ehealth Architecture Principles
|
|
|
- Charity Taylor
- 9 years ago
- Views:
Transcription
1 ehealth Architecture Principles Version 3.0 June 2009
2 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version: 3.0 Version Control Date Version Changes 1.0 Published version for comment via ehealth Leads 12/01/ Draft incorporating feedback from review for ehealth internal review 20/04/ Draft for internal discussion & PET approval 06/05/ Published version for info to ehealth leads 13/05/ Published version for ehealth Programme Board approval 19/05/ Approved by the ehealth Programme Board subject to the following changes being included: Updated Principle 12 to include statement on affordability. Updated the Principle 15 s rational to make the statement clearer. Minor formatting and text updates. 01/06/ Published version for ehealth website Minor formatting and text updates. 2
3 1 Introduction Principles allow us to make decisions without revisiting the fundamentals of what we are trying to achieve. They allow us to make strategic decisions without reinventing strategy. By basing decisions on previously agreed Architecture Principles instead of working from first principles, we can make difficult decisions on Information and Communications Technology (ICT) architecture and solutions consistently, easier and faster. In an organisation as large and complex as NHSScotland, a set of widely understood decision making principles is a powerful technique to build a cohesive ICT architecture. The ehealth Architecture Principles are aimed at governing: the development and maintenance of NHSScotland s ICT architecture and change plan; and the implementation of the architecture, by providing the first tenets for developing and delivering ehealth solutions. 3
4 2 ehealth Architecture Principles The Architecture Principles have deliberately been written in the present tense, even though some of the resources required to underpin the Principles have not yet been developed. Work to develop these resources is either underway or will commence in due course. Each Principle is presented as a separate section of the document and in the following format: title: the essence of the principle; description: a succinct and unambiguous definition of the fundamental principle; rationale: the business and clinical benefits of adhering to the principle; implications: an outline of the key tasks, resources and potential costs associated with following the principle; and supporting resources: to illustrate the resources available and required to support application of the principle. 1 Adhering to the Architecture Principles The Scottish Government Health Directorates and all NHSScotland territorial and special Health Boards adhere to the Architecture Principles. Adherence to the Architecture Principles enables the evolution of an improved architecture that has the security, reliability, flexibility and cost effectiveness necessary to achieve the benefits of the overall ehealth vision. NHSScotland s architecture developments and new solutions align with the Principles. Solution owners and or ehealth leads to ensure that solutions comply with the Principles. National solution architecture and design checklists (to be developed) 2 Solutions are based on the ehealth reference architecture The ehealth reference architecture guides the design and delivery of all solutions. The reference architecture guides the development of solutions in alignment with the Architecture Vision and the ehealth Strategy. The reference architecture comprises NHSScotland s current architecture (encompassing applications, technology, security and data); the target architecture and associated change plan. 4
5 The reference architecture is maintained and updated with output from projects. Project teams (solution architects/owners, etc.) contribute to the reference architecture by delivering suitable content (e.g., standards, designs, etc) from their projects. The baseline ehealth reference architecture National solution architecture and design checklists (to be developed) 3 The architecture supports the organisation structure The target architecture supports the structure of NHSScotland and local variations in clinical and business priorities. To support the overall ehealth vision, the architecture supports the structure of NHSScotland overall, including local variations in clinical and business priorities, and NHS Health Board autonomy. Components of the architecture are designed in accordance with the organisation structure, staff capability and capacity and the boundaries of ehealth within the wider infrastructure. ehealth Strategy : 4 Agile architecture and solutions NHSScotland implements agile architecture and solutions composed of reusable modular components and services, based on Service Oriented Architecture wherever possible. The use of component and service based building blocks enables an agile architecture that is receptive to changing business and clinical priorities. Encapsulating functionality provided by a series of applications into a set of components and services that can be reused across NHSScotland will promote future flexibility and interoperability, and reduce the cost and risk of implementing new solutions. Architecture and solutions are designed in a manner that supports the implementation of a servicebased architecture for NHSScotland. Consideration must be given to using published services and building blocks when architecting solutions. Consistency with the ehealth Reference Architecture. 5
6 The architecture supports variations in NHS Board priorities and business processes. ehealth reference architecture Integration and interoperability standards (to be developed) Other standards to be identified and included within the ehealth standards library 5 Complying with standards The architecture and solutions comply with relevant standards published within the ehealth standards library. Standards help to ensure consistency, promoting interoperability between systems and introducing convergence, improving systems manageability, user satisfaction and protecting ehealth investments. Complying with standards and, in particular, open standards, helps to maximise return on investment and minimise costs. The use of proprietary standards increases the risk of excessive integration complexity and expense; open standards simplify the integration of solutions and, therefore, help to minimise the costs and risks associated with the implementation. The use of open standards will support NHSScotland s ability to leverage developments in the wider healthcare sector. The evolution of NHSScotland s architecture drives the need for the continuous analysis and development of standards within the ehealth standards library. Solutions conform to Scottish Government, NHSScotland, United Kingdom, European and other relevant standards published within the ehealth standards library. Wherever possible solutions should avoid the use of proprietary standards and careful consideration is necessary to ensure that the impact on NHSScotland s architecture is both recorded and understood. Design checklists. ehealth standards library: Interoperability working group (IOWG) 6 Leveraging existing national applications NHS Scotland s architecture leverages maximum benefit from existing ehealth investments. 6
7 Rational NHSScotland already has significant achievements in ehealth based on its existing investment in a range of national applications. However, there are substantial opportunities to increase the content, usage and coverage of these applications to realise additional benefits for patient care. The architecture incorporates existing national applications. The capabilities of existing national applications are considered when designing solutions to meet new business and clinical requirements. ehealth reference architecture 7 Information is governed The architecture and solutions adhere to NHSScotland s standards for information governance. Patients entrust NHSScotland with personal information in the expectation that it will be appropriately stored, and be shared only with those who need to know. Without robust information governance there is a risk of unauthorised disclosure that could undermine patient, public and professional confidence. Robust information governance is key to enabling solutions to reach their full potential. The architecture and solutions comply with NHSScotland s and Scottish Public Sector standards for information governance. Information governance is considered in solution design. Standards for information governance (to be developed) the ehealth Directorate is undertaking an information governance study which aims to answer many of the complex questions associated with managing access to the personal health information held by NHSScotland. 8 Information is accessible Information is available and accessible to authorised individuals and groups across NHSScotland. Safe, efficient and effective decision making, either clinical, administrative, or managerial, is directly dependent on the availability and accessibility of information. Information gathered in one part of the organisation may have value to another, and therefore systems storing information make that information readily available to authorised (identified, authenticated and audited) 7
8 individuals and groups across the service, and facilitate the sharing of health information with patients. NHSScotland s architecture and solutions comply with relevant standards to ensure that information is accessible to authorised systems and individuals in other parts of the organisation. Within agreed constraints, the architecture and solutions enable access to real-time operational and management data. Within agreed constraints, the ICT architecture and solutions support the sharing of information with the Scottish Government, local authorities, other organisations and recognised NHS bodies in the UK, as appropriate. Portal standards (to be identified and developed) Integration and interoperability standards (to be identified and developed) Other standards to be identified and included within the ehealth standards library 9 Information is secure All information is secured against unauthorised access, modification or loss in accordance with NHSScotland s information security policy. Information systems are responsible for managing, storing and transmitting patient health information and therefore meet the requirements of NHSScotland s information security policy. The architecture and solutions, including people, systems, processes and physical components, comply with NHSScotland s information security policy, balanced with the need to make information accessible. Solution owners ensure that technical configurations and measures are in place to enforce compliance with NHSScotland s information security policy, and ensure that such configurations and measures are in proportion to the level of security risk. Scottish Government HDL (2006) 41 NHSScotland Information Security Policy NHSScotland Security Policy and Standards Other standards from the ehealth standards library 10 Common vocabulary and data definitions Data is defined consistently throughout NHSScotland, and the definitions are understandable and available to all users and systems. 8
9 Systems contain information that has value to deliver care and manage resources in the wider service. This includes information required for management and clinical purposes other than direct patient care, for example healthcare planning, public health, clinical audit, research and clinical governance. In order that information can be shared and unambiguously understood, solutions adhere to a common vocabulary and data definitions, as specified through NHSScotland s national data standards. The architecture and solutions comply with NHSScotland s national data standards to ensure that the end to end integrity of clinical meaning is maintained. Standards from the ehealth standards library 11 Application usability and delivery Consistency is applied to presentation mechanisms for delivering and presenting applications and information to end-users. Providing standard presentation mechanisms across NHSScotland simplifies access to the functionality that end-users require. Enabling end-users to be self-sufficient improves efficiency, reduces the need to complete additional training and reduces the possibility of mistakes being made. The architecture incorporates portal standards, to which solutions conform. When designing solutions, consideration is given to using portals as the standard presentation mechanism. Portal standards (in development) Other standards to be identified and included within the ehealth standards library 12 ehealth solutions will be cost efficient Reuse over buy and buy over build Where approved standard solutions and technology platforms exist in NHSScotland, they will be considered for reuse. Where they do not exist in NHSScotland, but are externally available either via open source or from software vendors, they will be selected. Only where NHSScotland requirements are substantially unique, or where specific constraints arise, will development be considered. 9
10 Solutions that are built to leverage and/or extend existing solutions and technology platforms will, in general, be most cost effective in terms of implementation and support, and will be simpler to integrate into an existing architecture. The requirements of NHSScotland are common to other healthcare providers. Developing complex applications is a time consuming, costly and risky exercise, the service is best served by taking advantage of the experience and effort of others by using Commercial-of-the-Shelf (COTS) solutions or open source software. In making a decision the total cost of ownership must be considered and local or internal development should only be considered as a preferred option following sound analysis and business case. The total cost of ownership of COTS applications is likely to be less than that of equivalent custom-build solutions. Similarly, the cost and risk associated with the implementation and integration of COTS applications is likely to be lower than that associated with equivalent custombuild solutions. In all cases solutions have to be affordable to NHSScotland with the required capital and resource investment matching available budgets. The architecture consists of reusable building blocks. Systems, capabilities or services specified by the architecture are reused whenever possible. Systems expose services and information to interoperate with other systems. Any proposed custom-build solution is carefully examined to understand the associated costs, benefits, risks of implementation and available alternatives. ehealth Reference Architecture 13 Controlling technology diversity Technology diversity is controlled to minimise the cost of maintaining expertise in, and connectivity between, multiple platforms. Minimising the variety of technology platforms (applications and infrastructure) used to support NHSScotland minimises the total cost of ownership and simplifies maintenance. Solutions adopt existing technology standards as the preferred option, and consider the cost of integration and support for any non-standard technology. Technology standards from the ehealth standards library 10
11 14 Critical services are maintained The architecture is capable of supporting and maintaining critical business and clinical processes. As NHSScotland is increasingly dependent on ehealth to deliver healthcare, the reliability and resilience of the overall architecture and its component parts must correspond to the importance of the business and clinical processes which they support. Solutions are designed in proportion to the criticality of the services which they support. Consideration is given to any potential impact on existing health systems and measures appropriate to the criticality of the system are taken to ensure no detrimental effect on existing service levels. Business continuity and disaster recovery are considered within the architecture and solution design. Resources to be identified 15 Compliance with Laws and Regulations Solutions will comply with all relevant laws and regulations, and should be able to take account of changes to these. NHSScotland is obliged to abide by relevant laws and regulations. Solutions that are in breach of any applicable laws, regulations or policies are not compliant with NHSScotland s architecture vision. Compliance with the relevant legal and regulatory frameworks (e.g. Disability Discrimination Act or Data Protection Act) must form part of business requirements. Compliance with policies, such as NHSScotland s standards for information governance, must form part of the requirements. Where changes to relevant laws, regulations or policies are likely/possible, solutions should have the necessary flexibility to accommodate with these. Changes to the law, regulations or policies, which have an impact on NHSScotland s architecture, need to be understood and managed in a coordinated manner. UK Cabinet Office Information on Policies and Standards for egovernment: Scottish Government Equality & Diversity impact assessment toolkit: 11
12 Central Legal Office 12
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
Information Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
Document management concerns the whole board. Implementing document management - recommended practices and lessons learned
Document management concerns the whole board Implementing document management - recommended practices and lessons learned Contents Introduction 03 Introducing a document management solution 04 where one
Best Value toolkit: Information management
Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
ENTERPRISE ARCHITECTUE OFFICE
ENTERPRISE ARCHITECTUE OFFICE Date: 12/8/2010 Enterprise Architecture Guiding Principles 1 Global Architecture Principles 1.1 GA1: Statewide Focus 1.1.1 Principle Architecture decisions will be made based
Enterprise Architecture (EA) Principles
FINAL January 2016 Enterprise Architecture (EA) Principles Introduction The Enterprise Architecture principles express how Highways England needs to design and deploy information systems across the organisation.
Tactical Cost Reduction
Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
Empowering Edinburgh. Our ICT and Digital Strategy
Empowering Edinburgh Our ICT and Digital Strategy Empowering Edinburgh Our ICT and Digital Strategy Purpose of this document The new Information and Communication Technology (ICT) and Digital strategy
BBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: [email protected] Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
Managing ICT contracts in central government. An update
Managing ICT contracts in central government An update Prepared by Audit Scotland June 2015 Auditor General for Scotland The Auditor General s role is to: appoint auditors to Scotland s central government
The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019
The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 Peter Kendal Associate Director for Information Management and Technology Development 01/12/2014 1 Page
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
ICT Strategy 2010-2013
ICT Strategy 2010-2013 If you would like to receive this publication in an alternative format (large print, tape format or other languages) please contact us on 01832 742000. East Northamptonshire Council
INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW
GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
NHS 24 KNOWLEDGE MANAGEMENT SYSTEM INITIAL AGREEMENT
NHS 24 KNOWLEDGE MANAGEMENT SYSTEM INITIAL AGREEMENT 18 TH JUNE 2004 TABLE OF CONTENTS 1 Title...3 2 Introduction/Background...4 2.1 Strategic Objectives... 4 2.2 Clinical Needs... 4 2.3 Proposed Outcomes
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Digital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
ITC 19 th November 2015 Creation of Enterprise Architecture Practice
ITC 19.11.15 ITC 19 th November 2015 Creation of Enterprise Architecture Practice C Description of paper 1. As part of a wider strategy of Digital Transformation of the University s core services, ISG
The Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION
PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION 1. Introduction This document has been written for all those interested in the future approach for delivering ICT
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
National Occupational Standards. Compliance
National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements
Relationship Manager (Banking) Assessment Plan
1. Introduction and Overview Relationship Manager (Banking) Assessment Plan The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It forms a key
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
Guide to the National Safety and Quality Health Service Standards for health service organisation boards
Guide to the National Safety and Quality Health Service Standards for health service organisation boards April 2015 ISBN Print: 978-1-925224-10-8 Electronic: 978-1-925224-11-5 Suggested citation: Australian
Appendix A: ICT and Information Management Strategy
Appendix A: ICT and Information Management 2014 2019 Head of Information and Business Change Sarah Caulkin October 2014 1 Version Control: Date Version Author Comments 04/08/14 0.1 Jo Harley First draft
Assessment of Software for Government
Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented
IS INFORMATION SECURITY POLICY
IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
Information Governance Policy
Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version
Business Integration Architecture for Next generation OSS (NGOSS)
Business Integration Architecture for Next generation OSS (NGOSS) Bharat M. Gupta, Manas Sarkar Summary The existing BSS/OSS systems are inadequate in satisfying the requirements of automating business
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Enterprise Security Architecture
Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture
DIGITAL STRATEGY 2014-2017
DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology
Joint ICT Service ICT Strategy 2014-17
Document History Document Location This document is only valid on the day it was printed. The source of the document will be found in (see footer) Revision History Date of this revision: 19 th May 2014
POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas
POSITION DESCRIPTION Position Title Manager, Technical Services Support Position Number Reports to Manager Technology Services Functional Auth HRM Auth Region IT Services Centre Head Office Date Feb 2011
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER Pharma companies are improving personalized relationships across more channels while cutting cost, complexity, and risk Increased competition
Business Process Management (BPM) Software
FlowCentric Processware 2013 FlowCentric Business Process Management (BPM) Software and Services enable organisations of all proportions, in a multitude of industries, to satisfy and often exceed their
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Selecting a Content Management System
9 9 SELECTING A CONTENT MANAGEMENT SYSTEM Selecting a Content Management System Better Practice Checklist Practical guides for effective use of new technologies in Government www.agimo.gov.au/checklists
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
The Scottish Wide-Area Network (SWAN) Programme
The Scottish Wide-Area Network (SWAN) Programme An Overview Andy Williamson SWAN Programme Manager [email protected] Agenda What are the deliverables of the SWAN Programme? SWAN in
NSW Data & Information Custodianship Policy. June 2013 v1.0
NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...
MANAGING DIGITAL CONTINUITY
MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Central Sponsor for Information Assurance. A National Information Assurance Strategy
Central Sponsor for Information Assurance A National Information Assurance Strategy A NATIONAL INFORMATION ASSURANCE STRATEGY i Foreword Information and communications technology is changing the way that
Complying with the Records Management Code: Evaluation Workbook and Methodology. Module 8: Performance measurement
Complying with the Records Management Code: Evaluation Workbook and Methodology Module 8: Performance measurement Module 8: Performance measurement General 10.1 Many of the questions in the earlier modules
Request for feedback on the revised Code of Governance for NHS Foundation Trusts
Request for feedback on the revised Code of Governance for NHS Foundation Trusts Introduction 8 November 2013 One of Monitor s key objectives is to make sure that public providers are well led. To this
l e a r n i n g a r c h i t e c t u r e f r a m e w o r k MCEETYA A u s t r a l i a - N e w Z e a l a n d
l e a r n i n g a r c h i t e c t u r e f r a m e w o r k MCEETYA A u s t r a l i a - N e w Z e a l a n d Learning architecture delivers learner-centred schooling anywhere, anytime by designing the connections
G CLOUD SERVICE DEFINITION
G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: [email protected] Web: www.ashtoncourt.com
Guideline. Enterprise Architecture Guide. 1. Purpose. 2. Scope. 3. Related documents. 4. Enterprise Architecture Guide
Guideline Policy # QH-GDL-402-6-3:2014 Guide 1. Purpose This Guideline provides an overview of the document structure of the Department of Health, an index to its contents and a consolidated definitions
Application Value Assessment
Value Assessment Journey to Realising the Value of an Organisation s Portfolio Fujitsu UK & Ireland - Business & Services By Chris Waite, Fujitsu Businesses today operate in highly competitive environments
How To Develop An Enterprise Architecture
OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
Policy Statement 16/2006. Acute and Multidisciplinary Working
RCN Policy Unit Policy Statement 16/2006 Acute and Multidisciplinary Working The Royal College of Nursing of the United Kingdom and the Royal College of Physicians (London) September 2006 Royal College
Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce
Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO
Nursing and Midwifery Workload and Workforce Planning Project: A Good Practice Guide in the Use of Supplementary Staffing
Nursing and Midwifery Workload and Workforce Planning Project: A Good Practice Guide in the Use of Supplementary Staffing Nursing and Midwifery Workload and Workforce Planning Project: A Good Practice
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
NOS. Supply Chain Management Occupational Standards
NOS National Supply Chain Management Occupational Standards Contents Unit Supply Chain Management National Occupational Standards - Technical T1 Maintain operational relationships within the supply chain
Gateway review guidebook. for project owners and review teams
Gateway review guidebook for project owners and review teams The State of Queensland (Queensland Treasury and Trade) 2013. First published by the Queensland Government, Department of Infrastructure and
Informatics: The future. An organisational summary
Informatics: The future An organisational summary DH INFORMATION READER BOX Policy HR/Workforce Management Planning/Performance Clinical Document Purpose Commissioner Development Provider Development Improvement
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Best Value toolkit: Performance management
Best Value toolkit: Performance management Prepared by Audit Scotland July 2010 Contents Introduction The Audit of Best Value The Best Value toolkits Using the toolkits Auditors evaluations Best Value
Technology Review Feedback Vale of Glamorgan Council
Technology Review Feedback Vale of Glamorgan Council Audit year: Annual Improvement Assessment 2011 Issued: October 2011 Document reference: 538A2011 Status of report The person who delivered the work
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Chapter 24 - Quality Management. Lecture 1. Chapter 24 Quality management
Chapter 24 - Quality Management Lecture 1 1 Topics covered Software quality Software standards Reviews and inspections Software measurement and metrics 2 Software quality management Concerned with ensuring
PARCC TECHNOLOGY ARCHITECTURE ARCHITECTURAL PRINCIPLES AND CONSTRAINTS SUMMARY
PARCC TECHNOLOGY ARCHITECTURE ARCHITECTURAL PRINCIPLES AND CONSTRAINTS SUMMARY Version 1.1 November 5, 2012 Architectural Principles and Constraints Summary REVISION HISTORY The following revision chart
Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218
Copyright in the material is owned by the State of New South Wales. Apart from any use as permitted under the Copyright Act 1968 and/or as explicitly permitted below, all other rights are reserved. You
COMESA Guidelines on Free and Open Source Software (FOSS)
COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Service Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version: 3.2 Authorisation Committee: Date of Authorisation: May 2014 Ratification Committee Level 1 documents): Date of Ratification Level 1 documents): Signature of ratifying
