment means the aggregate computing environment of Concordia made up of Client Computers including all hardware and software. Local IT Staff means staff that performs technical support within a University department or unit. End User means a member of the University community using a Client Computer to carry out University activities. Exempt funds refers to: External research funding agency funds which includes industrial funded research funds including but not limited to NSERC, etc. Concordia University Research Chairs funds Start-Up funds for new faculty members POLICY Authority 1. Under the authority of the Vice-President, Services, the Chief Information Officer shall be responsible for the application of this Policy. 2. The Chief Information Officer shall be responsible for ensuring that this Policy and any associated guidelines, procedures and standards are reviewed every three years and shall make recommendations for any revisions to the Vice-President, Services.
3 Client Computer Standards Page 3 of 5 3. The IT Standards Committee shall consider, develop and recommend IT standards and norms for the University to the IT Advisory Committee. These standards and norms shall be set and reviewed on an annual basis or as requested by the IT Advisory Committee. 4. The final decision with respect to the implementation of Client Computer and Software Standards rests with the Vice-President, Services. 5. The Client Computer Standards shall be maintained and updated on the IITS web site. 6. A department or unit may decide to use one or a combination of the Client Computer Standards. Client Computer Software Standards 8. Client Computers will be provided with standardized Software applications, including future upgrades as they become available and are deemed stable. 9. The Client Computer Software standards shall be maintained and updated on the IITS web site. Procurement Guidelines 10. The acquisition of Client Computers and Software is a recurring cost requiring long-term planning. It is the responsibility of each Dean/Director to assess the need for Client Computers and Software acquisition and renewal in the various units reporting to him/her. Requests for renewal of Client Computers and Software should be approved on the basis of sector needs and priorities. 11. The acquisition of all Client Computers and Software shall be done in accordance with the Procurement Policy (CFO-20). Client Computers and software acquisition must be done with an electronic requisition and may not be bought using a Corporate or Purchasing Card, or any personal funds including credit card (which will not be reimbursed via an Expense Report) 12. University members who have specialized computing needs may acquire non-standard
4 Page 4 of 5 Client Computers upon the approval of a completed waiver from standard configuration form. This form requires the approval of the Chief Information Officer or delegate prior to the purchase and can be found on the IITS web site. 13. Global request for proposals related to standard computers provisioning must include an EPEAT Gold rating in the technical specifications and a preference for manufacturers who strive to use conflict-free minerals for their components. End-User Responsibility: 14. Non-standard Client Computers must be acquired with a vendor maintenance/service contract of three (3) years and must be configured with the University Virus detection software as listed on the IITS web site. 15. All Client Computers (standards or not) must be inventoried, tagged and engraved according to the procedure established by IITS. IT Support 16. IT support for standard Client Computers shall be provided by Instructional and Information Technology Services ( IITS ) except for departments with Local IT Staff. 17. Non-standard Client Computers purchased with research funds or through the use of the Waiver, will be supported by IITS or Local IT Staff on a best efforts basis. 18. Software installation on Non-standard Client Computers will be supported by IITS or Local IT Staff, if they have been tagged, engraved and inventoried as mentioned in clause 15 above. 19. For all client computers, it is MANDATORY that critical patches be automatically installed and the antivirus software be installed. It is strictly forbidden to deactivate or de-install such software.
5 Page 5 of 5 Replacement Cycles 18. The University will strive to replace Client Computers every five (5) years. Decommissioning of Client Computers 19. Proper end-of-life procedures for computers and their components are an essential part of Concordia s sustainability commitment since they contain toxic materials which can leach into soil and water when discarded in landfills. Reuse and recycling of electronics also reduces the need for unnecessary environmentally harmful mining operations. It is the End User's responsibility to ensure that old computers and their components are never discarded in trash bins. Before a computer is decommissioned, it is the End User s responsibility to identify any data that needs to be retrieved and to take the appropriate measures to safeguard it. 20. IITS or the Local IT Staff shall erase the hard disk to ensure that no information can be recovered, using a standardized sanitizing secure method. 21. For decommissioning purposes, IITS will ensure that computers are evaluated for internal reuse, donation, or external recycling, in that respective order. IITS shall coordinate and track the internal reuse or donation processes. Distribution and Custodial Services shall coordinate the external recycling processes in collaboration with Environmental Health and Safety.
BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY
BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY Effective Date: January 1, 2012 Prepared by: Information Technology and Services ( ITS ) Policy Number: ITS-01-2012
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM Subject: Hardware and Software Management Approval: Brent Wahlquist Subject Number: IT-2 Transmittal
MOUNT HOLYOKE COLLEGE. LITS Computer Replacement and Support Strategy for Faculty and Staff Computers
MOUNT HOLYOKE COLLEGE Revised 3/27/12 LITS Computer Replacement and Support Strategy for Faculty and Staff Computers This document outlines the Computer Replacement and Support Strategy for faculty and
Technology Evergreening
IT 02 Technology Evergreening Classification: Responsible Authority: Executive Sponsor: Approval Authority: Date First Approved : 2006.02.01 Date Last Reviewed: 2011.11.23 Mandatory Review Date: 2016.11.23
Section 700 Fixed Assets
Section 700 Fixed Assets Section 701 Definition Fixed Assets Section 702 Responsibility for Fixed Assets Section 703 Inventory of Fixed Assets Section 705 Inventory Shortage Procedures Section 706 Inventory
Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia
Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
UNIVERSITY EQUIPMENT
Authority: History: Source of Authority: 05.164 Related Links: Responsible Office: UNIVERSITY EQUIPMENT Vice Chancellor for Business Affairs Effective September 20, 1994; Updated October 16, 1995; Updated
McGill University IT Asset Management Regulation
Publication Date May 8, 2015 Revision V 1.1 McGill University IT Asset Management Regulation OVERVIEW McGill University seeks to provide its community with the necessary IT equipment, infrastructures and
HARD DRIVE REMARKETING
A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS
Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet
Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE
FLORIDA ATLANTIC UNIVERSITY. Property Policy
FLORIDA ATLANTIC UNIVERSITY Property Policy 2014 1 Table of Contents 1. PURPOSE 2. INTRODUCTION 3. DEFINITIONS 3.1. Property 3.2. Property Manager 3.3. Accountable Officer 3.4. Surplus 3.5. Salvage 3.6.
Workstation Management
Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
3-0127 ADMINISTRATION & FINANCE August 2010 FEDERAL PROPERTY MANAGEMENT STANDARDS
[ FEDERAL PROPERTY MANAGEMENT STANDARDS 3-0127 ADMINISTRATION & FINANCE August 2010 1.01 The Director of Budget Operations through the Associate Vice President for Administration and Finance is designated
The Power to Take Control of Software Assets
The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets The Benefits of SAM: Building the case for Conducting a SAM Assessment and Implementing a
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
28400 POLICY IT SECURITY MANAGEMENT
Version: 2.2 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. The objective of this policy is to provide direction and support for IT
New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS Page No. INTRODUCTION... 3 PURPOSE... 3 SCOPE... 3 POLICY... 3 INFORMATION TECHNOLOGY EQUIPMENT... 3 INVENTORY... 4 EQUIPMENT RECEIVED BY ITS DEPARTMENT... 4 EQUIPMENT RECEIVED
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
University Systems Desktop Support Service Level Commitment
University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,
SMTD Computer Hardware and. Software Asset Inventory Policy
SMTD Computer Hardware and Software Asset Inventory Policy Effective Date: May 18, 2015 Purpose: With a considerable amount of computer hardware and peripherals both on and off-campus, maintaining an accurate
COMPUTER REPLACEMENT PROGRAM GUIDELINES AND PROCEDURES
COMPUTER REPLACEMENT PROGRAM GUIDELINES AND PROCEDURES Information Technology Services (ITS) is implementing guidelines for replacing desktop and laptop computers on a three (3) year cycle as allowed by
Federal Sustainable Print Management Policy Template
Introduction The policy language in this document is provided as an example of the type of language your organization can include in a print management policy, directive, memorandum, or guidance (in italics
Software Licenses Managing the Asset and Related Risks
AUDITOR GENERAL S REPORT ACTION REQUIRED Software Licenses Managing the Asset and Related Risks Date: February 4, 2015 To: From: Wards: Audit Committee Auditor General All Reference Number: SUMMARY The
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.
INFORMATION TECHNOLOGY
MISSION STATEMENT The Information Technology department provides technology, telecommunications and information systems leadership and strategic planning while ensuring efficient, cost effective implementation
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Eastern Illinois University information technology services. strategic plan. January,
Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic
CENG Information Technology Services University of North Texas
CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS
EMERGENCY MANAGEMENT POLICY
Effective Date: November 2, 2009 Supersedes/Amends: VRS-50/December 2006 Originating Office: Office of the Vice-President, Services Policy Number: VPS-50 SCOPE This policy applies to all members of the
UW-L Information Technology Services Standard Operating Procedure (SOP)
UW-L Information Technology Services Standard Operating Procedure (SOP) Title: Computer Lifecycle Management Date Prepared: 9/12/2014 Author(s): ITS Cross Reference/Related Procedure(s): Campus Surplus
Corporate Mobile Policy Template
Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes
IT Asset Management. ProPath. Office of Information and Technology
IT Asset Management ProPath Office of Information and Technology Table of Contents IT Asset Management Process Maps... 1 Process: IT Asset Management... 19 IT Asset Management and Goals... 22... 22 Goals...
Christopher Newport University Policy and Procedures
Policy: Cell Phone Allowances Policy Number: 3025 Date of Current Revision: Executive Oversight: Executive Vice President Contact Office: Business Office Policy: This Policy provides guidelines for the
Why does the program purchase computers instead of leasing them?
General Questions What is the FAS Refresh Program? Harvard University Information Technology (HUIT) provides a computer lifecycle management service to FAS departments, including acquisition, set up, management,
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Hardware and Software
Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems
Key Aspects of Configuration Management. NOvA Working Group Meeting 1
Key Aspects of Configuration Management NOvA Working Group Meeting 1 Excerpts from ANSI/EIA-649 on Configuration Management The purpose and benefits of configuration management include the following: Product
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Value Recovery Enterprise IT Asset Disposition
Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.
DHHS Directive Number II-12
DHHS Directive Number II-12 Title: Delegation of Authority to the Director, Division of Information Resource Management Effective Date: November 3, 2008 Revision History: January 1, 2002 Authority: G.S.
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
REQUEST FOR PROPOSAL FOR IT ASSET MANAGEMENT SERVICES
KENYA AIRWAYS TENDER NO. T/026/14 REQUEST FOR PROPOSAL FOR IT ASSET MANAGEMENT SERVICES Release Date: 25 th April 2014 Closing date: 23 rd May 2014 1 INVITATION TO TENDER TENDER NO.T/026/14: PROVISION
Standards of Technology Support
Standards of Technology Support Summary The Computing Services Group () provides information technology assistance, oversight and resources for the college s teaching, research and outreach missions. By
INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO
INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO Updated October 2010 Table of Contents Desktop and Customer Services... 3 Enterprise Application Services... 6 Department Specific Application Services...
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization
Information Security Plan effective March 1, 2010
Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document
FINANCIAL POLICIES & PROCEDURES USER GUIDE SECTION 15
I. INTRODUCTION The following fixed asset control policies and procedures help ensure proper stewardship of the School s real property which includes land, buildings, improvements to land other than buildings
Service Level Agreement (SLA) Information Technology Support. for. Departments within Southern Clinical School. Provided by
Service Level Agreement (SLA) Information Technology Support for Departments within Southern Clinical School Provided by Network Services Monash University Monash Medical Centre Version 3 Page 1 of 12
Annual Report 2009-2010
Part 1 Section A Unit Information Unit: Computing Services Annual Report 2009-2010 Mission Statement: Computing Services provides leadership and instills confidence through exceptional technology and assistance
IBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
ADMINISTRATIVE PROCEDURE
Categories of Fixed Assets 1. Land -Land as well as the costs incurred in preparing the land for its intended purpose. These costs include, but are not limited to, purchase costs, real estate commissions,
SUSTAINABLE PROCUREMENT GUIDELINES
SUSTAINABLE PROCUREMENT GUIDELINES Purpose Consistent with Stanford s sustainability goals, the purpose of these guidelines is to support and facilitate the purchase of products, services and materials
Next Generation ITAM in the Cloud: Business Intelligence and Analytics as a Service
Next Generation ITAM in the Cloud: Business Intelligence and Analytics as a Service Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - May 2012 SM Next Generation
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
BEConnected User Agreement
BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to
Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index
Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index NOTE: Services pricing and/or desktop/laptop pricing may change from what is listed in this Appendix C based on customer requirements and changes
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
C I T Y O F W E S T L I N N
C I T Y O F W E S T L I N N JOB DESCRIPTION Job Title: DESKTOP TECHNICIAN II GENERAL FUNCTION: Position is responsible for: 1) providing administration and support for all City desktop and peripheral hardware,
GENERAL SERVICES POLICY STATEMENT
GENERAL SERVICES POLICY STATEMENT POLICY NO: P-250 POLICY TITLE: ENVIRONMENTALLY RESPONSIBLE PURCHASING POLICY EFFECTIVE DATE: 12/14/04 PURPOSE: The purpose of this Policy is to reduce negative impacts
That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
E. Custodian - the Vice President for Administrative Services and Finance or designee.
Florida Gulf Coast University Policy Manual TITLE: Tangible Personal Property Policy Policy: 3.033 Approved: 1/13/12 Responsible Executive: Vice President for Administrative Services and Finance Responsible
State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:
State of Vermont Digital Media and Hardware Disposal Standard Date: Approved by: Policy Number: 1.0 INTRODUCTION... 3 1.1 Authority... 3 1.2 Scope and Purpose:... 3 2.0 STANDARD... 3 2.1 Preface... 3 2.2
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
Standard Operating Procedure. Asset Management at PERFORM. PC-SOP-GA-004-v01
Standard Operating Procedure Asset Management at PERFORM PC-SOP-GA-004-v01 Revision History Version Reason for revision Date 02 1. Changed acronym from CR to CF for the conditioning floor 2. Updated definitions
Corporate Purchasing. Manual: Organizational Approved By: President & C.E.O. Section: Finance Original Date Issued: March 2011
Corporate Purchasing Manual: Organizational Approved By: President & C.E.O. Section: Finance Original Date Issued: March 2011 Reviewed/Revised Date: Revised Reviewed December 2011 PREAMBLE The Pembroke
INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA
INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA Report of an investigation of a malicious software outbreak affecting health information August 19, 2011 Dr. Cathy MacLean Investigation Report H2011-IR-003
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy
U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy Order 1830.9 A 09/18/2009 SUBJ; Cellular/Satellite Device Acquisition and Management 1. Purpose of this order. The Federal
5 th -6 th : Electronic Jeopardy
Objectives: The students will learn the lifecycle of electronic devices, the environmental impacts of new age electronic waste (e-waste), and the disposal options at the end of an electronics' useful life.
PROCEDURES: Purchasing Policy
AUTHORITY: University Administration POLICY: A:VPFA # / RESPONSIBILITY: Vice President Finance and Administration Effective Date: April 1, 2013 Purpose To implement the, the following specific actions
