REVIEWED ICT CHANGE MANAGEMENT POLICY
|
|
|
- Samuel Williamson
- 10 years ago
- Views:
Transcription
1 LI_M_POPO PROVINCIAL GOVERNMENT ~EP.j8L-C OF SO;_;-H.'\FR1C.... DEPARTMENT OF CO-OPERATIVE GOVERNANCE. HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT CHANGE MANAGEMENT POLICY Version: 2
2 Table of Contents I. Acronyms and Abbreviations 3 II. Clarification of Terms 4 1. Preamble 5 2. Purpose and objectives 5 3. Scope of Application 5 4. Legal Framework 5 5. Administration of the policy 6 6. Policy Content 6 7. Roles and responsibilities Change Lead Default Inception Date Policy Review Enquiries 14,
3 I. Acronyms and Abbreviations CAB Change Advisory Board CoGHSTA Cooperative Governance, Human Settlement and Traditional Affairs GITO Government Information Technology Office(r) ICT SLA VPN Information Communication Service Level Agreement Virtual Private Network Technology
4 II. Clarification of Terms Accountability: ensuring that the actions of an entity/individual may be traced uniquely to that entity/individual, who may then be held responsible for that action. Authentication: establishing the validity of a claimed entity/verification of the identity of an individual or application. Availability: being accessible and useable upon demand by an authorized entity. Confidentiality: the principle that information is not made available or disclosed to unauthorized individuals, entities or processes. Information and communication systems: applications and systems to support the business, utilizing information technology as an enabler or tool. Information technology: any equipment or interconnected system or subsystem of equipment, that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission or reception of vocal, pictorial, textual and numerical data or information. Monitoring: performance measurement to ensure the confidentiality, availability and integrity of operational systems and information. II
5 1. Preamble 1.1. The complexity of current business environments, and the diverse technology used in ICT infrastructure environments demands a greater control to minimize risk and potential impact on the business Procedures should be instituted to ensure all ICT changes are recorded, followed up and escalated to management when necessary. It is important that these procedures are adhered to at all times. 2. Purpose and objectives 2.1. The purpose of this policy is to provide the COGHSTA with a procedure for the ICT change control function that shall be established to manage record and track all changes for CoGHSTA ICT environment The objective of this policy is to ensure that standardized processes are followed and adhered to accordingly. This is to ensure that no ICT changes take place as a quick change, with documentation provided afterwards, without any prior authorisation. 3. Scope of Application This policy is applicable to all employees of the COGHSTA, including learners and interns as well as all other stakeholders who make use of the COGHSTA ICT network and systems. 4. Legal Framework The following publications govern the execution of the Internet Use Policy and were taken into consideration during the drafting of the Policy:
6 4.1. State Information Technology Act (Act no 88 of 1998) 4.2. Protection of Information Act (Act no 84 of 1982) 4.3. Minimum Information Security Standards (MISS), Second Edition March Departmental Policy 4.5. Departmental Internet Usage Policy 4.6. Departmental Password Policy 4.7. DepartmentallCT Security Policy 4.8. Departmental ICT Equipment Usage Policy. 5. Administration of the policy GITO is responsible for enforcing this policy and continuously ensuring monitoring and compliance. 6. Policy Content The ICT Change Management Process seeks to manage and control the ICT changes through processes and procedures and then ensuring that the appropriate authority levels exist for each ICT change. The following process steps shall be used within CoGHSTA: 6.1. Change Initiation An ICT change is initiated when the requirements for a change has been identified. This request for change can be initiated for the following reasons: (a) Change to infrastructure components. (b) (c) (d) Resolving problems. Project related activities. Ad-hoc activities that influence service delivery. c.
7 6.2. Change Planning and Building Under the responsibility of change planning and building, ICT changes may be scheduled and planning may be provided if necessary for the optimum control of the change ICT Change Management has a coordination role, supported by line management, to ensure that activities are both resourced and also completed according to schedule Change Logging and Filtering Under the responsibility of the ICT Help Desk, changes are logged on the Help Desk Remedy system Each ICT Change may be categorized accordingly in the automatic function of the Help Desk Remedy system A Request for ICT Change Form (Annexure A) needs to be completed for the following changes to the ICT environment: CLASS ITEM DEFINITION Significant Install New requirement introduced Minor Move Move of any component within the Infrastructure environment Significant Addition Additional requirements (including releases and or upgrades) within the Infrastructu re environment Minor Configuration A change to the function or the assembly to the Infrastructure environment Significant Decommission Removal of any component from the
8 Infrastructure environment Minor Operational Change from the current operation state of a state component within the Infrastru ctu re environment There are two change types that needs to be adhered to base on the above classes and items: CHANGE TYPE DEFINITION CAB Changes For changes that need to be channeled via the CAB after which approval or rejection will be provided Pre-approved For changes that can take place without being changes channeled via the CAB, e.g. password resets / creation of new user accounts CAB CHANGES PRE-APPROVED CHANGES May cause down-time May not cause down-time on any system on production systems May affect one or May not affect any SLA more SLAs May affect May not affect any processes configuration information May affect for services processes Changed with high risk involved n
9 6.4. Emergency Changes The emergency ICT change management process shall provide a change control mechanism in the event of an emergency. The goal is not to bypass the ICT Change Management Processes but rather to speed up the process and execute it quickly and efficiently when the normal process cannot be followed due to an emergency. The following criteria shall be accepted as Emergency (a) Production loss (b) Financial loss (c) Prevention of death (d)legislation changes Changes 6.5. ICT Change Approval Prior to the approval of ICT changes, an approval indicator shall be allocated to the change to enable the correct workflow associated with the required approval. The risks of the ICT Change will determine the required approval: CATEGORY VALUES Change Classification Major Significant Minor 2. Priority High Medium Low 3. Impact Multiple districts Single district No impact 4. Implementation Exceed 4 hours Complex Simple 5. Black out Exceed 4 hours Complex Simple n
10 The sum of the value of the five risk categories may determine the approval process: Low risk Greater than 10 = Minor Approval required Medium risk From 6 to 10 = Significant Approval required High risk Less than 6 = Major Approval required The risk factor indicates the nature of the approval: Minor Approval The Chairperson of the CAB has delegated authority to approve and schedule changes to the Senior Manager: Information Technology and shall report back to CAB Significant Approval The change submitted shall be discussed at the CAB Major Approval and relevant documentation are sent to CAB members before the meeting for assessment GITO shall raise the Request for Change with the CAB. Approved changes must be passed back to the CAB for scheduling and implementation Emergency Request for Change forms and relevant documentation Approval are sent to CAB members for approval. A minimum of two members need to approve the change 6.6.ICT Change Implementation GITO shall be responsible for implementation of all ICT changes as scheduled Feedback regarding the success or failure of the ICT change shall be provided to the CAB within 5 days after the planned completion time. 6.7.ICT Change Review and Reporting GITO management shall perform an evaluation of the ICT changes implemented. The purpose of this review shall be: 11"\
11 Establish if the change had the desire effect and met the objectives; Tasks and follow-up actions assigned to correct any problems or inefficiencies arising in the change management process itself as a result of ineffective changes; Where resources were used to implement the change as planned, and any problems or discrepancies fed back to CAB helping to improve the future estimating process; and Review satisfactory and abandoned changes, and formally closes them in the ICT help desk system Communication Communication will be managed according to the predefined communication structure for each project. Communication shall include: a) Change approvals b) Change notifications c) Change control escalations d) Change management processes and procedure changes e) Change management standard changes f) Change management policy changes. 7. Roles and responsibilities Different owners of processes and responsibilities can be identified Owner: Change Management The Senior Manager within GITO shall be responsible for: Defining of the ICT Change Management process, procedure, division of work and the roles and responsibilities within the process 11
12 Contributing to the evaluation or establishment of the ICT change management system, ensuring conformance to documentation standards Maintaining the ICT change management system in accordance with agreed procedures Reviews on procedures and other processes checking for compliance against the quality system, and external standards where appropriate Communicating all updates and/or changes of the ICT Change Management Process Promoting awareness of the importance of a structured ICT change management process, working with other business units 7.2. ICT Change Advisory Board The Department shall formulate an ICT Change Advisory Board to function within the following mandate: To formalize an official forum to review all ICT changes in a structured way To focus the attention of the Committee to the management of ICT changes The ICT Change Advisory Board shall: Review all high impact ICT changes to be implemented Review any ICT change that was implemented unsuccessfully or had to be cancelled Screen all the ICT changes to ensure the correct category, type and item have been selected Monitor routine and low impact ICT changes GITO Implement Change requests as per above mentioned ICT Change Management Process Provide regular feedback on progress regarding the change request and schedule. 17
13 8. Change Lead 8.1. Change lead time is the amount of time required to evaluate and adequately plan for change implementation. Lead time is measured from the time the change is submitted until the change is actually implemented. Lead time shall vary by the type of change All changes to be submitted shall be done within the following lead time matrix: SERVICE LEAD TIME APPLICATION SYSTEMS New Application Releases 1 month Incident Fixes Emergencies hours 12 hours OPERATIONS Installation of hardware 1-2 months Consumable - tapes / cartridges 2 weeks Changes to Schedules Hardware maintenance Changes to operation of servers 48 hours 1 month 1 week NETWORK Installation of new data lines 4 months In- and outdoor transfer of data 1 month lines Installation of new equipment on 2 weeks existing network Incident fixes 3 weeks TECHNICAL SUPPORT New application release 3 weeks Environmental changes 2 months 12
14 Incident fixes Software evaluation hours 2 weeks The lead time for non-standard changes that require research shall be negotiated with SBU's concerned, and will depend on the nature and complexity of the change or captured in Operational Service Level Agreements 9. Default Non-compliance of this policy shall constitute violation of the policy and shall be treated in terms of the departmental disciplinary code and procedure policy. 10. Inception Date This policy comes into effect from the date of approval by Member of Executive Council. 11. Policy Review This policy shall be reviewed bi-annually. 12. Enquiries Enquiries about the policy should be directed to the Government Technology Office. Information 111
15 Document Title ICT Change Management Policy Compiled by : Gover~rnent Information Technology Office._,(K \ Senior Manager )Ah ZhOlll '7 I Date (ICT Infrastructure and Systems) Acknowledge by : ~ ~koill General Manager (GITO) Ar{/'J Da~e ' Qualified by: ~ ~I.f 1/2--/7_~/C!' Senior Manager Date (Research and Policy Coordination) I ( Recommended by: -1 ~ :t;)-ied( r( ~ot ~ Senior General Manager Date \ (Corporate Services) D Adopted by: Approved by : / ~~{6 C)~ U0?OD of Department Date ~ Member of the Executive Council 0\\Dll~tS; Date 1r:::
16 "., LI~lPOPO ICT.. INFRASTRUCTURE COOPERAT'.i: :'~{.)~R~A~C:. Logged By:,. 111:11(/..!. GC,~'NIIE\ Card Number: H'J~,~~1 )ETT~E~,!EN7Si T"'rtA~!~lONA:.AFF~~~: REQUEST FOR CHANGE Requestor Details Full Name Business Unit: Telephone: Cell Number: Town: Persal No: Building: Floor: Office No: Details of the Change Request Date Describe the change that is being requested, including systems and components: Outline your motivation for this in terms of impacts, risks and benefits. I Additional information: DECLARA TlON BY EMPLOYEE: Signatures By signing this form I confirm that the change is required for operational business purpose. Role Position Name Signature Date Requester Approved by: Implemented by: Verified by:
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY
Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY Contents ICT CHANGE MANAGEMENT...1 POLICY...1 1. Preamble...3 2. Terms and definitions...3 3. Purpose...4 4. Objective of this Policy...4 5. References
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
University of Waikato Change Management Process
1. Overview Information Technology Services and the Faculty and Division ICT staff have adopted the Information Technology Infrastructure Library (ITIL) systems management framework as its model for best
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
IT Service Desk Workflow Management in versasrs HelpDesk
Service Level Management The Keystone of versasrs HelpDesk This document outlines IT Service Desk Workflow within versasrs HelpDesk. versasrs HelpDesk is a packaged application enabling organisations to
The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private
1. Policy Overview The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private Network (VPN) connections to the University of Dammam network. 1.1. Purpose University
CHANGE MANAGEMENT PROCESS
CHANGE MANAGEMENT PROCESS PROCESS ADOPTED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Change Management Process 1. 1. OBJECTIVE The objective of this process is to manage
Service Level Agreement
Between State Agency Here after called "1st Party" And Vendor Here after called "2nd Party" Document Classification: Public Page 1 of 7 Table of Contents Table of Contents... 2 1. SCOPE OF SERVICE... 3
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Information and Communication Technology. Helpdesk Support Procedure
BELA-BELA LOCAL MUNICIPALITY Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 BELA-BELA 0480 Tel: 014 736 8000 Fax: 014 736 3288 Website: www.belabela.gov.za OFFICE OF THE MUNICIPAL MANAGER Information
Request Fulfillment Management. ITG s CENTRE Service Record Screen
MANDATORY CRITERIA 1. Does the tool facilitate the creation, modification, fulfillment and closure of Service Request records? Comments: Yes. The tool facilitates; the creation of a fulfillment with a
HUIT Change Management with ServiceNow. [email protected] September 2013
HUIT Change Management with ServiceNow [email protected] September 2013 Module 1: Basic Training - Change Requester/Implementer Change Management with ServiceNow Agenda Session Overview HUIT Change Management
Service Desk Level 1 Service Description
Service Desk Level 1 Service Description Copyright Copyright Atea Group. All rights reserved. This document may not be reproduced, in whole or in part, in any form or any language, except for the client
TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified
TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
IT CHANGE MANAGEMENT POLICY
IT CHANGE MANAGEMENT POLICY PURPOSE The purpose of the IT Change Management Policy is to manage changes in a planned and predictable manner in order to assign resources, assess risk and minimize any potential
Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice.
ROLES, RESPONSIBILITIES, PROCEDUREs Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice. IT Operations Change Manager: The steward of the Change Management
Security Incident Management Process. Prepared by Carl Blackett
Security Incident Management Prepared by Carl Blackett 19/01/2009 DOCUMENT CONTROL Purpose of document This document describes the Security Incident Management and defines all roles and responsibilities
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES
OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES IN CONFIDENCE TABLE OF CONTENTS 1 CONTACT DETAILS 1 1.1 The Client Contract Management
ICT SUPPORT SERVICES
ICT SUPPORT SERVICES SERVICE LEVEL AGREEMENT 2008 2009 Period of agreement: This document will run from 1st April 2008 to 31 st March 2009 and remains valid until superseded by a revised document. The
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
ITIL Roles Descriptions
ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test
Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers
Standard Operating Procedures (SOP) for: Configuration Management and Change Control SOP Number: DG25 Version Number: 1 Effective Date: 14/07/2014 Review Date: 14/07/2015 Author: Reviewer: Authorisation:
Change Management Process. June 1, 2011 Version 2.7
Change Management Process June 1, 2011 Version 2.7 Contents Document Control... 3 Overview... 4 Definition of a Change... 5 Description... 5 Objectives... 5 Key Terms & Definitions... 6 Change Management
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
CM00 Change Management High Level
CM00 Change Management High Level CM01 Create Change CM09 Assess and Execute Emergency / CM03 Approve Change CM05 Implement Change CM02 Assess And Schedule Change CM07 Review Change CM04 Communicate Scheduled
hi Information Technologies Change Management Standard
hi Information Technologies Change Management Standard Classification Service Delivery Standard # SVD-002 Approval Authority Chief Information Officer Implementation Authority Director, Service Delivery
CITY UNIVERSITY OF HONG KONG Change Management Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information Officer in September 2015) PUBLIC Date of Issue:
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
IT Security Agency Policies and Procedures
Revised Date: 12/20/11 (formatting) Page 1 of 6 IT Security Agency Policies and Procedures Firewall Change Control Procedure Policy Objectives: The purpose of this document is to define Admin s process
Statement of Service Enterprise Services - MANAGE Microsoft IIS
Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
How To Manage Change Management At Uni
Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED
Process Guide. Release Management. Service Improvement Program (SIP)
Process Guide Release Service Improvement Program (SIP) i Table of Contents Process Guide Release Document Information... 3 Approval... 4 Section 1: Process Vision... 6 Overview... 6 Process Mission and
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION
GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Corporate ICT Change Management
Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Incident Management help topics for printing Document Release Date: July 2014 Software Release Date: July
Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
Introduction... 4. Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4. RFC Procedures... 5
Remedy Change Management Version 3.0 Modified: 10/27/2015 Table of Contents Introduction... 4 Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4 RFC Procedures... 5 Process Flow
White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
HOW TO MANAGE SERVICE REQUESTS USING FOOTPRINTS TICKETS
HOW TO MANAGE SERVICE REQUESTS USING FOOTPRINTS TICKETS How to Manage Service Requests Using Footprints Tickets... 1 Introduction... 3 Planning to use Footprints... 3 Services... 3 Agents... 3 Teams...
Analytics Reporting Service
1. Rate per month $19.00 per user 2. General Overview: The provides the technologies for transforming large quantities of raw data into useable information serving the agency s functions. includes interactive
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint
Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint CUSTOMER Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and
Standard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
ISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
Information Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
Helpdesk Incident & Request Management Procedure For
IT HELPDESK PROCEDURE Helpdesk Incident & Request Management Procedure For Author: Helpdesk Owner: IT Head Organisation: Karvy Stock Broking Ltd. Document No: CIT ITHP 01 Version No: 1.1 Release Date:
GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic
GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Basic Service. If you require more detailed technical information, please contact
Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06
Exam : EX0-100 Title : ITIL Foundation Certificate in IT Service Management Ver : 08.01.06 QUESTION 1 The successful diagnosis of a problem results in a Known Error. On the basis of this Known Error a
Automation Suite for. 201 CMR 17.00 Compliance
WHITEPAPER Automation Suite for Assurance with LogRhythm The Massachusetts General Law Chapter 93H regulation 201 CMR 17.00 was enacted on March 1, 2010. The regulation was developed to safeguard personal
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer
Process Owner: Change Manager Version: 1.0
BMC REMEDY 8.1 CHANGE MANAGEMENT USER GUIDE Process Owner: Change Manager Version: 1.0 DOCUMENT REVISION HISTORY Revision Description Date Approved by Number V1.0 Initial Release 6/25/2015 6/25/2015 Page
CA Nimsoft Service Desk
CA Nimsoft Service Desk Rapid Workflow Implementation Guide 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
Change Management Process Guide
XXXXX (XX) IT Operational Process Change Management Process Guide XXXXX Information Technology Preface The purpose of this document is to outline the procedures that govern the Change Management process
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
EDMS Project Outcome Realisation Plan
Outcome Realisation Plan Version 1.A (14 August 2008) Copy: Uncontrolled Corporate Support Department of Treasury and Finance DOCUMENT ACCEPTANCE and RELEASE NOTICE This is version 1.A of the Outcome Realisation
IT Services. incident criteria
IT Services IT Services incident criteria Guidance for IT Services staff on priorities to be used when logging incidents. Introduction... 2 Definitions... 2 Response time... 2 Resolution times... 2 Minimum
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Information & Technology Management Branch Ministry of Education. Change Management Policy
Author: Change Advisory Board Creation Date: March 26, 2001 Last Updated: June 29, 2007 Document Number: 6840 00/Change Control Version: 2.3.5 Approval Renate Butterfield ITMB Director Signature Date CIO
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY Originator IT Change Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
GREATER LETABA MUNICIPALITY P.O Box 36, Modjadjiskloof, 0835, Tel (015) 309 9246/7/8, Fax (015) 309 9419, Email:[email protected].
Greater Letaba Municipality invites suitably qualified candidates to apply for the following positions: CORPORATE SERVICES DIRECTORATE ASSISTANT DIRECTOR: INFORMATION COMMUNICATION TECHNOLOGY (ICT) Salary:
How to integrate Verax NMS & APM with Verax Service Desk
How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories
Yale University Change Management Process Guide
Yale University Management Process Guide Yale University Management Process 1 of 29 Table of Contents Introduction... 3 Purpose... 3 Scope... 3 Management Overview... 3 Management Key Concepts... 4 Management
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT
InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:
Service Level Agreement SAN Storage
Service Level Agreement SAN Storage Executive Summary This Service Level Agreement defines the support provided by UCIT to the University of Cincinnati s Storage Area Network (SAN) users as well as the
THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING
THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING Date and reference no. of approval/modification resolutions by the Board of Directors: Date and reference no. of approval by Supervisory
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Access to Electronic Health Records Policy Franciscan Health System
Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
IMO Systems Change Management Procedures. IMO Systems Change Management Procedures for Market Participants
IMO Systems Change Management Procedures for Market Participants Version 1.0 25 January 2007 1 Approvals The undersigned have approved the release of Version 1.0 of the IMO s IT Change Management Procedures
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
NCREN QUALITY ASSURANCE DOCUMENT
CHAPTER: Administration STATUS: Approved TITLE: NCREN Video Quality Assurance Group PAGE: 1 of 1 SPEC#: ADM.GRP.001 AUTHORS: Mick Kreszock, Darleene M. Heath DATE: Approved September 1997; Revised format
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
