Corporate ICT Change Management

Size: px
Start display at page:

Download "Corporate ICT Change Management"

Transcription

1 Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced to ensure the controlled, secure and authorised installation, maintenance and upgrade of operating systems, applications software, application systems software and significant hardware and environment components. Table 1 - Document details Publication date February 2011 Review date January 2014 Related legislation/applicable section of legislation Related policies, procedures, guidelines, standards, frameworks Replaces ICT Security Policy February 2011 Policy officer (position) Manager, ICT Assurance Policy officer (phone) Policy sponsor (position) Executive director responsible (position and office) Applies to Key words Status Approved by Assistant Director, ICT Strategy & Relationships Executive Director, Infrastructure All DECD Employees ICT Change Management Approved Executive Director, Infrastructure Approval date February 2011 Version Corporate ICT Change Management February 2011

2 Table 2 - Revision record Date Version Revision description 2 Corporate ICT Change Management February 2011

3 Table of Contents Policy... 1 Corporate ICT Change Management... Error! Bookmark not defined. 1. Title Purpose Scope Policy detail Roles and responsibilities Monitoring, evaluation and review Definitions and abbreviations Supporting documents References...6 Appendix Corporate ICT Change Management February 2011

4 1. Title Corporate ICT Change Management 2. Purpose A formal change management system must be approved, implemented and enforced to ensure the controlled, secure and authorised installation, maintenance and upgrade of operating systems, applications software, application systems software and significant hardware and environment components. 3. Scope All DECD employees. 4. Policy detail General Formal change management procedures must be used to install new or modified operating, application or hardware systems into production and to decommission system components. Changes must be scheduled to minimise disruption to normal business In the event of an emergency a change may not always be scheduled, however procedures will ensure urgent changes remain controlled at all times. (Emergency procedures reflect normal management procedures with allowances for fast tracked solutions.) Documented Procedures Change management procedures must be documented, maintained and managed as formal documents. This documentation will include details including scheduling requirements, interdependencies with other systems, support contacts, restart and recovery procedures, customer notification requirements and any other special instructions. System Changes System changes must be classified against an established set of priorities and defined change categories. Change Authority The owners of the application systems and resources must provide the necessary authority and approval to the custodian of the systems and resources to enable changes to be performed. Change Process The custodian of the application systems and resources can only initiate the change to production on the authority of the owner of the system after the required testing, acceptance and quality assurance 4 Corporate ICT Change Management February 2011

5 approvals are obtained. Appropriate back-out procedures must be established prior to initiation to maintain controlled situations in the event of a change being cancelled. Cooperative Processing Changes must be reviewed and tested to ensure there is no adverse impact on the security or operation of any other infrastructure components or systems. Change Documentation Documentation of the changes applied to equipment, operating systems and information systems must be maintained for production systems and systems under development. The records must include the authorisation documents, library change logs, system logs, and management acknowledgments and approvals as appropriate. Change Review Evidence of the review of changes and the change process must be documented and maintained. Emergency Changes Where emergency changes to production systems and data are required, the event must be recorded and appropriate documentation and approvals obtained as soon as possible after the event. Failures must be investigated, causes identified and logged, and permanent changes implemented to prevent recurrence, in accordance with this policy. 5. Roles and responsibilities Table 2 - Roles and responsibilities Role Authority/responsibility for 6. Monitoring, evaluation and review 5 Corporate ICT Change Management February 2011

6 7. Definitions and abbreviations Table 3 - Definitions and abbreviations Term Meaning 8. Supporting documents The DECD Policy ICT Security is relevant and must be read in conjunction with this policy. 9. References N/A Appendix N/A 6 Corporate ICT Change Management February 2011

Mobile Communication Device

Mobile Communication Device Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Temporary Records Procedure

Temporary Records Procedure Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will

More information

Policies of the University of North Texas Health Science Center

Policies of the University of North Texas Health Science Center Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic

More information

IT Change Management Policy

IT Change Management Policy Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Information Technology Services Core Services SLA

Information Technology Services Core Services SLA Information Technology Services Information Technology Services Core Services SLA This Service Level Agreement defines the levels of service provided by Information Technology Services to Victoria University

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014 Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This

More information

University of Waikato Change Management Process

University of Waikato Change Management Process 1. Overview Information Technology Services and the Faculty and Division ICT staff have adopted the Information Technology Infrastructure Library (ITIL) systems management framework as its model for best

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) (NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies

More information

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author

More information

ITIL applied to Network Operations

ITIL applied to Network Operations ITIL applied to Network Operations ITIL: Information Technology Infrastructure Library A set of specifications to help IT manager and FTE achieve good services delivery to their users ITIL provides a comprehensive

More information

[Type text] SERVICE CATALOGUE

[Type text] SERVICE CATALOGUE [Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service

More information

Policy. Business Continuity. Business Continuity Policy. Ref: FA5.3. North East Scotland College All rights reserved. Review Date: September 2017

Policy. Business Continuity. Business Continuity Policy. Ref: FA5.3. North East Scotland College All rights reserved. Review Date: September 2017 Ref: FA5.3 Business Continuity Policy Review Date: September 2017 North East Scotland College All rights reserved 1.0 Introduction 1.1 The College operates from three permanent main centres owned by the

More information

IT Service Management

IT Service Management RL Consulting People Process Technology Organization Integration IT Service Management Change Management Methods and Implementation Best Practices White Paper Prepared by: Rick Leopoldi June 19, 2002 Change

More information

I.T. Service Management

I.T. Service Management I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased

More information

Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY

Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY Contents ICT CHANGE MANAGEMENT...1 POLICY...1 1. Preamble...3 2. Terms and definitions...3 3. Purpose...4 4. Objective of this Policy...4 5. References

More information

Business Unit CONTINGENCY PLAN

Business Unit CONTINGENCY PLAN Contingency Plan Template Business Unit CONTINGENCY PLAN Version 1.0 (Date submitted) Submitted By: Business Unit Date Version 1.0 Page 1 1 Plan Review and Updates... 3 2 Introduction... 3 2.1 Purpose...

More information

Security Incident Management Process. Prepared by Carl Blackett

Security Incident Management Process. Prepared by Carl Blackett Security Incident Management Prepared by Carl Blackett 19/01/2009 DOCUMENT CONTROL Purpose of document This document describes the Security Incident Management and defines all roles and responsibilities

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY Originator IT Change Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

CCIT Change Management Procedures & Documentation

CCIT Change Management Procedures & Documentation CCIT Change Management Procedures & Documentation 1.0 Introduction A major challenge within any organization is the ability to manage change. This process is even more difficult within an IT organization.

More information

REVIEWED ICT CHANGE MANAGEMENT POLICY

REVIEWED ICT CHANGE MANAGEMENT POLICY LI_M_POPO PROVINCIAL GOVERNMENT ~EP.j8L-C OF SO;_;-H.'\FR1C.... DEPARTMENT OF CO-OPERATIVE GOVERNANCE. HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT CHANGE MANAGEMENT POLICY Version: 2 Table of

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

CDP Support Guide. Support Plans & Services

CDP Support Guide. Support Plans & Services CDP Support Guide Support Plans & Services V10 Date: July 2014 Background... 3 Overview... 3 CDP support team... 3 Prevailing document... 3 Supported products... 4 IBM Cognos... 4 IBM Information Management...

More information

EA-ISP-010 - Architecture Service Planning Policy

EA-ISP-010 - Architecture Service Planning Policy Technology & Information Services EA-ISP-010 - Architecture Service Planning Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 24/06/2015 Document Security Level: PUBLIC Document Version: 1.00

More information

IT BACKUP POLICY. This Policy applies to all University electronic data stored on all IT-managed applications and systems.

IT BACKUP POLICY. This Policy applies to all University electronic data stored on all IT-managed applications and systems. IT BACKUP POLICY PURPOSE Brock University requires its data and systems to be backed up and the backup media (both tape and disk) be stored in a secure manner. This Policy aims to protect data and systems

More information

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015 Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating

More information

BUSINESS CONTINUITY MANAGEMENT POLICY

BUSINESS CONTINUITY MANAGEMENT POLICY BUSINESS CONTINUITY MANAGEMENT POLICY AUTHORISED BY: DATE: Andy Buck Chief Executive March 2011 Ratifying Committee: NHS Rotherham Board Date Agreed: Issue No: NEXT REVIEW DATE: 2013 1 Lead Director John

More information

JOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION

JOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION JOB DESCRIPTION Title ICT Officer Career Group ICT Classification Level 5.1 (18-20) Line Manager Director of e-learning Sub-school / Location Strathalbyn and Murray Bridge Reporting to Director of e-learning

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

IT CHANGE MANAGEMENT POLICY

IT CHANGE MANAGEMENT POLICY IT CHANGE MANAGEMENT POLICY PURPOSE The purpose of the IT Change Management Policy is to manage changes in a planned and predictable manner in order to assign resources, assess risk and minimize any potential

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems

Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as

More information

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES IN CONFIDENCE TABLE OF CONTENTS 1 CONTACT DETAILS 1 1.1 The Client Contract Management

More information

Information Governance Plan

Information Governance Plan Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

Service Level Agreement

Service Level Agreement Between State Agency Here after called "1st Party" And Vendor Here after called "2nd Party" Document Classification: Public Page 1 of 7 Table of Contents Table of Contents... 2 1. SCOPE OF SERVICE... 3

More information

PROCEDURE Health and Safety - Incident Investigation. Number: J 0103 Date Published: 18 March 2015

PROCEDURE Health and Safety - Incident Investigation. Number: J 0103 Date Published: 18 March 2015 1.0 Summary of Changes This is a new procedure which should be read by all members of staff so they are aware of what health and safety incidents can be reported, what the definition of when a person is

More information

Issue and Use of Corporate Credit Cards Policy

Issue and Use of Corporate Credit Cards Policy Issue and Use of Corporate Credit Cards Policy Responsible Directorate Responsible Business Unit/s Responsible Officer Affected Business Unit/s Corporate Services Finance Services Manager Finance Services

More information

1. Introduction. 2. Performance against service levels 1 THE HIGHLAND COUNCIL. Agenda Item. Resources Committee 26 th March 2003 RES/43/03

1. Introduction. 2. Performance against service levels 1 THE HIGHLAND COUNCIL. Agenda Item. Resources Committee 26 th March 2003 RES/43/03 1 THE HIGHLAND COUNCIL Resources Committee 26 th March 2003 Performance report for January / February 2003 Report by the Information Systems Client Manager Agenda Item Report No 18 RES/43/03 Summary This

More information

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services

Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided

More information

ASX SETTLEMENT OPERATING RULES Guidance Note 10

ASX SETTLEMENT OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

CHANGE MANAGEMENT PROCESS

CHANGE MANAGEMENT PROCESS CHANGE MANAGEMENT PROCESS PROCESS ADOPTED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Change Management Process 1. 1. OBJECTIVE The objective of this process is to manage

More information

EDITIONS COMPARISON ICEFLO Editions & Pricing. Date November 2015 Version. v1d2

EDITIONS COMPARISON ICEFLO Editions & Pricing. Date November 2015 Version. v1d2 EDITIONS COMPARISON ICEFLO s & Pricing Date November 2015 Version v1d2 Introduction ICEFLO provides your deployment community with one central place to manage all deployment-related activities. That means

More information

Managing Risk in Procurement Guideline

Managing Risk in Procurement Guideline Guideline DECD 14/10038 Managing Risk in Procurement Guideline Summary The Managing Risk in Procurement Guideline assists in the identification and minimisation of risks involved in the acquisition of

More information

IS INFORMATION SECURITY POLICY

IS INFORMATION SECURITY POLICY IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not

More information

La Trobe University is committed to maintaining a comprehensive and effective Compliance Framework.

La Trobe University is committed to maintaining a comprehensive and effective Compliance Framework. La Trobe University Compliance Framework Introduction The Compliance Framework documents the system and Compliance Process through which La Trobe University can monitor, review and comply with its legislative

More information

SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager

SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director

More information

INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS

INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS Revised: 12/5/2011 Table of Contents Overview... 3 Roles and Responsibilities... 4 Management Process Definition... 6 Management Process

More information

For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis

For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

Information Shield Solution Matrix for CIP Security Standards

Information Shield Solution Matrix for CIP Security Standards Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability

More information

ITIL Example emergency change management procedure

ITIL Example emergency change management procedure ITIL Example emergency change management procedure An example emergency change process diagram Emergency RFC Actually logging of the emergency request for change can all be done retrospectively Emergency

More information

Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers

Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers Standard Operating Procedures (SOP) for: Configuration Management and Change Control SOP Number: DG25 Version Number: 1 Effective Date: 14/07/2014 Review Date: 14/07/2015 Author: Reviewer: Authorisation:

More information

Transition Guidelines: Managing legacy data and information. November 2013 v.1.0

Transition Guidelines: Managing legacy data and information. November 2013 v.1.0 Transition Guidelines: Managing legacy data and information November 2013 v.1.0 Document Control Document history Date Version No. Description Author October 2013 November 2013 0.1 Draft Department of

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic

GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Basic Service. If you require more detailed technical information, please contact

More information

Release: 1. ICAB5230B Maintain custom software

Release: 1. ICAB5230B Maintain custom software Release: 1 ICAB5230B Maintain custom software ICAB5230B Maintain custom software Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required to maintain

More information

An Integrated Operational Risk Management Framework for Power Generation

An Integrated Operational Risk Management Framework for Power Generation An Integrated Operational Risk Management Framework for Power Generation Ir Stephen W.K. Pang Acting Plant Risk Manager Generation Business Group CLP Power Hong Kong Limited Introduction Excellent risk

More information

i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections

i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY

DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY VERSION 1.0 ISSUED JULY 2015 CONTENTS Page CONTENTS VERSION CONTROL FOREWORD i ii iii POLICY 1 Scope 1 Aim and Objectives 1 Methods and Standards 1

More information

Version: 3.0. Effective From: 19/06/2014

Version: 3.0. Effective From: 19/06/2014 Policy No: RM66 Version: 3.0 Name of Policy: Business Continuity Planning Policy Effective From: 19/06/2014 Date Ratified 05/06/2014 Ratified Business Service Development Committee Review Date 01/06/2016

More information