Information Security Management System ISO/IEC 27001:2013

Size: px
Start display at page:

Download "Information Security Management System ISO/IEC 27001:2013"

Transcription

1 Information Security Management System ISO/IEC 27001:2013 CAPACITY MANAGEMENT POLICY For PTM Use Only Date: 25 th Feb 2015 Written By: Asiah Abu Samah Pengerusi Jawatankuasa Pengguna ISMS Verified By: Haslina Abd Hamid Wakil Pengurusan Keselamatan Maklumat (ISMR) Approved By: Dr David Pengarah Pusat Teknologi Maklumat

2 Revision History Date of No Change 1 1st October 2014 Description Page Version Approved By Remove MS from Front Page. Front 1.1 Dr David Page 2 25 th Nov 2014 Inserted TERHAD logo Header 1.2 Dr David 3 25 th Nov 2014 Updated policy statements 3, Dr David 4 25 th Feb 2015 Updated scope statement to include SAN storage Dr David 5 25 th Feb 2015 Updated section 4.0 to include SAN storage Dr David FOR DEPARTMENT USE ONLY Page 1 of 4

3 1.0 Purpose Capacity Management ensures that Capacity and Performance of the IT Infrastructure in UM Centre For Information Technology (PTM) matches the evolving demands of UM s business in the most cost-effective and timely manner. Capacity Management requires a solid understanding of the university s service needs, PTM s current service capability and the underlying IT Infrastructure (the means of service delivery), and is responsible for ensuring that all current and future capacity related requirements demanded by the university are provided by PTM in a timely and cost effective manner. Capacity management addresses the Availability component of Information Security Management Scope 1.1 Objectives The goal of capacity management is to ensure availability of services and it s performance. This applies to all core services provided by PTM which includes internet services, critical servers and core network equipment: 2.1 Critical Network Equipment (eg: supercore switches, firewalls, DHCP servers, network appliances, etc) 2.2 Monitoring systems (eg: RIIL, Nagios) 2.3 Critical servers 2.4 Backup system 2.5 SAN Storage This document is limited to those ICT equipment in PTM and does not cover other resources like People, Processes and Financials. FOR DEPARTMENT USE ONLY Page 2 of 4

4 3.0 Roles and Responsibilities 3.1 PTM Director Responsible in delivering & ensuring capacity management is in place PTM Director shall be the reviewer of PTM s Capacity Management. 3.2 Network Responsible in assessing network needs and provide the required resources to fulfill the capacity 3.3 Data Centre Responsible for assessing servers and backup capacity to fulfill UM ICT requirement. 3.4 Management Iiformation System (MIS) 4.0 Capacity Activities Provide requirement (input/feedback) as per plan to Network and Data centre heads to facilitate capacity planning. 4.1 Capacity Review Refer Capacity Review Procedure 4.2 Monitoring Capacity Management Planning shall be done on an annual basis. The utilization of each resource and service shall be monitored on monthly basis. FOR DEPARTMENT USE ONLY Page 3 of 4

5 4.3 Analyze While monitoring, the collected data is analyzed to determine whether threshold need to be readjusted, resources to be tuned or capacity to be increased/decreased. In the event capacity needs to be increased and results in financial implication, it needs to be escalated to head of division/ PTM Director. Sample of resources monitored and analyzed are: a) Memory usage ( AverageThreshold 70%) b) CPU (Average Threshold 70%) c) Hard disk usage (Average Threshold 70%) d) Network bandwidth (AverageThreshold 50%) Please find enclosed Appendix threshold for SAN storage 4.4 Change Initiation Once the threshold is reached (average for the month), analysis must be done & appropriate action must be taken. FOR DEPARTMENT USE ONLY Page 4 of 4

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27 001:2013 Information Security Management System ISO/IEC 27001:2013 For PTM Use Only Date: 7 th June 2017 Written By: Dr Kanmani Munusamy, Marina Mansor

More information

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27001:2013 WEB HOSTING POLICY For PTM Use Only Date: 18 th Nov 2016 Written By: Junnaini Ismun Ketua Bahagian Pengurusan Pusat Data, PTM Verified By: Nor

More information

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27001:2013 OF ICT FACILITIES PENGGUNAAN KEMUDAHAN ICT For PTM Use Only Date: 7 th June Written By: Junnaini Ismun Pengerusi Jawatankuasa ISMS Verified By:

More information

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27001:2013 POLISI PEMINDAHAN & PELUPUSAN For PTM Use Only Date: 25 th Nov 2014 Written By: Nor ain Mohamed Ketua Bahagian Infrastruktur ICT Verified By: Haslina

More information

IM Misrouted Ticket Process

IM Misrouted Ticket Process Purpose: The purpose of this document is to define the process and tasks associated when a Tier 2/3 team is assigned a ticket by the Service Desk that is not their responsibility. The goals of this process

More information

itsmf Annual Conference 2012

itsmf Annual Conference 2012 itsmf Annual Conference 2012 Applying ITIL to Cloud Computing Mr. HP Suen Director itsmf International Executive Board Agenda Definition of Cloud Computing On-demand self service Pool of resources Pre-production

More information

Service Description CloudCore

Service Description CloudCore CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service

More information

End User Terminal Service

End User Terminal Service Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

McGill University Virtualization Service Description and Service Level Agreement

McGill University Virtualization Service Description and Service Level Agreement McGill University Virtualization Service Description and Service Level Agreement Document Control Revision No. Document Control Date Description Approved By 1.0 January 19, 2007 Creation of the document

More information

KENYA ACCREDITATION SERVICE

KENYA ACCREDITATION SERVICE KENAS-POL-004 02 06/08/2018 06/09/2018 POL 1 of 5 Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Document. Authored by ASSISTANT DIRECTOR

More information

ISO & ISO & ISO Cloud Documentation Toolkit

ISO & ISO & ISO Cloud Documentation Toolkit ISO & ISO 27017 & ISO 27018 Cloud ation Toolkit Note: The documentation should preferably be implemented order in which it is listed here. The order of implementation of documentation related to Annex

More information

SERVICE DESCRIPTION ISO Lex. Certifications

SERVICE DESCRIPTION ISO Lex. Certifications SERVICE DESCRIPTION Lex ISO/IEC 20000-1 INFORMATION TECHNOLOGY - SERVICE MANAGEMENT SYSTEM Companies of any size rely on effective IT service management. No matter where you re based or what you do, your

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Voluntary Product Accessibility Template (VPAT ) WCAG Edition. About This Document. Version 2.2 July 2018

Voluntary Product Accessibility Template (VPAT ) WCAG Edition. About This Document. Version 2.2 July 2018 This document is broken into two main sections: Voluntary Product Accessibility Template (VPAT ) WCAG Edition Version 2.2 July 2018 About This Document...1 Essential Requirements and Best Practices for

More information

Operating Level Agreement

Operating Level Agreement IT Applications with Critical Service Levels Dispatch and Compliance Monitoring (DCM) Attachment B: Appendix B2.8 Document Change Management Version Date Short Description V1.0 Nov 18, 2005 Initial Draft

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

Joint Task Force District-Wide 40J Technology Program Monthly Status Update

Joint Task Force District-Wide 40J Technology Program Monthly Status Update Los Angeles Community College District PROGRAM MANAGEMENT SERVICES Joint Task Force District-Wide 40J Technology Program Monthly Status Update Build-LACCD IT PMO 01/31/2017 40J Technology Agenda 40J Technology

More information

TIMICO LIMITED SERVICE SPECIFIC SCHEDULES

TIMICO LIMITED SERVICE SPECIFIC SCHEDULES TOTAL HOSTING DEFINITIONS In this Service Specific Schedule, the following expressions shall have the following meaning unless the context otherwise requires: Compute Data Centre Infrastructure Data Centre

More information

European Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number:

European Commission. Immigration Portal Development Case. Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by: Public: Reference Number: EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Immigration Portal Development Case Date: 08/06/2007 Version: 1.0 Authors: Revised by: Approved by:

More information

Operating Level Agreement

Operating Level Agreement IT Application with Critical Service Level Distribution Analysis & Design (DAD) Attachment B: Appendix B 2.2 Document Change Management Version Date Short Description V1.0 Nov 18, 2005 Initial Draft V1.2

More information

Engineering Document Control

Engineering Document Control Division / Business Unit: Function: Document Type: Enterprise Services All Disciplines Procedure Engineering Document Control Applicability ARTC Network Wide SMS Publication Requirement Internal / External

More information

Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)

Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification) Research of Personnel 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the coordination of interfaces in complex large scale

More information

ASD CERTIFICATION REPORT

ASD CERTIFICATION REPORT ASD CERTIFICATION REPORT Amazon Web Services Elastic Compute Cloud (EC2), Virtual Private Cloud (VPC), Elastic Block Store (EBS) and Simple Storage Service (S3) Certification Decision ASD certifies Amazon

More information

HPE 3PAR Performance and Capacity Trending Service

HPE 3PAR Performance and Capacity Trending Service Data sheet HPE 3PAR Performance and Capacity Trending Service HPE Lifecycle Event Services HPE 3PAR Performance and Capacity Trending Service provides data collection, analysis, and reports with key performance

More information

Continual Improvement of Data Centre Energy Performance

Continual Improvement of Data Centre Energy Performance Continual Improvement of Data Centre Energy Performance Solutions for maintaining ISO 50001 certification Mike Gilmore, e-ready Building Limited Mike Gilmore Standards Activities Member - JTC1 SC25 WG3

More information

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018

Oracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018 Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009 Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009

More information

UNECE DETA Deployment Feasibility Study

UNECE DETA Deployment Feasibility Study Document Date Department/Name 30/05/2011 ISU/HV UNECE DETA Deployment Feasibility Study Project Initiation Documentation Document Location The source of the document will be found in [TBD] Document History

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Accreditation Criteria For Conformity Assessment Bodies

Accreditation Criteria For Conformity Assessment Bodies Page 1 of 8 Reviewed by: Getnet Tsigemalak Approved by: Araya Fesseha Position: Quality Manager Position: Director General Signature: Signature: Contents Page 1 Purpose and Scope... 2 2 References... 2

More information

AUDIT OF ICT STRATEGY IMPLEMENTATION

AUDIT OF ICT STRATEGY IMPLEMENTATION APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken

More information

The Pursuit of ISO/IEC 27001:2005 Certification. Joan Ross, CISSP, NSA IEM Moss Adams LLP

The Pursuit of ISO/IEC 27001:2005 Certification. Joan Ross, CISSP, NSA IEM Moss Adams LLP The Pursuit of ISO/IEC 27001:2005 Certification Joan Ross, CISSP, NSA IEM Moss Adams LLP When you think of compliance, what comes to mind? The Compliance Paradigm Game...test your knowledge for fun and

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration

More information

CCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune.

CCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune. Sanjay Kumar Swami Email: Sanjay.swami@hotmail.com Cell +91-8105959777 Pune OBJECTIVE: IT NETWORK Professional Summary OBJECTIVE Intend to build a challenging career in a professionally managed, progressive

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Data Governance Framework

Data Governance Framework Data Governance Framework Purpose This document describes the data governance framework for University of Saskatchewan (U of S) institutional data. It identifies designated roles within the university

More information

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service

More information

Using ITIL to Measure Your BCP

Using ITIL to Measure Your BCP Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

ITIL Capacity Management Deep Dive

ITIL Capacity Management Deep Dive ITIL Capacity Management Deep Dive Chris Molloy IBM Distinguished Engineer International Business Machines Agenda IBM Global Services ITIL Business Model ITIL Architecture ITIL Capacity Management Introduction

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2

More information

Title: CAPACITY PLANNING - SERVER/HOST INFORMATION FORM

Title: CAPACITY PLANNING - SERVER/HOST INFORMATION FORM POLICY: In order to accurately compute capacity of each mainframe/midrange/server for the Capacity Plan, a Server/Host Information Form is to be filled out for each existing server or host managed by MS.

More information

REPORT 2015/186 INTERNAL AUDIT DIVISION

REPORT 2015/186 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective

More information

Tiscali Business Services Wholesale IPVPN Services Summary

Tiscali Business Services Wholesale IPVPN Services Summary Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.

More information

FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide. Version 1.2

FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide. Version 1.2 FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide Version 1.2 October 21, 2016 FedRAMP POA&M Template Completion Guide v1.1 September 1, 2015 Document Revision History Date Description

More information

Hostname System Configuration Documentation

Hostname System Configuration Documentation Hostname System Configuration Documentation Version 0.0 25-Jan-18 Delivered January 25, 2018 Version 0.0 By: Gary Neshanian (consultant) Nish Consulting 2336 Elden Ave., Suite G Costa Mesa, CA 92627 Phone

More information

I. Tariff language for Transmission Losses Applied to Monthly Reported Network Loads: (for tariff)

I. Tariff language for Transmission Losses Applied to Monthly Reported Network Loads: (for tariff) I. Tariff language for Transmission Losses Applied to Monthly Reported Network Loads: (for tariff) * MISO will add the underlined text provided by the Owners Committee to Section 34.2 of the Tariff with

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Use of Mobile Devices on Voice and Data Networks Policy

Use of Mobile Devices on Voice and Data Networks Policy World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by

More information

Hetch Hetchy Water and Power of the City and County of San Francisco. Joint Transmission Planning Base Case Preparation Process

Hetch Hetchy Water and Power of the City and County of San Francisco. Joint Transmission Planning Base Case Preparation Process California Independent System Operator & Hetch Hetchy Water and Power of the City and County of San Francisco Joint Transmission Planning Base Case Preparation Process This is a living document. Please

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...

More information

1 SAP HANA Remote Monitoring

1 SAP HANA Remote Monitoring Page 1 of 5 Service Description: Cisco Managed for Data Center: SAP HANA Technology Addendum to Cisco Managed for Enterprise Common Service Description This document referred to as a Technology Addendum

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

On the EGI Operational Level Agreement Framework

On the EGI Operational Level Agreement Framework EGI-InSPIRE On the EGI Operational Level Agreement Framework Tiziana Ferrari, EGI.eu EGI Chief Operations Officer 1 Outline EGI and its ecosystem EGI Service Infrastructure Operational level agreements

More information

EU Code of Conduct on Data Centre Energy Efficiency

EU Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all

More information

Supervisory Control and Data Acquisition (SCADA) Performance Criteria Transmission Maintenance Procedure No. 6

Supervisory Control and Data Acquisition (SCADA) Performance Criteria Transmission Maintenance Procedure No. 6 Supervisory Control and Data Acquisition (SCADA) Performance Criteria Transmission Maintenance Procedure No. 6 Version 3 Effective Date 10/17/2017 Approved by: Transmission Maintenance Coordination Committee

More information

Northwestern University Collaboration Services

Northwestern University Collaboration Services Information Technology Northwestern University Collaboration Services Project Has Been Completed Status Period Period Start Date: 2/13/2012 Period End Date: 5/04/2012 Cost performance 0% under budget Schedule

More information

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

StruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits

StruxureWare TM Data Center Operation Periodic Maintenance. Statement Of Work. 2.0 Features & Benefits - 1 - StruxureWare TM DC Operation Periodic Maintenance Service Integration Service Statement Of Work 1. Executive summary StruxureWare TM Data Center Operation Periodic Maintenance Table of Contents 1.0

More information

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting

More information

Andrew Durant/Ellen Sullivan

Andrew Durant/Ellen Sullivan AGENDA ITEM: 3.5 INFORMATION MANAGEMENT, TECHNOLOGY AND GOVERNANCE COMMITTEE DATE OF MEETING: 2 OCTOBER 2018 Subject : Approved and Presented by: Prepared by: Other Committees and meetings considered at:

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

University of Hawaii Hosted Website Service

University of Hawaii Hosted Website Service University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

CABINET PLANNING SYSTEM PROCUREMENT

CABINET PLANNING SYSTEM PROCUREMENT Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt

More information

Turn-key Vulnerability Management

Turn-key Vulnerability Management Turn-key Vulnerability Management Security Manager The solution for IT security in your organisation Security issues: How many? Where are they? How can I correct them? Compliance: Has it been achieved

More information

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report. Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...

More information

Policies and Procedures Date: February 28, 2012

Policies and Procedures Date: February 28, 2012 No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...

More information

FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide. Version 1.0

FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide. Version 1.0 FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide Version 1.0 May 27, 2015 Document Revision History Date Version Page(s) Description Author May 27, 2015 1.0 All Initial Version C. Andersen June

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

AGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE

AGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE AGENDA ITEM: 3.4 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE DATE OF MEETING: 3 MAY 2018 Subject: Approved and Presented by: Prepared by: Other Committees and meetings considered at: Considered

More information

VMware vsphere 6.5/6.0 Ultimate Bootcamp

VMware vsphere 6.5/6.0 Ultimate Bootcamp VMware vsphere 6.5/6.0 Ultimate Bootcamp Class Duration 5 Days Introduction This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter

More information

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership CX-E Cloud Hosting Provider Intermedia Introduction AVST has selected Intermedia as the cloud provider for our hosted CX-E Cloud offering. Intermedia delivers an enterprise-grade cloud infrastructure that

More information

Password Standard. Suzanne Baker Version Effective Date 7/12/2013 Last Updated 7/12/2013

Password Standard. Suzanne Baker Version Effective Date 7/12/2013 Last Updated 7/12/2013 Password Standard Responsible Parties Prepared By Document Version Number Phone Number Suzanne Baker Version 1.1 314-977-4185 Effective Date 7/12/2013 Last Updated 7/12/2013 Department(s) Responsible ITGS:IT

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Security Driven Compliance

Security Driven Compliance Security Driven Compliance Using the FFIEC Cybersecurity Assessment Effectively Presented by Bryan Boam Azureity, Inc. Agenda Who is Azureity? Compliance Driven Security - Traditional Security Model Azureity

More information

NHS WALES INFORMATICS SERVICE DATA QUALITY ASSURANCE NATIONAL STATISTICS

NHS WALES INFORMATICS SERVICE DATA QUALITY ASSURANCE NATIONAL STATISTICS NHS WALES INFORMATICS SERVICE DATA QUALITY ASSURANCE NATIONAL STATISTICS Version: 2.0 Date: 3 rd November 2016 Document History Document Location The source of the document will be found on the Programme

More information

ITD SERVER MANAGEMENT PROCEDURE

ITD SERVER MANAGEMENT PROCEDURE ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update

More information

HITSP/T16. October 15, 2007 Version 1.1. Healthcare Information Technology Standards Panel. Security and Privacy Technical Committee.

HITSP/T16. October 15, 2007 Version 1.1. Healthcare Information Technology Standards Panel. Security and Privacy Technical Committee. October 15, 2007 Version 1.1 HITSP/T16 Submitted to: Healthcare Information Technology Standards Panel Submitted by: Security and Privacy Technical Committee 20071015 V1.1 D O C U M E N T C H A N G E H

More information

SMO Appendix 1: Terms of Reference (22 March 2018)

SMO Appendix 1: Terms of Reference (22 March 2018) SMO 2017-06 Appendix 1: Terms of Reference (22 March 2018) ABOUT SCA The Swedish Committee for Afghanistan (SCA) is an aid organisation that has worked in Afghanistan since 1982. We carry out development

More information

Australian Standard. Industrial automation systems and integration Open systems application integration framework

Australian Standard. Industrial automation systems and integration Open systems application integration framework AS ISO 15745.2 2004 ISO 15745-2:2003 AS ISO 15745.2 Australian Standard Industrial automation systems and integration Open systems application integration framework Part 2: Reference description for ISO

More information

LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU

LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE. Loughborough University (LU) Research Office SOP 1027 LU LOUGHBOROUGH UNIVERSITY RESEARCH OFFICE STANDARD OPERATING PROCEDURE Loughborough University (LU) Research Office SOP 1027 LU Process for Writing Study Protocols for NHS Research Sponsored by Loughborough

More information

SOUTH AFRICAN NATIONAL STANDARD

SOUTH AFRICAN NATIONAL STANDARD ISBN 978-0-626-34280-7 ISO 9004:2009 SOUTH AFRICAN NATIONAL STANDARD Managing for the sustained success of an organization A quality management approach This national standard is the identical implementation

More information

Accreditation programme for management systems certification bodies NAR IRT Edition 2

Accreditation programme for management systems certification bodies NAR IRT Edition 2 Accreditation programme for management systems certification bodies NAR-01-04-IRT Edition 2 Approved by: Csaba Bodroghelyi Deputy Director General Responsible for preparation: Consistency of content reviewed

More information

Voluntary Product Accessibility Template (VPAT ) Revised Section 508 Edition. About This Document. Version 2.2 July 2018

Voluntary Product Accessibility Template (VPAT ) Revised Section 508 Edition. About This Document. Version 2.2 July 2018 Voluntary Product Accessibility Template (VPAT ) Edition Version 2.2 July 2018 About This Document...1 Essential Requirements and Best Practices for Information & Communications Technology (ICT) Vendors...3

More information

2014 Bond Technology Update Progress of the Technology Network Infrastructure Upgrades Long Range Planning Committee March 4, 2015

2014 Bond Technology Update Progress of the Technology Network Infrastructure Upgrades Long Range Planning Committee March 4, 2015 2014 Bond Technology Update Progress of the Technology Network Infrastructure Upgrades Long Range Planning Committee March 4, 2015 2014 Bond Technology Update Progress of the Technology Network Infrastructure

More information

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB)

SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Name of Institution SOUTH AFRICAN LIBRARY FOR THE BLIND (SALB) Bid Number SALB 2019/01/01 A Description ICT Disaster Recovery and ICT Business Continuity Services to SALB Date Published 20/03/2019 Closing

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information