Presentation: Comprehensive Policies & Procedures Information Resources UNIT.

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

OMB Circular A-123 – Management’s Responsibility for Internal Control Policy Applicability Sources of Information Assessment, Documentation and Reporting.
Security Controls – What Works
Business Crisis and Continuity Management (BCCM) Class Session
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
1 ISE Ch. 22 Managing an Ergonomics Program History of Ergonomics Programs  1993: OSHA Ergonomics Program Management Guidelines for Meatpacking.
Database Administration
ENVIRONMENTAL MANAGEMENT PLAN
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Examine Quality Assurance/Quality Control Documentation
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Evolving IT Framework Standards (Compliance and IT)
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Implementation of ISO 14001/OHSAS TMS Consultancy Ltd.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Concepts of Database Management Sixth Edition
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Environmental Health and Safety (EH&S) Supplier Awareness Training ISR Systems Danbury, CT 2011.
David N. Wozei Systems Administrator, IT Auditor.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Database Administration
Agenda  Sarbanes Oxley Act  Where to Begin  Creating the Risk Library  Assessments / Audits  Signing Officer  Business Process Owners  Documenting.
Database Administration
Resource Management Resource Management 3.03 Understand support services.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
SecSDLC Chapter 2.
Chapter 12 Implementation and Maintenance
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
TEXT BOOK: DATABASE ADMINISTRATION: THE COMPLETE GUIDE TO PRACTICES AND PROCEDURES CRAIG S. MULLINS Database Administration(IS4511) Sana azzam
Harris County Case Study.  Aligning plans with emergency support functions (ESFs) can facilitate an efficient and effective response to emergencies.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Scientific data storage: How are computers involved in the following?
INFORMATION DISASTER PREPAREDNESS PLANNING (IDPP).
2007 Office of Risk Management Annual Conference 2007 David M. Shapiro Disaster Planning & Recovery Consultants
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
CHAPTER 3 Management Systems. Learning Objectives Describe the basic business activities and tools necessary to implement successful industrial hygiene.
Risk Management and the Treasury Function
Learn Your Information Security Management System
Be prepared How to face crises Safety in and around the building.
Electronic Records Management Program
Alabede, Collura, Walden, Zimmerman
Environmental Health and Safety (EH&S) Supplier Awareness Training
Resource Management 3.03 Understand support services
Final HIPAA Security Rule
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management PP Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Resource Management 3.03 Understand support services
Whose Job Is It? Responsibility for Laboratory Safety and Security
RISK MANAGEMENT CENTER
Presentation transcript:

Presentation: Comprehensive Policies & Procedures Information Resources UNIT

Policies & Procedures  Policies: Written record of proper practices to be implemented in an organization. They define the WHY (objectives), - Generalized.  Procedures: Define the steps required to achieve the corresponding policy. They define the HOW, - Specific.  Work Instructions & Procedures (Engineering Standards- Manufacturers) Specialized procedures, Data Sheets and practices for maintenance,Repair and Engineering applications, jobs  Above Define a Blueprint for:  Daily operations - End-User familiarization  Loss Prevention – Employee & Asset Safeguarding  Disaster Recovery Plan : Plan for (resumption of operations following an incident )

P & P Categories DIVISIONS & SUBDIVISIONS Finance Policies & Procedures Administration Policies & Procedures Technical WI & P Finance Policies Finance Procedures Finance Work Forms Admin & Policies Admin & Procedures Administration Work Forms Engineering Standards Technical Manufacturer s W I & P Technical Work Forms

Current Situation IF - Most of the policies, the procedures, and the work instruction & Maintenance manuals have been compiled some decades ago and exist, if at all, in printed format only. Therefore:  Negative Information. The content of existing policies and procedures and WI&P are mostly out of context with both current international practices and actual your operations.  Unavailable Information. Some of the printed documents do may not exist or hard to locate and even when that is possible, the searching is cumbersome.

Magnitude of Endeavors Common with most companies A good indication of the magnitude of the underlining policies & procedures to be addressed, is the number of forms that are being utilized in an enterprise:  Currently, a sample of the forms situation in at a 45 year s old Oil Company DepartmentActiveCancelled Finance8540 Administration Technical WORK INSTRUCTIONS AND PROCEDURES TIED WITH THEWORK INSTRUCTIONS AND PROCEDURES TIED WITH THE TECHNICAL PART ARE TENS OF THOUSANDS TECHNICAL PART ARE TENS OF THOUSANDS

Engineering Standards & Specifications Common Situation Some documents are available BUT,  No directly correlated access to referenced international standards such as ISO9000, ANSI, IEEE, ASME, ASHRAE, ASCE, ACM, BS, etc.  Not searchable as a unified knowledge base system. Plain English/Arabic queries are not available Target: Remedy the above by:- incorporating EngineeringStandards and Work Instructions and Procedures into the overall recompilation and computerization.

Another Necessity for Policies & Procedures  ISO Certification. The following are essential in attempting such a certification:  Existence of documentation of all operations  Written policies and procedures  Proof of implementation of P&P  Document Management and Control  Insurance Coverage. Existence of enforced policies and procedures (especially in Safety and Risk Management) are required by most corporate insurance policy underwriters.

Risk Mitigation & Disaster Recovery Implementation of Policies & Procedures RM & DR are essential in:  Business Continuity. Ensuring the day-to-day continuation of corporate operations.  Risk Evaluation & Mitigation. Minimization of human health hazards and firm asset destruction.  Disaster Recovery. In the event of a catastrophic event to allow the Company to resume operations in the shortest possible time. (Recovery Plan)

Sample Of a Company P&P Categories Following is only an indication:  Management  Finance  Procurement  Planning  Travel & Transportation  Administration & HR  ICT & Information Management Work instructions & Procedures  Safety & security  Internal Audit

Steps and Targets  Compile Comprehensive Policies & Procedures and W.I.&P for all Company Activities & Operations.  Organize Company’s p & p and W.I.&P in an electronically searchable format (Including Forms).  Implement a knowledge base system (Database) that will allow queries in plain English and Arabic as required.  Train End Users on searching and utilizing information contained in the P&P + WI&P and Engineering standards

Plan to Achieve The Target  Survey and catalog all departmental operations.  Evaluate currently available policies and procedures.  Incorporate internationally acceptable practices.  Update & Compile a revised comprehensive policies and procedures system that will take all above in consideration.  Develop and implement the necessary computerized search engines. (searchable DataBase)  Schedule a plan for the required training for all end users of the system usage Phase – I Identify Requirements Phase – II Implementation

IF YOU NEED SUCH PROSSITIONAL WORK WE CAN HELP