SOP Unplanned Outages/Major Incidents

Size: px
Start display at page:

Download "SOP Unplanned Outages/Major Incidents"

Transcription

1 Table of Contents Definitions... 2 Incident... 2 Declaring... 2 Incident Levels... 3 Priority Priority Priority Priority Mission Critical Services... 3 Authentication... 3 Computer Labs Network... 4 Wireless Network... 4 Power Disruptions to Campus... 4 Storage Area Network (SAN) Disruption... 4 Roles and Responsibilities of Team for Priority 1 Outages/Major Incidents... 4 CIO or Backup... 4 Incident Commander... 4 Technical Lead... 4 User Support Lead... 4 Communications Lead... 5 Field Coordinator... 5 Service Owners... 5 Subject Matter Expert (SME)... 5 Communications... 5 Internal Communications Options... 5 External Communications Options

2 Reporting... 6 Meeting Location... 7 Logistics... 7 Execution of Work Steps for Priority1 Major Incident... 8 Incident commander duties General duties Incident commander timed checklist Check List Review the Emergency Prep roles and procedures! Username: it Password: Ic3 Definitions Incident Whenever a user is not receiving an expected level of service from an IT service. Expected levels of service are based on Service Level Agreements (SLA). Major Incident/Outage A major incident is defined as a significant event, which demands a response beyond the routine, resulting from uncontrolled developments in the course of the operation of any establishment or transient work activity. Declaring Mission critical (university or internal) IT service(s) are not performing at the expected level for a period of 30 minutes unless defined differently in the SLA or designated otherwise by this plan. 2

3 Incident Levels Priority 1 Mission critical services are not performing for the University. All appropriate resources will be dedicated to restore service(s). Priority 2 Mission critical services are not performing for departments or computer labs. Service(s) is not performing at a campus or enterprise level. Appropriate services owners will be dedicated to restore service(s). Priority 3 Address problem and escalate as necessary. These incidents do not require the dedication of level 1 or 2. Priority 4 There is a known work around for the issue. Does not require dedicate resources to resolve. Mission Critical Services Authentication Accepting authentication requests and responses for the following systems: Blackboard Campus desktop computers Central IT maintained computer lab machines CUSIS portal MyUCCS Portal Wireless System Computer Labs Disruptions to IT maintained computer lab machines not allowing customers the ability to utilize systems. messages not flowing in or out of the following systems: Exchange on premise Office 365 Cloud Solution Note: Unless the service outage is determined to be an exclusive Microsoft issue and UCCS IT personnel have no control to participant in a resolution, than this will not follow the full Major Critical procedures. Conceivably only the communication plan will be followed. 3

4 Network Disruptions to campus network systems to include: Campus Firewalls Campus Routing Campus Switches Connections in and out or within the El Pomar Data Center Connections in and out or within the Columbine Data Center Connections in and out or within Main Hall and Cragmor Hall External internet connectivity Wireless Network Disruptions to the wireless system not allowing customers to utilize the network Power Disruptions to Campus Any power disruption to the El Pomar or Columbine Data Centers lasting longer than 10 minutes. Storage Area Network (SAN) Disruption Any disruption to data flowing in or out of the campus SAN solution. Roles and Responsibilities of Team for Priority 1 Outages/Major Incidents CIO or Backup Authorize resources for the major incident; direct communication with Chancellor and UCCS Leadership team; and if needed communications with Presidents office. Incident Commander Coordinate plan; oversee response; lead meetings; organize meals; and provide funding; See below for detailed description. Technical Lead Examine situation; confirm major incident; attempt to identify root cause; work to find technical options; present technical options to team; and participant with plan where needed. User Support Lead Provide information from user s perspective; provide user support options; contact specialized users; and participant where needed. 4

5 Communications Lead Create plan for messaging including frequency; provide messaging to campus; update UCCS.info; point person for internal communication; and participant where needed. Field Coordinator Provide information from the field; deliver support from the field; participant where needed. Note: depending on the major incident this role may not be needed. Service Owners Provide information on services effected; work with technical lead to create options for plan of action. Subject Matter Expert (SME) An individual with a high-level of overall knowledge of the service impacted, both in terms of general architecture and business service provided. Communications Internal Communications Options Communications should be sent out from the helpdesk@uccs.edu address if possible outage@uccs.edu - hosted on lists.uccs.edu (Communigate server local infrastructure must be working) (Texting and ) outage@uccs.info - hosted through Bluehost.com (Texting and ) uccshelpdesk@gmail.com - help desk communications sent when exchange is not available CenturyLink Conferencing Audio Conferencing USA: USA /Canada (toll free): This will be the Major Incident main line: Web / sharing desktops GotoMeeting.com External Communications Options Students - student-1@uccs.edu (lists.uccs.edu is required) Faculty - faculty-l@uccs.edu (lists.uccs.edu is required) Staff staff-l@uccs.edu (lists.uccs.edu is required) UCCS.info {needing login information} Automatically posts to IT Twitter UIS itccop@cu.edu Housing Lists: Summit-l@uccs.edu Alpine_l@uccs.edu Timberline-l@uccs.edu 5

6 UCCS leadership - Only CIO or backup communicates with leadership team University Relations Hutton, Tom Executive Director University Advancement - University Communications and Media Relations MAIN 301A thutton@uccs.edu UCCS Twitter Denman, Philip Assistant Director University Advancement - University Communications and Media Relations MAIN 301 pdenman@uccs.edu Website Alerts {Craig needing information for posting in Ingeniux or how this should be handled} Rave (Must first check with Tim Stoecklein before post message with system) Stoecklein, Tim Program Director of Emergency Management Public Safety Department - Emergency Management DPS 208 tstoeckl@uccs.edu Phones Help Desk ACD message Sidecars if necessary Media University Relations will be the only organization allowed to speak to the media. Reporting When to report Who to report to UIS Other CU campuses Chancellor's office President's office 6

7 Meeting Location EPC 139, IT Conference Room Location needs: Phone Laptop/Projector White board Table Room and chairs for 10 people Extra Ports Power Logistics Review Mission Critical Services Communications expectations plan Communication templates Define essential personnel and backups Personnel expectations during major incident and after Essential personnel is expected to participant in major incident/outage response. If incident is after hours essential personnel is expected to participant if available. Working Time: 16 hours working max or 2 a.m. At the start of 14 hours, or midnight appropriately, technical lead must start to create plan for providing rest to employees. Discuss of break/meal every 4 hours. Food/Drink coordination After major incident/outage is resolved and work was conducted after normal business hours, employees will be given hour for hour flex time. The employee is expected to take the time and must be used within one month from when the work was performed. Incident Commander will work with employee s supervisor to coordinate flex time. Equipment needs Funding Equipment needs shall be coordinated by the Incident Commander. Will be coordinated by the Incident Commander. 7

8 Execution of Work Steps for Priority1 Major Incident Service restoration target is two hours for a Priority 1 Major Incident. Task Description 1. Notification and Confirmation Priority1 Major Incident has been identified 2. Notify IT Outage Group Send or text message to outage@uccs.info or outage@uccs.edu Text Template: UCCS IT internal alert (ServiceName) is experiencing a service interruption. See for more details. Sent by: (Name) (PhoneNumber) Time Incident as past the trigger points Within 10 Minutes Template: Subject: (ServiceName) is experiencing a service interruption. Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 3. Contact Computing Services Directors: Kirk Moore Cell: (719) House: (719) kmoore@uccs.edu or uccsit@moorei.com Within 10 minutes of initial contact Greg Williams Cell: (719) House:(719) gwillia5@uccs.edu or 8

9 If directors have not been reached contact associate directors: Rob Garvie Cell: (719) House: (719) Mike Belding Cell: (719) House: (719) If directors or associate directors have not been reached contact CIO: Jerry Wilson Cell: (719) House: (719) Open Technical Bridge (toll free): Within 15 minutes of initial contact Host and Guest passcodes stored in LastPass under Incident Response 5. Initial Triage 1. Start assessment 2. Replicate issue 3. Review monitoring and logs 4. Try to identify workarounds If no quick solution or workout is discovered then declare a Priority 1 Incident. 6. Declare Priority 1 Incident 1. Select Incident commander 2. Start calling in personnel to meeting location or conference bridge 3. Define roles of team 4. Start external communication Set Message on UCCS.info using Template Within 20 minutes of initial contact Within 30 minutes of initial contact Text Template: UCCS IT Alert: SERVICENAME is experiencing a 9

10 service interruption. IT is working to restore service and will provide more information as it becomes available. Template: Subject: UCCS IT Alert: SERVICENAME is experiencing a service interruption. Body: Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 5. Communicate to CIO or person acting as backup and they will contact Chancellor s office 6. Determine if service should remain active or be brought down. 7. Determine whether individuals aiding in incident restoration should convene in person to aid in restoration efforts. 8. Determine whether vendor involvement or escalation is required. 9. If incident resolution is not expected within 15 minutes, establish time frame for next status update. 10. Continue to facilitate conversation as appropriate to ensure focus is on restoring service. 7. While Priority 1 Incident is occurring 1. Request current status of restoration efforts. 2. Instruct communication lead to send a notice using the following templates: Template: Subject: UCCS IT Alert: SERVICENAME is experiencing a service interruption. Every 60 minutes 10

11 Body: Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 Update: UCCS IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 8. Upon Service Restoration 1. Request the technical lead to verify that service has been restored and report on the current state of operation. 2. Confirm the communications lead will: Update UCCS.info Remove ACD message on Help Desk phone line. Send an incident restoration message with the following content: Upon service restoration Template: Subject: UCCS IT Alert: SERVICENAME Service Now Available Body: UCCS IT has identified and addressed root cause. As of XX:XX a.m./p.m. service has been restored. Thank you for your cooperation we worked to resolve this issue. 3. The technical manager or director of the failing service or component that caused the incident will: Hold a debrief meeting Prepare and deliver incident report to CIO, Directors, and campus IT partners within three business days. 4. Formally state to participants on the technical bridge that the incident status is downgraded, everyone is standing down and the technical bridge is being closed. 5. Document resolution and close incident management (IM) ticket. 6. Open problem management ticket to track ongoing root cause analysis efforts and document any known workarounds. 11

12 Close Major Incident 1. Hold debrief meeting with three days 2. Prepare Major Incident Response report within five days with the help from those participating 3. {Rachel - needing report template} 4. Distribute report Incident commander duties An incident commander serves to keep an incident project on track for process, maintain focus on the problems, facilitate analysis and interactions, and verify that the incident response team s needs are being met (resources, information, etc.). To that end, the individual has several duties outlined below. General duties Open the incident phone bridge line: (toll free): Host Passcode: Guest Passcode: Monitor incident phone bridge line or assign duty. Assign a participant to set up any required A/V resources (projecting monitoring data, etc.). Briefly recap incident process at the beginning of incident room level events. Coordinate efforts within the room to minimize confusion and reduce the risk of inadvertent or simultaneous changes. Draw focus back together when conversations become unproductively fragmented. Document notable events and steps taken in a visible incident log (to be recorded electronically by designated in-room scribe). Solicit approval and/or consensus on decisions to bring services up/down and to make changes to production services. Ensure that the appropriate UIS employees and vendors are engaged and working the issue, tasking people to escalate as needed. Initiate brainstorming during troubleshooting and ensure that identified paths of investigation (hypotheses) or actions are assigned to individuals and given an order/priority. Facilitate communications efforts (both to broad groups of customers and executives) by ensuring that the appropriate communicators have timely and accurate information. Record employees hours worked and ensure they take their flex time. 12

13 Incident commander timed checklist Every 30 minutes: o Request status from teams working issues. What current hypotheses are being investigated and have any been eliminated or verified. What actions have been completed or are in progress. o Provide a verbal update within the incident room and update the incident log. Every hour: o Check in with communications staff regarding next status update steps. o If the list of hypotheses has been exhausted, initiate a new cycle of brainstorming, documenting, assigning tasks, etc. At 11:30am and 5:30pm: o Request that business office (if available) order some food for those working the issue in the incident room. Be sure to cover dietary needs (vegetarian, etc.). o Encourage participants to use mealtime as an opportunity to leave the room for a little while, allowing for coverage if needed. At 9pm: o Request that directors/managers begin their plans for staff rotation during the night if ongoing work is required. Check List 1. Notification of Priority 1 incident 2. Confirmation of major incident/outage 3. Priority 1 incident has been determined 4. If Level 1 priority 1 incident a. Has incident crossed trigger points i. No continue to monitor situation ii. Yes 1. Create problem in Cherwell 2. Determine which individuals are needing to evaluate the situation 3. Define roles for individuals participating 4. Tools a. Last pass Cloud Service for password management b. Monitoring c. Testing environment 5. Build action plan: a. Define scope / timeframe b. Develop technical plan 13

14 c. Define personnel needed d. Determine return on investment e. Assign tasks 6. Communication plan a. How do we communicate with each other? b. How and who do we communicate with externally? c. Recording communications d. Confirming communications postings e. How often do we need to communicate f. Communicating to UCCS Leadership (Role of CIO) 7. Document going progress and issues, record in Cherwell 8. Resolved a. Documenting issue, response and fix 9. Closing response a. Hold debrief meeting with three days b. Prepare Major Incident Response report within five days with the help from those participating c. {Rachel - needing report template} d. Distribute report 14

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

(Office 365) Service Level Expectation

(Office 365) Service Level Expectation Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment

More information

Magento Enterprise Edition Customer Support Guide

Magento Enterprise Edition Customer Support Guide Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part

More information

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4

BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND

More information

Chapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level

Chapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level 1 Chapter 8: IT Service Management Topics covered: 1.1 Roles of helpdesk support staff 1.2 Different types of helpdesk support level 1.3 Role of Internet Service Provider (ISP) 1.4 Change request process

More information

End User Terminal Service

End User Terminal Service Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History

More information

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

IT Service Level Agreement

IT Service Level Agreement The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September

More information

Information Technology Procedure IT 3.4 IT Configuration Management

Information Technology Procedure IT 3.4 IT Configuration Management Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT

TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

Lincoln University OIT Monthly Activity Summary. June Action Items

Lincoln University OIT Monthly Activity Summary. June Action Items Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu June 5, 2018

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

MAPP DIGITAL TECHNICAL SUPPORT MANUAL AND OPERATIONAL PROCEDURES

MAPP DIGITAL TECHNICAL SUPPORT MANUAL AND OPERATIONAL PROCEDURES This document replaces our previous Customer Service Support Guide and Technical Support policies MAPP DIGITAL TECHNICAL SUPPORT MANUAL AND OPERATIONAL PROCEDURES This document presents how the Mapp Digital

More information

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno Larry Mandel Vice Chancellor and Chief Audit Officer Office of Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu February

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Telephone System Service Level Agreement

Telephone System Service Level Agreement Telephone System Service Level Agreement V1.0 The Complete Business Solution 04 0 Document Version Log 03 1 Purpose 03 2 Service Description 03 3 Service Availability 03 4 Scope of Service and Exclusion

More information

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN

INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Revision History Revision Change Date 1.0 DRAFT Disaster Recovery Plan 8/8/2006 1.1 FINAL Disaster Recovery Plan 10/12/2009 2.0 Reviewed 10/15/2009

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

Operating Level Agreement for NYU Login Service

Operating Level Agreement for NYU Login Service Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for the (Partner Service), which has been

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

Insight s Remote Technical Assistance Center: A User s Guide to RTAC

Insight s Remote Technical Assistance Center: A User s Guide to RTAC Insight s Remote Technical Assistance Center: A User s Guide to RTAC Table of Contents 1. Remote Technical Assistance Center (RTAC) quick reference guide... 1 1.1 Opening a case with the RTAC 1.2 Online

More information

Master Information Security Policy & Procedures [Organization / Project Name]

Master Information Security Policy & Procedures [Organization / Project Name] Master Information Security Policy & Procedures [Organization / Project Name] [Version Number / Date of [Insert description of intended audience or scope of authorized distribution.] Authors: [Names] Information

More information

VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD

VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD September 2016 revision16s13nc The purpose of this document is to describe Vidyo s service and support policies for VidyoCloud

More information

UCLA AUDIT & ADVISORY SERVICES

UCLA AUDIT & ADVISORY SERVICES UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF

More information

CCBC is equipped with 3 computer rooms, one at each main campus location:

CCBC is equipped with 3 computer rooms, one at each main campus location: Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

UF CEMP Support Group Annex: IT Group

UF CEMP Support Group Annex: IT Group UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

McGill University Virtualization Service Description and Service Level Agreement

McGill University Virtualization Service Description and Service Level Agreement McGill University Virtualization Service Description and Service Level Agreement Document Control Revision No. Document Control Date Description Approved By 1.0 January 19, 2007 Creation of the document

More information

Introduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response

Introduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response Every Crisis Management Team Needs a Critical Decision Checklist Presented by Roseanne Rostron, CBCP President Raido Response Tuesday, May 9, 2006 Introduction Roseanne Rostron, CBCP - President Raido

More information

Service Description: Software Support

Service Description: Software Support Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software

More information

Information. Technology. Annual Report

Information. Technology. Annual Report Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

JUNIPER OPTIMUM CARE SERVICE

JUNIPER OPTIMUM CARE SERVICE SERVICE DESCRIPTION JUNIPER OPTIMUM CARE SERVICE Contents 1. Introduction...1 2. Eligibility and Purchasing....1 3. Service Features and Deliverable Description...1 4. End User Responsibilities...3 5.

More information

GETTING STARTED: INCIDENT

GETTING STARTED: INCIDENT GETTING STARTED: INCIDENT Incident is a Cloud-based IT help desk management solution that streamlines the entire technology workflow process from support request to resolution. An efficient IT help desk

More information

Resource Room Document Emergency Planning Steering Committee 2012 Report

Resource Room Document Emergency Planning Steering Committee 2012 Report Resource Room Document 1.13 Emergency Planning Steering Committee 2012 Report Community College of Aurora Emergency Planning Steering Committee Report to Cabinet March 7, 2011 INTRODUCTION The Emergency

More information

Version v November 2015

Version v November 2015 Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and

More information

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 23, 2018

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

Best Practices for Video-Enabled Teaching and Learning

Best Practices for Video-Enabled Teaching and Learning Web Seminar for Higher Education Leaders Best Practices for Video-Enabled Teaching and Learning Kurt Eisele-Dyrli Web Seminar Editor University Business Adam Linzels Director of Videoconferencing & AV

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Page 1 of 8 ATTACHMENT H

Page 1 of 8 ATTACHMENT H Page 1 of 8 This is Attachment A (Statement of Work Definitions) to the Agreement between the County of Orange, CA ( County ) and Vendor. In the event of a conflict between the definitions set forth in

More information

Security Awareness, Training, And Education Plan

Security Awareness, Training, And Education Plan Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4

More information

The 2017 State of IT Incident Management. Annual Report on Incidents, Tools & Processes

The 2017 State of IT Incident Management. Annual Report on Incidents, Tools & Processes The 2017 State of IT Incident Management Annual Report on Incidents, Tools & Processes Table of Contents 03 Executive Summary and Key Findings 04 Overview 05 IT Incidents Major IT Incidents a Real Area

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

Major Information Security Incident POLICY TITLE:

Major Information Security Incident POLICY TITLE: Major Information Security Incident POLICY TITLE: Management Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June

More information

Guidance for IT staff on priorities to be used when logging incidents.

Guidance for IT staff on priorities to be used when logging incidents. Information Technology IT Incident Criteria Guidance for IT staff on priorities to be used when logging incidents. Version Control... 2 Introduction... 3 Definitions (ITIL)... 3 Response time... 3 Resolution

More information

Course Catalog: Spark + WebEx + Jabber

Course Catalog: Spark + WebEx + Jabber Course Catalog: Spark + WebEx + Jabber WebEx, Jabber and Cisco Spark End User and Administrator Training Meet Me In The Cloud, Inc. https://meetmeinthecloud.com San Francisco Bay Area Contact: sales@meetmeinthecloud.comm

More information

Quick Reference Guide: Working with CommVault Customer Support

Quick Reference Guide: Working with CommVault Customer Support Quick Reference Guide: Working with CommVault Customer Support Contents Creating Maintenance Advantage Accounts for your Organization... 4 Accessing the Maintenance Advantage Site... 8 Logon... 8 Issues

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

San Jac ITS Desktop Support Guidelines

San Jac ITS Desktop Support Guidelines San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving

More information

Please review the SECURE GATEWAY Administrator Guides prior to engaging the AT&T Managed Security Services Support Center.

Please review the SECURE  GATEWAY Administrator Guides prior to engaging the AT&T Managed Security Services Support Center. Secure Network Gateway / Secure E-Mail Gateway Service Technical Support Guide Technical Support Administrative Guides and Training Modules Please review the SECURE EMAIL GATEWAY Administrator Guides prior

More information

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents University of Central Florida Information Technology (UCF IT) Title: Effective: 12/15/2016 UCF IT Incident Management Policy & Procedure Revised: 07/13/2018 Approved By: Michael Sink, Associate VP & COO,

More information

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent

More information

Course Catalog: Webex Teams + Webex Meetings + Jabber

Course Catalog: Webex Teams + Webex Meetings + Jabber Course Catalog: Webex Teams + Webex Meetings + Jabber Webex Meetings, Webex Teams, and Jabber End User and Administrator Training Meet Me In The Cloud, Inc. https://meetmeinthecloud.com San Francisco Bay

More information

TELUS Cloud Contact Centre (TC3) Customer Care Guide

TELUS Cloud Contact Centre (TC3) Customer Care Guide Customer Care Guide May 2018 Table of Contents... 1 INTRODUCTION... 3 CONTACTING TELUS... 4 Reporting Technical Service Issues... 4 Repair Ticket Severity Levels and Response Target... 5 Requesting Moves/Adds/Changes

More information

Managed Administration Service (MAS): Hitachi ID Password Manager

Managed Administration Service (MAS): Hitachi ID Password Manager Managed Administration Service (MAS): Hitachi ID Password Manager 2018 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Managed Administration Service (MAS) 1 2.1 Hitachi ID Systems

More information

FACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK. Copyright 2007 Rockwell Automation, Inc. All rights reserved.

FACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK. Copyright 2007 Rockwell Automation, Inc. All rights reserved. FACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK Copyright 2007 Rockwell Automation, Inc. All rights reserved. 2 Technical Support Programs Each of our Support Programs includes application, developer

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the

More information

STANDARD (PAY AS YOU GO) PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT

STANDARD (PAY AS YOU GO) PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT Standard Service Level Agreement STANDARD (PAY AS YOU GO) & PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT Prepared and effective as of Monday, 5th September 2016 By Daniel Herr Director of Tech Help

More information

Qumu Support and Maintenance Service Agreement

Qumu Support and Maintenance Service Agreement Qumu and Maintenance Service I. Scope: A. Services: Qumu, Inc. ( QUMU ) will provide technical assistance, software maintenance and support services (collectively Services as described in section II below)

More information

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016

MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016 MIS 5203 Lifecycle Management 1 Week 12 April 7, 2016 Study Objectives Systems Implementation Data Migration Change Over 2 Phase 1 Feasibility Phase 2 Requirements Which ones of these activities are part

More information

One Hospital s Cybersecurity Journey

One Hospital s Cybersecurity Journey MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital

More information

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 10, 2018

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Service Level Agreement (SLA) for The Texas State University System Office

Service Level Agreement (SLA) for The Texas State University System Office Service Level Agreement (SLA) for The Texas State University System Office By Technology Resources Texas State University San Marcos Effective Date: January 01, 2008 Version Version Date Revision / Description

More information

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities

More information

NAMI Affiliate Profile Center Contact Manual

NAMI Affiliate Profile Center Contact Manual NAMI Affiliate Profile Center Contact Manual Standards of Excellence/Center for Excellence November 2013 Table of Contents Chapter Page I. NAMI Affiliate Profile Center Contact Training Timetable 3 II.

More information