Consolidation Committee Final Report
|
|
- Olivia O’Connor’
- 6 years ago
- Views:
Transcription
1 Committee Details Date: 11/20/2015 Committee Name: 36-7 Network Telecom Video Surveillance Committee Co- Chairs: Noel Small and Chris Burge Functional Area: Information Technology Functional Area Coordinator: Phil Ventimiglia List the major tasks your committee will need to take to accomplish your deliverables. Please provide more details for the tasks leading up to the SACSCOC Prospectus development. Major Tasks for Committee Tracker from Final Planning Document and Recommendations Task: Plan then design Network Integration two (2) 10gig circuits 2) Test and insure proper routing between campuses/and firewalls are in place. This task is in progress. Task: Investigate network account needs based on department access requirements two (2) 10gig circuits 2) Test and insure proper routing between campuses/and firewalls are in place. 3) Redefine Protocol Routing 4) Test and Implement configuration changes. This task is in progress. Task: Develop firewall requirements Page 1 of 5
2 two (2) 10gig circuits 2) Test connectivity 3) Insure proper routing between campuses/and firewalls are in place. This task is in progress. Task: Identify connectivity requirements Once connectivity is established between institutions, GSU & GPC can then utilize both campus locations for Business Continuity and/or Disaster Recovery sites in the event of an internet connectivity outage. There are anticipated charges necessary to enable internet resilience. Establishing a link between Georgia State University and Georgia Perimeter College to enable data transport needed for seamless communication. This link will allow for software application and hardware access of various resources. The assessment needed for this task to proceed is completed. This task is in progress as part of the Network Integration Task. Task: Determine total bandwidth requirements Based on our desired outcome, it was determined the installing 2 10Gigs circuits would adequately serve the new university connectivity needs and that relates to acceptable bandwidth. This task has been completed. Task: Work with Peachnet to explore connectivity options Once connectivity is established between institutions, GSU & GPC can then utilize both campus locations for Business Continuity and/or Disaster Recovery sites in the event of an internet connectivity outage. There are anticipated charges necessary to enable internet resilience. Establishing a link between Georgia State University and Georgia Perimeter College to enable data transport needed for seamless communication. This link will allow for software application and hardware access of various resources. The background work/assessment needed for this task to Page 2 of 5
3 proceed is completed. The connectivity options obtained from Peachnet is as follows: Option 1 - Increase GPC's connectivity within the Peachnet cloud.(from 50Mbps - 150Mbps) Completed Option 2 - Pending further analysis and design based on actual long term requirements. This task is in progress as part of the Network Integration Task. Task: Identify dark Fiber availability at each core site We have received three (3) quotes from authorized vendors and will determine a way forward should we decided to terminate fiber at one of our desired data centers. The background work/assessment for this task has been completed. There may be future activity under this task, if the need to terminate fiber is required. Task: Identify Ocularis Version and add- on components (including 3 rd party) Georgia Perimeter College to enable video data transport for camera viewing and video retrieval 2. Consolidate video surveillance network architectures into one (1) logical 3. GSU Police Department should remain primary customer/authority having view controls of ALL cameras connected throughout both campus Today GSU and GPC both use the same video surveillance management system. The team has now identified the current versions of Ocularis being used on each campus. The activities associated with this task include: 1) Conduct GPC VSS assessment 2) Define routing and firewall ACL s 3) Write Config script 4) test and implement ensuring viewing capability by all campuses and necessary personnel. 5) Upgrade GPC system equipment 6) Sync version compatibility. This task is in progress. Task: Identify IP address ranges used The team has identified and shared IP addresses used by both institutions today. The background work/assessment of this task has been completed. Task: Network Design of video surveillance system Page 3 of 5
4 Georgia Perimeter College to enable video data transport for camera viewing and video retrieval 2. Consolidate video surveillance network architectures into one (1) logical 3. GSU Police Department should remain primary customer/authority having view controls of ALL cameras connected throughout both campus Today GSU and GPC both use the same video surveillance management system. The team has now identified the current versions of Ocularis being used on each campus. The activities associated with this task include: 1) Conduct GPC VSS assessment 2) Define routing and firewall ACL s 3) Write Config script 4) test and implement ensuring viewing capability by all campuses and necessary personnel. 5) Upgrade GPC system equipment 6) ensure version compatibility. This task is in progress. Task: Determine wireless infrastructure requirements Georgia Perimeter College to enable GSU SSID authentication and wireless access across the campus. 2. Consolidate wireless network architectures into one (1) logical design. Today GSU and GPC both use the IEEE n standard and RADIUS authentication. The assessment of this task has resulted in the rolling out a new SSID name and using certificate based authentication. This will occur in September The activities associated with this task include: 1) Assess GPC SSID s and functionality 2) Map GPC and GSU SSID s/or create new naming convention 3) Test Configuration 4) Launch testing phase 5) Communicate to end users 6) Launch 7) decommission old SSIDs. This task is in progress. Task: Wired and Wireless Authentication for Students and Employees Georgia Perimeter College to enable GSU SSID authentication and wireless access across the campus. 2. Consolidate wireless network architectures into one (1) logical design. Today GSU and GPC both use the IEEE n standard and RADIUS authentication. The assessment of this task has resulted in the rolling out a new SSID name and using certificate based authentication. This will occur in September The activities associated with this task include: 1) Assess GPC SSID s and functionality 2) Map GPC and GSU SSID s/or create new naming convention 3) Test Configuration 4) Launch testing phase 5) Communicate to end users 6) Launch 7) decommission old SSIDs. This task is in progress. Task: Review of IT service and maintenance contracts Page 4 of 5
5 1. Consolidate video surveillance network architectures into one (1) logical 3. Consolidate wireless network architectures into one (1) logical design. GPC and GSU teams are continuing to gather information as it relates to service and maintenance contracts as they work through the major consolidation tasks. All enterprise vendors are to be notified through this fiscal year renewal process (or prior to July 1) of the intent to merge licenses, the effective licensing date for the new institution, any relevant information with regard to projected FTE/Seats required, adjusted standard renewal/anniversary date of July 1 to align with FY budgets (if not already), request any needed legal amendments or contract changes that may be required, and quote for future budgetary purposes. This task is in progress. Task: Inventory and Review of GPC infrastructure 1. Consolidate video surveillance network architectures into one (1) logical 3. Consolidate wireless network architectures into one (1) logical design. GPC and GSU teams are continuing to gather information as it relates to inventory and GPC infrastructure as they work through the major consolidation tasks. This task is in progress. Other/Final Comments (if any): Page 5 of 5
Consolidation Committee Final Report
Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia
More informationADDENDUM #1 RFP # , Districtwide Network Refresh Design
ADDENDUM #1 RFP #1718-03, Districtwide Network Refresh Design This Addendum forms a part of the Contract Documents and modifies the original Contract Documents. Acknowledge receipt of this Addendum in
More informationPROJECT PROGRESS REPORT Information Technology Equipment. Chabot- Las Positas CCD October 27, Equipment Categories of Hardware and Software:
PROJECT PROGRESS REPORT Information Technology Equipment Chabot- Las Positas CCD October 27, 2010 Equipment Categories of Hardware and Software: Desktop & laptops Network switches & routers Network monitoring
More informationHABERSHAM COUNTY BOARD OF COMMISSION EXECUTIVE SUMMARY
HABERSHAM COUNTY BOARD OF COMMISSION EXECUTIVE SUMMARY SUBJECT: County Dark Fiber Expansion Project DATE: March 7, 2017 (X) RECOMMENDATION ( ) POLICY DISCUSSION BUDGET INFORMATION: ( ) STATUS REPORT ANNUAL
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationInformation Technology Procedure IT 3.4 IT Configuration Management
Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationHow Cisco IT Deployed Enterprise Messaging on Cisco UCS
Cisco IT Case Study July 2012 Enterprise Messaging on Cisco UCS How Cisco IT Deployed Enterprise Messaging on Cisco UCS Messaging platform upgrade and new servers reduce costs and improve management, availability,
More information6/5/ Michael Hojnicki Chief of Technology and Administrative Services
Technology Update 6/5/2018 - Michael Hojnicki Chief of Technology and Administrative Services Projects Completed in 2017 Open Checkbook Published Network & Phone Upgrade High Level Design Competitive Bid
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationTechnology Master Plan Proposal
Fort Bend Independent School District Technology Master Plan Proposal As of May 1, 2018 Infrastructure Only INTRODUCTION AND BACKGROUND Fort Bend ISD (FBISD) has witnessed a tremendous increase in the
More informationIT Disaster Recovery Services Program
Q4-2017 ISAC Update v.20171107 IT Disaster Recovery Strategy Implementation 2008 Data Center Strategic Plan Part 1 Part 2 Disaster Recovery Strategic Plan Part 1 Part 2 2016 2019 Implementation Goals Decouple
More informationCASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC
CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationThe Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft
The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document
More informationNASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen
NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationDesigning Windows Server 2008 Network and Applications Infrastructure
Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of
More informationCouncil, 26 March Information Technology Report. Executive summary and recommendations. Introduction
Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last
More informationMetro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government
Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency
More informationBroward County RFP TEC P1
Broward County RFP TEC2115735P1 John Burns - SVP Sales & Marketing Paul Leppert - VP & Managing Director (TLC Denver) Don West - CARL Strategic Account Consultant CARL X Questions Hosted from Solution
More informationNU Cloud Terms of Service
Overview This document represents the Terms of Service among Northwestern Information Technology (IT) and participating tenants in the NUCloud private cloud environment at Northwestern. The goal of these
More informationRequest for Proposal. I. Introduction. II. Scope of Work. IT Managed Services Support. IT Environment. Main Facility
Request for Proposal IT Managed Services Support I. Introduction The Hoh Indian Tribe ( Tribe or Hoh Tribe ) is located in western Washington State in Jefferson County, 28 miles South of Forks, Washington.
More information2014 NASCIO Recognition Award Nomination
2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes
More informationTechnology Services. FY Budget Presentation
FY 2018-19 Budget Presentation Goals and Accomplishments Overall, completed 74 projects, fulfilled 8,676 service/incident requests, and held uptime of 99.96% Application Consolidation/Reduction initiative-
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationAudit Challenges and Best Practices in a Research University Environment
NSAA Annual Conference Jeffrey Huskamp Vice President and CIO University of Maryland, College Park Carnegie Doctoral/Research University Extensive 18 th ranked public university (US News) Celebrated 150
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationTexas Commission on Fire Protection
2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing
More informationTable of Contents. Page 1 of 6 (Last updated 27 April 2017)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationFOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK
2017 FOLLOW-UP REVIEW OF RISK MANAGEMENT ETC RISK MANAGEMENT FRAMEWORK MA. LUISA JASA-LOQUE IMAAN HIGHER COLLEGE OF TECHNOLOGY Educational Technology Center DISTRIBUTION LIST ETC QA CORDINATOR Report Distribution
More informationContinuity Insights Presentation. April 28, Stephen Forte CEO
Continuity Insights Presentation April 28, 2004 2004 Stephen Forte CEO 818-728-2040 sforte@ascendenttelecom.com The Role of Wireless Communications for Business Continuity Mobility What Problems are Solved?
More informationPerfigo Design Comparison Overview
Perfigo Design Comparison Overview The University of Utah has chosen the Cisco Perfigo product to provide a replacement for the University WANA product. The Perfigo initial implementation will replace
More informationHRSD Position Description: UNIX Systems Administrator
HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position
More informationCampus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1
Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,
More informationGroton Data Center Migration Project
Groton Data Center Migration Project Category Enterprise IT Management Initiatives State Connecticut Contact Mark Raymond, Chief Information Officer mark.raymond@ct.gov Project May 2014 Initiation End
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access
More informationCourse 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Page 1 Course 10233: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 4 days;
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course No.10233B 5 Days Instructor-led, Hands-on Introduction This five-day, instructor-led course provides you with the
More informationADDENDUM #2 TO REQUEST FOR PROPOSAL (RFP) #2252 Institutional Network Service, Data Center Co-location Service, and High-Speed Internet Service
CITY OF CONCORD, CALIFORNIA March 13, 2013 ADDENDUM #2 TO REQUEST FOR PROPOSAL (RFP) #2252 Institutional Network Service, Data Center Co-location Service, and High-Speed Internet Service NOTICE TO PROPOSERS
More informationCampus Network Design
Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationMaximize Your Assets Securely and Cost Effectively
S E N T I N E L P O I N T S E R V I C E S Maximize Your Assets Securely and Cost Effectively Competently track and manage your communication system and network through Altura Sentinel Point Services. We
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationTechnology Meeting Agenda: [Client Name]
Attendees: Status: Meeting Items Meeting Date/Time: Nov 12 Attendees: [client] [names] Attendees: [name] Next Meeting Dec 10 Agenda: 1. Below items and determine next steps Open Items: Item: Security Firewall
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationSony Customer Journey
Sony Customer Journey A declining market share due to new market entrants, Apple and Samsung, meant that cost reduction was a critical issue. The CIO was tasked with reducing the European IT budget by
More informationCyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No
PROPOSAL FORM Cyber Insurance Underwritten by The Hollard Insurance Co. Ltd, an authorised Financial Services Provider www.itoo.co.za @itooexpert ITOO is an Authorised Financial Services Provider. FSP.
More informationSTRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010
STRATEGIC IT ACCOUNTABILITY BOARD (SITAB) MEETING NOTES WEDNESDAY, SEPTEMBER 8, 2010 Attendees: Tony Ambler, Jay Boisseau, Pat Clubb, Andrew Dillon, Brad Englert, Greg Fenves, Rod Hart, Steve Leslie, David
More informationINTRODUCTION EXISTING DESIGN
INTRODUCTION Syringa Networks clearly sees the Idaho Education Network as a valuable educational asset. Like any asset, the network must be well managed in order to maximize its value for all Stakeholders.
More informationPISMO BEACH COUNCIL AGENDA REPORT
PISMO BEACH COUNCIL AGENDA REPORT SUBJECT/TITLE: REVIEW OF INFORMATION TECHNOLOGY (IT) STATUS AND IT STRATEGIC PLAN IMPLEMENTATION UPDATE. RECOMMENDATION: 1. Receive the IT Status and Implementation Update.
More informationDisaster Recovery and Mitigation: Is your business prepared when disaster hits?
1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since
More informationUNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017
UNC Campus Security Initiatives Update Business Affairs Committee May 9, 2017 UNC Campus Security Initiative In August 2013, President Ross asked for a review of current security practices, an assessment
More informationFacilities. Western Illinois University Quad Cities. Consolidated Fiscal-Year 2011 Annual Report and Fiscal-Year 2012 Planning Document
Mission statement: Western Illinois University Quad Cities Facilities Consolidated Fiscal-Year 2011 Annual Report and Fiscal-Year 2012 Planning Document Submitted by: William Brewer University Architect
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationIntroduction to Juniper Networks Wireless LANs (IJWL)
Introduction to Juniper Networks Wireless LANs (IJWL) Course No: EDU-JUN-IJWL Length: Four Days Cost: $2800 (US) Schedule and Registration Course Overview This course is a four-day technical training course
More informationContents. 1 General Terms. Page 1 of 8
Page 1 of 8 Service Description: Advanced Services --- Fixed Price Secure Agile Exchange Advise and Implement (Quick Start) (ASF-CORE-SAI-QS) This document describes Cisco s Secure Agile Exchange Advise
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationBicycle Access & Parking Plan Project List Review
Bicycle Access & Parking Plan Project List Review Bicycle Advisory Committee September 19th, 2013 Strategy Overview New Bicycle Issues and Ideas (BAC, staff, public) Funding External Agency Lead BAPP s
More informationConnecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1
Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationUniversity Network Policies
BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these
More informationMarshall University Information Technology Council. Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE
Marshall University Information Technology Council Procedure ITP-16 IT INFRASTRUCTURE AUTHORIZATION PROCEDURE General Information: 1.1 Scope: This procedure applies to all University employees, including
More informationDisaster Recovery and Business Continuity Planning (Mile2)
Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity
More informationHow Cisco Expedites IT Integration of an Acquisition
How Cisco Expedites IT Integration of an Acquisition Streamlined, cross-functional processes accelerate how new employees work productively and minimize the transition impact on customers Cisco IT Case
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationIs there a preferred vendor (Cisco? ShoreTel? Etc) or a vendor that you wish to avoid?
MVWIB TELECOM RFP QUESTIONS AND ANSWERS AS OF 2 NOV 2016 Is there a preferred vendor (Cisco? ShoreTel? Etc) or a vendor that you wish to avoid? Our preference would be Cisco, but it is not a requirement.
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: Fall 2011 PROGRAM: AUTHOR: Computer Engineering Technologist - Networking Dan Kachur
More informationRequest for Proposals. Information Technology Consultant and Network & Information Technology Support Services
Request for Proposals Information Technology Consultant and Network & Information Technology Support Services July 18, 2018 General Description The City of Greenville is looking to select a qualified firm
More informationNAC Institutional Committee Meeting
Meeting Jet Propulsion Lab July 28-29, 2015 Kathryn Schmoll Chair Membership Committee Members Current Employer Current Position 1 CHAIR: Kathryn (Katy) Schmoll Kathryn Schmoll and Associates, LLC 2 James
More informationUNIT PLAN PART A Program/Pathway Update
UNIT PLAN PART A Program/Pathway Update Program/Pathway: Date: 1/6/2014 Our Mission: Los Angeles Harbor College fosters learning through comprehensive programs that meet the educational needs of the community
More informationCisco Director Class SAN Planning and Design Service
Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationSecurity Incident May Student Information System University of Nebraska Nebraska State College System
Security Incident May 2012 Student Information System University of Nebraska Nebraska State College System 1 NeSIS Overview NeSIS has been operational for two years and is based on Oracle's PeopleSoft
More informationFaculty and Staff, Student Labs Program Update. Information Technology Fiscal Year 2013
Faculty and Staff, Student Labs Program Update Information Technology Fiscal Year 2013 Standardize make/models/configurations of desktop and laptops used on the UMass Lowell campus. Standardize UMass Lowell
More informationTechnology Disaster Recovery Plan updated 06/16/16
Technology Disaster Recovery Plan updated 06/16/16 Overview In the case of natural or other disaster the district needs to be back in operation and functioning in all areas - business, security, education
More informationREQUEST FOR PROPOSALS FOR COMPUTER HARDWARE, SOFTWARE, PERIPHERALS, AND INSTALLATION SERVICES PROPOSAL NO.s PIT & PIT ADDENDUM #4
PURCHASING DEPARTMENT Willowbend Road Peachtree City, GA 3069 Phone: 770-487-767 Fax: 770-63-0 www.peachtree-city.org REQUEST FOR PROPOSALS FOR COMPUTER HARDWARE, SOFTWARE, PERIPHERALS, AND INSTALLATION
More informationRecommendation to Board. Final Action
MOTION NO. M2017-142 Ratification and contract for Tukwila traction power sub-station repairs MEETING: DATE: TYPE OF ACTION: STAFF CONTACT: Operations and Administration Committee Board 12/7/2017 12/21//2017
More informationAgenda Item No. AGENDA ITEM BRIEFING
AGENDA ITEM BRIEFING Submitted by: Billy Hamilton, Executive Vice Chancellor and Chief Financial Officer The Texas A&M University System Subject: Approval to Amend the FY 2016-FY 2020 Texas A&M University
More informationEthernet Your Technology Partner for the Future
Ethernet Your Technology Partner for the Future Working to Redefine Your Business Technology Partnership Choice ETHERNET YOUR TECHNOLOGY PARTNER FOR THE FUTURE RCN Business 1 UPDATING IT INFRASTRUCTURE
More informationOneUConn IT Service Delivery Vision
OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.
More informationThe Windstream Enterprise Advantage for Healthcare
The Windstream Enterprise Advantage for Healthcare Creating personalized healthcare experiences with secure and reliable cloud-optimized IT communications so you can focus on providing a connected, interoperable
More informationCCNA Discovery 4.0 Designing and Supporting Computer Networks
CCNA Discovery 4.0 Designing and Supporting Computer Networks Characterizing Existing Network Chapter 3 1 Objectives 2 Creating a Network Diagram Typically, the first step in installing a new network is
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES
ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES 1. INTRODUCTION 1.1 The Office of Information Technology Services ( OITS ) has the responsibility of managing
More informationInformation Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017
Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &
More informationAppendix 12 Risk Assessment Plan
Appendix 12 Risk Assessment Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A12-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More information