IT Change Management Policy
|
|
|
- Alexander Mitchell
- 9 years ago
- Views:
Transcription
1 Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1. The purpose of this policy is to communicate the University s requirement that changes to IT (information, application and infrastructure) architecture must be managed efficiently and effectively, using standardised methods and procedures. Definition 2. Change management is the process responsible for controlling the lifecycle of all changes. The primary objective of change management is to enable beneficial changes to be made with minimum disruption to IT Services (ITIL v3) and end users. Goals 3. The goals of the Change Management process are to: Ensure that standardised methods and procedures are used for the efficient and prompt handling of all Changes, in order to minimise the impact of Change-related Incidents upon service quality, and consequently improve the day-to-day operations of the organisation. The Change Management process is especially important in ensuring only authorised change is made to the production environment. Respond to the University s changing business requirements while maximising value and reducing incidents, disruption and re-work. Respond to the requests for change that will align the IT services with the University s business needs. Scope 4. This policy covers the release of any new services or a service change to the University s IT architecture. 5. Changes include additions, deletions and modifications to any IT architecture resource. Referenced from Best Practice for Service Support ITIL The Key to Managing IT Services Page 1
2 6. The University s IT architecture includes, but is not limited to, hardware, software, operating systems, data and voice network and applications. Legislation 7. This policy is governed by the University of Canberra (University Facilities) Amendment Statute 2006 and the University Facilities (Information and Communication Technology Network) Rules B. Principles 8. IT Service and infrastructure changes shall have clearly defined and documented scope. 9. All requests for change shall be recorded and classified, e.g., standard, normal, enhancements and emergency/fast track standard. Requests for changes shall be assessed for their risk, impact and business benefit. 10. The change management process shall include the manner in which the change shall be reversed or remedied if unsuccessful. 11. Changes shall be approved and then checked, and shall be implemented in a controlled manner. 12. Details of changes will be communicated to all stakeholders on a regular basis. 13. There shall be a procedure to handle the authorisation and implementation of emergency changes. 14. The scheduled implementation dates of changes shall be used as the basis for change and release scheduling. A schedule that contains details of all the changes approved for implementation and their proposed implementation dates shall be maintained and communicated to relevant parties. 15. There shall be clear accountabilities for the authorisation and implementation of all changes. 16. There shall be an appropriate administrative separation of authorisation and implementation roles for each change, relating to the risk associated with the change. 17. Change Advisory Board (CAB) meetings shall be held regularly with attendees from ITM and relevant business units. Page 2
3 C. Relevant information Context 18. This policy fits within the University s IT Infrastructure Library (ITIL) service management framework (Service Transition Responsibilities 19. Responsibilities for implementing this policy are set out below:. Policy owner: Head ITM Policy custodian: Head ITM, Director Customer Services Group and Director Infrastructure and Information Management Policy contact: Change and Release Manager 20. The University of Canberra Change Management Roles and Responsibilities document provides full details of roles and responsibilities in relation to Change Management. 21. Suppliers of goods and services pertaining to the University s IT Architecture have the responsibility for following the prescribed ITM change management process and procedures. 22. Suppliers of externally hosted services are responsible and accountable for informing the University of its role and responsibilities in the suppliers change management process. 23. Where an externally hosted service is hybrid (contains service components owned/managed by the University) the supplier s and the University s ITM change management processes will work collaboratively during service transition. 24. All staff and end-users of the University s the IT architecture including all corporate IT applications have a responsibility for Change Management: End-User/Functional User has responsibility for submitting a change request, including appropriate authorisation and participation in the testing. Business System Owner has the responsibility for ensuring that the change process is followed for all business systems. ITM Staff Technical Role has responsibility for following the prescribed change management processes and procedures. Change Advisory Board has responsibility for advising the Change and Release Manager in the assessment, prioritisation and scheduling of changes. Change Manager - has responsibility for approving changes to the IT architecture. Emergency CAB has responsibility for reviewing/approving high urgency, high impact emergency changes (required in less than 24 hours). ITM Management has overall governance responsibility for overseeing the change management policy and processes. This includes, but is not limited to, policy dissemination, process enforcement, grievance and final approval for those changes requiring escalation by the CAB. Page 3
4 Audit and Evaluation 25. The Change Management process will be reviewed and assessed on an annual basis by Head ITM for compliance with the policy. Other related documents 26. Documents related to this policy are: Archives Act 1983 Freedom of Information Act 1982 Privacy Act 1988 Evidence Act 1995 Electronic Transaction Act 1999 Crimes Act 1914 Telecommunications (Interception and Access) Act 1979 Enterprise Architecture Principles Policy Data Management Strategy Business Intelligence Strategy Enterprise Content Management Strategy Glossary 27. The following definitions are relevant to this policy: Term Change Change Advisory Board (CAB) Change Manager Corporate IT Application Emergency Change Advisory Board (ECAB) ITIL Release Suppliers Definition A Change is defined as any addition, deletion and/or modification to an IT resource and may be characterised as permanent, transitory or remedial. A dynamically formed group of functional experts, who assist in assessing, prioritising and scheduling changes. Authorises and documents changes to the IT infrastructure and components in order to minimise disruption on operational services. All applications that support the business of the University. A smaller subset of CAB (including a Director of ITM) who are responsible for reviewing/approving high urgency, high impact emergency changes. Information Technology Infrastructure Library provides a best practice framework for the delivery of managed IT services. ITIL definition: A collection of hardware, software, documentation, processes or other components required to implement one or more approved Changes to IT Services. Third parties responsible for the supply of services and/or goods for the delivery of IT services. Page 4
5 Information for Policy Database [The following table is not part of the policy. It is to be sent as a separate document to the UC Policy Database administrator.] Policy number Policy status New Review date 31 December 2015 Central Registry file no. 2010/4244 Relevant UC Statute(s) and Rule(s) University of Canberra (University Facilities) Amendment Statute 2006 University Facilities (Information and Communication Technology Network) Rules Other relevant legislation Archives Act 1983 Freedom of Information Act 1982 Privacy Act 1988 Evidence Act 1995 Electronic Transaction Act 1999 Crimes Act 1914 Telecommunications (Interception and Access) Act 1979 Policy database grouping Accessibility Custodian Contact position Keywords Public access IT, Information Technology, change, change management, IT architecture Page 5
The Newcastle upon Tyne Hospitals NHS Foundation Trust. IT Change Management Policy and Process
The Newcastle upon Tyne Hospitals NHS Foundation Trust Version No.: 2.0 Effective From: 16 July 2015 Expiry Date: 16 July 2018 Date Ratified: 5 June 2015 Ratified By: Director of IT 1 Introduction IT Change
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
The ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 3, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
Service Support. Change
Service Support Change Management ITIL Change Management - 1 Module Objective Define the scope of the Service Support function of Change Management in the IT Infrastructure Library (ITIL) Provide an overview
Service Transition. ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1
Service Transition ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1 Lesson Objectives Service Transition - Introduction - Purpose and Objectives
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY Originator IT Change Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
CHG-11-G-001 Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 N/A. Edition workflows and process integrations?
Purpose: [C]ontrol the lifecycle of all changes, enabling beneficial changes to be made with minimum disruption to IT services. (ST 4.2.1) Activities include: Assessing the impact of business change on
ITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
Roles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
SFJ EFSM14 Manage the performance of teams and individuals to achieve objectives
Manage the performance of teams and individuals to achieve objectives Overview This standard is about making the best use of your team and its members so that they can achieve your organisation's objectives.
Page 1 of 8. Any change, which meets the following criteria, will be managed using IM/IT Change Management Process.
Page 1 of 8 1. Introduction This policy describes the Authority s Information Management/Information Technology (IM/IT) change management procedures. IM/IT manages changes to applications, infrastructure
1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects
1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects b) The path to Service Delivery and Service Support for efficient and effective
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
ISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact [email protected] http://www.uxcconsulting.com.au This summary
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
ITIL Example change management procedure
ITIL Example change management procedure An example change process diagram Change Intiators outside IT (users/customers/supplier/etc.) Change Initiators IT SERVICE DESK Filters change requests RFC REJECT
Corporate ICT Change Management
Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced
Free ITIL v.3. Foundation. Exam Sample Paper 1. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass
Free ITIL v.3. Foundation Exam Sample Paper 1 You have 1 hour to complete all 40 Questions You must get 26 or more correct to pass Compliments of Advance ITSM www.advanceitsm.com 1. What is the main reason
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
University of Waikato Change Management Process
1. Overview Information Technology Services and the Faculty and Division ICT staff have adopted the Information Technology Infrastructure Library (ITIL) systems management framework as its model for best
ITIL Example emergency change management procedure
ITIL Example emergency change management procedure An example emergency change process diagram Emergency RFC Actually logging of the emergency request for change can all be done retrospectively Emergency
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
BMC Software Consulting Services Fermilab Computing Division Incident Management Policy
BMC Software Consulting Services Incident Management Policy Client: Fermilab Date : 01/28/2009 Version : 1.0 DOCDB 3067 Description Purpose Applicable to Supersedes GENERAL This is the policy that governs
ITIL applied to Network Operations
ITIL applied to Network Operations ITIL: Information Technology Infrastructure Library A set of specifications to help IT manager and FTE achieve good services delivery to their users ITIL provides a comprehensive
POLICY CONTRACT MANAGEMENT POLICY POLICY STATEMENT
POLICY CONTRACT MANAGEMENT POLICY POLICY STATEMENT The intent of this policy is to establish a University-wide governance structure for managing contracts and other legally binding documents. The Policy
hi Information Technologies Change Management Standard
hi Information Technologies Change Management Standard Classification Service Delivery Standard # SVD-002 Approval Authority Chief Information Officer Implementation Authority Director, Service Delivery
Institutional Data Governance Policy
Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.
Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
ITIL V3 Foundation Certification - Sample Exam 1
ITIL V3 Foundation Certification - Sample Exam 1 The new version of ITIL (Information Technology Infrastructure Library) was launched in June 2007. ITIL V3 primarily describes the Service Lifecycle of
XXX000YY Certificate IV in Government Security
XXX000YY Certificate IV in Government Security XXX000YY Certificate IV in Government Security Description This qualification allows for the attainment of generalist competencies in Security and also specialist
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
1 Why should monitoring and measuring be used when trying to improve services?
1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve
Data Governance Policy. Version 2.0 19 October 2015
Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage
Foundation. Summary. ITIL and Services. Services - Delivering value to customers in the form of goods and services - End-to-end Service
ITIL ITIL Foundation Summary ITIL and s Design s - Delivering value to customers in the form of goods and services - End-to-end ITIL Best Practice - Scalable and not prescriptive - Gathered from Users,
3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
Victorian Government Information and Communication Technology (ICT) Governance
Governance Victorian Government Information and Communication Technology (ICT) Governance Framework A framework to describe ICT governance in the Victorian Government Keywords: ICT Strategy; governance;
Release Management for BMC Remedy IT Service Management version 7.0 WHITE PAPER
Release Management for BMC Remedy IT Service Management version 7.0 WHITE PAPER Table of Contents Overview...2 Release Management Request Process...3 Associating Relationships to the Release Request...5
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard
White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard Abstract: This white paper outlines the ITIL industry best practices methodology and discusses the methods in
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Master Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
ICAICT704A Direct ICT in a supply chain
ICAICT704A Direct ICT in a supply chain Release: 1 ICAICT704A Direct ICT in a supply chain Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained
The ITIL v.3 Foundation Examination
The ITIL v.3 Foundation Examination Sample Paper A, version 3.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions. 3. All answers are to be marked on
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
ITIL & PROCESSES. Basic Training
ITIL & PROCESSES Basic Training ITIL ITIL = IT Infrastructure Library The ITIL describes the processes that need to be implemented in an organization in the area of management, operations and maintenance
NOTTINGHAMSHIRE OFFICE OF THE POLICE AND CRIME JOB DESCRIPTION. Project Manager ECINS Development and Implementation 1 year project
NOTTINGHAMSHIRE OFFICE OF THE POLICE AND CRIME JOB DESCRIPTION Job title: Department/Location: Responsible to: Manager Responsible for: Project Manager ECINS Development and Implementation 1 year project
Records Management Security of University Records Procedures
Records Management Security of University Records Procedures pro-064 To be read in conjunction with: Records Management Policy Version: 2.00 Last amendment: Nov 2014 Next Review: Nov 2016 Approved By:
BUSINESS CONTINUITY MANAGEMENT POLICY
BUSINESS CONTINUITY MANAGEMENT POLICY AUTHORISED BY: DATE: Andy Buck Chief Executive March 2011 Ratifying Committee: NHS Rotherham Board Date Agreed: Issue No: NEXT REVIEW DATE: 2013 1 Lead Director John
Location of the job: CFO Revenue Assurance
JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance
INS Problem Management Manual
INS Problem Management Manual Process, Policies & Procedures Version 0.4 Draft Ver 0.4 INS Problem Management Manual.doc Page 1 of 47 Document Control Document Versions Date Version Person Changing Brief
WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101
WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
MODULE CURRICULUM DOCUMENT
MODULE CURRICULUM DOCUMENT ITIL FOUNDATION (C383) Approved by: Boo Chong-han Director, School of Infocomm Date of Approval: 20 March 2015 Submitted by: Anne Tan Module Chair Effective Date: AY2015 Semester
information Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist
Records Management Checklist Foreword We fi rst developed the Records Management Checklist in 2008 to complement our performance audit Records Management in the Victorian Public Sector. At that time the
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 5.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
ITIL Introduction and Overview & ITIL Process Map
ITIL Introduction and Overview & ITIL Process Map Barbara Re 1 Where we are? IT organization has a long trouble to improve service level to their customers without adding cost, reducing quality or introducing
POSITION PROFILE Support Officer, ICT. Position Summary. Position Statement. Corporate Vision. Constructive Culture ICT.
Position Summary Position Title: Business unit: ICT Support Officer ICT Division : ICT and Knowledge Management Classification : Level 5 Status : Position Statement The ICT Support Officer maintains the
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Records Management Self-Evaluation Guide
Records Management Self-Evaluation Guide Introduction University of Cincinnati Records Management has developed this self-evaluation guide for departments to use as an overview of the basic components
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
ITSM. Maturity Assessment
ITSM 2012 Maturity Assessment Table of Contents Introduction... 2 What is ITSM?... 2 What is ITIL... 2 Is ITS doing ITSM today?... 3 Where is ITS in relation to ITIL best practices?... 3 Readiness and
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0
Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations
Ref. Ares(2014)1520151-13/05/2014. l(5)vodafone.com>
Ref. Ares(2014)1520151-13/05/2014 From: Vodafone Group" < Date: 25 Jul 2013 17:51:32 GMT+02:00 To: "Wolf-Dietrich.Grussmann(g)ec.europa.eu l(5)vodafone.com> Subject: virtual access products Dear Dieter,
The Value of ITIL to IT Audit
The Value of ITIL to IT Audit HP Suen Chairman 9 August 2005 IT Infrastructure Library 1 ITIL Best practice in IT Service management, developed by Office of Government Commerce (OGC), UK in the late 1980s.
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
BCS Specialist Certificate in Change Management Syllabus
BCS Specialist Certificate in Change Management Syllabus Version 1.9 March 2015 BCS Specialist Certificate in Change Management Syllabus Contents Change History... 2 Rationale... 3 Aims and Objectives...
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Risk Management Policy
1 Purpose Risk management relates to the culture, processes and structures directed towards the effective management of potential opportunities and adverse effects within the University s environment.
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
Information Strategy 2006-2009
The University of Sheffield Information Strategy 2006-2009 The Information Strategy exists to support the University s mission and its objectives in research, teaching and learning, and knowledge transfer.
The ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus
CONSTRUCTION HEALTH AND SAFETY, AND INJURY PREVENTION Research and develop accident and incident investigation procedures on construction sites
1 of 7 level: 4 credit: 4 planned review date: December 2003 sub-field: purpose: Construction People credited with this unit standard are able to: research accident and/or incident investigation and reporting
CITY UNIVERSITY OF HONG KONG Change Management Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September 2015) PUBLIC Date of Issue:
Risk Management Policy
Risk Management Policy DOCUMENT CONTROL Developed by: Date: Origination: Quality, Systems & Shared s March 2014 Authorised by: Colette Kelleher April 2014 DOCUMENT REVIEW HISTORY Original Circulation date:
Ulster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
How To Manage A Service Transition
SERVICE TRANSITION Service Transition Development and improvement of capabilities for transitioning new and changed services into operations SOURCE: ITIL Service Transition Publication, p. 6 Service Transition
INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW
GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
CMS Policy for Configuration Management
Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION
