Operational Plan and Processes
|
|
- Amos Lane
- 5 years ago
- Views:
Transcription
1 UK BIM Alliance Operations Operational Plan and Processes
2 UK BIM Alliance Operations - Operational Plan and Processes 1. Introduction This document covers the operational plan and key processes for the Operations area of the UK BIM Alliance and should be read in conjunction with the UK BIM Alliance Terms of Reference. Should any conflict arise between documents the UK BIM Alliance Terms of Reference will take precedence. 2. Aims, objectives and key operational responsibilities General Administration and Secretariat functions for the Alliance. Facilitate the transformation of the Alliance from a non-legal entity into a Not for Profit Organisation as a legal entity, through the outsourced Secretariat Oversea the financial operations of the Alliance through the Secretariat and Finance Committee. Management of meetings and attendee communication. Deliver and maintenance of IT Systems including: Website, , Document Management Systems, online discussion sites and Project Management Systems 3. Team structure, roles and responsibilities Operations Lead Back Office Sytems Team Finance Committee Secretatiat Operational Lead Responsible for the overall operational strategy for the Alliance. Management of the operational team delivery. Management of the Secretariat function and outsourcing. Management and reporting of the Finance Committee Reports to the UK BIM Alliance Operations - Operational Plan and Processes Page 2
3 Back Office Systems Team Document Control Administrator Responsible for the establishment, management and maintenance of the Document Management system for the Alliance. Administers the primary membership and security access for the document folder structure. Monitors and polices adherence to document standards for naming and content structure. Discussion Group Administrator Responsible for the establishment, management and maintenance of the Discussion Group system for the Alliance. Administers the primary membership and security access for the discussion groups. Monitors and polices adherence to standards for discussion groups. Provides guidance to discussion group moderators on appropriate communication in line with the guidance established by the Alliance Communications team. Web Site and Administrator Responsible for the development and maintenance of the Alliance website. Administers the primary membership and security access to the website. Coordinates delivery and performance of the website with the Internet Service Provider Ensures that the information on the website meets Alliance security requirement. Monitors and polices content on the website to ensure it is in line with guidance established by the Alliance Communications team. Manages the system for the UKBIMAlliance.org domain. Project Management System Administrator Responsible for the delivery of project progress tracking and task manager technology. Administers the primary membership and security access to the project management system. UK BIM Alliance Operations - Operational Plan and Processes Page 3
4 Ensures that the project management system meets Alliance security requirement. Secretariat CIRIA will be appointed as the company to take on the Secretariat functions for the Alliance. They will be the Legal entity of the Alliance (initially CIRIA trading as UKBIMA). Their role includes the following responsibilities: Financial services and management (including all accounting services, banking, VAT, etc.) Financial audit (as part of hosts overall audit) Acting as employer for dedicated UKBIMA staff if required Staff support and benefits including pensions and health care Personnel management and support Public and staff insurances Office base and general services for employed/visiting staff Postal address and incoming/outgoing mail services Commercial and legal support Internal controls (including financial, operational and compliance controls) Reporting to the Alliance Finance Committee, through the Operational Lead and ultimately to the Alliance Exec Committee. Finance Committee Made up of representatives from each stream of the Exec committee as well as representation from the Secretariat. The Finance Committee is responsible for the review and recommendation of all financial transactions. The recommendations for expenditure by the Finance Committee will be presented for final approval to the Alliance Exec through the Operational Lead. 4. Activity scopes and plans Meetings Back Office Team - Weekly operational activity meeting. Stephen Holmes (Lead), Shaun Farrell, Henry Fenby-Taylor Finance Committee - Monthly finance review meeting Martin Penney(Lead), Stephen Holmes(Deputy), John Eynon, Rick Hartwig, CIRIA Secretariat - Monthly review meeting in conjunction with Finance Committee Reports Operations Lead UK BIM Alliance Operations - Operational Plan and Processes Page 4
5 Quarterly Report and presentation to Alliance Forum Monthly written Operational report for Alliance Exec committee Monthly written Finance report for Exec committee Fortnightly minutes of Exec committee Secretariat Monthly Finance Statement Quarterly Accounts Report Annual Accounts Report 5. Operational processes See 3. Roles and Responsibilities Instruction to the Secretariat will be directed through the Operational Lead on a day to day basis. Approval for expenditure will be through the Finance Committee with final authorisation given by the Exec Committee. 6. Internal relationships and communications To be kept under review by Exec and Engagement Core Team, managed through Exec, Operations, Programme and Engagement and stream leads. Stephen Holmes - Operations Lead UK BIM Alliance Sept 2017 UK BIM Alliance Operations - Operational Plan and Processes Page 5
NEBOSH Part A accreditation criteria
NEBOSH Part A accreditation criteria 1. The course provider must provide the following contact details for the five roles defined below: a) NEBOSH Communications Coordinator: The person to whom all correspondence
More informationMinimum Requirements For The Operation of Management System Certification Bodies
ETHIOPIAN NATIONAL ACCREDITATION OFFICE Minimum Requirements For The Operation of Management System Certification Bodies April 2011 Page 1 of 11 No. Content Page 1. Introduction 2 2. Scope 2 3. Definitions
More informationPrivacy Policy Wealth Elements Pty Ltd
Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy
More information[Utility Name] Identity Theft Prevention Program
[Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed
More informationIQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification
IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...
More informationRequest for tenders proposing hosting arrangements for the ECPGR Secretariat/EURISCO
Request for tenders proposing hosting arrangements for the ECPGR Secretariat/EURISCO Dear National Coordinators, Based on the outcome of the External Independent Review of the ECPGR Programme, the ECPGR
More informationitsmf Hong Kong Chapter Annual Conference 2008 The new Era of ITSM Keith Aldis Chief Executive & Company Secretary itsmf International
itsmf Hong Kong Chapter Annual Conference 2008 The new Era of ITSM Keith Aldis Chief Executive & Company Secretary 1 itsmf Hong Kong Chapter There are 2 x parts to my presentation 1. 2. ITIL v 3 2 itsmf
More informationDATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:
DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should
More informationNORTHPINE COMMUNITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN 01 st July th June 2022
1 Convene meeting Nominate and elect NCID board PROGRAM 1 MANAGEMENT, COMMUNICATION & OPERATIONS SRA Steering Committee Once at Inception Phase 1 N/A N/A N/A N/A Minutes of meeting and list of elected
More informationLeeds Civic Trust Privacy Policy
Leeds Civic Trust Privacy Policy This document sets out Leeds Civic Trust s Privacy Policy as it relates to the storage and use of personal data. The policy will be reviewed formally by the Trust s Council
More informationGlobal Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research.
CONTENTS i. INTRODUCTION 3 ii. OVERVIEW SPECIFICATION PROTOCOL DOCUMENT DEVELOPMENT PROCESS 4 1. SCOPE 5 2. DEFINITIONS 5 3. REFERENCES 6 4. MANAGEMENT STANDARDS FOR APPROVED CERTIFICATION BODIES 6 4.1
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationChapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017
Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Copyright 2017 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International
More informationUK-led international standards for BIM
UK-led international standards for BIM Kieran Parkinson Digital Transformation Standards Manager Built Environment Copyright 2018 BSI. All rights reserved 27/11/2018 1 BSI Group structure Policy, Engagement
More informationCERTIFICATE SCHEME THE MATERIAL HEALTH CERTIFICATE PROGRAM. Version 1.1. April 2015
CERTIFICATE SCHEME For THE MATERIAL HEALTH CERTIFICATE PROGRAM Version 1.1 April 2015 Copyright Cradle to Cradle Products Innovation Institute, 2015 1 Purpose The intention of the Certificate Scheme is
More informationGREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN
GREEN POINT CITY IMPROVEMENT DISTRICT IMPLEMENTATION PLAN 1st July 2019 to 30 June 2020 1. ADMINISTRATIVE ACTION STEPS RESPONSIBLE DURATION IN MONTHS ACTION 1. Appointment of staff CEO / CID Board / Chairman
More informationCONTINUING PROFESSIONAL DEVELOPMENT POINTS POLICY (CPDP) Board approved 17 May 2016, effective 1 July 2016
CONTINUING PROFESSIONAL DEVELOPMENT POINTS POLICY (CPDP) Board approved 17 May 2016, effective 1 July 2016 1. Policy Statement The purpose for this policy is to enable SCA (Qld) Members to develop and
More informationData Protection policy
This is a template Data Protection Policy for use by Making Music members. It is intended to be taken as a starting point and adapted to suit your group s circumstances. The template comes with notes please
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller
More informationGlobal Statement of Business Continuity
Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationREPORT 2015/010 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/010 Audit of information and communications technology strategic planning, governance and management in the Investment Management Division of the United Nations Joint
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationIAF Mandatory Document for the Transfer of Accredited Certification of Management Systems
IAF MD 2:2007. International Accreditation Forum, Inc. IAF Mandatory Document IAF Mandatory Document for the Transfer of Accredited Certification of Management Systems (IAF MD 2:2007) IAF MD2:2007 International
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationTech Peer Forum IT structure and compliance survey
Q1 Please briefly describe your IT staffing structure - the size and scope of your in-house technology team, IT functions you outsource, and how outsourced resources report within the pool. 1 TASB Risk
More informationData ownership within governance: getting it right
Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data
More informationPayment Card Industry - Data Security Standard (PCI-DSS)
Payment Card Industry - Data Security Standard (PCI-DSS) Tills Security Standard (SAQ P2PE) Version 1-0-0 14 March 2018 University of Leeds 2018 The intellectual property contained within this publication
More informationContents. Sterling Accreditation Annual Report - 1 st October th September 2014 Page 2 of 11
Contents Contents... 2 Glossary... 3 Introduction... 4 Review of the Period.5 Membership 6 Guidace and Information...6 Continuous Professional Development 6 Applications.7 Lodgements...8 Quality Assurance..9
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationSCHEME OF DELEGATION (Based on the model produced to the National Governors Association)
SCHEME OF DELEGATION (Based on the model produced to the National Association) THE PURPOSE OF A SCHEME OF DELEGATION: A scheme of delegation (SoD) is the key document defining which functions have been
More informationRetention & Archiving Policy
Retention & The IES has a responsibility to look after the personal data we collect, including information about our members, employees, event attendees and people browsing our websites. As outlined in
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationFSC STANDARD. Standard for Multi-site Certification of Chain of Custody Operations. FSC-STD (Version 1-0) EN
FOREST STEWARDSHIP COUNCIL INTERNATIONAL CENTER FSC STANDARD Standard for Multi-site Certification of Chain of Custody Operations FSC-STD-40-003 (Version 1-0) EN 2007 Forest Stewardship Council A.C. All
More informationINNOVENT LEASING LIMITED. Privacy Notice
INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR
More informationData Sheet The PCI DSS
Data Sheet The PCI DSS Protect profits by managing payment card risk IT Governance is uniquely qualified to provide Payment Card Industry (PCI) services. Our leadership in cyber security and technical
More informationUniversity of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director
More informationProcedure re-written. (i.e. All staff with responsibility for the creation, use and management of organisational responsibility)
Standard Operating Procedure Title of Standard Operation Procedure: Corporate Records Management Procedure Reference Number: ECT002863 Version No: 2.0 Supersedes Versions No: 0.1 Amendments Made: Procedure
More informationChapter 4. EDGE Approval Protocol for Auditors
Chapter 4 EDGE Approval Protocol for Auditors Version 2.01 June 2016 Copyright 2015 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationCRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS
CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date
More informationCOMMISSION IMPLEMENTING REGULATION (EU) /... of XXX
COISSION IPLEENTING REGULATION (EU) /... of XXX establishing the format for registration and reporting and the frequency of reporting to the register (Text with EEA relevance) THE EUROPEAN COISSION, Having
More informationPeopleSoft Finance Access and Security Audit
PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...
More informationDated 3 rd of November 2017 MEMORANDUM OF UNDERSTANDING SIERRA LEONE NATIONAL ehealth COORDINATION HUB
Memorandum of Understanding for Joint Working by Ministry of Health and Sanitation, Ministry of Information and Communication on the Government of Sierra Leone ehealth Coordination Hub Dated 3 rd of November
More informationStrategic Plan for years Updated - 8/9/14 Review & re-approved
The Mid-Florida Chapter of APICS will continue to utilize a Continuous Improvement concept, along with the C-BAR as tools to better manage the chapter. Vision: Mission: Mid-Florida Chapter of APICS will
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 27006 First edition 2007-03-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems
More informationDe Montfort Students Union Student Data Privacy Statement
De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations
More informationUniversity of Texas Arlington Data Governance Program Charter
University of Texas Arlington Data Governance Program Charter Document Version: 1.0 Version/Published Date: 11/2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE OF THIS DOCUMENT... 3 1.2 SCOPE...
More informationCyber Security is it a boardroom issue?
Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness
More informationEffective 1 January 2016
BATS Chi-X Europe Market Data Policy Effective 1 January 2016 Published October 2015 Copyright BATS Trading Limited. No part of this material may be copied, photocopied, duplicated or published in any
More informationFISH HOEK BUSINESS IMPROVEMENT DISTRICT NPC MANAGEMENT & OPERATIONS
FISH HOEK BUSINESS IMPROVEMENT DISTRICT NPC 2017/18 IMPLEMENTATION PLAN 1 st July 2017 to 30 th June 2018 FISH HOEK BUSINESS IMPROVEMENT DISTRICT NPC MANAGEMENT & OPERATIONS APPENDIX A 1. Annual General
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationBringing Cybersecurity to the Boardroom Bret Arsenault
SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity
More informationJefferies EMEA Privacy Notice
Jefferies International Limited Vintners Place 68 Upper Thames St London United Kingdom Jefferies EMEA Privacy Notice 1. Introduction This Privacy Notice explains what we do with your personal data. It
More informationPrivacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd
Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationStudent Union Social Programming Board Constitution
Student Union Social Programming Board Constitution Preamble The Social Programming Board (SPB) is an Executive Entity of the Student Union at Washington University in Saint Louis, charged with providing
More informationTRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate
TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment
More informationThis document provides a general overview of information security at Aegon UK for existing and prospective clients.
Information for third parties Information Security This document provides a general overview of information security at Aegon UK for existing and prospective clients. This document aims to provide assurance
More informationGuardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY
1. Statement of Policy (Guardian) needs to collect and use certain types of information about the Individuals or Service Users with whom they come into contact in order to carry on our work. This personal
More informationMMARS Financial, Labor Cost Management (LCM) and Commonwealth Information Warehouse (CIW) Reports
MMARS Policy: Audit Issue Date: April 30, 2007 Date Last Revised: MMARS Financial, Labor Cost Management (LCM) and Commonwealth Information Warehouse (CIW) Reports Executive Summary The Massachusetts Management
More informationIT Services Policy/Policy Document
IT Services Policy/Policy Document DG26 System Backup and Recovery Prepared by: < Shelim Miah> Version: 2.2 Page 1 of 8 Effective Date: 17/03/17 Review Date: 17/03/18 Reviewers: Steve Wicks, Servers &
More informationRSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES
RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES ISSUED DECEMBER 2018 Table Of Contents 1. Model A sub-branches... 2 2. Model B sub-branches... 6 1 SUB-BRANCH STANDARD OPERATING PROCEDURES (SOPs) These
More informationQualification and Renewal Criteria for certification to engage in the practice of accounting
Public Accounting Certification Committee Rules Qualification and Renewal Criteria for certification to engage in the practice of accounting Overview: Section I. New Entrants to Public Accounting This
More informationWelcome John Harris, Director General
Business Plan 2018 Welcome John Harris, Director General Agenda - speakers Chief Minister, Senator Ian Gorst, Government of Jersey Key highlights of Lord Eatwell, Chairman, JFSC Strategic and major priorities
More informationData Protection policy (GDPR)
Data Protection policy (GDPR) This is the statement of general policy and arrangements for: Overall and final responsibility for health and safety is that of: Day-to-day responsibility for ensuring this
More informationAction Plan Developed by The Iranian Institute of Certified Accountants (IICA) BACKGROUND NOTE ON ACTION PLANS
BACKGROUND NOTE ON ACTION PLANS Action Plans are developed by IFAC members and associates to address policy matters identified through their responses to the IFAC Compliance Self-Assessment Questionnaire.
More informationData Encryption Policy
Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager
More informationR2 Code of Practices
R2 Code of Practices R2 Certification Process Requirements Version 1.0 Effective Date: July 1, 2013 Copyright R2 Solutions All Rights Reserved Table of Contents I. Introduction... 3 II. Expected Outcomes...
More informationUNCONTROLLED IF PRINTED
161Thorn Hill Road Warrendale, PA 15086-7527 1. Scope 2. Definitions PROGRAM DOCUMENT PD 1000 Issue Date: 19-Apr-2015 Revision Date: 26-May-2015 INDUSTRY MANAGED ACCREDITATION PROGRAM DOCUMENT Table of
More informationHBW LAW LTD T/A HESELTINE BRAY & WELSH
HBW LAW LTD T/A HESELTINE BRAY & WELSH CLIENT INFORMATION POLICY HOW WE STORE AND USE YOUR PERSONAL INFORMATION INFORMATION WE COLLECT AND HOLD ABOUT YOU To enable us to provide you with our services we
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationData Protection policy
DULWICH SYMPHONY ORCHESTRA Data Protection policy 1. Overview Policy prepared by: Dan Sullivan and Jeremy Crump Approved by committee on: 3 May 2018 Next review date: 1 May 2020 Introduction In order to
More informationStep by Step Guide to Self-Registration on Selenity Expenses
1 Step by Step Guide to Self-Registration on Selenity Expenses NOTE FOR PANEL MEMBERS if you are a panel member you should claim from your employer and ask them to invoice Health Education England for
More informationINFORMATION TECHNOLOGY SECURITY POLICY
INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin
More informationData Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory
Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable
More informationElectronic Records Management System (ERMS)
Electronic Records Management System (ERMS) ERMS Folder Creation and Titling Conventions 2015 Contents 1. Introduction... 3 2. ERMS Folders... 3 3. Creating an ERMS Folder... 4 4. ERMS Folder Creation
More informationLevel 2 Diploma in Business Administration (601/3964/X)
Level 2 Diploma in Business Administration (601/3964/X) This document lists the units available in this qualification and how they compare to units in the previous version of this qualification. Units
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10
More informationArchiMate Certification for People Training Course Accreditation Requirements
ArchiMate Certification for People Training Course Accreditation Requirements Version 2.0 January 2012 Copyright 2012, The Open Group All rights reserved. No part of this publication may be reproduced,
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationInstitute of Technology, Sligo. Information Security Policy. Version 0.2
Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date
More informationDATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES
DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES You have been given this Notice because Babington collects, uses and stores information about colleagues
More informationMerchant Guide to PCI DSS
0800 085 3867 www.cardpayaa.com Merchant Guide to PCI DSS Contents What is PCI DSS and why was it introduced?... 3 Who needs to become PCI DSS compliant?... 3 Card Pay from the AA Simple PCI DSS - 3 step
More informationInformation Governance Policy
2015 Information Governance Policy University of Wolverhampton Version 1.0 28 th October 2015 Policy Approval Procedure Information Governance Policy Policy Author: Stephen Hill Dept.: DAS Information
More informationUpdate from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013
Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S
More informationCHIEF EXECUTIVE OFFICER/MANAGING PARTNER AND COMPLIANCE, REGULATORY, AND LEGAL DEPARTMENTS
Information Memo Member Firm Regulation NYSE Regulation, Inc. 20 Broad Street New York, NY 10005 nyse.com Number 07-43 May 9, 2007 ATTENTION: TO: SUBJECT: CHIEF EXECUTIVE OFFICER/MANAGING PARTNER AND COMPLIANCE,
More informationYou can access the AIMS user guide in the Related Links section at the top right of the page.
Tender response form Click on any of the underlined headings to start your form. Once you have completed all mandatory questions within a section and moved to the next, you will see a tick appear on the
More informationASP Professional Standards and Certification Program for Strategic Planning and Strategic Management ASP CERTIFICATION
ASP Professional Standards and Certification Program for Strategic Planning and Strategic Management ASP CERTIFICATION 1 ASP Certification Policies (version 4.0 - Sept 2016) Table of Contents Section I:
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationSCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1
2000 Powell Street, Ste. 600 Emeryville, CA 94608 USA +1.510.452.8000 main +1.510.452.8001 fax www.scsglobalservices.com SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD-40-003
More informationOpportunity Lives Here
Opportunity Lives Here Southern Virginia Higher Education Center Policy Policy # 4107 Policy Title: INFORMATION TECHNOLOGY (IT) PHYSICAL ACCESS CONTROL POLICY Responsible Oversight Director: Chief Finance
More informationINFORMATION SECURITY AND RISK POLICY
INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:
More informationGuidance - publication of ISSAIs and INTOSAI GOVs on issai.org
PSC INTOSAI Professional Standards Committee Guidance - publication of ISSAIs and INTOSAI GOVs on issai.org This document identifies the process which ISSAI and INTOSAI GOV guidelines developed by INTOSAI
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More information