Corporate ICT Change Management
|
|
|
- Samuel Day
- 10 years ago
- Views:
Transcription
1 Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced to ensure the controlled, secure and authorised installation, maintenance and upgrade of operating systems, applications software, application systems software and significant hardware and environment components. Table 1 - Document details Publication date February 2011 Review date January 2014 Related legislation/applicable section of legislation Related policies, procedures, guidelines, standards, frameworks Replaces ICT Security Policy February 2011 Policy officer (position) Manager, ICT Assurance Policy officer (phone) Policy sponsor (position) Executive director responsible (position and office) Applies to Key words Status Approved by Assistant Director, ICT Strategy & Relationships Executive Director, Infrastructure All DECD Employees ICT Change Management Approved Executive Director, Infrastructure Approval date February 2011 Version Corporate ICT Change Management February 2011
2 Table 2 - Revision record Date Version Revision description 2 Corporate ICT Change Management February 2011
3 Table of Contents Policy... 1 Corporate ICT Change Management... Error! Bookmark not defined. 1. Title Purpose Scope Policy detail Roles and responsibilities Monitoring, evaluation and review Definitions and abbreviations Supporting documents References...6 Appendix Corporate ICT Change Management February 2011
4 1. Title Corporate ICT Change Management 2. Purpose A formal change management system must be approved, implemented and enforced to ensure the controlled, secure and authorised installation, maintenance and upgrade of operating systems, applications software, application systems software and significant hardware and environment components. 3. Scope All DECD employees. 4. Policy detail General Formal change management procedures must be used to install new or modified operating, application or hardware systems into production and to decommission system components. Changes must be scheduled to minimise disruption to normal business In the event of an emergency a change may not always be scheduled, however procedures will ensure urgent changes remain controlled at all times. (Emergency procedures reflect normal management procedures with allowances for fast tracked solutions.) Documented Procedures Change management procedures must be documented, maintained and managed as formal documents. This documentation will include details including scheduling requirements, interdependencies with other systems, support contacts, restart and recovery procedures, customer notification requirements and any other special instructions. System Changes System changes must be classified against an established set of priorities and defined change categories. Change Authority The owners of the application systems and resources must provide the necessary authority and approval to the custodian of the systems and resources to enable changes to be performed. Change Process The custodian of the application systems and resources can only initiate the change to production on the authority of the owner of the system after the required testing, acceptance and quality assurance 4 Corporate ICT Change Management February 2011
5 approvals are obtained. Appropriate back-out procedures must be established prior to initiation to maintain controlled situations in the event of a change being cancelled. Cooperative Processing Changes must be reviewed and tested to ensure there is no adverse impact on the security or operation of any other infrastructure components or systems. Change Documentation Documentation of the changes applied to equipment, operating systems and information systems must be maintained for production systems and systems under development. The records must include the authorisation documents, library change logs, system logs, and management acknowledgments and approvals as appropriate. Change Review Evidence of the review of changes and the change process must be documented and maintained. Emergency Changes Where emergency changes to production systems and data are required, the event must be recorded and appropriate documentation and approvals obtained as soon as possible after the event. Failures must be investigated, causes identified and logged, and permanent changes implemented to prevent recurrence, in accordance with this policy. 5. Roles and responsibilities Table 2 - Roles and responsibilities Role Authority/responsibility for 6. Monitoring, evaluation and review 5 Corporate ICT Change Management February 2011
6 7. Definitions and abbreviations Table 3 - Definitions and abbreviations Term Meaning 8. Supporting documents The DECD Policy ICT Security is relevant and must be read in conjunction with this policy. 9. References N/A Appendix N/A 6 Corporate ICT Change Management February 2011
Mobile Communication Device
Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Temporary Records Procedure
Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will
Policies of the University of North Texas Health Science Center
Policies of the University of North Texas Health Science Center 14.650 UNT Health IT Change Policy Chapter 14 UNT Health Policy Statement. It is the standard operating policy of UNT Health, UNTHSC Academic
IT Change Management Policy
Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Information Technology Services Core Services SLA
Information Technology Services Information Technology Services Core Services SLA This Service Level Agreement defines the levels of service provided by Information Technology Services to Victoria University
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit
Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This
University of Waikato Change Management Process
1. Overview Information Technology Services and the Faculty and Division ICT staff have adopted the Information Technology Infrastructure Library (ITIL) systems management framework as its model for best
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author
ITIL applied to Network Operations
ITIL applied to Network Operations ITIL: Information Technology Infrastructure Library A set of specifications to help IT manager and FTE achieve good services delivery to their users ITIL provides a comprehensive
[Type text] SERVICE CATALOGUE
[Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service
Policy. Business Continuity. Business Continuity Policy. Ref: FA5.3. North East Scotland College All rights reserved. Review Date: September 2017
Ref: FA5.3 Business Continuity Policy Review Date: September 2017 North East Scotland College All rights reserved 1.0 Introduction 1.1 The College operates from three permanent main centres owned by the
IT Service Management
RL Consulting People Process Technology Organization Integration IT Service Management Change Management Methods and Implementation Best Practices White Paper Prepared by: Rick Leopoldi June 19, 2002 Change
I.T. Service Management
I.T. Service Management The ITIL approach to service delivery Gerald O Sullivan Human Sciences Research Council egovernment challenges Measurable egovernment value Lowering service delivery costs Increased
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY Contents ICT CHANGE MANAGEMENT...1 POLICY...1 1. Preamble...3 2. Terms and definitions...3 3. Purpose...4 4. Objective of this Policy...4 5. References
Business Unit CONTINGENCY PLAN
Contingency Plan Template Business Unit CONTINGENCY PLAN Version 1.0 (Date submitted) Submitted By: Business Unit Date Version 1.0 Page 1 1 Plan Review and Updates... 3 2 Introduction... 3 2.1 Purpose...
Security Incident Management Process. Prepared by Carl Blackett
Security Incident Management Prepared by Carl Blackett 19/01/2009 DOCUMENT CONTROL Purpose of document This document describes the Security Incident Management and defines all roles and responsibilities
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY Originator IT Change Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
CCIT Change Management Procedures & Documentation
CCIT Change Management Procedures & Documentation 1.0 Introduction A major challenge within any organization is the ability to manage change. This process is even more difficult within an IT organization.
REVIEWED ICT CHANGE MANAGEMENT POLICY
LI_M_POPO PROVINCIAL GOVERNMENT ~EP.j8L-C OF SO;_;-H.'\FR1C.... DEPARTMENT OF CO-OPERATIVE GOVERNANCE. HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT CHANGE MANAGEMENT POLICY Version: 2 Table of
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
CDP Support Guide. Support Plans & Services
CDP Support Guide Support Plans & Services V10 Date: July 2014 Background... 3 Overview... 3 CDP support team... 3 Prevailing document... 3 Supported products... 4 IBM Cognos... 4 IBM Information Management...
EA-ISP-010 - Architecture Service Planning Policy
Technology & Information Services EA-ISP-010 - Architecture Service Planning Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 24/06/2015 Document Security Level: PUBLIC Document Version: 1.00
IT BACKUP POLICY. This Policy applies to all University electronic data stored on all IT-managed applications and systems.
IT BACKUP POLICY PURPOSE Brock University requires its data and systems to be backed up and the backup media (both tape and disk) be stored in a secure manner. This Policy aims to protect data and systems
Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015
Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating
BUSINESS CONTINUITY MANAGEMENT POLICY
BUSINESS CONTINUITY MANAGEMENT POLICY AUTHORISED BY: DATE: Andy Buck Chief Executive March 2011 Ratifying Committee: NHS Rotherham Board Date Agreed: Issue No: NEXT REVIEW DATE: 2013 1 Lead Director John
JOB DESCRIPTION. Director of e-learning. Strathalbyn and Murray Bridge PURPOSE OF THE POSITION
JOB DESCRIPTION Title ICT Officer Career Group ICT Classification Level 5.1 (18-20) Line Manager Director of e-learning Sub-school / Location Strathalbyn and Murray Bridge Reporting to Director of e-learning
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
IT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY PURPOSE The purpose of the IT Change Management Policy is to manage changes in a planned and predictable manner in order to assign resources, assess risk and minimize any potential
DBC 999 Incident Reporting Procedure
DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES
OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES IN CONFIDENCE TABLE OF CONTENTS 1 CONTACT DETAILS 1 1.1 The Client Contract Management
Information Governance Plan
Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Service Level Agreement
Between State Agency Here after called "1st Party" And Vendor Here after called "2nd Party" Document Classification: Public Page 1 of 7 Table of Contents Table of Contents... 2 1. SCOPE OF SERVICE... 3
PROCEDURE Health and Safety - Incident Investigation. Number: J 0103 Date Published: 18 March 2015
1.0 Summary of Changes This is a new procedure which should be read by all members of staff so they are aware of what health and safety incidents can be reported, what the definition of when a person is
Issue and Use of Corporate Credit Cards Policy
Issue and Use of Corporate Credit Cards Policy Responsible Directorate Responsible Business Unit/s Responsible Officer Affected Business Unit/s Corporate Services Finance Services Manager Finance Services
1. Introduction. 2. Performance against service levels 1 THE HIGHLAND COUNCIL. Agenda Item. Resources Committee 26 th March 2003 RES/43/03
1 THE HIGHLAND COUNCIL Resources Committee 26 th March 2003 Performance report for January / February 2003 Report by the Information Systems Client Manager Agenda Item Report No 18 RES/43/03 Summary This
Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services
Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided
ASX SETTLEMENT OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
CHANGE MANAGEMENT PROCESS
CHANGE MANAGEMENT PROCESS PROCESS ADOPTED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Change Management Process 1. 1. OBJECTIVE The objective of this process is to manage
EDITIONS COMPARISON ICEFLO Editions & Pricing. Date November 2015 Version. v1d2
EDITIONS COMPARISON ICEFLO s & Pricing Date November 2015 Version v1d2 Introduction ICEFLO provides your deployment community with one central place to manage all deployment-related activities. That means
Managing Risk in Procurement Guideline
Guideline DECD 14/10038 Managing Risk in Procurement Guideline Summary The Managing Risk in Procurement Guideline assists in the identification and minimisation of risks involved in the acquisition of
IS INFORMATION SECURITY POLICY
IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
Business Continuity Management
Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not
La Trobe University is committed to maintaining a comprehensive and effective Compliance Framework.
La Trobe University Compliance Framework Introduction The Compliance Framework documents the system and Compliance Process through which La Trobe University can monitor, review and comply with its legislative
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS
INFORMATION TECHNOLOGY SERVICES IT CHANGE MANAGEMENT POLICY & PROCESS Revised: 12/5/2011 Table of Contents Overview... 3 Roles and Responsibilities... 4 Management Process Definition... 6 Management Process
For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
ITIL Example emergency change management procedure
ITIL Example emergency change management procedure An example emergency change process diagram Emergency RFC Actually logging of the emergency request for change can all be done retrospectively Emergency
Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers
Standard Operating Procedures (SOP) for: Configuration Management and Change Control SOP Number: DG25 Version Number: 1 Effective Date: 14/07/2014 Review Date: 14/07/2015 Author: Reviewer: Authorisation:
Transition Guidelines: Managing legacy data and information. November 2013 v.1.0
Transition Guidelines: Managing legacy data and information November 2013 v.1.0 Document Control Document history Date Version No. Description Author October 2013 November 2013 0.1 Draft Department of
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic
GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Basic Service. If you require more detailed technical information, please contact
Release: 1. ICAB5230B Maintain custom software
Release: 1 ICAB5230B Maintain custom software ICAB5230B Maintain custom software Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required to maintain
An Integrated Operational Risk Management Framework for Power Generation
An Integrated Operational Risk Management Framework for Power Generation Ir Stephen W.K. Pang Acting Plant Risk Manager Generation Business Group CLP Power Hong Kong Limited Introduction Excellent risk
i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections
Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY VERSION 1.0 ISSUED JULY 2015 CONTENTS Page CONTENTS VERSION CONTROL FOREWORD i ii iii POLICY 1 Scope 1 Aim and Objectives 1 Methods and Standards 1
Version: 3.0. Effective From: 19/06/2014
Policy No: RM66 Version: 3.0 Name of Policy: Business Continuity Planning Policy Effective From: 19/06/2014 Date Ratified 05/06/2014 Ratified Business Service Development Committee Review Date 01/06/2016
