SOP Unplanned Outages/Major Incidents
|
|
- Loren Ford
- 5 years ago
- Views:
Transcription
1 Table of Contents Definitions... 2 Incident... 2 Declaring... 2 Incident Levels... 3 Priority Priority Priority Priority Mission Critical Services... 3 Authentication... 3 Computer Labs Network... 4 Wireless Network... 4 Power Disruptions to Campus... 4 Storage Area Network (SAN) Disruption... 4 Roles and Responsibilities of Team for Priority 1 Outages/Major Incidents... 4 CIO or Backup... 4 Incident Commander... 4 Technical Lead... 4 User Support Lead... 4 Communications Lead... 5 Field Coordinator... 5 Service Owners... 5 Subject Matter Expert (SME)... 5 Communications... 5 Internal Communications Options... 5 External Communications Options
2 Reporting... 6 Meeting Location... 7 Logistics... 7 Execution of Work Steps for Priority1 Major Incident... 8 Incident commander duties General duties Incident commander timed checklist Check List Review the Emergency Prep roles and procedures! Username: it Password: Ic3 Definitions Incident Whenever a user is not receiving an expected level of service from an IT service. Expected levels of service are based on Service Level Agreements (SLA). Major Incident/Outage A major incident is defined as a significant event, which demands a response beyond the routine, resulting from uncontrolled developments in the course of the operation of any establishment or transient work activity. Declaring Mission critical (university or internal) IT service(s) are not performing at the expected level for a period of 30 minutes unless defined differently in the SLA or designated otherwise by this plan. 2
3 Incident Levels Priority 1 Mission critical services are not performing for the University. All appropriate resources will be dedicated to restore service(s). Priority 2 Mission critical services are not performing for departments or computer labs. Service(s) is not performing at a campus or enterprise level. Appropriate services owners will be dedicated to restore service(s). Priority 3 Address problem and escalate as necessary. These incidents do not require the dedication of level 1 or 2. Priority 4 There is a known work around for the issue. Does not require dedicate resources to resolve. Mission Critical Services Authentication Accepting authentication requests and responses for the following systems: Blackboard Campus desktop computers Central IT maintained computer lab machines CUSIS portal MyUCCS Portal Wireless System Computer Labs Disruptions to IT maintained computer lab machines not allowing customers the ability to utilize systems. messages not flowing in or out of the following systems: Exchange on premise Office 365 Cloud Solution Note: Unless the service outage is determined to be an exclusive Microsoft issue and UCCS IT personnel have no control to participant in a resolution, than this will not follow the full Major Critical procedures. Conceivably only the communication plan will be followed. 3
4 Network Disruptions to campus network systems to include: Campus Firewalls Campus Routing Campus Switches Connections in and out or within the El Pomar Data Center Connections in and out or within the Columbine Data Center Connections in and out or within Main Hall and Cragmor Hall External internet connectivity Wireless Network Disruptions to the wireless system not allowing customers to utilize the network Power Disruptions to Campus Any power disruption to the El Pomar or Columbine Data Centers lasting longer than 10 minutes. Storage Area Network (SAN) Disruption Any disruption to data flowing in or out of the campus SAN solution. Roles and Responsibilities of Team for Priority 1 Outages/Major Incidents CIO or Backup Authorize resources for the major incident; direct communication with Chancellor and UCCS Leadership team; and if needed communications with Presidents office. Incident Commander Coordinate plan; oversee response; lead meetings; organize meals; and provide funding; See below for detailed description. Technical Lead Examine situation; confirm major incident; attempt to identify root cause; work to find technical options; present technical options to team; and participant with plan where needed. User Support Lead Provide information from user s perspective; provide user support options; contact specialized users; and participant where needed. 4
5 Communications Lead Create plan for messaging including frequency; provide messaging to campus; update UCCS.info; point person for internal communication; and participant where needed. Field Coordinator Provide information from the field; deliver support from the field; participant where needed. Note: depending on the major incident this role may not be needed. Service Owners Provide information on services effected; work with technical lead to create options for plan of action. Subject Matter Expert (SME) An individual with a high-level of overall knowledge of the service impacted, both in terms of general architecture and business service provided. Communications Internal Communications Options Communications should be sent out from the helpdesk@uccs.edu address if possible outage@uccs.edu - hosted on lists.uccs.edu (Communigate server local infrastructure must be working) (Texting and ) outage@uccs.info - hosted through Bluehost.com (Texting and ) uccshelpdesk@gmail.com - help desk communications sent when exchange is not available CenturyLink Conferencing Audio Conferencing USA: USA /Canada (toll free): This will be the Major Incident main line: Web / sharing desktops GotoMeeting.com External Communications Options Students - student-1@uccs.edu (lists.uccs.edu is required) Faculty - faculty-l@uccs.edu (lists.uccs.edu is required) Staff staff-l@uccs.edu (lists.uccs.edu is required) UCCS.info {needing login information} Automatically posts to IT Twitter UIS itccop@cu.edu Housing Lists: Summit-l@uccs.edu Alpine_l@uccs.edu Timberline-l@uccs.edu 5
6 UCCS leadership - Only CIO or backup communicates with leadership team University Relations Hutton, Tom Executive Director University Advancement - University Communications and Media Relations MAIN 301A thutton@uccs.edu UCCS Twitter Denman, Philip Assistant Director University Advancement - University Communications and Media Relations MAIN 301 pdenman@uccs.edu Website Alerts {Craig needing information for posting in Ingeniux or how this should be handled} Rave (Must first check with Tim Stoecklein before post message with system) Stoecklein, Tim Program Director of Emergency Management Public Safety Department - Emergency Management DPS 208 tstoeckl@uccs.edu Phones Help Desk ACD message Sidecars if necessary Media University Relations will be the only organization allowed to speak to the media. Reporting When to report Who to report to UIS Other CU campuses Chancellor's office President's office 6
7 Meeting Location EPC 139, IT Conference Room Location needs: Phone Laptop/Projector White board Table Room and chairs for 10 people Extra Ports Power Logistics Review Mission Critical Services Communications expectations plan Communication templates Define essential personnel and backups Personnel expectations during major incident and after Essential personnel is expected to participant in major incident/outage response. If incident is after hours essential personnel is expected to participant if available. Working Time: 16 hours working max or 2 a.m. At the start of 14 hours, or midnight appropriately, technical lead must start to create plan for providing rest to employees. Discuss of break/meal every 4 hours. Food/Drink coordination After major incident/outage is resolved and work was conducted after normal business hours, employees will be given hour for hour flex time. The employee is expected to take the time and must be used within one month from when the work was performed. Incident Commander will work with employee s supervisor to coordinate flex time. Equipment needs Funding Equipment needs shall be coordinated by the Incident Commander. Will be coordinated by the Incident Commander. 7
8 Execution of Work Steps for Priority1 Major Incident Service restoration target is two hours for a Priority 1 Major Incident. Task Description 1. Notification and Confirmation Priority1 Major Incident has been identified 2. Notify IT Outage Group Send or text message to outage@uccs.info or outage@uccs.edu Text Template: UCCS IT internal alert (ServiceName) is experiencing a service interruption. See for more details. Sent by: (Name) (PhoneNumber) Time Incident as past the trigger points Within 10 Minutes Template: Subject: (ServiceName) is experiencing a service interruption. Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 3. Contact Computing Services Directors: Kirk Moore Cell: (719) House: (719) kmoore@uccs.edu or uccsit@moorei.com Within 10 minutes of initial contact Greg Williams Cell: (719) House:(719) gwillia5@uccs.edu or 8
9 If directors have not been reached contact associate directors: Rob Garvie Cell: (719) House: (719) Mike Belding Cell: (719) House: (719) If directors or associate directors have not been reached contact CIO: Jerry Wilson Cell: (719) House: (719) Open Technical Bridge (toll free): Within 15 minutes of initial contact Host and Guest passcodes stored in LastPass under Incident Response 5. Initial Triage 1. Start assessment 2. Replicate issue 3. Review monitoring and logs 4. Try to identify workarounds If no quick solution or workout is discovered then declare a Priority 1 Incident. 6. Declare Priority 1 Incident 1. Select Incident commander 2. Start calling in personnel to meeting location or conference bridge 3. Define roles of team 4. Start external communication Set Message on UCCS.info using Template Within 20 minutes of initial contact Within 30 minutes of initial contact Text Template: UCCS IT Alert: SERVICENAME is experiencing a 9
10 service interruption. IT is working to restore service and will provide more information as it becomes available. Template: Subject: UCCS IT Alert: SERVICENAME is experiencing a service interruption. Body: Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 5. Communicate to CIO or person acting as backup and they will contact Chancellor s office 6. Determine if service should remain active or be brought down. 7. Determine whether individuals aiding in incident restoration should convene in person to aid in restoration efforts. 8. Determine whether vendor involvement or escalation is required. 9. If incident resolution is not expected within 15 minutes, establish time frame for next status update. 10. Continue to facilitate conversation as appropriate to ensure focus is on restoring service. 7. While Priority 1 Incident is occurring 1. Request current status of restoration efforts. 2. Instruct communication lead to send a notice using the following templates: Template: Subject: UCCS IT Alert: SERVICENAME is experiencing a service interruption. Every 60 minutes 10
11 Body: Current symptoms includes: - SYMPTOM1 Known workarounds include: - WORKAROUND1 Update: UCCS IT is working to restore service and will provide more information as it becomes available. The next communication will be sent by XX:XX a.m./p.m. 8. Upon Service Restoration 1. Request the technical lead to verify that service has been restored and report on the current state of operation. 2. Confirm the communications lead will: Update UCCS.info Remove ACD message on Help Desk phone line. Send an incident restoration message with the following content: Upon service restoration Template: Subject: UCCS IT Alert: SERVICENAME Service Now Available Body: UCCS IT has identified and addressed root cause. As of XX:XX a.m./p.m. service has been restored. Thank you for your cooperation we worked to resolve this issue. 3. The technical manager or director of the failing service or component that caused the incident will: Hold a debrief meeting Prepare and deliver incident report to CIO, Directors, and campus IT partners within three business days. 4. Formally state to participants on the technical bridge that the incident status is downgraded, everyone is standing down and the technical bridge is being closed. 5. Document resolution and close incident management (IM) ticket. 6. Open problem management ticket to track ongoing root cause analysis efforts and document any known workarounds. 11
12 Close Major Incident 1. Hold debrief meeting with three days 2. Prepare Major Incident Response report within five days with the help from those participating 3. {Rachel - needing report template} 4. Distribute report Incident commander duties An incident commander serves to keep an incident project on track for process, maintain focus on the problems, facilitate analysis and interactions, and verify that the incident response team s needs are being met (resources, information, etc.). To that end, the individual has several duties outlined below. General duties Open the incident phone bridge line: (toll free): Host Passcode: Guest Passcode: Monitor incident phone bridge line or assign duty. Assign a participant to set up any required A/V resources (projecting monitoring data, etc.). Briefly recap incident process at the beginning of incident room level events. Coordinate efforts within the room to minimize confusion and reduce the risk of inadvertent or simultaneous changes. Draw focus back together when conversations become unproductively fragmented. Document notable events and steps taken in a visible incident log (to be recorded electronically by designated in-room scribe). Solicit approval and/or consensus on decisions to bring services up/down and to make changes to production services. Ensure that the appropriate UIS employees and vendors are engaged and working the issue, tasking people to escalate as needed. Initiate brainstorming during troubleshooting and ensure that identified paths of investigation (hypotheses) or actions are assigned to individuals and given an order/priority. Facilitate communications efforts (both to broad groups of customers and executives) by ensuring that the appropriate communicators have timely and accurate information. Record employees hours worked and ensure they take their flex time. 12
13 Incident commander timed checklist Every 30 minutes: o Request status from teams working issues. What current hypotheses are being investigated and have any been eliminated or verified. What actions have been completed or are in progress. o Provide a verbal update within the incident room and update the incident log. Every hour: o Check in with communications staff regarding next status update steps. o If the list of hypotheses has been exhausted, initiate a new cycle of brainstorming, documenting, assigning tasks, etc. At 11:30am and 5:30pm: o Request that business office (if available) order some food for those working the issue in the incident room. Be sure to cover dietary needs (vegetarian, etc.). o Encourage participants to use mealtime as an opportunity to leave the room for a little while, allowing for coverage if needed. At 9pm: o Request that directors/managers begin their plans for staff rotation during the night if ongoing work is required. Check List 1. Notification of Priority 1 incident 2. Confirmation of major incident/outage 3. Priority 1 incident has been determined 4. If Level 1 priority 1 incident a. Has incident crossed trigger points i. No continue to monitor situation ii. Yes 1. Create problem in Cherwell 2. Determine which individuals are needing to evaluate the situation 3. Define roles for individuals participating 4. Tools a. Last pass Cloud Service for password management b. Monitoring c. Testing environment 5. Build action plan: a. Define scope / timeframe b. Develop technical plan 13
14 c. Define personnel needed d. Determine return on investment e. Assign tasks 6. Communication plan a. How do we communicate with each other? b. How and who do we communicate with externally? c. Recording communications d. Confirming communications postings e. How often do we need to communicate f. Communicating to UCCS Leadership (Role of CIO) 7. Document going progress and issues, record in Cherwell 8. Resolved a. Documenting issue, response and fix 9. Closing response a. Hold debrief meeting with three days b. Prepare Major Incident Response report within five days with the help from those participating c. {Rachel - needing report template} d. Distribute report 14
DISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More information(Office 365) Service Level Expectation
Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment
More informationMagento Enterprise Edition Customer Support Guide
Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part
More informationBUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4
BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4 2016 DR Committee 1 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND
More informationChapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level
1 Chapter 8: IT Service Management Topics covered: 1.1 Roles of helpdesk support staff 1.2 Different types of helpdesk support level 1.3 Role of Internet Service Provider (ISP) 1.4 Change request process
More informationEnd User Terminal Service
Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History
More informationWeb Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012
Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2
More informationISSP Network Security Plan
ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...
More informationIT Service Level Agreement
The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September
More informationInformation Technology Procedure IT 3.4 IT Configuration Management
Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationTECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT
TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationLincoln University OIT Monthly Activity Summary. June Action Items
Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationStandard for Security of Information Technology Resources
MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationAny observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.
Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu June 5, 2018
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationPTS Customer Protection Agreement
PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone
More informationUNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017
UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets
More informationMAPP DIGITAL TECHNICAL SUPPORT MANUAL AND OPERATIONAL PROCEDURES
This document replaces our previous Customer Service Support Guide and Technical Support policies MAPP DIGITAL TECHNICAL SUPPORT MANUAL AND OPERATIONAL PROCEDURES This document presents how the Mapp Digital
More informationSubject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno
Larry Mandel Vice Chancellor and Chief Audit Officer Office of Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu February
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More informationTelephone System Service Level Agreement
Telephone System Service Level Agreement V1.0 The Complete Business Solution 04 0 Document Version Log 03 1 Purpose 03 2 Service Description 03 3 Service Availability 03 4 Scope of Service and Exclusion
More informationINFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN
INFORMATION TECHNOLOGY SERVICES DISASTER RECOVERY PLAN Revision History Revision Change Date 1.0 DRAFT Disaster Recovery Plan 8/8/2006 1.1 FINAL Disaster Recovery Plan 10/12/2009 2.0 Reviewed 10/15/2009
More informationManaged NIDS Care Services
Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration
More informationEX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101
EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic
More informationOperating Level Agreement for NYU Login Service
Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for the (Partner Service), which has been
More informationEffective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO
Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:
More informationHARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL
HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationInsight s Remote Technical Assistance Center: A User s Guide to RTAC
Insight s Remote Technical Assistance Center: A User s Guide to RTAC Table of Contents 1. Remote Technical Assistance Center (RTAC) quick reference guide... 1 1.1 Opening a case with the RTAC 1.2 Online
More informationMaster Information Security Policy & Procedures [Organization / Project Name]
Master Information Security Policy & Procedures [Organization / Project Name] [Version Number / Date of [Insert description of intended audience or scope of authorized distribution.] Authors: [Names] Information
More informationVIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD
VIDYO CLOUD SERVICES SERVICE AND SUPPORT POLICY FOR VIDYOCLOUD SERVICES - STANDARD September 2016 revision16s13nc The purpose of this document is to describe Vidyo s service and support policies for VidyoCloud
More informationUCLA AUDIT & ADVISORY SERVICES
UCLA AUDIT & ADVISORY SERVICES Edwin D. Pierce, CPA, CFE Director September 4, 2015 10920 Wilshire Boulevard, Suite 700 Los Angeles, California 90024-1366 310 794-6110 Fax: 310 794-8536 SENIOR VICE PRESIDENT/CHIEF
More informationCCBC is equipped with 3 computer rooms, one at each main campus location:
Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationTrust Services Principles and Criteria
Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access
More informationUF CEMP Support Group Annex: IT Group
UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationMcGill University Virtualization Service Description and Service Level Agreement
McGill University Virtualization Service Description and Service Level Agreement Document Control Revision No. Document Control Date Description Approved By 1.0 January 19, 2007 Creation of the document
More informationIntroduction. Overview. Every Crisis Management Team Needs a Critical Decision Checklist. Presented by Roseanne Rostron, CBCP President Raido Response
Every Crisis Management Team Needs a Critical Decision Checklist Presented by Roseanne Rostron, CBCP President Raido Response Tuesday, May 9, 2006 Introduction Roseanne Rostron, CBCP - President Raido
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationInformation. Technology. Annual Report
Information 2016 Technology Annual Report Information Technology Table of Contents Division Personnel 2 Mission Statement & Core Values 2 Technical Support 3 System Integration 4 Infrastructure 4-6 WARCOG
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationChapter 16: Advanced Security
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationJUNIPER OPTIMUM CARE SERVICE
SERVICE DESCRIPTION JUNIPER OPTIMUM CARE SERVICE Contents 1. Introduction...1 2. Eligibility and Purchasing....1 3. Service Features and Deliverable Description...1 4. End User Responsibilities...3 5.
More informationGETTING STARTED: INCIDENT
GETTING STARTED: INCIDENT Incident is a Cloud-based IT help desk management solution that streamlines the entire technology workflow process from support request to resolution. An efficient IT help desk
More informationResource Room Document Emergency Planning Steering Committee 2012 Report
Resource Room Document 1.13 Emergency Planning Steering Committee 2012 Report Community College of Aurora Emergency Planning Steering Committee Report to Cabinet March 7, 2011 INTRODUCTION The Emergency
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationSubject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento
Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 23, 2018
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationBest Practices for Video-Enabled Teaching and Learning
Web Seminar for Higher Education Leaders Best Practices for Video-Enabled Teaching and Learning Kurt Eisele-Dyrli Web Seminar Editor University Business Adam Linzels Director of Videoconferencing & AV
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationPage 1 of 8 ATTACHMENT H
Page 1 of 8 This is Attachment A (Statement of Work Definitions) to the Agreement between the County of Orange, CA ( County ) and Vendor. In the event of a conflict between the definitions set forth in
More informationSecurity Awareness, Training, And Education Plan
Security Awareness, Training, And Education Plan Version 2.0 December 2016 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PLAN DETAILS 4 3.2 WORKFORCE DESIGNATION 4
More informationThe 2017 State of IT Incident Management. Annual Report on Incidents, Tools & Processes
The 2017 State of IT Incident Management Annual Report on Incidents, Tools & Processes Table of Contents 03 Executive Summary and Key Findings 04 Overview 05 IT Incidents Major IT Incidents a Real Area
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationMajor Information Security Incident POLICY TITLE:
Major Information Security Incident POLICY TITLE: Management Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June
More informationGuidance for IT staff on priorities to be used when logging incidents.
Information Technology IT Incident Criteria Guidance for IT staff on priorities to be used when logging incidents. Version Control... 2 Introduction... 3 Definitions (ITIL)... 3 Response time... 3 Resolution
More informationCourse Catalog: Spark + WebEx + Jabber
Course Catalog: Spark + WebEx + Jabber WebEx, Jabber and Cisco Spark End User and Administrator Training Meet Me In The Cloud, Inc. https://meetmeinthecloud.com San Francisco Bay Area Contact: sales@meetmeinthecloud.comm
More informationQuick Reference Guide: Working with CommVault Customer Support
Quick Reference Guide: Working with CommVault Customer Support Contents Creating Maintenance Advantage Accounts for your Organization... 4 Accessing the Maintenance Advantage Site... 8 Logon... 8 Issues
More informationCisco Secure Ops Solution
Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationSan Jac ITS Desktop Support Guidelines
San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving
More informationPlease review the SECURE GATEWAY Administrator Guides prior to engaging the AT&T Managed Security Services Support Center.
Secure Network Gateway / Secure E-Mail Gateway Service Technical Support Guide Technical Support Administrative Guides and Training Modules Please review the SECURE EMAIL GATEWAY Administrator Guides prior
More informationRevision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents
University of Central Florida Information Technology (UCF IT) Title: Effective: 12/15/2016 UCF IT Incident Management Policy & Procedure Revised: 07/13/2018 Approved By: Michael Sink, Associate VP & COO,
More informationAudit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015
Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent
More informationCourse Catalog: Webex Teams + Webex Meetings + Jabber
Course Catalog: Webex Teams + Webex Meetings + Jabber Webex Meetings, Webex Teams, and Jabber End User and Administrator Training Meet Me In The Cloud, Inc. https://meetmeinthecloud.com San Francisco Bay
More informationTELUS Cloud Contact Centre (TC3) Customer Care Guide
Customer Care Guide May 2018 Table of Contents... 1 INTRODUCTION... 3 CONTACTING TELUS... 4 Reporting Technical Service Issues... 4 Repair Ticket Severity Levels and Response Target... 5 Requesting Moves/Adds/Changes
More informationManaged Administration Service (MAS): Hitachi ID Password Manager
Managed Administration Service (MAS): Hitachi ID Password Manager 2018 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Managed Administration Service (MAS) 1 2.1 Hitachi ID Systems
More informationFACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK. Copyright 2007 Rockwell Automation, Inc. All rights reserved.
FACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK Copyright 2007 Rockwell Automation, Inc. All rights reserved. 2 Technical Support Programs Each of our Support Programs includes application, developer
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationSt. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN
St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the
More informationSTANDARD (PAY AS YOU GO) PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT
Standard Service Level Agreement STANDARD (PAY AS YOU GO) & PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT Prepared and effective as of Monday, 5th September 2016 By Daniel Herr Director of Tech Help
More informationQumu Support and Maintenance Service Agreement
Qumu and Maintenance Service I. Scope: A. Services: Qumu, Inc. ( QUMU ) will provide technical assistance, software maintenance and support services (collectively Services as described in section II below)
More informationMIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016
MIS 5203 Lifecycle Management 1 Week 12 April 7, 2016 Study Objectives Systems Implementation Data Migration Change Over 2 Phase 1 Feasibility Phase 2 Requirements Which ones of these activities are part
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationAny observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.
Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 10, 2018
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationService Level Agreement (SLA) for The Texas State University System Office
Service Level Agreement (SLA) for The Texas State University System Office By Technology Resources Texas State University San Marcos Effective Date: January 01, 2008 Version Version Date Revision / Description
More informationCDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL
Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities
More informationNAMI Affiliate Profile Center Contact Manual
NAMI Affiliate Profile Center Contact Manual Standards of Excellence/Center for Excellence November 2013 Table of Contents Chapter Page I. NAMI Affiliate Profile Center Contact Training Timetable 3 II.
More information