CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS Sample Clauses

The Configuration & Change Management Policy Statements clause establishes the rules and procedures for managing changes to systems, software, or processes within an organization. It typically outlines how changes must be documented, reviewed, approved, and tracked to ensure that all modifications are controlled and do not negatively impact operations or security. By formalizing these processes, the clause helps maintain system integrity, reduces the risk of unauthorized or disruptive changes, and ensures accountability throughout the change management lifecycle.
CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources. 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.
CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. 3.2.1 Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures. 3.2.2 Changes impacting security appliances managed by OCIT (e.g., security architecture, security appliances, County firewall, Website listings, application listings, email gateway, administrative accounts) shall be reviewed by OCIT Enterprise Privacy and Cybersecurity in accordance with the County Security Review and Approval Process. 3.2.3 Only authorized users shall make any changes to system and/or software configuration files. 3.2.4 Only authorized users shall download and/or install operating system software, service-related software (such as web server software), or other software applications on County computer systems without prior written authorization from department IT management. This includes, but is not limited to, free software, computer games and peer-to-peer file sharing software. 3.2.5 Each department shall develop a formal change control procedure that outlines the process to be used for identifying, classifying, approving, implementing, testing, and documenting changes to its IT resources. Docusign Envelope ID: 7489E300-8AF1-4335-9329-A29008757313 3.2.6 Each department shall conduct periodic audits designed to determine if unauthorized software has been installed on any of its computers. 3.2.7 As appropriate, segregation of duties shall be implemented by all County departments to ensure that no single person has control of multiple critical systems and the potential for misusing that control.
CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS. Changes to all information processing facilities, systems, software, or procedures shall be strictly controlled according to formal change management procedures.

Related to CONFIGURATION & CHANGE MANAGEMENT POLICY STATEMENTS

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 1, 2016, the District will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the District to provide equally effective alternative access. The Plan for New Content will require the District, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the District’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the District will officially adopt, and fully implement the amended policies and procedures.

  • Service Level Agreements If a Service or a Plan includes a Service Level Agreement (‘SLA’): (a) we are liable for any remedy or rebate allowed to you under the SLA; and (b) subject to clauses 34 to 38, and to the express terms of the SLA, our liability for breach of the SLA is limited to such remedy or rebate.

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.