This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policies:security:develandmaint [2018/01/10 12:22] – [32. New information systems procedure] deul | policies:security:develandmaint [2018/01/10 13:32] (current) – [39. Calamity procedures] deul | ||
---|---|---|---|
Line 13: | Line 13: | ||
There are no scientific systems with elevated risks. So no additional risk analysis measures have to be taken. | There are no scientific systems with elevated risks. So no additional risk analysis measures have to be taken. | ||
- | For information systems storing personel information additional analysis | + | For information systems storing personel information additional analysis |
====34. Operational acceptance asset==== | ====34. Operational acceptance asset==== | ||
Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems ' | Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems ' | ||
Line 28: | Line 28: | ||
The Security manager as defined by the [[policies: | The Security manager as defined by the [[policies: | ||
====39. Calamity procedures===== | ====39. Calamity procedures===== | ||
- | There is no true calamity procedure and each case is handled ad hoc, with teh following requirements in mind: | + | There is no true calamity procedure, |
* Minimize downtime of critical services | * Minimize downtime of critical services | ||
* Communicate the calamity to all users/ | * Communicate the calamity to all users/ | ||
* Maximize the collaborative effort within the IT Department team | * Maximize the collaborative effort within the IT Department team | ||
* Strive to full resolution of the calamity | * Strive to full resolution of the calamity |