Change Management Control Procedure
|
|
|
- Dale Reed
- 9 years ago
- Views:
Transcription
1 Change Management Control Procedure
2 Procedure Name: Procedure Number: Prepared By: Approved By: Change Management Control ESS100 Nancy Severance Director, Administrative Computing Services Paul Foley Director, Enterprise Applications Version: 1.1 Last Updated: October 24, 2011 Revised November 30, 2011 Revised December 19,
3 Contents I. Introduction.. 4 II. Purpose... 4 III. Scope 4 IV. Procedure.. 5 A. Operational Procedures Document change Request 5 2. Requirements Analysis Code and Validation User Acceptance Testing and Approval Documentation Release Planning and Implementation.. 8 B. Unscheduled Change Exceptions.. 9 V. Compliance. 9 VI. Related Policies.. 9 Appendix A 10 3
4 I. INTRODUCTION The Office of Information Technology (OIT) maintains the Enterprise Resource Planning (ERP) applications/environments for the Rhode Island School of Design. OIT is responsible for extending reliable information systems and services through upgrades, enhancements, extensions, integrations, and modifications to hardware and software. The goals of the Change Management Control Procedure are to: improve communication with the user community reduce management involvement improve software validation provide historical information on changes reduce frequency of production changes mitigate risks associated with change to production environment maintain checks and balances and separation of duties develop audit trail This document defines the procedures that OIT will use to control changes to the Production environment. II. Purpose The purpose of the Change Management Control Procedure is to establish a standard approach to applying software changes to Production. Changes require thorough planning, careful monitoring, and follow up evaluation to reduce negative impact to the user community and to increase the value of vital information resources. This is done through a formal process of recording, assessment, authorization, scheduling and comprehensive communications around all changes. This procedure will ensure the implementation of change management and control strategies to mitigate risks such as: data corruption or destruction system performance being disrupted or degraded loss of functionality loss of productivity loss of integration integrity vendor supplied functionality conflicts III. Scope The Change Management Control Procedure covers changes to the ERP system (hardware and software applications) upon which any functional business unit of the institution relies in order to perform normal business activities. See Appendix A for list of servers/applications covered by this procedure. 4
5 Changes may be needed for many reasons including but not limited to: application modifications and enhancements vendor recommendations/requirements periodic maintenance changes in regulations application failures addition of modules/applications changes/additions of hardware There are generally two types of change requests: 1) Incident Reports are a change as a result of system failure or an error preventing a user from completing a task. 2) Functional Modifications are changes requested that are not part of the vendor delivered design. This procedure assumes approval has been granted by the Information Technology Steering Committee (ITSC). It does not address the need, appropriateness, or prioritization of requested change. This procedure does not apply to vendor delivered software updates. (see Project Request and Prioritization Policy, Patch Management Procedure; these procedures are currently in development) IV. Procedure Changes to ERP applications/environments shall be managed and executed according to a formal change control process. The control process will ensure that changes proposed are reviewed, authorized, tested, implemented, and released in a controlled and consistent manner; and that the status of each proposed change is monitored. The Director of Administrative Computing Services is responsible for ensuring that the Change Management Control Procedure is implemented, maintained, and followed. A. Operational Procedures These procedures cover the responsibilities of the functional business owner requesting the change, the Application Specialist assigned to the request/requirement, the Database Administrator, and the Director of Administrative Computing Services overseeing the project. 1. Document Change Request A functional business owner must first make a request in writing and send it to the OIT Helpdesk via to [email protected]. All change requests, incident reports and functional modifications, must be logged in the Helpdesk call management system whether approved or rejected. 5
6 The request shall include: incident report or functional modification desired description of the requested change the system(s) involved the functional business units affected date by which the change is needed If the requested change falls within the OIT guidelines of a project, the appropriate documented procedures must be followed. (see Project Request and Prioritization Policy) The Director of Administrative Computing Services will assign the request to appropriate Application Specialist based on the requesting functional business unit, availability, and prioritization. 2. Requirements Analysis The requirements analysis is the responsibility of the assigned Application Specialist working in conjunction with the requesting functional business user. Analysis will include but is not limited to: develop specification requirements determining impact of change to all functional business units determining impact to system performance determining impact of integration (if applicable) plan for ensuring sustainability consider best practices technical design and review based on approved requirements communicate proposed change and obtain sign off from all affected functional business units obtain written sign off for specification requirements 3. Code and Validation The Application Specialist will make changes to code as specified in the analysis phase. The code changes will be performed in the development environment only. 6
7 Code changes will meet the following stipulations: appropriate development kit will be used in accordance with the OIT Custom Standards and Guidelines Policy a code review performed unit testing with documented results develop version and custom impact controls communicate with functional business user The Applications Specialist will package the custom code and install the package into the test environment. The Application Specialist will notify the functional business user that the change has been moved to the test environment and is ready for user acceptance testing. This phase will be repeated until functional business unit approval is obtained and documented as complete. 4. User Acceptance Testing and Approval The functional business user will perform functionality testing of the change installed in the test environment. This will ensure the isolation of the change and eliminate the undesired effects on the relevant business process(es). Testing will include but is not limited to: functionality testing assess impact on operations and security verify that only intended and approved changes were made communicate testing results and/or needed modification to responsible Application Specialist provide written sign off Approval of changes will be based on formal acceptance criteria; the change request was done by an authorized user, the impact assessment was performed and the proposed changes were tested. At the completion of this phase, the functional business user will give written approval (physical or electronic) of changes made to the Application Specialist as validation of its readiness to be moved to the production environment. 7
8 5. Documentation Documentation will be required for all changes by the Application Specialist. It will be developed and maintained throughout all phases of the Change Management Control process in the Helpdesk system, within the program, and as part of the custom package. This will ensure accuracy, communication, consistency, and agreed upon understanding of the change. Documentation will be included but is not limited to: change specification/requirements approval/acceptance of change specification/requirements code changes documentation in accordance with OIT Custom Standards and Guidelines Policy communication of changes to functional business units end user documentation (when appropriate) documented fall back plan Documentation will be used for reference purposes and for future evaluation and changes. It will also ensure knowledge transfer in the event that the original Application Specialist is unavailable. It is imperative that documentation is complete, accurate, and kept up to date. 6. Release Planning and Implementation Upon notification by the Application Specialist, the Database Administrator or Director, Administrative Computing Services will plan and implement the custom change into the production environment. This change will be implemented according to the Change Implementation Schedule. Release Planning and Implementation will include but is not limited to: verification that all appropriate approvals have been obtained validate custom change package migrate custom change to production environment during next available Change Implementation Schedule time slot version control communicate completion of change to functional business user and Application Specialist any necessary communication of the change to the greater community is the responsibility of the requester close call ticket 8
9 User Acceptance Testing and Approval phase must be completed prior to the Implementation of any change. All software changes will include version control. Older versions will be retained in accordance with the OIT Custom Standards and Guidelines Policy. Application Specialists do not have access to develop or change code in the Production environment. Installation access to the Production environment is reserved for the Database Administrator and Director, Administrative Computing Services only. B. Unscheduled Changes Exceptions All unscheduled changes require approval from the Director, Enterprise Systems and Services. It is the responsibility of the Director, Administrative Computing Services to escalate and procure all required approvals in an effort to implement the change as expeditiously as possible. Emergency changes are defined as changes required to fix production problems affecting critical institutional business functions. Emergency changes do not require review prior to implementation. These requests must be completed as soon as possible and cannot wait until the next scheduled change window. All Emergency changes must be fully documented; however, due to the nature of the request, this may occur after the fact. V. Compliance All parties responsible for changes made to RISD ERP system must comply with the Change Management Control Procedure. It is the responsibility of the Director, Administrative Computing Services to ensure compliance with this procedure; periodic review will be conducted. VI. Related Policies Project Approval and Prioritization, Patch Management Procedure, and Custom Programming Guidelines and Standards 9
10 Appendix A Servers/Applications covered by the Procedure Servers admin.risd.edu wa.risd.edu Applications Datatel Colleague Datatel WebAdvisor 10
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
Information & Technology. Change Management Policy
Makana Information Technology Division Corporate Services Information & Technology Change Management Policy 1 Information & Technology Change Management Policy Table of Contents Approval Table of Contents
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
Page 1 of 8. Any change, which meets the following criteria, will be managed using IM/IT Change Management Process.
Page 1 of 8 1. Introduction This policy describes the Authority s Information Management/Information Technology (IM/IT) change management procedures. IM/IT manages changes to applications, infrastructure
Policies of the University of North Texas Health Science Center
Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic
Patch Management Procedure. Andrew Marriott [email protected] 01253 658578 PATCH MANAGEMENT PROCEDURE.DOCX Version: 1.1
Title: Patch Management Andrew Marriott [email protected] 01253 658578 PATCH MANAGEMENT PROCEDURE.DOCX Version: 1.1 Contents 1. Introduction... 4 2. Objectives... 4 3. Context... 4 4. Responsibility...
Data Center Services
Data Center Services Production Support Providing Call, Incident, and Change Management for customers throughout the Johns Hopkins Enterprise The Johns Hopkins Health Systems And The Johns Hopkins University
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
Project Management Guidelines
Project Management Guidelines 1. INTRODUCTION. This Appendix (Project Management Guidelines) sets forth the detailed Project Management Guidelines. 2. PROJECT MANAGEMENT PLAN POLICY AND GUIDELINES OVERVIEW.
Information & Technology Management Branch Ministry of Education. Change Management Policy
Author: Change Advisory Board Creation Date: March 26, 2001 Last Updated: June 29, 2007 Document Number: 6840 00/Change Control Version: 2.3.5 Approval Renate Butterfield ITMB Director Signature Date CIO
Dundalk Institute of Technology Change Control Procedure
Dundalk Institute of Technology Change Control Procedure 1 Revision History Date of this revision: 07 Dec 2015 Date of next revision: 07 Dec-2016 Revision Number v1.0.1 Revision Summary of Changes Date
PSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding
PSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding Table of Contents -I. Summary -II. Service Description-Scope of OnBase Document Imaging and Workflow Service Integration
Enterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
Outsourcing BI Maintenance Services Version 3.0 January 2006. With SourceCode Inc.
Outsourcing BI Maintenance Services With Inc. An Overview Outsourcing BI Maintenance Services Version 3.0 January 2006 With Inc. Version 3.0 May 2006 2006 by, Inc. 1 Table of Contents 1 INTRODUCTION...
WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance
WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance Complying With HIPAA The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
Columbia College Process for Change Management Page 1 of 7
Page 1 of 7 Executive Summary Columbia College's Process for Change Management is designed to provide an orderly and documented method in which changes to the College's computing environment are requested
EA-ISP-011-System Management Policy
Technology & Information Services EA-ISP-011-System Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 17/03/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
STATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
CITY UNIVERSITY OF HONG KONG Change Management Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September 2015) PUBLIC Date of Issue:
[name of project] Service Level Agreement
[name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off
Technology Event Notification and Escalation Procedures. Procedure: Technology Event Notification and Escalation. Procedure Date: 10/27/2009
Procedure: Technology Event Notification and Escalation Procedure Date: 10/27/2009 1.0 Purpose Information Technology Services (ITS) provides and manages technology in support of the College mission. Changes
Change Management Process. June 1, 2011 Version 2.7
Change Management Process June 1, 2011 Version 2.7 Contents Document Control... 3 Overview... 4 Definition of a Change... 5 Description... 5 Objectives... 5 Key Terms & Definitions... 6 Change Management
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
IT Service Continuity Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Managed Support Policy
TABLE OF CONTENTS 1. SERVICE DESCRIPTION 2 2. SUPPORT OPTIONS 2 3. SERVICE SUPPORT HOURS 3 4. MONITORING AND OUTAGES 3 5. SERVICE LEVEL AGREEMENT 4 6. PLANNED MAINTENANCE AND UPGRADES 5 7. TARGET UPTIME
ITSM Process Description
ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management
Managed Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
Application Maintenance and Development Attachment C for RFP#
Application Maintenance and Development Attachment C for RFP# Service Level Agreements and Operating Level Agreements Issue: 1.0 Issue Date: November 17, 2015 Issue 1.0 November 17, 2015 1 Copyright 2015
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY Originator IT Change Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Working with Sage Customer Support (Sage 100 ERP and Sage 500 ERP)
Table of Contents Who Can Call Sage Customer Support... 2 When To Call Sage Customer Support... 2 When To Call Your Sage Business Partner... 4 How to Fast Track Your Case... 5 Escalating an Issue with
IT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY PURPOSE The purpose of the IT Change Management Policy is to manage changes in a planned and predictable manner in order to assign resources, assess risk and minimize any potential
IT-P-001 IT Helpdesk IT HELPDESK POLICY & PROCEDURE IT-P-001
IT HELPDESK POLICY & PROCEDURE IT-P-001 Date:25 September, 2013 Amemberof, LAUREATE I'.;TlRNAT'Oi'lAl. UWII[RSITIB Stamford International University Policy Policy Statement This Policy has been written
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
IBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
ISO 20000 Information Technology Service Management Systems Professional
ISO 20000 Information Technology Service Management Systems Professional Professional Certifications Sample Questions 1. You work as an external consultant to an IT department that plans to demonstrate
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
PATCHING WINDOWS SERVER 2012 DOMAIN CONTROLLERS. Prepared By: Sainath K.E.V MVP Directory Services
PATCHING WINDOWS SERVER 2012 DOMAIN CONTROLLERS Prepared By: Sainath K.E.V MVP Directory Services TABLE OF CONTENTS 1 Introduction:... 3 2 Patch management process... 4 3 Patching active directory domain
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report March 2007 promoting efficient & effective local government Introduction Software change involves modifications
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
MASTER SERVICE LEVEL AGREEMENT (MSLA)
MASTER SERVICE LEVEL AGREEMENT (MSLA) Charles Darwin University Document Owner Service Level Manager Zubair NAQVI Zubair NAQVI Version Date Revision/Description Author 1.00 16 February 2010 Creation Zubair
Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview
Voice Over IP Network Solution Design, Testing, Integration and Implementation Program Overview 1/1 Table of Contents 1. Introduction...3 2. Executive Summary...4 3. Program Definition...5 3.1. Program
CLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
STANLEY HEALTHCARE SUPPORT POLICY
STANLEY HEALTHCARE SUPPORT POLICY The following describes the Support which Stanley Healthcare or an authorized Stanley Healthcare third party partner (collectively Stanley Healthcare ) provides to Buyer
Privacy Management Program Toolkit Health Custodians Personal Health Information Act
Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
LogRhythm and HIPAA Compliance
LogRhythm and HIPAA Compliance The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to ensure that personal information stored,
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers
Standard Operating Procedures (SOP) for: Configuration Management and Change Control SOP Number: DG25 Version Number: 1 Effective Date: 14/07/2014 Review Date: 14/07/2015 Author: Reviewer: Authorisation:
6-8065 Payment Card Industry Compliance
0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
SUBJECT: Network Support Partnership Silver Support Level for FY 2013
June 4, 2012 MEMORANDUM OF UNDERSTANDING TO: {Customer} {Title} {Department or Organization} THROUGH: Timothy M. Chester, Chief Information Officer Enterprise Information Technology Services FROM: David
IST Drupal Cloud Hosting SLA
Table of Contents 1 General Overview 3 2 Service Description 3 2.1 Service Scope 3 2.2 Assumptions 4 3 Roles and Responsibilities 5 3.1 Parties 5 3.2 Research & Content Technologies Responsibilities 5
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy
Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document
ITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
Development, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
Service Level Terms Inter8 Cloud Services. Service Level Terms Inter8 Cloud Services
Date 7 July 2015 SERVICE LEVEL TERMS INTER8 CLOUD SERVICES Article 1. Definitions In these Service Level Terms ( SLT ), the following terms, indicated with a capital, whether single or plural, will have
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
Assigning Severity Codes
Technical Support Service Number:SDT-051111 Version number: 2.0 Effective Date: 2 nd Jan 2010 Assigning Severity Codes The impact of a problem is a composite of many factors: the number of clients affected,
CUSTOMER GUIDE. Support Services
CUSTOMER GUIDE Support Services Table of Contents Nexenta Support Overview... 4 Support Contract Levels... 4 Support terminology... 5 Support Services Provided... 6 Technical Account Manager (TAM)... 6
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
MARQUIS DISASTER RECOVERY PLAN (DRP)
MARQUIS DISASTER RECOVERY PLAN (DRP) Disaster Recovery is an ongoing process to plan, develop, test and implement changes, processes and procedures supporting the recovery of the critical functions in
ITP01 - Patch Management Policy
IT Services Policy ITP01 - Patch Management Policy Prepared by: < Shelim Miah> Version: V1.0 Page 1 of 8 Description & Target Audience: Policy to outline the requirement of all systems and software applications
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES
SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
MY HELPDESK - END-USER CONSOLE...
Helpdesk User Guide Page 1 Helpdesk User Guide Table of Contents 1 INTRODUCTION... 3 1.1. OBJECTIVES... 3 1.2. END-USER CONSOLE... 3 1.3. SUMMARY OF RESPONSIBILITY... 3 1.4. HELPDESK INCIDENT LIFE CYCLE...
CHANGE MANAGEMENT POLICY
DEPARTMENT OF TECHNOLOGY (DTECH) CHANGE MANAGEMENT POLICY Revised: 10/20/14 799 G Street, Sacramento, CA 95814 Table of Contents Introduction... 3 Definition of Change... 3 Definition of Change... 3 Objectives...
White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
National Interagency Resource Ordering and Status System. Change Management Procedures
National Interagency Resource Ordering and Status System Change Management Procedures Working Copy June 9, 2003 Table of Contents 1. Purpose...3 2. Change Control Board Description and Roles... 3 3. Change
Binary Tree Support. Comprehensive User Guide
Binary Tree Support Comprehensive User Guide Updated: 5/14/2013 TABLE OF CONTENTS About this Guide... 4 Standard Support... 4 Advanced Support... 4 Service Level Agreement (SLA)... 5 Binary Tree Support
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management
White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
CA Unicenter Service Desk Change Policy
CA Unicenter Service Desk Change Policy Outline of Change Processes, Roles, and Terms for CA Unicenter Service Desk John Cowsert 2 Table of Contents Description of CA Unicenter Service Desk... 3 Roles
CONTENTS. List of Tables List of Figures
Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation
Contract and Vendor Management Guide
Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier
AeroScout Industrial Support Policy
AeroScout Industrial Support Policy February 20, 2015 AEROSCOUT INDUSTRIAL SUPPORT POLICY The following describes the Support which AeroScout Industrial or an authorized AeroScout Industrial third party
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
