POLICY ON COMPUTER PROVISIONING



Similar documents
BISHOP S UNIVERSITY PERSONAL COMPUTING HARDWARE & SOFTWARE PURCHASING AND SUPPORT POLICY

U.S. Department of Education. Office of the Chief Information Officer

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF SURFACE MINING RECLAMAION AND ENFORCEMENT DIRECTIVES SYSTEM

MOUNT HOLYOKE COLLEGE. LITS Computer Replacement and Support Strategy for Faculty and Staff Computers

Technology Evergreening

Section 700 Fixed Assets

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Mobile Devices Policy

UNIVERSITY EQUIPMENT

McGill University IT Asset Management Regulation

HARD DRIVE REMARKETING

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet

FLORIDA ATLANTIC UNIVERSITY. Property Policy

Workstation Management

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM

ADMINISTRATION & FINANCE August 2010 FEDERAL PROPERTY MANAGEMENT STANDARDS

The Power to Take Control of Software Assets

Information Security Program Management Standard

28400 POLICY IT SECURITY MANAGEMENT

New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5

DOT.Comm Oversight Committee Policy

University Systems Desktop Support Service Level Commitment

SMTD Computer Hardware and. Software Asset Inventory Policy

COMPUTER REPLACEMENT PROGRAM GUIDELINES AND PROCEDURES

Federal Sustainable Print Management Policy Template

Software Licenses Managing the Asset and Related Risks

Report via OMB s Integrated Data Collection (IDC), 10

Domain 1 The Process of Auditing Information Systems

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

INFORMATION TECHNOLOGY

University of South Wales Software Policies

Eastern Illinois University information technology services. strategic plan. January,

CENG Information Technology Services University of North Texas

EMERGENCY MANAGEMENT POLICY

UW-L Information Technology Services Standard Operating Procedure (SOP)

Corporate Mobile Policy Template

IT Asset Management. ProPath. Office of Information and Technology

Christopher Newport University Policy and Procedures

Why does the program purchase computers instead of leasing them?

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Hardware and Software

Key Aspects of Configuration Management. NOvA Working Group Meeting 1

Information Resources Security Guidelines

Value Recovery Enterprise IT Asset Disposition

DHHS Directive Number II-12

Mapping the Technical Dependencies of Information Assets

REQUEST FOR PROPOSAL FOR IT ASSET MANAGEMENT SERVICES

Standards of Technology Support

INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO

Information Technology Services Guidelines

Information Security Plan effective March 1, 2010

FINANCIAL POLICIES & PROCEDURES USER GUIDE SECTION 15

Service Level Agreement (SLA) Information Technology Support. for. Departments within Southern Clinical School. Provided by

Annual Report

IBM Tivoli Asset Management for IT

ADMINISTRATIVE PROCEDURE

SUSTAINABLE PROCUREMENT GUIDELINES

Next Generation ITAM in the Cloud: Business Intelligence and Analytics as a Service

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

BEConnected User Agreement

Appendix C to DIR Contract No. DIR-SDD-1894 Pricing Index

This policy applies to all DRC employees, contractors, volunteers, interns and other agents of the state.

C I T Y O F W E S T L I N N

GENERAL SERVICES POLICY STATEMENT

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

E. Custodian - the Vice President for Administrative Services and Finance or designee.

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

FSIS DIRECTIVE

Standard Operating Procedure. Asset Management at PERFORM. PC-SOP-GA-004-v01

Corporate Purchasing. Manual: Organizational Approved By: President & C.E.O. Section: Finance Original Date Issued: March 2011

INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA

U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION National Policy

5 th -6 th : Electronic Jeopardy

PROCEDURES: Purchasing Policy

Transcription:

Effective Date: July 1, 2013 Supersedes /Amends: November 16, 2010 Originating Office: Office of the Vice-President, Services Policy Number: VPS-32 PURPOSE Client Computers (as defined below) are intended to support the overall objectives and operations of the University. This Policy sets out University-wide standards for computer provisioning in order to reduce the cost of ownership, provisioning delays and to provide reliable information technology ( IT ) support to University members. The objectives of this Policy are to: Achieve and maintain a computing environment that provides a high level of productivity for University members Reduce the total cost of ownership of Client Computers across the University through volume acquisition Maximize the life cycle of Client Computers Promote the planned and coordinated renewal of IT assets through an inventory process and a needs prioritization Establish a standardized Baseline Computing Environment Enhance technology compatibility throughout the University Facilitate deployment of standardized software applications and update releases Improve technical support to University members Ensure that best sustainability practices are applied in the provisioning and disposal of Client Computers. SCOPE This Policy applies to all departments and units of the University that purchase Client Computers. All departments and units are required to purchase standard computers from any source of funds with the exception of the exempt funds as defined below. Nothing in this Policy shall replace or supersede any provisions set out in other University s Official Policies but it shall supersede any Faculty, Departmental or Research Unit policy or guidelines with respect to the purchase of computers.

Page 2 of 5 DEFINITIONS For the purposes of this Policy: Standard Client Computer means End User computer and related components and accessories configured according to the specifications of the University. This excludes Tablets which are identified as a mobile device that can establish a network connection using ONLY a wireless connection (WiFi and/or Bluetooth), and optionally with cell phone carrier. Non-standard Client Computer means End User computer and related components and accessories configured differently from the Standard Client Computers above. Baseline Computing Environment means the aggregate computing environment of Concordia made up of Client Computers including all hardware and software. Local IT Staff means staff that performs technical support within a University department or unit. End User means a member of the University community using a Client Computer to carry out University activities. Exempt funds refers to: External research funding agency funds which includes industrial funded research funds including but not limited to NSERC, etc. Concordia University Research Chairs funds Start-Up funds for new faculty members POLICY Authority 1. Under the authority of the Vice-President, Services, the Chief Information Officer shall be responsible for the application of this Policy. 2. The Chief Information Officer shall be responsible for ensuring that this Policy and any associated guidelines, procedures and standards are reviewed every three years and shall make recommendations for any revisions to the Vice-President, Services.

Client Computer Standards Page 3 of 5 3. The IT Standards Committee shall consider, develop and recommend IT standards and norms for the University to the IT Advisory Committee. These standards and norms shall be set and reviewed on an annual basis or as requested by the IT Advisory Committee. 4. The final decision with respect to the implementation of Client Computer and Software Standards rests with the Vice-President, Services. 5. The Client Computer Standards shall be maintained and updated on the IITS web site. 6. A department or unit may decide to use one or a combination of the Client Computer Standards. Client Computer Software Standards 8. Client Computers will be provided with standardized Software applications, including future upgrades as they become available and are deemed stable. 9. The Client Computer Software standards shall be maintained and updated on the IITS web site. Procurement Guidelines 10. The acquisition of Client Computers and Software is a recurring cost requiring long-term planning. It is the responsibility of each Dean/Director to assess the need for Client Computers and Software acquisition and renewal in the various units reporting to him/her. Requests for renewal of Client Computers and Software should be approved on the basis of sector needs and priorities. 11. The acquisition of all Client Computers and Software shall be done in accordance with the Procurement Policy (CFO-20). Client Computers and software acquisition must be done with an electronic requisition and may not be bought using a Corporate or Purchasing Card, or any personal funds including credit card (which will not be reimbursed via an Expense Report) 12. University members who have specialized computing needs may acquire non-standard

Page 4 of 5 Client Computers upon the approval of a completed waiver from standard configuration form. This form requires the approval of the Chief Information Officer or delegate prior to the purchase and can be found on the IITS web site. 13. Global request for proposals related to standard computers provisioning must include an EPEAT Gold rating in the technical specifications and a preference for manufacturers who strive to use conflict-free minerals for their components. End-User Responsibility: 14. Non-standard Client Computers must be acquired with a vendor maintenance/service contract of three (3) years and must be configured with the University Virus detection software as listed on the IITS web site. 15. All Client Computers (standards or not) must be inventoried, tagged and engraved according to the procedure established by IITS. IT Support 16. IT support for standard Client Computers shall be provided by Instructional and Information Technology Services ( IITS ) except for departments with Local IT Staff. 17. Non-standard Client Computers purchased with research funds or through the use of the Waiver, will be supported by IITS or Local IT Staff on a best efforts basis. 18. Software installation on Non-standard Client Computers will be supported by IITS or Local IT Staff, if they have been tagged, engraved and inventoried as mentioned in clause 15 above. 19. For all client computers, it is MANDATORY that critical patches be automatically installed and the antivirus software be installed. It is strictly forbidden to deactivate or de-install such software.

Page 5 of 5 Replacement Cycles 18. The University will strive to replace Client Computers every five (5) years. Decommissioning of Client Computers 19. Proper end-of-life procedures for computers and their components are an essential part of Concordia s sustainability commitment since they contain toxic materials which can leach into soil and water when discarded in landfills. Reuse and recycling of electronics also reduces the need for unnecessary environmentally harmful mining operations. It is the End User's responsibility to ensure that old computers and their components are never discarded in trash bins. Before a computer is decommissioned, it is the End User s responsibility to identify any data that needs to be retrieved and to take the appropriate measures to safeguard it. 20. IITS or the Local IT Staff shall erase the hard disk to ensure that no information can be recovered, using a standardized sanitizing secure method. 21. For decommissioning purposes, IITS will ensure that computers are evaluated for internal reuse, donation, or external recycling, in that respective order. IITS shall coordinate and track the internal reuse or donation processes. Distribution and Custodial Services shall coordinate the external recycling processes in collaboration with Environmental Health and Safety.