Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet
|
|
|
- Gerald Reynard Simpson
- 10 years ago
- Views:
Transcription
1 Management and Use of Information & Information Technology (I&IT) Directive Management Board of Cabinet February 28, 2014
2 TABLE OF CONTENTS PURPOSE... 1 APPLICATION AND SCOPE... 1 PRINCIPLES... 1 ENABLE PUBLIC POLICY DELIVERY THROUGH THE USE OF INFORMATION AND INFORMATION TECHNOLOGY... 1 ENSURE PRUDENT INVESTMENT IN INFORMATION AND INFORMATION TECHNOLOGY TO SUPPORT BUSINESS ENDS... 2 MANAGE RISKS ASSOCIATED WITH THE I&IT PORTFOLIO... 2 MANDATORY REQUIREMENTS Governance Infrastructure Service Management I&IT Solution Choices Enterprise Architecture and Standards Management of I&IT Assets Project Management Information Management I&IT Security Identity, Authentication and Authorization Risk Management... 7 RESPONSIBILITIES... 9 MANAGEMENT BOARD OF CABINET (MBC)... 9 MINISTER OF GOVERNMENT SERVICES (MINISTER)... 9 INFORMATION AND INFORMATION TECHNOLOGY DEPUTIES COMMITTEE (IITDC)... 9 INFORMATION AND INFORMATION TECHNOLOGY PROJECT APPROVAL COMMITTEE (ITPAC). 9 DEPUTY HEADS (DEPUTY MINISTER OR EQUIVALENT AND AGENCY HEADS)... 9 CHIEF ADMINISTRATIVE OFFICERS I&IT ORGANIZATION CORPORATE ARCHITECTURE REVIEW BOARD (ARB) POLICY MANAGEMENT AUTHORITY (PMA) INTERNAL AUDIT DIVISION PROGRAM MANAGERS ALL OPS AND APPLICABLE AGENCY STAFF APPENDIX A: DEFINITIONS... 13
3 PURPOSE The purpose of this Directive is to establish policy and control parameters for the management and use of information and information technology (I&IT) in the Ontario Public Service (OPS). This Directive is supported by a policy framework that elaborates expectations pursuant to it. Compliance with this Directive and the supporting I&IT policy framework will enable more efficient operations and improved delivery of government programs. APPLICATION AND SCOPE This Directive applies in its entirety to all ministries. All Advisory and Adjudicative agencies are subject to this Directive. If an agency, as defined under the Agency Establishment and Accountability Directive, is receiving I&IT services or products from the OPS, a list of these services and products, as well as the corresponding application of this Directive, in whole or in part, will be attached as a schedule to the Memorandum of Understanding with the agency concerned. Ministries or agencies seeking exemptions from the mandatory requirements of the Management and Use of I&IT Directive must receive prior Management Board of Cabinet approval. PRINCIPLES The management of information and information technology in the OPS is governed by the following principles: Enable public policy delivery through the use of information and information technology a) The I&IT Organization is a strategic partner and service provider to business areas across the OPS in supporting government priorities and delivering government information and services to the public. b) The I&IT Organization will be accountable for evolving with technology to provide creative and innovative solutions in order to meet existing and emerging citizen and customer expectations. c) The I&IT Organization will be accountable for enabling collaboration, sharing, distribution and efficient and timely access to data, information and services. MANAGEMENT AND USE OF I&IT DIRECTIVE 1
4 Ensure prudent investment in information and information technology to support business ends d) Information and information technology are assets that must be managed strategically, cost-effectively and transparently by the I&IT Organization to support public accountability and prudent use of public funds, including exploring strategic opportunities to partner with the broader public sector and other jurisdictions. e) Collaboration between I&IT and business areas must be transparent, with active governance processes that support strategic and timely decision-making. f) The I&IT Organization will be accountable for standardizing the OPS technology environment and maximize re-use of existing I&IT solutions, where appropriate, in order to simplify user experience, reduce duplication, maximize efficiencies, and reduce lifecycle costs. Manage risks associated with the I&IT portfolio g) Government information, systems and resources must have integrity, and be protected and secure. h) I&IT projects must achieve clear deliverables, add value to the OPS, be completed on time and within budget, and serve a clear business or strategic need. MANDATORY REQUIREMENTS 1. Governance Ministries must: 1.1 Consult with their assigned I&IT Cluster when developing and/or updating Memoranda of Understanding with agencies. The I&IT Organization must: 1.2 Establish appropriate I&IT governance bodies in accordance with corporate governance frameworks. Ministries, applicable agencies, and the I&IT Organization must: 1.3 Participate as appropriate in, and comply with decisions of, cluster and corporate I&IT governance bodies. MANAGEMENT AND USE OF I&IT DIRECTIVE 2
5 2. Infrastructure Ministries, applicable agencies and the I&IT Organization must: 2.1 Use OPS I&IT infrastructure services; and 2.2 Migrate to supportable infrastructure within a timeframe acceptable to the Corporate Chief Information Officer (CCIO). The I&IT Organization must: 2.3 Provide I&IT infrastructure services that are cost-competitive for the OPS. 3. Service Management Ministries must: 3.1 Acquire, develop or procure 1 all I&IT services and products from or through the I&IT Organization. I&IT services are defined in the I&IT Service Catalogue or designated as a Mandatory Central Common Service supplied by the I&IT Organization per the Procurement Directive. Applicable agencies must: 3.2 Use the I&IT services that are specified to apply to them in their Memoranda of Understanding, as defined in the I&IT Service Catalogue. Ministries and the I&IT Organization must: 3.3 Proactively work to identify service needs and assess opportunities for new I&IT services. The I&IT Organization must: 3.4 Provide I&IT services for the OPS; 3.5 Define I&IT services in the I&IT Service Catalogue; 3.6 Design I&IT services in consultation with clients to meet their needs and that are supported by transparent and predictable billing arrangements; 3.7 Ensure that I&IT services are subject to performance measurement and management and are periodically amended to ensure responsiveness to client needs; and 3.8 Manage assets and information that support I&IT service delivery effectively, efficiently, securely and strategically. 1 Refer to the Procurement Directive for procurement requirements. MANAGEMENT AND USE OF I&IT DIRECTIVE 3
6 4. I&IT Solution Choices Ministries and applicable agencies must: 4.1 Re-use existing I&IT solutions that are available and recommended by their I&IT Cluster, where appropriate and feasible. Ministries and the I&IT Organization must: 4.2 Collaborate on I&IT solutions that support the OPS interactions with the public, including internet channels and the use of social media. The I&IT Organization must: 4.3 Develop or approve I&IT solutions, including mobile applications, that are run on the OPS I&IT infrastructure, in accordance with applicable policies; 4.4 Design or acquire I&IT solutions in consultation with clients to align with OPS strategies and priorities and meet clients needs and input; 4.5 Support re-use of existing I&IT solutions through identification, selection, management, promotion, and governance of I&IT solutions; 4.6 Ensure that all new applications enable the sharing of machine-readable data where appropriate and in accordance with applicable policies and standards; and 4.7 Manage Government of Ontario web presence (both internet and intranet) in accordance with applicable policies, standards, and guidelines. 5. Enterprise Architecture and Standards Ministries and applicable agencies, supported by the I&IT Organization, must: 5.1 Develop and maintain Business Architecture for their I&IT projects and ensure compliance with applicable OPS directives and policies in this architecture. Ministries, applicable agencies, and the I&IT Organization must: 5.2 Participate in the architecture governance process for their I&IT projects at both cluster and corporate levels; 5.3 Adhere to Government of Ontario Information Technology Standards (GO-ITS); and 5.4 Participate in and ensure Architecture Review Board review of all cross-cluster and enterprise-wide projects, common infrastructure projects, projects which have an extensive or unique impact on the business and technology environment, and any other projects as identified by the CCIO, by Management Board of Cabinet Support Branch, or by I&IT Strategy and Cyber Security Division, Ministry of Government Services, or a cluster CIO. MANAGEMENT AND USE OF I&IT DIRECTIVE 4
7 The I&IT Organization must: 5.5 Establish Enterprise Architecture and architecture policies and standards, and govern appropriate execution of Enterprise Architecture; and 5.6 Establish Government of Ontario Information Technology Standards (GO-ITS) and govern their use. 6. Management of I&IT Assets Ministries, applicable agencies and the I&IT Organization must: 6.1 Manage the portfolio of I&IT assets that they own using approved I&IT asset management policies, standards and approaches, including but not limited to: a. tracking I&IT assets and maintaining accurate inventories and performance information; b. proactively identifying the extent to which their remaining life meets required performance (i.e. technical and business needs); c. recommending expenditure plans to optimize performance and decrease portfolio risks through asset renewal and/or decommissioning, including the identification of priority initiatives; and d. capitalizing investments per the Ministry of Finance Tangible Capital Asset Accounting Policy. 6.2 Report on the infrastructure and business application assets that they own through the reporting process and tools developed by the CCIO, to support cluster and OPS-wide asset management reporting and investment portfolio recommendations; and 6.3 Safeguard OPS I&IT assets that are in their custody, and provide information on the movement of assets in their custody to the asset owner to support tracking and reporting. The I&IT Organization must: 6.4 Provide cluster and OPS-wide I&IT asset management portfolio reporting and expenditure plan recommendations, including the identification of OPS-wide priority asset management initiatives and OPS-wide strategies and tools; and 6.5 Establish I&IT asset management policies and standards and institute appropriate governance to ensure their implementation. 7. Project Management Ministries, applicable agencies, and the I&IT Organization must: 7.1 Manage I&IT projects and project portfolios in accordance with corporate OPS-wide project management methodologies and frameworks 2 ; 2 OPS Integrated Project Management Framework and Methodology, and Project Portfolio Management Framework. MANAGEMENT AND USE OF I&IT DIRECTIVE 5
8 7.2 Ensure that I&IT projects proceed through a project review and decision process at identified project lifecycle transitions, in accordance with the Policy on the I&IT Project Gateway Process. The Policy takes precedence over the corporate project management methodologies and frameworks in the event of a conflict; 7.3 Manage I&IT projects in an integrated fashion 3 ; 7.4 Report on I&IT projects and project portfolios through a reporting process and tool approved by the CCIO. Local applications for reporting on projects may be used until decommissioned; and 7.5 Report to Management Board of Cabinet on major I&IT projects through the corporate quarterly Major I&IT Projects Reporting process. 8. Information Management Ministries, applicable agencies and the I&IT Organization must: 8.1 Manage their information in accordance with corporate policy, standards, guidelines, and best practices; 8.2 Deliver training on information management that is specific to ministry or agency needs; 8.3 Apply records schedules approved by the Archivist of Ontario to information holdings; and 8.4 Provide information to clusters for the purpose of developing annual cluster-level information management plans. The I&IT Organization must: 8.5 Develop information management policies, standards, guidelines and best practices; 8.6 Support compliance with corporate policies, standards, guidelines and best practices on information management; 8.7 Develop annual information management plans; 8.8 Deliver or support delivery of information management training in ministries; and 8.9 Support planning and implementation of enterprise content management by ministries and provide ongoing support. 3 The OPS Unified I&IT Project Methodology (UPM) identifies all the activities to be considered, and provides an integrated phased methodology guideline for managing I&IT projects in the OPS. MANAGEMENT AND USE OF I&IT DIRECTIVE 6
9 9. I&IT Security Ministries, applicable agencies, and the I&IT Organization must: 9.1 Adequately safeguard information according to its sensitivity level and take steps to ensure that the confidentiality, availability and integrity requirements of all information, systems and resources are met; 9.2 Implement security controls appropriate to levels of risk in accordance with security policy or security testing and evaluation recommendations to minimize risk or mitigate vulnerabilities to information, systems and resources; 9.3 Identify security requirements for new solutions that must be included in program design; 9.4 Ensure that assessments and reviews of security controls are periodically performed and testing conducted, including prior to implementation of a major change 4 or upgrade, or whenever security incidents occur; and 9.5 Provide security awareness training to all users and ensure that they receive any additional training that may be required by their job function or in view of the sensitivity of the information, systems and resources to which they have access. The I&IT Organization must: 9.6 Develop I&IT security policies, standards and guidelines. 9.7 Develop I&IT security awareness training for OPS staff. 10. Identity, Authentication and Authorization Ministries, applicable agencies, and the I&IT Organization must: 10.1 Ensure that the identities of all users of non-public information and information technology are known and that access to their information, systems and resources is managed appropriately and only provided via an approved authentication process consistent with Identity, Authentication and Authorization (IAA) policies. 11. Risk Management Ministries, applicable agencies, and the I&IT Organization must: 11.1 Collaborate to manage I&IT risks in accordance with applicable policies, and exercise prudence in accepting residual risks. 4 Major changes are those that have the potential to impact either a large number of users or a critical service, either as part of the change implementation or as a result of a high-risk change failure. MANAGEMENT AND USE OF I&IT DIRECTIVE 7
10 Ministries and the I&IT Organization must: 11.2 Ensure appropriate internal audit coverage of enterprise and ministry I&IT risks and controls. The I&IT Organization must: 11.3 Identify I&IT risks and develop appropriate mitigation strategies in accordance with applicable policies; and 11.4 Appropriately manage I&IT risks, in accordance with I&IT risk management frameworks and policies. MANAGEMENT AND USE OF I&IT DIRECTIVE 8
11 RESPONSIBILITIES Management Board of Cabinet (MBC) The responsibilities of MBC include: reviewing and approving exemption requests from the mandatory requirements of this Directive; reviewing the Major I&IT Projects Report on a quarterly basis; and approving major I&IT projects costing $20M or more. Minister of Government Services (Minister) The responsibilities of the Minister include: establishing, amending, replacing or rescinding policies on the management and use of I&IT that are consistent with this Directive, setting out more detailed operational requirements for ministries, clusters and agencies; approving exemptions from any requirements of the policies for the management and use of I&IT made pursuant to this Directive; periodically reporting to MBC on the making of policies, for the purpose of demonstrating prudence and due diligence; and periodically making recommendations to MBC on updating this Directive. Information and Information Technology Deputies Committee (IITDC) The responsibilities of IITDC include: recommending policies to the Minister pertaining to the management of information and information technology that are consistent with this Directive; providing advice to the Minister with respect to I&IT policy setting consistent with this Directive; and ensuring alignment of I&IT strategy and policy with the government s business directions. Information and Information Technology Project Approval Committee (ITPAC) The responsibilities of ITPAC include: approving I&IT projects, or recommending I&IT projects to MBC, in accordance with the Policy on the I&IT Project Gateway Process. Deputy Heads (Deputy Minister Or Equivalent And Agency Heads) The responsibilities of Deputy Heads include: ensuring ministry and applicable agency compliance with this Directive and policies and standards made pursuant to the Directive; MANAGEMENT AND USE OF I&IT DIRECTIVE 9
12 articulating ministry strategies, priorities and service needs; ensuring that ministries and applicable agencies acquire, develop or procure all I&IT services from or through the I&IT Organization; ensuring one accountable executive is assigned as a project sponsor to each I&IT project; participating in I&IT governance bodies and processes as required; and providing CIOs with notice of agency MOUs under development where I&IT may be asked to provide service to an agency. Chief Administrative Officers The responsibilities of CAOs, or other Assistant Deputy Minister as appointed by the Deputy Minister, include: providing controllership for ministry resources, including providing oversight for ministry I&IT budgets and expenditures. I&IT Organization The responsibilities of the Corporate Chief Information Officer (CCIO) and I&IT Corporate Offices include: providing leadership and direction to ministries on this Directive and all policies made under this Directive; monitoring compliance with the approved policy framework; interpreting this Directive and the related policy framework, and resolving any disputes in relation to the interpretation or application of this Directive; developing and maintaining the I&IT policy framework, including policies, standards, guidelines and best practices; ensuring that corporate I&IT strategies support delivery of ministry strategies, priorities and service needs; managing their program resources and budgets; establishing and governing corporate Enterprise Architecture approaches and artefacts; developing, maintaining and delivering infrastructure services for the OPS; developing I&IT asset management approaches and accordingly acquiring, managing and disposing of IT infrastructure assets; leading development of enterprise directions for I&IT and integrating I&IT planning with broader OPS planning processes through appropriate vehicles, including the I&IT Capital Plan, Asset Management Plan and Enterprise I&IT Plan; providing leadership and direction to ministries and clusters on public facing IAA implementation responsibilities and plans; supervising the provision and maintenance of public facing IAA implementations; and establishing key I&IT processes and governance structures, as well as providing a secretariat function for corporate governance committees. The responsibilities of Cluster Chief Information Officers (CIOs) include: managing their program resources and budgets; ensuring cluster compliance with this Directive and all policies made under the Directive; MANAGEMENT AND USE OF I&IT DIRECTIVE 10
13 providing strategic I&IT advice to cluster ministries and managing the strategic partnership with ministry clients; advocating for and on behalf of ministry clients with respect to their business needs that can be met by I⁢ providing I&IT products and services to client ministries; creating an annual Cluster I&IT operational plan; ensuring professional management of I&IT projects for which the Cluster is responsible, in accordance with applicable policies; establishing Cluster Enterprise Architecture approaches and artefacts; supporting ministry clients in developing and maintaining their Business Architecture; managing relationships with I&IT service providers, including Infrastructure Technology Services; supporting and delivering horizontal initiatives; supporting or representing ministry and agency clients on corporate I&IT governance bodies; and reviewing agency Memoranda of Understanding content pertaining to I&IT requirements and providing advice about the appropriateness and capability of the I&IT Organization to provide the service, and the corresponding requirements for agencies to comply, in whole or in part, with this Directive. Corporate Architecture Review Board (ARB) The responsibilities of Corporate ARB include: approving the architecture, design and delivery of I&IT solutions for the I&IT Organization; providing leadership, direction and approval related to Enterprise Architecture within the context of this Directive; approving business, logical and physical architecture of reviewed projects; and approving Government of Ontario Information Technology Standards. Policy Management Authority (PMA) The responsibilities of the PMA include: recommending public facing Identity, Authentication and Authorization policies, standards and guidelines to the Minister; and reviewing and approving public-facing IAA services in accordance with OPS policy. Internal Audit Division The responsibilities of Ontario Internal Audit Division include: conducting periodic assurance and consulting engagements of pertinent activities to assess compliance with this Directive and associated policies and standards; communicating with appropriate management about the risks identified and the severity of those risks; and working with management to identify the needed management action plans to mitigate the risks noted during the course of an audit, and conducting follow-up as required. MANAGEMENT AND USE OF I&IT DIRECTIVE 11
14 Program Managers The responsibilities of program managers include: ensuring their staff comply with this Directive and all policies made under this Directive; and managing their program resources and budgets. All OPS and Applicable Agency Staff The responsibilities of all OPS and applicable agency staff include: acting in accordance with this Directive, as well as policies and standards made pursuant to the Directive. MANAGEMENT AND USE OF I&IT DIRECTIVE 12
15 APPENDIX A: DEFINITIONS In this Directive: agencies means classified agencies (including boards or commissions) as defined in the Agency Establishment and Accountability Directive; applicable agencies means all agencies required to comply with this Directive in whole or in part by their Memoranda of Understanding; application means automated processes that are designed and created to meet business needs; Business Architecture is a business-driven disciplined process that decomposes the businesses goals and strategies, the assets and the processes needed to execute them as well as their impact on business goals; CCIO means the OPS Corporate Chief Information Officer; CIO means OPS cluster Chief Information Officers; clusters means the OPS Chief Information Officers and their staff; Directive means this Management and Use of Information and Information Technology (I&IT) Directive; Enterprise Architecture means the discipline of planning, designing, building and maintaining a set of models that represent the enterprise. It illustrates the manner in which the operations, systems and technology components of a business are, or will be, organized; I&IT Assets mean information assets, infrastructure assets and business application assets; I&IT Organization means the Office of the Corporate Chief Information Officer and all I&IT clusters; I&IT Project means a project as defined by the OPS Integrated Project Management Framework and Methodology and relating to I⁢ I&IT Services means services provided to one or more customers, by the I&IT Organization. An IT Service is based on the use of information technology and supports the customer s business process. An IT Service is made up from a combination of people, processes and technology and should be defined in a service catalogue. IAA means Identification, Authentication and Authorization where: Identification means creating and issuing a persistent verified electronic identifier (based on assessment of evidence that has been presented to support the claimed identification) and on first time access mapping the electronic identifier to the program enrolment; Authentication means establishing at the start of each online session the validity of that electronic identification, as appropriate, based on assurance level; and MANAGEMENT AND USE OF I&IT DIRECTIVE 13
16 Authorization means granting or denying access to online information or services based on the transaction or program specific business rules of the online service. information means information in any form, in any medium and at all stages of its lifecycle, including information created, recorded, transmitted or stored in digital form or in other intangible form by electronic, magnetic, optical or any other means, but does not include a mechanism or system for creating, sending, receiving, storing or otherwise processing information; information management means applying common management principles (planning, directing, controlling, evaluating) to information assets. It involves establishing disciplined and consistent practices related to the planning, creation, capture or collection, organization, use, accessibility, dissemination, storage, protection and disposition of information assets; information technology means the equipment, software, services and processes used to create, store, process, communicate and manage information, including process control technology; infrastructure means the physical hardware and software that supports the flow and processing of information, including networks, platforms, wireless devices, access points, mobile devices, photocopiers, printers, mainframe and personal computing devices, servers and data repositories, operating systems and related software and telecommunications infrastructure equipment and hardware; machine-readable data means data that can be processed by computers without users manually entering it. Most commonly-used database files can be easily converted to this format; major I&IT projects means I&IT projects with a projected expenditure of $20M or more; MBC means Management Board of Cabinet; Minister means the Minister of Government Services; ministry means a ministry of the Ontario Government; non-public information means government information that is subject to valid privacy, security or privilege limitations or has otherwise not been made public; OPS means the Ontario Public Service ministries; public information means government information that is not subject to valid privacy, security or privilege limitations. security testing and evaluation means any assessment required to evaluate I&IT security, including but not limited to Threat/Risk Assessment, vulnerability assessment, penetration test, and security review, including compliance assessments; and service management means the discipline for managing information technology (IT) with a focus on the customer s perspective of the quality of the IT Services, and their effectiveness in supporting business outcomes and strategies. MANAGEMENT AND USE OF I&IT DIRECTIVE 14
Strategy for Email Management in Canadian Jurisdictions
Strategy for Email Management in Canadian Jurisdictions Email is a fundamental part of doing business today, and the management of email has become a critical issue across all jurisdictions. All governments
CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance
CITY OF HOUSTON Executive Order E.O. No: 1-44 Effective Date: December 20, 2012 1. AUTHORITY 1.1 Article VI, Section 7a, of the City Charter of the City of Houston. 2. PURPOSE 2.1 The City of Houston seeks
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET. 1283 Data Administration and Management (Public)
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET 1283 Data Administration and Management (Public) Release 1-1742 Date 7/10/2012
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities
Office of Audits and Evaluations Report No. AUD-13-007 The FDIC s Controls over Business Unit- Led Application Development Activities September 2013 Executive Summary The FDIC s Controls over Business
Software Licenses Managing the Asset and Related Risks
AUDITOR GENERAL S REPORT ACTION REQUIRED Software Licenses Managing the Asset and Related Risks Date: February 4, 2015 To: From: Wards: Audit Committee Auditor General All Reference Number: SUMMARY The
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
Audit of Financial Management Governance. Audit Report
Audit of Financial Management Governance Audit Report March 2015 TABLE OF CONTENTS Executive Summary... 2 What we examined... 2 Why it is important... 2 What we found... 2 Background... 4 Objective...
This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.
STATE OF OHIO SUBJECT: PAGE 1 OF 9 DRC Sensitive Data Security Requirements NUMBER: 05-OIT-23 DEPARTMENT OF REHABILITATION AND CORRECTION RULE/CODE REFERENCE: RELATED ACA STANDARDS: SUPERSEDES: 05-OIT-23
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
City of Minneapolis Policy for Enterprise Information Management
City of Minneapolis Policy for Enterprise Information Management Origin: Developed by the City Clerk s Office and Business Information Services. Based on requirements set forth in Federal and State regulations
Information Security Classification
i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
Application Development Standard: Standards for SDLC (Software Development Life Cycle)
Government of Ontario IT Standard (GO-ITS) Application Development Standard: Standards for SDLC (Software Development Life Cycle) Document Number: 54 Version Number: 1.0 Status: Approved Prepared for the
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
Enterprise Performance Life Cycle Management. Guideline
Enterprise Performance Life Cycle Management Guideline Version 2.1 PREPARED BY THE ENTERPRISE PROGRAM MANAGEMENT OFFICE MAY 2011 Table of Contents Document Control...i 1. Introduction... 2 1.1 Purpose...
4.06 Consulting Services
MANAGEMENT BOARD SECRETARIAT AND MINISTRIES OF THE ENVIRONMENT, FINANCE, HEALTH AND LONG-TERM CARE, NATURAL RESOURCES, AND COMMUNITY SAFETY AND CORRECTIONAL SERVICES 4.06 Consulting Services (Follow-up
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 7750.07 October 10, 2014 DoD CIO SUBJECT: DoD Forms Management Program References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction (DoDI)
Guidelines for Best Practices in Data Management Roles and Responsibilities
Guidelines for Best Practices in Data Management Roles and Responsibilities September 2010 Data Architecture Advisory Committee A subcommittee of Information Architecture & Standards Branch Table of Contents
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Government of Ontario IT Standard (GO-ITS) Number 30.3 OPS Business Intelligence Software
UNCLASSIFIED Government of Ontario IT Standard (GO-ITS) Number 30.3 OPS Business Intelligence Software Version #: 1.1 Status: Approved Prepared under the delegated authority of the Management Board of
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
SSC Operations IT Transformation in Motion
SSC Operations IT Transformation in Motion Financial Management Institute (FMI PD Week 2013) November 28, 2013 Kevin Radford Senior Assistant Deputy Minister Operations Branch Outline SSC OPERATIONS IT
Significant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose
Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.
4.01. Archives of Ontario and Information Storage and Retrieval Services. Chapter 4 Section. Background
Chapter 4 Section 4.01 Ministry of Government Services Archives of Ontario and Information Storage and Retrieval Services Follow-up on VFM Section 3.01, 2007 Annual Report Background The Archives of Ontario
Software Asset Management on System z
Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager [email protected] Agenda Why Software Asset Management (SAM) The Discipline of Software
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
State of Minnesota IT Governance Framework
State of Minnesota IT Governance Framework June 2012 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework... 4 Management of the
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
Internal Audit Standards
Internal Audit Standards Department of Public Expenditure & Reform November 2012 Copyright in material supplied by third parties remains with the authors. This includes: - the Definition of Internal Auditing
Information Management and Protection Policy
Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief
Victorian Government Information and Communication Technology (ICT) Governance
Governance Victorian Government Information and Communication Technology (ICT) Governance Framework A framework to describe ICT governance in the Victorian Government Keywords: ICT Strategy; governance;
HHS OCIO Policy for Information Technology (IT) Enterprise Performance Life Cycle (EPLC)
Office of the Chief Information Officer Office of the Assistant Secretary for Resources and Technology Department of Health and Human Services HHS OCIO Policy for Information Technology (IT) Enterprise
ICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Concept of Operations for Line of Business Initiatives
Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3
How To Develop An Enterprise Architecture
OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
Status Report of the Auditor General of Canada to the House of Commons
2011 Status Report of the Auditor General of Canada to the House of Commons Chapter 1 Financial Management and Control and Risk Management Office of the Auditor General of Canada The 2011 Status Report
Subject: 1268-1 Information Technology Configuration Management Manual
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release 1-1741 Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: 1268-1 Information Technology Configuration Management
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Infrastructure Information Security Assurance (ISA) Process
Infrastructure Information Security Assurance (ISA) Process Handbook AS-805-B March 2005 Transmittal Letter A. Explanation. As part of the Postal Service s efforts to enhance security across all technology
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT
5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT (CT:IM-92; 08-01-2007) (Office of Origin: IRM/BPC/PRG) 5 FAM 671 WHAT ARE IT PERFORMANCE MEASURES AND WHY ARE THEY REQUIRED?
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:
OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,
Audit of Veterans Health Administration Blood Bank Modernization Project
Department of Veterans Affairs Office of Inspector General Audit of Veterans Health Administration Blood Bank Modernization Project Report No. 06-03424-70 February 8, 2008 VA Office of Inspector General
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
ANNUAL PRIVACY REPORT
THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER AND THE OFFICE OF PRIVACY AND CIVIL LIBERTIES ANNUAL PRIVACY REPORT JANUARY 1, 2012-SEPTEMBER 30, 2013 United States Department of Justice Message from the
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Digital Records Preservation Procedure No.: 6701 PR2
Digital Records Preservation Procedure No.: 6701 PR2 Policy Reference: Category: Department Responsible: Current Approved Date: 6700 Records Management Information Management Records Management and Privacy
ITIL Managing Digital Information Assets
ITIL Managing Digital Information Assets Shirley Lacy, ConnectSphere Frieda Midgley, Digital Continuity Project Judith Riley, Digital Continuity Project Nigel Williamson, Digital Continuity Project White
July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263
July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Audit of Physical Security Management
Audit of Physical Security Management Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council Approved by the President on March 18, 2015 1 Her Majesty
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes
Final Audit Report. Audit of the Human Resources Management Information System. December 2013. Canada
Final Audit Report Audit of the Human Resources Management Information System December 2013 Canada Table of Contents Executive summary... i A - Introduction... 1 1. Background... 1 2. Audit objective...
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Statement of Guidance: Outsourcing All Regulated Entities
Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 200.1A Approved: SUBJECT: INFORMATION TECHNOLOGY MANAGEMENT 1. OBJECTIVES. The Department of Energy s (DOE) overarching mission, to advance the national,
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
A. Title 5, United States Code (U.S.C.), Section 552a, Records Maintained On Individuals (The Privacy Act of 1974)
Department of Homeland Security DHS Directives System Directive Number: 103-01 Revision Number: 01 Issue Date: 8/25/2014 ENTERPRISE DATA MANAGEMENT POLICY I. Purpose This Directive establishes the Department
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
