Loughborough University. Computer Purchasing and Deployment Policy

Size: px
Start display at page:

Download "Loughborough University. Computer Purchasing and Deployment Policy"

Transcription

1 Loughborough University Computer Purchasing and Deployment Policy 1) Introduction and purpose This policy covers the selection, purchase, deployment and disposal of desktop and laptop computers by the University on behalf of its staff. The policy replaces the previous Desktop & Laptop Policy agreed in A University-wide policy is required in order to minimise the costs and risks inherent in purchasing and supporting a large estate of IT equipment in use by a diverse user group. The cost of purchasing computers for staff across the University is significant however, it should be noted that the initial purchase price typically constitutes around a third of the overall cost of a device, the remainder being made up of support, licensing, underlying infrastructure and disposal. All of these cost components can only be controlled through adopting a standardised approach to the purchase of computers, although flexibility is still required to accommodate the specialist activity taking place across a university. 2) Scope This policy applies to all personal computers and Apple Macs (either in desktop or laptop versions) purchased using University funds for the use of temporary and permanent staff in their normal duties. The policy excludes tablet devices (such as Apple ipads) and mobile phones running mobile-specific operating systems, such as ios and Android. Such devices will be covered by separate policies. Any equipment purchased as an exception to this policy will receive only the third tier of support as set out in Table 1 below. Other exclusions include: Equipment required for specialist teaching or research where specific requirements cannot be met by approved suppliers; The hardware purchased for deployment in computing labs, although many of the same principles will apply; Specialised servers, storage and core infrastructure purchased by IT Services, which are subject to separate procurement policies and technical requirements. 3) Procurement approach Due to the total volume of computer equipment purchased across the University, all such purchases are subject to EU procurement legislation. The only means of purchasing computer equipment that is fully compliant with this legislation is via the University s approved supplier. Page 1 of 5

2 This supplier has been selected with the support of the University s Procurement team following a tendering process using the National Desktop and Notebook Agreement (NDNA) for Higher Education, which employs fair and transparent selection criteria and ensures prices and service levels are optimised for the University. The supplier agreement is based around a standard selection of desktop and laptop computers designed to meet the vast majority of staff requirements, however it also allows for other equipment and variations to be purchased at preferential rates and with guaranteed levels of support. The standard models available are kept under review with the supplier to ensure suitability. There are currently three desktop and three laptop models available for selection. All standard models are corporate-specific rather than consumer-focused models, designed to be supportable by the staff and infrastructure of the University. This supplier agreement is proactively reviewed by IT Services and is subject to renewal on an annual basis, thereby giving the University the opportunity to go to market again should pricing, quality or service levels prove unsatisfactory. 4) Principles The following principles apply to the purchase of computer equipment as defined under the scope of the policy: a) Computers purchased by the University from its operating budgets remain the property of the University for their lifetime. Access to any such computer by members of staff is subject to all relevant policies (including the Acceptable Use Policy) and can be withdrawn at any time. b) It is expected that each member of staff will receive a single computer in order to carry out their role, subject to the approval of their line manager and/or the budget holder (with the exception of individuals with multiple roles within the University). Exceptions to this, such as the purchase of both a desktop and laptop for an individual, will require approval by the School Operations Manager or Head of Professional Service as per section 5 below. c) It is expected that the majority of staff will receive a desktop computer, except where staff are expected to work in multiple locations or attend frequent meetings in which case a laptop may be considered. Where laptops are purchased, a desktop docking station and monitor should also be considered and budgeted for. d) Computers must be purchased from the University s approved supplier and from the list of standard models. Increases in the amount of memory or device storage may also be purchased without the need for additional approval. Any exceptions beyond this must be approved as per section 5 below. e) PC Computers will utilise the IT Services-supported core Windows build and comply fully with the University s Software Policy. New computers will be configured in compliance with a naming convention that is machine-specific, stays with the machine for the life of the device and indicates the type of device (e.g. laptop/desktop/server etc.) Page 2 of 5

3 f) To enable efficient management and support over its lifetime, basic information on all University-owned computers must be recorded at the time of deployment. g) The purchase of an Apple computer can incur a significantly higher total cost of ownership across its lifecycle. Apple computers within the University do not receive the same level of support as the standard Windows desktop service and certain University services cannot be guaranteed to operate with an Apple device. However, it is recognised that certain specialist requirements necessitate the use of Apple operating systems or Apple-specific software for teaching and research and so exceptions can be made with the approval of the School Operations Manager or Head of Professional Service using the process below. Users of Apple computers must be made aware that they will receive a reduced level of service as summarised below and that support is only available for devices running Mac OS X (current release and single previous OS only). h) Computers in good working order must not be replaced before 4 years of operation, provided they remain fit for purpose and continue to meet the IT Services base performance requirements. After 4 years, computers should be assessed for their fitness-for-purpose and support requirements before being replaced or re-allocated. This ensures the University achieves maximum value for its investment and is in line with industry standards. i) Should a member of staff leave the University or organisational unit, their computer will be re-allocated to another member of staff if it is less than 4 years old. j) Schools and Professional Services must maintain suitable budget provision to maintain a replacement cycle for their staff as above. k) Due consideration must be given to physical security of computers, particularly in open-plan offices or computer labs. Advice should be sought from Security on the most effective means of securing computers but anti-theft devices with steel locking bars and drill resistant locks have been shown to be most effective. l) Computers must not be retained by (or sold to) staff or students should they leave the University or if the device reaches end-of-life. This is for reasons of information security, software licence compliance and compliance with regulations on the disposal of electronic equipment. m) Computers must be disposed of in accordance with the EU Waste Electrical and Electronic Equipment Directive (WEEE) regulations via the University's approved contractor. Processes and guidelines for the disposal of electronic equipment are maintained by the University s Sustainability team. 5) Exceptions process The normal process for any computer procurement deviating from the principles above is to gain approval as follows: Page 3 of 5

4 Exceptions must be approved by the School Operations Manager / Head of Professional Service or an individual with their delegated authority. The approval of an exceptional purchase must be logged with the IT Services Service Desk. This will facilitate the analysis and ongoing support of exception requests. Commonly approved exceptions will be incorporated into future versions of the standard specifications. 6) Service Levels The service available is in three, distinct tiers as per Table 1 below. Support for anything beyond what is listed here is provided, where possible, on a best endeavours basis and can be accessed by bringing the device to the PC Clinic during standard opening hours. Additional software may be installed by arrangement with local IT support staff (subject to appropriate licenses being available) in these cases, installation and ongoing support of that software will only be available from local staff at their discretion. Page 4 of 5

5 Windows on approved hardware Normally procured, configured and delivered in 7 working days Same-day repair or replace service for faulty hardware Anti-virus installed and updated daily Security patches and updates applied frequently and without user intervention Over 30 software tools installed by default, including Microsoft Office Professional, Outlook, Cisco Jabber etc Suitable for accessing all University systems Pre-configured printing, network storage ( workspaces ) and wireless access (for laptops) Administrator access to device available on request from off-campus installed Table 1: Service levels by device type Apple Mac (running Mac OS X) Note: Current release and single previous OS only. Delivery time is subject to availability Faulty hardware replaced as per Apple s consumer warranty terms Anti-virus software supplied, updates to be downloaded and installed by users Security patches from Apple to be downloaded and installed by users Self-service printing configuration Self-service storage ( workspaces ) configuration Self-service wireless connection (for laptops and imacs) access via web browser Some University systems may not be compatible - Virtual desktop available as alternative access method No software installed beyond Apple standard from off-campus available but not installed All others (including Linux devices and staff s own computers) from off-campus available but not installed (for Mac, Windows, ios and some versions of Linux/Unix) Wired and wireless connection available but not automatically configured access via web browser Some University systems may not be compatible - Virtual desktop available as alternative access method Page 5 of 5

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

Karen Winter Service Manager Schools and Traded Services 01823 355267 KWinter@somerset.gov.uk

Karen Winter Service Manager Schools and Traded Services 01823 355267 KWinter@somerset.gov.uk Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager

More information

Mobile Device Policy

Mobile Device Policy Mobile Device Policy Purpose of this Document This document describes the policy for the management of mobile devices. This document will be reviewed every 12 months Author: Matt Mason Version: 1.1 Date:

More information

Do you know what makes NetSupport Manager so unique?

Do you know what makes NetSupport Manager so unique? Do you know what makes NetSupport Manager so unique? NetSupport Manager is recognised internationally as the market leading Remote Control solution for Enterprises large and small. Over the last 23 years,

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

IT06 - Information Technology (IT) Hardware and Software Policy

IT06 - Information Technology (IT) Hardware and Software Policy IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton

More information

BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY

BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY Effective Date: January 1, 2012 Prepared by: Information Technology and Services ( ITS ) Policy Number: ITS-01-2012

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

BALTIMORE CITY PUBLIC SCHOOLS (CITY SCHOOLS) 147

BALTIMORE CITY PUBLIC SCHOOLS (CITY SCHOOLS) 147 BOARD PRIORITY 1: City Schools will have quality curricula and instruction that provide rigor, engage students, raise the bar and deliver targeted interventions to increase learning. I. PURPOSE: The focus

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS Division Resources Ref. No. RES-INT-010 Department Information Technology Asset Management

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS Division Resources Ref. No. RES-INT-010 Department Information Technology Asset Management 1. PURPOSE AND SCOPE The purpose of this policy is to define the management of Iinformation Technology (IT) assets of the IT at the Royal Australasian College of Surgeons (the College). 2. KEYWORDS, Assets,

More information

ITIL A guide to service asset and configuration management

ITIL A guide to service asset and configuration management ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing

More information

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us...

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us... 1 A Technician s Perspective Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us... Most people think of classroom

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Wireless Presentation Gateway. User Guide

Wireless Presentation Gateway. User Guide User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants...

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants... Contents Workstation Refresh & Virtual Desktop Infrastructure Program Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2 Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Maximizer CRM 12 Summer 2013 system requirements

Maximizer CRM 12 Summer 2013 system requirements 12 Summer 2013 system requirements A comprehensive look at Maximizer Software s lastest CRM solutions Enterprise and Group Editions A typical Maximizer implementation consists of a server and one or more

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Harry Fike hefike@frostburg.edu. Frostburg State University Office of Information Technology Technical Services

Harry Fike hefike@frostburg.edu. Frostburg State University Office of Information Technology Technical Services Harry Fike hefike@frostburg.edu Frostburg State University Office of Information Technology Technical Services New Technologies Challenges Solutions What we do at FSU Apple has been gaining market share

More information

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.

More information

Designed for Local Government Powered by Microsoft Dynamics

Designed for Local Government Powered by Microsoft Dynamics Designed for Local Government Powered by Microsoft Dynamics CouncilFirst is a Division of Open Systems Technology Pty Ltd (OST ) A Powerful, Flexible Business Solution CouncilFirst delivers a fully integrated

More information

Workstation Management

Workstation Management Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described

More information

Information Services hosted services and costs

Information Services hosted services and costs Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.

More information

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools IT Enterprise Services Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools The freedom and agility which cloud unleashes directly impacts business performance. Cloud productivity

More information

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access. What is VCL? VCL (Virtual Computer Lab) is a service running on servers in IIT s datacenter that enables users to schedule and connect to virtual desktops running specific academic software applications

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

Notebook Computer Framework 2009-2012 (School Notebook) Pricing and Overview March 2012

Notebook Computer Framework 2009-2012 (School Notebook) Pricing and Overview March 2012 Department of Education & Skills National Centre for Technology in Education (NCTE) Notebook Computer Framework 2009-2012 (School Notebook) Pricing and Overview March 2012 The Notebook Framework is an

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Virtual Workplace Agility & reliability for your future workplace Balancing freedom & control Virtual working is essential and you know the virtual workplace is possible.

More information

Florida Department of Education TECHNOLOGY GUIDELINES

Florida Department of Education TECHNOLOGY GUIDELINES Florida Department of Education TECHNOLOGY GUIDELINES The Florida Department of Education (FDOE) is pleased to provide these technology guidelines to inform schools and districts as they make technology

More information

Engage and control Students in the ICT classroom. Provide tools to encourage participation, collaboration and safe use of technology.

Engage and control Students in the ICT classroom. Provide tools to encourage participation, collaboration and safe use of technology. Tools to enhance teaching, keep students on task, encourage continuous assessment and reduce teacher workload. Unique and innovative solution for the provision of MFL teaching without the need for specialist

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

Desktop as a Service Service Definition

Desktop as a Service Service Definition Desktop as a Service Service Definition 2 Table of Contents Purpose of Document... 4 Desktops as a Service (DaaS) Service Description... 4 Technology... 5 Deliver Uncompromised End User Experience... 5

More information

Do I need to install anything on my computer to use the VC?

Do I need to install anything on my computer to use the VC? FAQs How does the Virtual computer work? Essentially, the computer accessing the Virtual computer acts as a wireless mouse and keyboard. The applications themselves are running on IT Sligo servers in a

More information

Mac Managed Platform Service Level Agreement. Oxford University Computing Services Network Systems Management Service

Mac Managed Platform Service Level Agreement. Oxford University Computing Services Network Systems Management Service Mac Managed Platform Service Level Agreement Oxford University Computing Services Network Systems Management Service Version: Release Date: 1.0 09/05/2011 Document Control Authors Wylie Horn, Jon Hutchings,

More information

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing

More information

ITSM & Enterprise Mobility Management

ITSM & Enterprise Mobility Management ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

IT Consulting Services Desktop Support Service Levels are available online. IT Consulting Services Comparison

IT Consulting Services Desktop Support Service Levels are available online. IT Consulting Services Comparison Computing Services - Desktop Support & [Organization] Information Technology (IT) Service Level Agreement for Fiscal Year 2013 This document outlines the services provided by the Desktop Support Program

More information

HERTSMERE BOROUGH COUNCIL REPORT TO EXECUTIVE

HERTSMERE BOROUGH COUNCIL REPORT TO EXECUTIVE HERTSMERE BOROUGH COUNCIL REPORT TO EXECUTIVE Item no: 7.2 Document Reference No: EX/11/45 Date of Meeting / Decision: 20 July 2011 This is not a key decision call-in on the grounds of urgency Urgency:

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Components. Key features

Components. Key features BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from

More information

SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk

SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk 01347 812148 www.softbox.co.uk Contents Page 3 SBL Company Overview 4 SBL in Justice 5 SBL Apple Authorised Reseller 5 SBL

More information

Quick User Guide. The KLZ Home Page www.klz.org.uk

Quick User Guide. The KLZ Home Page www.klz.org.uk Revised June 2014 Secure Online Communication Zone Quick User Guide This quick user guide provides the basic information that is needed for users to get the best experience from using KLZ. It explains

More information

Schools ICT Support Service (SITSS) Service Level Agreement 2014/15

Schools ICT Support Service (SITSS) Service Level Agreement 2014/15 Schools ICT Support Service (SITSS) Service Level Agreement 2014/15 CONTENTS CONTENTS... 2 1 PRINCIPLES OF THE AREEMENT... 3 1.1 Service Desk... 4 1.2 Remote Support... 4 1.3 Training... 5 1.4 Procurement...

More information

1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6

1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6 Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...

More information

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially

More information

Using the Remote Desktop Portal

Using the Remote Desktop Portal Using the Remote Desktop Portal The Remote Desktop Portal The ICT Services team have implemented new software to provide staff greater access to College resources when away from the College. The new software

More information

Introducing Cisco Jabber personal videoconferencing

Introducing Cisco Jabber personal videoconferencing : Introducing Cisco Jabber personal videoconferencing Cisco Jabber is a cloud-based service that allows you to participate in Deakin videoconferences via Virtual Meeting Point (VMP) from wherever you are

More information

UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD)

UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) Purpose of Policy Introduction To establish how SoD faculty, staff and students will use and access the dental school s information

More information

Data Centre. We are XMA. Call 0115 846 4000 Visit www.xma.co.uk Email info@xma.co.uk Follow us @WeareXMA

Data Centre. We are XMA. Call 0115 846 4000 Visit www.xma.co.uk Email info@xma.co.uk Follow us @WeareXMA MANAGE COMPUTE STORAGE AUTOMATE SOFTWARE NETWORKING SERVICES VIRTUALISE Call 0115 846 4000 Visit www.xma.co.uk Email info@xma.co.uk Follow us @WeareXMA XMA Solutions Virtualise Manage Automate The most

More information

Personal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design.

Personal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design. Document Control Document Title Personal Computer Standard Version 1.0 Owner National Infrastructure Group Author Paul McLaren, paul.mclaren@scotland.gsi.gov.uk, 0131 244 2258 Creation date 13 th November

More information

Microsoft Office 365 for Education. Professional services for schools that are looking to adopt Microsoft Office 365.

Microsoft Office 365 for Education. Professional services for schools that are looking to adopt Microsoft Office 365. Microsoft Office 365 for Education. Professional services for schools that are looking to adopt Microsoft Office 365. What is Microsoft Office 365 for Education? Microsoft Office 365 for Education is a

More information

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Mobile Printing for Business Made Easy

Mobile Printing for Business Made Easy Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where

More information

Using the Remote Desktop Portal

Using the Remote Desktop Portal Using the Remote Desktop Portal The Remote Desktop Portal The ICT Services team have implemented new software to provide staff greater access to College resources when away from the College. The new software

More information

Getting Started with a Mac For businesses with a Windows Server

Getting Started with a Mac For businesses with a Windows Server Getting Started with a Mac For businesses with a Windows Server This document, a quick guide designed to help you integrate a Mac into your environment, is geared toward businesses with a Microsoft server

More information

Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing.

Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing. Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing. Microsoft Software Licensing. As a Microsoft Authorised Education Reseller and

More information

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite. Attix5 Pro Overview V7.x An overview of the Attix5 Pro product suite. Copyright notice and proprietary information This document is published by Attix5 or its local affiliated company, without any warranty.

More information

Your IT Helpdesk and On-Site and Remote Support Terms and Conditions. Document Revision 1 Sept 09

Your IT Helpdesk and On-Site and Remote Support Terms and Conditions. Document Revision 1 Sept 09 Your IT Helpdesk and On-Site and Remote Support Terms and Conditions These terms and conditions are in addition to our standard Terms of Business (available at http://www.tripod-it.co.uk) Our company details

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration IT Service Level Agreement (SLA) for users supported by the BEI Pilot Cluster in the departments of Biological Chemistry, Neurobiology, Neurology, and Pharmacology by the Information Technology Center

More information

How To Get Up To Speed In Healthcare It

How To Get Up To Speed In Healthcare It What s New In Healthcare IT And How Do I Get Up To Speed? John Dietle EVP Connecticut Computer Service, Inc. Agenda What s New In Healthcare IT And How Do I Get Up To Speed? 1 Connecticut Computer Service,

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,

More information

SPACE MANAGEMENT POLICY

SPACE MANAGEMENT POLICY SPACE MANAGEMENT POLICY Originated by Assistant Director, Management Services: October 2010 Impact Assessment: 11 November 2010 Recommended by Estates Committee: 1 November 2010 Approved by Council: 22

More information

AzMERIT Secure Browser Installation Manual For Technology Coordinators

AzMERIT Secure Browser Installation Manual For Technology Coordinators AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Parallels The best of both worlds

Parallels The best of both worlds Parallels The best of both worlds Research shows that Mac sales are up 10% year on year while competitors are down -1%. As businesses adopt Mac OS X at an ever-growing rate, legacy software and infrastructure

More information

Internet Guide. Prepared for 55 John Street

Internet Guide. Prepared for 55 John Street Internet Guide Prepared for 55 John Street I. Internet Service How do I connect to the Internet? WiFi (Wireless Connectivity) is available throughout the building. In order to connect, you will need a

More information

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

More information

Tablets in Data Acquisition

Tablets in Data Acquisition Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create

More information

MobileConnect. Getting Started Guide

MobileConnect. Getting Started Guide MobileConnect Getting Started Guide 1 Table of Contents Compatible Device List! 3 Operating Systems, Applications, & Personal Computer Devices:! 3 Mobile Devices & Mobile Operating Systems:! 3 Setting

More information

Purpose. Availability. Program guidelines. Allocation. Equipment selection

Purpose. Availability. Program guidelines. Allocation. Equipment selection University of Illinois at Urbana-Champaign Library Computing Technology Allocation Program (CTAP) Program Guidelines Purpose The work of Library Faculty and Academic Professionals (AP) is increasingly

More information

CA Technologies saves $23 million through greater control of global IT assets

CA Technologies saves $23 million through greater control of global IT assets CUSTOMER SUCCESS STORY AUGUST 2015 CA Technologies saves $23 million through greater control of global IT assets CLIENT PROFILE Industry: Technology Company: CA Technologies Employees: 11,500 Revenue:

More information

1.1.1 Computer Hardware Provision Policy

1.1.1 Computer Hardware Provision Policy 1 ABP IT Operating Policy and Procedures The Faculty has a comprehensive IT Policy and Procedures document which outlines policies and processes for the management and provision of most IT Services 1.

More information

GEM Network Advantages and Disadvantages for Stand-Alone PC

GEM Network Advantages and Disadvantages for Stand-Alone PC Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Hardware and Software Requirements for Sage 50 v15 to v22

Hardware and Software Requirements for Sage 50 v15 to v22 Hardware and Software Requirements for Sage 50 v15 to v22 Sage 50 Accounts v22 Note: The Sage Data Service has the same system requirements as Sage 50 Accounts v22. Note: For more information on support

More information

n2grate Open Positions March 2015

n2grate Open Positions March 2015 n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013

More information

Student Desktop@ Home

Student Desktop@ Home Student Desktop@ Home Full Off Campus Access to your Programs and Files Full Access to the University from Home You can access the University from any computer with an internet connection. This system

More information

Network Security & Connection Policy

Network Security & Connection Policy Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services Document Control Information Status and reason for development Revised to reflect

More information

SOFTWARE LICENSING POLICY

SOFTWARE LICENSING POLICY SOFTWARE LICENSING POLICY Version 12/12/2012 University of Birmingham 2012 David Deighton, IT Services CONTENTS 1. Policy on Software Licensing... 3 1.1 Software Licensing Compliance... 3 1.2 Software

More information

Macs are not directly compatible with Noetix.

Macs are not directly compatible with Noetix. Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information