Security Changes
Jump to:
UAS ITS Service Agreement
Revised: December 12, 2008
- Service Area
- Information Systems
- Service Needed
- Security configuration management
- Department Role
- Internally monitor who should have access to resources, especially as employees join or leave the department.
- When changes are needed, submit a work order request via the IT Helpdesk, providing:
- Identification of the specific resource being controlled
- Specific information of the change needed
- IT Services Role
- Reconfigure access to services within 2 business days of receiving the request.
- Service Outcome
UAS ITS Assessment Plan
Revised: December 12, 2008
- Service Area
- Information Systems
- Service Needed
- Security configuration management
- Service Outcome
- Employees have access to the resources they need.
- UAS resources are protected from unauthorized access.
- Sensitive data are not disclosed.
- Administrative Services Mission Alignment
- Effective and Efficient Practices: Yes ✅
- Fostering Cooperation: Yes ✅
- Compliance: Yes ✅
- IT Services Success Indicators
- 95% of change requests are completed within 2 business days
- Data Collection and Analysis Procedures
- Request submission and completion dates are tracked using the established work-order process.
- Information Systems Manager performs quarterly audit to ensure service levels are achieved.
- Utilization of Results
Failure to meet success objective will trigger a remediation strategy depending on the cause of the failure:
- Employee performance: increase oversight, training and accountability measures.
- Resource allocation: evaluate staffing levels and consider temporary or long-term internal reallocation.
- Internal process / workflow: reassess processes and service strategies
- Reporting Strategy
To be determined.