collection, dissemination and security of data. inform the access and utilisation of data within the organisation.
|
|
- Muriel Wells
- 8 years ago
- Views:
Transcription
1 Corporte Policies & Procedures Generl Administrtion Document CPP123 Dt Governnce Policy First Produced: Current Version: Pst Revisions: Review Cycle: Applies From: 17/07/13 17/07/13 Nil 3 yer cycle Immeditely Authoristion: Officer Responsible: Te Kāhui Mnukur Mnger, Governnce & Strtegy 1 Introduction 1.1 Purpose Dt governnce needs to ensure tht systems nd business processes re well mnged nd mintined both t strtegic nd opertionl levels on n ongoing bsis to ensure dt is ccurte nd vilble for business purposes. 1.2 Scope nd Appliction The policy pplies to ll stff of CPIT. It lso pplies to contrctors, consultnts nd visitors engged to work with, or who hve ccess to CPIT informtion. Policies lso pply to students nd ny specific exclusion s for students re identified within the policy. 1.3 Forml Delegtions Te Kāhui Mnukur hs ultimte responsibility for the integrity nd mngement of the institute s core dt. This is delegted to the Dt Governnce Group nd s (who my delegte further to the s) in their respective res of expertise. The Dt Governnce Group (DGG) will undertke those responsibilities defined in its chrter; CPIT Governnce Group, Dt Governnce. The DGG will report to Te Khui Mnukur (TKM). Members of the DGG will be s nd/or s representing the Core Dt resources of the Institute, nd Informtion representtive(s). 1.4 Definitions b c d s: Senior stff members with delegted ccountbility for the collection, dissemintion nd security of dt. Core Dt: The dt tht resides in the dtbses ssocited with the importnt nd business criticl pplictions for the orgnistion. Core dt includes, but is not limited to - shred dt bout mnged entities, interests, finnces, employees, resources, customers, providers, business ffilites, best prctices, nd operting procedures. Dt Clssifictions: The following dt clssifictions hve been estblished to inform the ccess nd utilistion of dt within the orgnistion. Public Dt: Avilble to generl public with no ccess control or identifiction required. Pge 1 of 9
2 e f g h i j k l m n o Student Dt: Dt vilble to students s right of enrolment. This includes generl student dt nd dt of relevnce to the individul student. Institutionl Dt: Proprietry dt, dt for generl dministrtion. Primrily for internl usge, not for student or externl distribution. Protected Dt: Dt to be used only by individuls who require it for their jobs. Dt contining sensitive personl or confidentil informtion, commercilly sensitive informtion or other informtion tht would usully be regrded s sensitive informtion. : An individul who is ultimtely responsible for the definition, mngement, control, integrity or mintennce of Core dt resource. This role will normlly be ssigned to n existing senior user/dministrtor of the system, which produces the dt, who hs good understnding of the dt nd its ppliction. Dt Integrity: Dt tht hs complete or whole structure. All chrcteristics of the dt including business rules, rules for how pieces of dt relte, dtes, definitions nd linege must be correct for dt to be complete. Disster Recovery: the process, policies nd procedures relted to prepring for recovery or continution of technology infrstructure criticl to n orgnistion fter nturl or humn-induced disster. Informtion: dt tht hs been processed into meningful form. Interfces: point of interction between two systems (or pplictions). Met-dt: dt tht describes dt e.g. dt formt, mening, source, ppliction etc. Referentil Integrity: property of dt which, when stisfied, requires every vlue of one ttribute (column) of reltion (tble) to exist s vlue of nother ttribute in different (or the sme) reltion (tble). Repliction: the use of redundnt resources to improve relibility, fult-tolernce, or performnce. This cn refer to both dtbses nd supporting technology e.g. server hrdwre. Relted CPIT Procedures(indicte if ttched to policy or where they cn be found) CPP105 Code of Conduct for ICT Users Relted Legisltion or Other Documenttion Privcy Act 1993 Public Records Act 2005 Relted CPIT Policies CPP105 Acceptble Use nd Conduct for ICT Users CPP109 Disclosing Personl Informtion bout Students nd CPP110 Legisltive Complince CPP114 Records nd Archives CPP121 ICT Security Policy Good Prctice Guidelines(indicte if ttched to policy or where they cn be found) References Notes Pge 2 of 9
3 2 Principles 2.1 All Dt is the Property of the Institution Dt is not "Owned" by ny Individul or Business Unit. Dt (both structured nd unstructured) nd the met-dt bout tht dt re business nd technicl resources owned by the orgnistion. 2.2 Core Dt Must Be Modeled All core dtbses shll be modeled, nmed, nd defined consistently (ccording to stndrds) cross the business divisions of the orgnistion. Every effort must be mde by mngement to shre dt cross divisions nd to void redundncy. s of core dtbses must recognise the informtionl needs of downstrem processes nd business units tht my require sid dt. 2.3 Core Dt Must Be Mintined Close to Source All core dt shll be creted nd mintined s close to the source s fesible ligned to consistent dt input stndrds. Dt qulity stndrds shll be mnged nd pplied ctively to ensure pproved relibility levels of core dt s defined by the Dt Governnce group e.g. compulsory field vlidtion on ll core dt sets. 2.4 Core Dt Must Be Sfe nd Secured Core dt in ll formts shll be sfegurded nd secured bsed on recorded nd pproved requirements nd complince guidelines s per dt clssifiction stndrds. These requirements re to be determined by the dt stewrds nd vlidted by the Mngement Tem. Approprite vilbility, bckups nd disster recovery mesures shll be dministered nd deployed for ll core dtbses. 2.5 Core Dt Must Be Accessible Core dt nd informtion bout tht dt (met-dt) shll be redily ccessible to ll. Core dt will be public except where determined to hve controlled ccess s per dt clssifiction stndrds. When restrictions re mde, dt stewrds re ccountble for defining specific individuls nd levels of ccess privileges tht re to be enbled. 2.6 Met-Dt Will Be Recorded nd Utilised All core informtion system development nd integrtion projects will utilise consistent met-dt method for dt nming, dt modeling, nd logicl nd physicl dtbse design purposes. 2.7 s Will Be Accountble for Core Dt s will be senior stff members with delegted ccountbility for the collection, dissemintion nd security of dt. They will be ccountble for: b c d e f Legisltive complince Dt use Dt qulity Dt security Dt Privcy Chnge mngement 2.8 s Will Be Responsible for Core Dt Individuls recognised s business definers, producers, nd users of core dt will be designted "s". s re those individuls ultimtely responsible for the definition, mngement, control, integrity or mintennce of core dt resource. Dt Pge 3 of 9
4 Stewrds re wre of complince requirements pertining to the dt held (e.g. Privcy Act 1993, Public Records Act 2005, etc) nd wre of their regultory obligtions rising from those regultions. 2.9 s will hve responsibility through their job description. 3 Associted procedures for CPIT Corporte Policy on: Dt Governnce Contents: 3.1 Dt Stndrds And Procedures 3.2 Access to Dt 3.3 Authority over Dt 3.4 Dt Integrity Referentil Integrity b Integrity of Appliction Softwre c Integrity of Content d Integrity of Process 3.5 Interfces 3.6 Migrtion 3.7 Dt Mngement 3.8 Version Control 3.9 Chnge Control 3.10 Repliction 3.11 Bckup, Recovery nd Restore 3.12 Disster Recovery 3.13 Retention requirements 3.14 Destruction protocols 3.15 User Responsibilities 3.16 Skills nd Trining 3.17 Corporte Informtion Systems 3.1 Dt Stndrds And Procedures The following dt stndrds hve been developed for the CPIT environment. It is expected tht these stndrds will provide guideline for ll stff nd vendors when working with CPIT core dt. 3.2 Access to Dt Access to dt is the bility to view, retrieve, lter, or crete dt. The Dt Governnce Group will estblish nd mintin ccess rules for dt nd business documents under their control. Access rules must be bsed on the principle of public nd equitble ccess to informtion unless explicit resons preclude this. Access with the bility to lter or crete dt is likely to be different, nd more restrictive, thn tht for view/retrieve. Where dt is held in multiple physicl dtbses e.g. for nlysis purposes or technicl performnce resons, the Dt Governnce Group will designte the mster source of the dt which will lwys tke precedence should conflict in dt vlues occur. Dt element content nd business documents will be retrievble in formts tht meet open interntionl stndrds. Technology will be supported for future retrievl of dt. Complince with CPIT Access to Dt stndrds is required for ll users. 3.3 Authority over Dt CPIT hs uthority over use of the orgnistion s physicl computer ssets. CPIT is the legl custodin of ll dt tht is collected or generted during the execution of the Institute s business processes. Pge 4 of 9
5 The Chief Executive or delegte is responsible for protecting CPIT dt t the level pproprite for its sensitivity, s per the dt clssifiction stndrds. CPIT dt will only be shred between internl systems or with other orgnistions with mngement pprovl. Complince with CPIT Authority over Dt stndrds is required for ll users. 3.4 Dt Integrity Dt nd business documents will be mnged to preserve nd demonstrte their uthenticity, integrity nd retrievbility to meet business nd sttutory requirements. These procedures cover both the logicl nd physicl integrity of dt nd document stores nd their contents. In order to present consistent informtion both internlly nd externlly, document nd dt stores must be mnged s coherent whole. This mens: All core dt stores re known & documented (s identified by the Dt Governnce Group) Dupliction of content between stores is minimised nd controlled The originl content, context, nd structure of documents is preserved Authorised ctivities re permitted Unuthorised ctivities re prevented Relevnt events re logged s determined by business or legisltive requirements Content is retrievble in usble formt. Referentil Integrity s must ensure tht systems re put in plce to mintin the context of dt elements in dtbse structures. b Integrity of Appliction Softwre The integrity of ny ppliction softwre operting on pproved dt stores will be monitored t pproprite intervls, nd ction tken to repir nd prevent defects. c Integrity of Content Where users enter dt into dt store, vlidtion t the time of input is required wherever prcticl. Processes must be in plce to monitor nd correct errors in the dt nd metdt. Any chnges to the use of dt or metdt fields must be greed with the relevnt nd documented nd effects on downstrem systems tken into ccount. d Integrity of Process 3.5 Interfces CPIT must be ble to demonstrte tht their processes fully cpture required dt elements, tht business rules nd stndrd operting procedures re in plce for their mngement nd tht they hve been implemented. Electronic interfces between systems must use mechnisms bsed on open industry stndrds s specified in the CPIT informtion technology policies nd stndrds. Redundnt or non-stndrd interfces will be phsed out over time. Pge 5 of 9
6 3.6 Migrtion Dt stores will be constituted such tht ll content, structure nd metdt cn be migrted to different environment without loss of integrity. In the event of migrtion or mjor upgrde, migrtion plns will be produced nd require pproprite pprovl. Complince with CPIT Dt Integrity stndrds is required for ll users. 3.7 Dt Mngement s hve responsibility for dt mngement of core dt within institutionl business systems. Metdt will be collected for ll core dtbses nd must be sufficient to describe the document, dtset, or dt store, nd to estblish its vlidity nd relevnce for business or evidentil purposes. Cpture of most metdt for business documents is best undertken t the time they re creted or received, usully by the individul involved. Dt nd business documents will be mnged within defined retention process, s per the forml retention nd disposl schedule for the institute. 3.8 Version Control CPIT will determine business rules for version control of dt elements nd dt sets. Rules will be built into systems or expressed s guidelines for users. 3.9 Chnge Control Chnge control procedures will be pplied to the structure of dt stores nd the business processes tht ffect them, to ensure the contextul integrity of current content nd tht historicl mteril mintins its integrity. This includes being cognisnt of Applictions tht crete or mintin dt nd interfces to downstrem systems Repliction Repliction of dt will be controlled by the s involved nd will only come from prime uthorittive dt sources. All repliction rrngements will be uditble to ensure tht true replic is mde Bckup, Recovery nd Restore CPIT will hve bckup regime for dt stores to insure ginst system filure or humn error. Bckup opertions will be regulrly monitored for completeness nd tested for retrievbility Disster Recovery CPIT will hve fully tested disster recovery pln to reconstitute dt stores to ensure timely re-estblishment of the business Retention requirements CPIT must identify, describe nd comply with their retention nd destruction requirements for dt elements s per legisltive requirements, including the Public Records Act (2005). Pge 6 of 9
7 3.14 Destruction protocols No dt will be destroyed while they re needed to fulfil the sttutory or business requirements of CPIT. Any deletion or destruction process must be secure, deliberte, uthorised nd uditble. Complince with CPIT Dt Mngement stndrds is required for ll users User Responsibilities Users of Institute dt include but re not limited to the following ctegories: b c d e f Institute employees Volunteers Contrctors Vendors Prtners Students Individul Institute Users ply criticl role in ensuring the security of Institute Dt. Ultimtely, only the User cn prevent unuthorized ccess nd ensure responsible use of the dt. Proper use of dt, including ssurnce of security nd privcy, is requirement for ll Institute employees nd should be included in ll Institute greements providing ccess to Institute Dt, nd is condition of enrolment for students. Users re responsible for the following ctions i ii iii iv v Store dt under ppropritely secure conditions for the dt clssifiction level Mke every resonble effort to ensure the pproprite level of dt privcy is mintined Use the dt only for the purpose for which ccess ws grnted Not to shre identities or psswords with other persons Securely dispose of sensitive Institute dt In ny disposl of medi or devices, Users should ensure tht techniques re pplied so tht unuthorized persons cnnot lter ccess sensitive dt. Such techniques include, but re not limited to; ersing dt from flsh/pen drives or hrd drives with specil scrubber' progrms, nd physiclly destroying old medi contining sensitive dt. This role my be conducted by the ICT support tem on behlf of the user. Complince with Institute User Responsibilities stndrds is required for ll users Skills nd Trining will be trined in their responsibilities when working with CPIT dt. These responsibilities will be written or referred to in Job Descriptions nd Performnce Agreements, for stff t ll levels. Pge 7 of 9
8 3.17 Corporte Informtion Systems (s defined by the CPIT Dt Governnce Group) Student Mngement System HR & Pyroll Tlent2 Alesco Finnce System Kyper Asset Mngement BEIMS Lerning Mngement System Moodle Director Corporte Services (Drren Mitchell) Mnger Registry (Lurie Millr) Mrion Pewini Admission/Results Tem Leder Kren Colemn Interntionl Admissions Gel Brrington Curriculum Loding Ktherine Hely Timetbling Officer Authorised stff nd students Director Humn Resources (Ptsy Gibson) Anlyst/Administrtor HRIS (Svetln Sburov) Pyroll All stff vi HRKiosk Director Corporte Services (Drren Mitchell) Mnger Finnce (Dvid Kerby) Dvid Kerby Finnce stff Director Corporte Services (Drren Mitchell) Mnger Fcilities Mngement (Grnt McPhil) Mnger Services (Chris Lws) Fcilities Director Acdemic (Shirley Wilson) Mnger Librry & Lerning (Fion Mcdonld) LTU & Students, Externl collbortors Pge 8 of 9
9 Lerning Object Repository Equell Director Acdemic (Shirley Wilson) Mnger Librry & Lerning (Fion Mcdonld) LTU & Students, Externl collbortors Content Mngement System MySource Mtrix Director Business Development Mnger Mrketing (Lee McNichol) Mrketing (Ntsh Cin) Communictions Exchnge, Lync, Cisco telephony, Zecom Director Corporte Services (Drren Mitchell) Director ICT (Mrk Mrshll) Infrstructure Mnger (Crig Mnson) Contct Center specilist users on Zecom Librry Voyger Progrmme Repository Director Acdemic (Shirley Wilson) Mnger Librry & Lerning (Fion Mcdonld) Librrin Digitl (Tnj Webster) Librry Students Director Acdemic (Shirley Wilson) Mnger Acdemic Evlution (Denise Holling) Acdemic Evlution Unit (Nicol Cmeron, Lynne Hwke) AEU Mrketing Pge 9 of 9
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationa Business Owners: Senior staff members with delegated accountability for the collection, dissemination and security of data.
Corporate Policies & Procedures General Administration Document CPP123 Data Governance Policy First Produced: Current Version: Past Revisions: Review Cycle: Applies From: 17/07/13 17/07/13 Nil 3 year cycle
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationTotal Data Protection for Sensitive Data Wherever It May Flow
Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationFile Storage Guidelines Intended Usage
Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess
More informationSource Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt
More informationl,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -
rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationAssessing authentically in the Graduate Diploma of Education
Assessing uthenticlly in the Grdute Diplom of Eduction Dr Mree DinnThompson Dr Ruth Hickey Dr Michelle Lsen WIL Seminr JCU Nov 12 2009 Key ides plnning process tht embeds uthentic ssessment, workintegrted
More informationPsychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013
Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl
More informationYour duty, however, does not require disclosure of matter:
Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or
More informationRecognition Scheme Forensic Science Content Within Educational Programmes
Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationINJURY MANAGEMENT & REHABILITATION
OBJECTIVES To estblish systemtic pproch to injury mngement nd rehbilittion throughout the City immeditely following work relted illness, injury nd disbility. To estblish tht it is the responsibility of
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationChromebook Parent/Student Information
Chromebook Prent/Student Informtion 1 Receiving Your Chromebook Student Distribution Students will receive their Chromebooks nd cses during school. Students nd prents must sign the School City of Hmmond
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationCurrent Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015
Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationBalanced Scorecard. Linking Strategy to Actions. KPMG Swiss Practice Benchmarking Congress, Bürgenstock May 28 th, 1997, Roger Jaquet
Blnced Scorecrd Linking Strtegy to Actions KPMG Swiss Prctice Benchmrking Congress, Bürgenstock My 28 th, 1997, Roger Jquet Contents ❶ Objectives 1 ❶ Wht s the historicl bckground of the BSC? 2-4 ❶ BSC
More informationAPPROVALS Gorporate Procurement Plan 2010-2011
MAKING WATER WORK APPROVALS Gorporte Procurement Pln 2010-2011 RECOMMENDED BY: Jnet Porchun Mnger Procurement DATE J;,ctt r 2otl RECOMMENDED BY: rte APPROVED BY:./ DATEJI I O/ I2OII SunWter Gorporte Procurement
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationAdditional Protocol to the Convention on Human Rights and Biomedicine concerning Genetic Testing for Health Purposes
Council of Europe Trety Series - No. 203 Additionl Protocol to the Convention on Humn Rights nd Biomedicine concerning Genetic Testing for Helth Purposes Strsourg, 27.XI.2008 2 CETS 203 Humn Rights nd
More informationNote: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014
Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).
More informationYour Image through Client Reporting
Your Imge through Client Reporting Prtnerships: Logits is n escrow gent, prtner of Softwre editors nd users, to design, control nd preserve ccurte deposits of sources. Contct: For ny dditionl informtion
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationCombined Liability Insurance. Information and Communication Technology Proposal form
Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationProgramme Specification
Progrmme Specifiction MA / PG Dip / PG Cert in Interntionl Studies (Interntionl Reltions) MA / PG Dip / PG Cert in Interntionl Studies (Globl Politicl Economy) MA / PG Dip / PG Cert in Interntionl Studies
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationFROM: John Na tmo Audito
COUNTY OF LOS ANGELES DEPARTMENT OF AU DITOR.CONTROLLER KENNETH HAHN HALL OF ADMINISTRATION 5OO WEST TEMPLE STREET, ROOM 525 LOS ANGELES, CALIFORNIA 9OO1 2-3873 PHONE: (213) 974-8301 FAX: (213) 626-5427
More informationAgenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A
Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM
More informationAccording to Webster s, the
dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly
More informationElectrical Engineering
Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,
More informationData quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors
Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationabcdefghijklmnopqrstu
NHS Circulr: PCS(AFC)2008/2 The Scottish Government Helth Workforce Directorte Employment nd Retention Division bcdefghijklmnopqrstu Der Collegue MANAGING SICKNESS ABSENCE Summry 1. This py circulr informs
More informationQUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.
QUESTIONNAIRE A. PERSONAL DETAILS: 1. Your Nme: 2. Age-group: Below 25 yers 26-35 yers 36-45 yers Over 45 yers 3. Gender : Mle Femle 4. Eduction : H.S.C or Below H.S.C. Grdution Post-Grdution Any other
More informationelearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007
elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning
More informationUNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.
UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationIn addition, the following elements form an integral part of the Agency strike prevention plan:
UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes
More informationThe Morgan Stanley FTSE Protected Growth Plan. Investor Pack
The Morgn Stnley FTSE Protected Growth Pln Investor Pck The Morgn Stnley FTSE Protected Growth Pln Introduction The current investment environment with its extreme levels of uncertinty nd voltility, mkes
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationPETER M. ROSS 22 Four Oaks Crescent London, Ontario N6J 4B7 Telephone: 51 9-661-4005/Facsimile: 5 19-471-0085 Email: pmross@,uwo.
PETER M. ROSS 22 Four Oks Crescent London, Ontrio N6J 4B7 Telephone: 51 9-661-4005/Fcsimile: 5 19-471-0085 Emil: pmross@,uwo.c April 2lS', 2005 Corportion of the City of London City Clerk's Office Room
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details
With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing
More informationA guide to the common curriculum
Civil Service Lerning A guide to the common curriculum Version 1d Sept 2011 Contents ii 1 Introduction 4 Lerning opportunities mp 5 Overview of topics 6 The Common Curriculum by Level 8 Content by level
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHow To Be A Successful Mobile Ppliction And Regression Tester
July/August 2009 Volume 3 SOFTWARE This issue of Softwre Testing delves into mobile ppliction nd regression testing. HOTSPOTS 1 Mobile pplictions nd regression testing p WANT JOB SECURITY? This issue of
More informationHealth Information Systems: evaluation and performance of a Help Desk
536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the
More informationIndustrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen
Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationTHE FOLLOWING QUESTIONS WERE ASKED DURING THE DISASTER APPLICATION WORKSHOP OR IMMEDIATELY THEREAFTER.
WORKSHOP UESTIONS THE FOLLOWING UESTIONS WERE SKED DURING THE DISSTER PPLICTION WORKSHOP OR IMMEDITELY THEREFTER. GENERL INFORMTION HOW WILL DC DETERMINE THT PROJECT IS RELTED TO HURRICNE DMGE? BY SUBMITTING
More informationPre-Approval Application
Pre-Approvl Appliction In tody s rel estte mrket, Pre-Approved mortgge provides you the buyer with powerful tool in the home purchse process! Once you hve received your Pre-Approvl, you cn shop for your
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSTATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services
Dtes of Review: FY '09 Evluttor(s): S. Crpenter DESK REVIEW: Accredittion: Acredittion is no longer required by the stte contrct. Significnt Events from the Agency: Developomentl Disbilities Progrm Comprehensive
More informationBusiness Continuity Planning
Business Continuity Plnning A Stte of the Art Dt Bckup nd Disster Recovery Solution tht bullet proofs your dt. TechAdvisory.org SME Reports sponsored by Highlights of the Service: A complete solution tht
More informationHow To Find Out What A Librry Is Like
Survey of Web Developers in Acdemic Librries by Ruth Sr Connell Avilble online 8 Februry 2008 A survey ws sent to librry Web designers from rndomly selected institutions to determine the bckground, tools,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More information2001 Attachment Sequence No. 118
Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished
More informationUnderstanding Cloud Accounting and QuickBooks Online
Understnding Cloud Accounting nd QuickBooks Online This guide is intended to provide comprehensive look t the prcticl benefits of working in the cloud, nd how QuickBooks Online cn help your business chieve
More informationTeen Rescue Foundation
Teen Rescue Foundtion Trust Deed Contents 1 Nme 2 2 Definitions nd interprettion 2 2.1 Definitions... 2 2.2 Interprettion... 4 2.3 Hedings... 5 3 Declrtion of trust 5 4 Trust Purpose 5 4.1 Pyment nd ppliction
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationOffice of Student Financial Aid Haven-Warren Room 210
Office of Student Finncil Aid Hven-Wrren Room 210 Division of Enrollment Services & Student Affirs Phone: (404) 880-8992 FEDERAL WORK-STUDY PROGRAM HANDBOOK Revision Approved: Complince Committee Dte Februry
More informationQuality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2
Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution
More informationFDIC Study of Bank Overdraft Programs
FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on
More informationLong Term Financial Planning
Long Term Finncil Plnning Overview of New Pltform City of Knss City, Missouri 2013 2018 Long term finncil plnning combines finncil forecsting with finncil strtegizing to identify future chllenges nd opportunities
More informationCOMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials
COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,
More informationVoluntary Prekindergarten Parent Handbook
Voluntry Prekindergrten Prent Hndbook Wht is Voluntry Prekindergrten (VPK)? Voluntry Prekindergrten (VPK) is legisltively mndted progrm designed to prepre every four-yer-old in Florid for kindergrten nd
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationPROPERTY AND CASUALTY INSURANCE. Effects of the Nonadmitted and Reinsurance Reform Act of 2010
United Sttes Government Accountbility Office Report to Congressionl Committees Jnury 2014 PROPERTY AND CASUALTY INSURANCE Effects of the Nondmitted nd Reinsurnce Reform Act of 2010 GAO-14-136 Jnury 2014
More information2 Workload and duration of the Program 3 Courses 4 Types of course units and number of participants
The English version of the consolidted curriculum for the "Bchelor Progrm in Mngement nd Economics" is not leglly inding nd is for informtionl purposes only. The leglly inding text which regultes the different
More informationProtection of Critical Information Infrastructure in Korea
Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement
More informationAcademic Regulations 2003-04. Academic Regulations. January 2004. Page 1 of 51
Acdemic Regultions Jnury 2004 Pge 1 of 51 ACADEMIC REGULATIONS OF THE UNIVERSITY 2004 The Acdemic Regultions, herefter referred to s the Regultions, of the University provide the frmework of principles
More informationInformation and Software Technology
Informtion nd Softwre Technology 53 (2011) 1199 1208 Contents lists vilble t ScienceDirect Informtion nd Softwre Technology journl homepge: www.elsevier.com/locte/infsof Determinnts of softwre qulity in
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationUnderstanding Life Cycle Costs How a Northern Pump Saves You Money
Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle
More informationCecilia K.C. Fung. Department of Applied Science Institute of Vocational Education Hong Kong 1.0 ABSTRACT
An Overview of Occuptionl Sfety nd Helth (OHS) Eduction in Hong Kong: Shll OHS Trining Course Compete or Compenste Ech Other in Supporting Legisltion Cecili K.C. Fung Deprtment of Applied Science Institute
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationNOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1
Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY
More informationSan Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -
A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework
More informationSavvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery
Svvis IT Infrstructure Svvis SS Infrstructure Solutions Enterprise-clss Resources for SS Delivery Softwre-s--Service (SS) Cretes New Opportunities Originlly ppeling to mostly smller businesses, SS is now
More informationer unterwegs Kommunikation Willkommen Nachba
www.wohnprtner-wien.t Contct Informtion: wohnprtner Guglgsse 7-9 1030 Vienn, Austri Phone: +43-1-24 503-25956 Fx: +43-1-24 503-25993 Emil: office@wohnprtner-wien.t wohnprtner together for good neighbourhood
More informationTemplate convertible loan agreement. User notes
Templte convertile lon greement User notes This is simple convertile lon greement intended to e used when shreholder lends money to compny, generlly s form of ridging finnce until n expected event tkes
More informationNorth American Logistics Services
North Americn Logistics Services Excellence in Logistics Services Business Profile Address : 7550 W 2 nd CT Hileh, FL 33014 Toll Free: 866.804.6287 Locl: 305.455.0640 Fcsimile: 786.472.6862 Website: Emil:
More information