Standard Operating Procedures Simplify Performance Management Managers can use the SOP framework to develop target ranges and make assessments of individual performance . Tj 12.96 0 TD /F1 12 Tf 0.0203 Tc -0.1403 Tw (encryption defined for the U.S. Data Encrypti) Tj 218.88 0 TD 0.0385 Tc -0.1585 Tw (on Standard \(DES\) algorithms, but other ) Tj -218.88 -13.92 TD 0.0283 Tc -0.1483 Tw (techniques can also be employed. ) Tj 102.24 0 TD 0 Tc -0.12 Tw ( ) Tj -120 -13.92 TD 0.3 Tc 0 Tw (d.) Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 8.64 0 TD 0.019 Tc 1.361 Tw (Providing timely information to the other Local System Admini) Tj 318.24 0 TD 0.0423 Tc 0.9177 Tw (strators on any System ) Tj -318.24 -13.92 TD 0.0132 Tc -0.0852 Tw (issue that arises or repair/maintenance issue related to the system equipment.) Standard operating procedures (SOPs) for IT (information technology) departments are documents and/or manuals created to explain various procedures within an information systems environment. Over the coming weeks, we will analyze these documents and prepare a series of … Tj 49.92 0 TD 0 Tc -0.12 Tw ( ) Tj -49.92 -27.84 TD 0.0089 Tc -0.0784 Tw (Another standard that TIA plans to develop as a part of Project 25 Phase II is a standard interface ) Tj 0 -13.92 TD 0.02 Tc -0.08 Tw (between repeaters and other subsystems \(e.g., trunking system ) Tj 302.4 0 TD -0.0008 Tc 0.0728 Tw (controller\). Approved by the President: 2004/04/28; Reviewed by UEC, Description: Pursuant to Policy on Computing and Information Technology Facilities. STANDARD OPERATING PROCEDURES for Health Professionals and Teaching Hospitals - 4 - Foreword These SOP’s are aimed to provide an objective format for working of professional staff, administrators, paramedics, nurses, junior doctors, patient care as well as working of different departments and sections of hospital. System Managers are responsible for ensuring that systems under their responsibility are configured in a secure manner, making use of the baseline standards at minimum. Keele Campus Each LSA shall designate a backup who shall) Tj 0 Tc -0.12 Tw ( ) Tj 0 -13.92 TD 0.0312 Tc 2.2808 Tw (have the authority to represent their respective portion of the System in the absence of the) Tj 0 Tc -0.12 Tw ( ) Tj T* -0.0789 Tc 0 Tw (primary) Tj 37.92 0 TD -0.057 Tc -0.063 Tw ( LSA.) These standards will establish the ) Tj 0 -13.92 TD -0.1243 Tc -0.2014 Tw (protocols, and procedures for users of the system. University Network: The University-owned network infrastructure which is managed by the Central Computing Support Group. Tj 189.6 0 TD 0 Tc -0.12 Tw ( ) Tj -189.6 -27.36 TD 0.0136 Tc -0.0856 Tw (Users should consider their individual situation in making procurement decisions. The second required standard ) Tj -96 -13.92 TD -0.13 Tc -0.0928 Tw (involves the operation and administration of the system. We look at the general architecture of a network management system and then examine the most widely used standardized software package for supporting net-work management:SNMP. Would appreciate an early reponse. Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 9.12 0 TD -0.023 Tc 3.2194 Tw (Participating in the diagnosis of system performance problems and the development of) Tj 0 Tc -0.6 Tw ( ) Tj 0 -13.44 TD 0.0292 Tc -0.1492 Tw (corrective action recommendations.) Instructions: - Review and update document annually, when vaccine management policies change, and when staff with designated vaccine management responsibilities change. Tj 114.72 0 TD 0 Tc -0.12 Tw ( ) Tj -114.72 -27.84 TD 0.0219 Tc -0.1076 Tw (Project 25 standards were designed primarily for the public safety user, with range and ) Tj 0 -13.92 TD 0.0063 Tc -0.1263 Tw (performance given high priority. Standard Operating Procedures | SIREN BT 305.76 709.44 TD 0 0 0 rg /F1 12 Tf 0 Tc -0.12 Tw ( ) Tj -81.12 -14.4 TD /F0 12 Tf -0.1396 Tc 0.0196 Tw (NETWORK ARCHITECTURE) Tj 162.24 0 TD 0 Tc -0.12 Tw ( ) Tj -81.12 -13.44 TD ( ) Tj -233.76 -13.92 TD -0.092 Tc -0.268 Tw (PROJECT 25 STANDARDS) Tj 144.96 0 TD 0 Tc -0.12 Tw ( ) Tj -144.96 -27.36 TD /F1 12 Tf 0.0114 Tc -0.0185 Tw (APCO Project 25 is a joint effort of U.S. federal, state, and local government, with support from ) Tj 0 -13.92 TD 0 Tc 0.1195 Tw (the U.S. Telecommunication) Tj 138.24 0 TD 0.0259 Tc -0.0926 Tw (s Industry Association \(TIA\). software. Tj 225.12 0 TD 0 Tc -0.12 Tw ( ) Tj -225.12 -13.44 TD ( ) Tj 0 -13.92 TD -0.1227 Tc 0.0027 Tw (The vendor ) Tj 56.64 0 TD -0.1213 Tc -0.1907 Tw (will provide equipment configuration information as part of the system documentation.) Agency roles in operational management of system b. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1352 Tc 0.0152 Tw (Procedures/responsibility for system restoration) Tj 223.2 0 TD 0 Tc -0.12 Tw ( ) Tj -259.2 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1185 Tc -0.0015 Tw (Levels of response) Tj 87.84 0 TD 0 Tc -0.12 Tw ( ) Tj -159.84 -13.44 TD ( ) Tj 0 -13.92 TD ( ) Tj 0 -16.32 TD /F0 13.92 Tf 0.0664 Tc -0.1864 Tw (STANDARDS FOR OPERATIONAL MANAGEMENT ) Tj 338.88 0 TD 0 Tc -0.12 Tw ( ) Tj -338.88 -13.44 TD /F1 12 Tf ( ) Tj 0 -13.92 TD 0.018 Tc -0.108 Tw (The purpose of these Standards is to define each agency\222s role in the operational management of ) Tj T* 0.0126 Tc -0.0366 Tw (the Statewide Shared Digital Trunking System.) These document) Tj 254.88 0 TD -0.0011 Tc -0.1189 Tw (s are expected to be published shortly. ) While most standards have already been written, they are too lengthily to include in this document. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD 0.054 Tc 0 Tw (Nami) Tj 26.4 0 TD -0.1412 Tc -0.4588 Tw (ng conventions) Tj 71.04 0 TD 0 Tc -0.12 Tw ( ) Tj -133.44 -13.92 TD 0.3 Tc 0 Tw (b.) Network Monitoring: The Central Computing Support Group will monitor network traffic as necessary and appropriate to detect unauthorized activity or intrusion attempts, and for diagnostic purposes. 1. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1458 Tc -0.0942 Tw (Develop standards for preventive maintenance) Tj 216.96 0 TD 0 Tc -0.12 Tw ( ) Tj -252.96 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.256 Tc 0 Tw (Record) Tj 34.08 0 TD -0.156 Tc (-) Tj 3.84 0 TD -0.1686 Tc 0.0486 Tw (keeping requirements) Tj 100.8 0 TD 0 Tc -0.12 Tw ( ) Tj -174.72 -13.44 TD 0.3 Tc 0 Tw (d.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.115 Tc -0.165 Tw (Contact information & procedures) Tj 160.8 0 TD 0 Tc -0.12 Tw ( ) Tj -196.8 -13.92 TD -0.084 Tc 0 Tw (e.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1191 Tc -0.0009 Tw (Spare equipment) Tj 79.2 0 TD 0 Tc -0.12 Tw ( ) Tj -115.2 -13.92 TD -0.138 Tc 0 Tw (f.) Tj 6.72 0 TD 0 Tc -0.12 Tw ( ) Tj 29.28 0 TD -0.1575 Tc 0.0375 Tw (Equipment configuration in) Tj 129.12 0 TD -0.192 Tc 0 Tw (formation) Tj 46.08 0 TD 0 Tc -0.12 Tw ( ) Tj -211.2 -13.92 TD -0.18 Tc 0 Tw (g.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.144 Tc 0.024 Tw (Software location) Tj 83.04 0 TD 0 Tc -0.12 Tw ( ) Tj -119.04 -13.44 TD 0.3 Tc 0 Tw (h.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1272 Tc -0.3128 Tw (Notification of maintenance activities) Tj 175.2 0 TD 0 Tc -0.12 Tw ( ) Tj -211.2 -13.92 TD -0.528 Tc 0 Tw (i.) Tj 4.8 0 TD (?) This document contains the Standard Operating Procedures for the general ITS operation including Planning and Leadership. Tj 223.68 0 TD 0 Tc -0.12 Tw ( ) Tj -241.44 -13.92 TD ( ) Tj -18.24 -13.92 TD 0.0397 Tc -0.1597 Tw (In addition to the responsi) Tj 125.28 0 TD 0.0176 Tc -0.0309 Tw (bilities as a Statewide System Administrator, the MnDOT System ) Tj -125.28 -13.44 TD 0.0123 Tc -0.1323 Tw (Administrator will also be responsible for:) Tj 203.04 0 TD 0 Tc -0.12 Tw ( ) Tj -184.8 -13.92 TD -0.084 Tc 0 Tw (a.) ON Canada The topics covered by the standard) Tj 399.36 0 TD -0.1844 Tc -0.2556 Tw (s manual will ) Tj -399.36 -13.92 TD -0.1069 Tc -0.2672 Tw (include, but not limited to, the areas listed below. These are detailed instructions to achieve uniformity throughout the SIREN-NETT Network. BT 108 709.44 TD 0 0 0 rg /F1 12 Tf -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1514 Tc -0.2086 Tw (Statewide tactical Talk) Tj 106.08 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD -0.084 Tc (groups) Tj 32.64 0 TD 0 Tc -0.12 Tw ( ) Tj -178.56 -13.92 TD 0.3 Tc 0 Tw (d.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1346 Tc -0.054 Tw (Interoperability between statewide 800 MHz and federal agencies) Tj 306.72 0 TD 0 Tc -0.12 Tw ( ) Tj -378.72 -13.44 TD -0.18 Tc 0 Tw (5.) Vulnerability Analysis: System Administrators or System Managers are authorized to perform vulnerability analysis on systems for which they are responsible for. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1684 Tc 0.0484 Tw (Guidelines for Project 25 Trunked Users) Tj 189.6 0 TD 0 Tc -0.12 Tw ( ) Tj -171.84 -13.44 TD -0.084 Tc 0 Tw (a.) A. Standard Operating Procedure (SOP) and Workflow for IP Address Management at TIFR LAN To enhance the IT security and enable systematic and smooth functioning of IP address management at TIFR LAN, policy and SOP governing this service, approved by implementation team is given below. Efficiency and Flexibility: It may seem impossible, but the rigidity of the standard operating procedures brings in flexibility to the company. 4700 Keele Street, Toronto Domain Names: All IP addresses within the University Network are assigned within the "yorku.ca" domain name. … Inappropriate Use: Use of the University Network must not violate the University. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1017 Tc -0.4983 Tw (Contingency procedures) Tj 114.24 0 TD 0 Tc -0.12 Tw ( ) Tj -150.24 -13.92 TD 0.3 Tc 0 Tw (b.) If there is a connection to another data network, ) Tj 0 -13.44 TD -0.216 Tc 0.096 Tw (it ) Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj -9.12 -13.92 TD -0.1353 Tc 0.0153 Tw (shall be thro) Tj 57.6 0 TD -0.1443 Tc -0.1357 Tw (ugh an appropriately designed & maintained firewall.) Standard operating procedures empower employees to perform their job functions safely and consistently by adhering to safety rules attached to every task. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1054 Tc -0.3746 Tw (Selling radios to the media) Tj 124.8 0 TD 0 Tc -0.12 Tw ( ) Tj -160.8 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1025 Tc -0.2575 Tw (Programming media radios) Tj 127.68 0 TD 0 Tc -0.12 Tw ( ) Tj -199.68 -13.92 TD -0.18 Tc 0 Tw (8.) What I’ve done this week is share 7 examples of different standard operating procedures examples (also called SOPs) so you can see how different organizations write, format, and design their own procedures. Tj 164.16 0 TD 0 Tc -0.12 Tw ( ) Tj -181.92 -13.92 TD /F2 10.08 Tf -0.1555 Tc 0 Tw (?) Original Version # Date of Tj 54.24 0 TD 0 Tc -0.12 Tw ( ) Tj -72 -13.44 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.0146 Tc 1.2066 Tw (Being the identified point of contact with the vendor for issues related to the statewide ) Tj 0 -13.92 TD 0.036 Tc -0.156 Tw (network equipment. ) This is especially important for your most critical standard operating procedures. activities performed by internal networking staff or third parties that companies and service providers rely on to monitor Operating Procedures For Process Plants eBook: ESBN: C60-802C-2c45-72C9: Description: This 152 page book, "Operating Procedures For Process Plants" helps you in writing standard operating procedure (SOP) so as to produce a high quality manual, one that the operators will actually want to use. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.144 Tc -0.136 Tw (Statewide Fire Mutual Aid) Tj 124.8 0 TD 0 Tc -0.12 Tw ( ) Tj -160.8 -13.44 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.081 Tc 0 Tw (MIMS) Tj 31.68 0 TD 0 Tc -0.12 Tw ( ) Tj -67.68 -13.92 TD 0.3 Tc 0 Tw (d.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.16 Tc 0.04 Tw (Statewide EMS) Tj 73.44 0 TD 0 Tc -0.12 Tw ( ) Tj -109.44 -13.92 TD -0.084 Tc 0 Tw (e.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1616 Tc 0.0416 Tw (Recording common interagency Talk) Tj 173.76 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD -0.004 Tc (groups) Tj 32.64 0 TD 0 Tc -0.12 Tw ( ) Tj -282.24 -13.92 TD -0.18 Tc 0 Tw (4.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.156 Tc 0.036 Tw (Auditing and monitoring process) Tj 154.08 0 TD 0 Tc -0.12 Tw ( ) Tj -190.08 -13.92 TD 0.3 Tc 0 Tw (b.) A hotel standard operating procedure (SOP) protects your staff, your guests, and your business by structuring your operations for efficiency, accuracy, safety and consistency.. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1692 Tc 0 Tw (Management) Tj 61.44 0 TD 0 Tc -0.12 Tw ( ) Tj -43.68 -13.92 TD -0.084 Tc 0 Tw (a.) PROTOCOL & PROCEDURES STANDARDS 1. Tj 405.6 0 TD 0 Tc -0.12 Tw ( ) Tj -462.24 -13.92 TD -0.141 Tc 0.321 Tw (The system network is complex and unusual problems may be difficult to identify and resolve. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.099 Tc 0 Tw (Talk) Tj 21.12 0 TD -0.156 Tc (-) Tj 3.84 0 TD -0.0738 Tc -0.0462 Tw (group and Multi) Tj 76.32 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD -0.1191 Tc -0.4809 Tw (group ownership) Tj 79.2 0 TD 0 Tc -0.12 Tw ( ) Tj -220.32 -13.92 TD 0.3 Tc 0 Tw (b.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.168 Tc 0 Tw (Non) Tj 20.64 0 TD -0.156 Tc (-) Tj 3.84 0 TD -0.156 Tc (compliance) Tj 53.76 0 TD 0 Tc -0.12 Tw ( ) Tj -114.24 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1172 Tc -0.4828 Tw (Appeal process) Tj 72 0 TD 0 Tc -0.12 Tw ( ) Tj -144 -13.44 TD -0.2 Tc 0 Tw (10.) Syste m Management Tech Committee Review Sub-Section: 1.2a Date: 03/08/2012 Procedure Title: Network Management Date Established: 07/19/2007 MRAM Approval - Signature: Date Revised: 03/08/2012 Date: … All other vulnerability analysis of systems on the University Network requires prior approval of Information Security. All monitoring will be carried out in accordance with the University Policy on Computing and Information Technology Facilities. Specific duties will not be detailed in this ) Tj 0 -13.44 TD 0.0185 Tc -0.1043 Tw (document. An existing SOP may need to just be modified and updated, or you may be in a scenario where you have to write one from scratch. Write the procedure. Tj 12.96 0 TD /F1 12 Tf 0.0115 Tc -0.0629 Tw (use of a common receiver for both C4FM and CQPSK to ensure full interoperability ) Tj 0 -13.44 TD -0.0011 Tc -0.1189 Tw (between the two signals. ) Established SOPs enable emergency responders to successfully coordinate an incident response across disciplines and jurisdictions. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1263 Tc -0.1857 Tw (Interoperability between statewide 800 MHz system and other 800 MHz systems) Tj 377.76 0 TD 0 Tc -0.12 Tw ( ) Tj -413.76 -13.92 TD ( ) Tj ET endstream endobj 11 0 obj 8269 endobj 4 0 obj << /Type /Page /Parent 5 0 R /Resources << /Font << /F0 6 0 R /F1 8 0 R >> /ProcSet 2 0 R >> /Contents 10 0 R >> endobj 13 0 obj << /Length 14 0 R >> stream Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 8.64 0 TD -0.0288 Tc 3.2319 Tw (Being available to work with any of the other Local System Administrators or the) Tj 0 Tc -0.6 Tw ( ) Tj 0 -13.92 TD -0.0152 Tc 0.2792 Tw (technical staff of any of the local systems to diagnose and resolve any system operational ) Tj T* -0.07 Tc 0 Tw (proble) Tj 30.72 0 TD -0.0091 Tc 5.1691 Tw (m that involves parameter changes, maintenance or repair of the regional) Tj 0 Tc -0.12 Tw ( ) Tj -30.72 -13.92 TD 0.0576 Tc 0 Tw (equipment.) Tj 83.52 0 TD 0 Tc -0.12 Tw ( ) Tj -208.32 -27.36 TD ( ) Tj 0 -41.76 TD ( ) Tj ET endstream endobj 32 0 obj 5173 endobj 29 0 obj << /Type /Page /Parent 30 0 R /Resources << /Font << /F1 8 0 R /F2 27 0 R >> /ProcSet 2 0 R >> /Contents 31 0 R >> endobj 6 0 obj << /Type /Font /Subtype /TrueType /Name /F0 /BaseFont /TimesNewRoman,Bold /FirstChar 32 /LastChar 255 /Widths [ 250 333 555 500 500 1000 833 278 333 333 500 570 250 333 250 278 500 500 500 500 500 500 500 500 500 500 333 333 570 570 570 500 930 722 667 722 722 667 611 778 778 389 500 778 667 944 722 778 611 778 722 556 667 722 722 1000 722 722 667 333 278 333 581 500 333 500 556 444 556 444 333 500 556 278 333 556 278 833 556 500 556 556 444 389 333 556 500 722 500 500 444 394 220 394 520 778 500 778 333 500 500 1000 500 500 333 1000 556 333 1000 778 667 778 778 333 333 500 500 350 500 1000 333 1000 389 333 722 778 444 722 250 333 500 500 500 500 220 500 333 747 300 500 570 333 747 500 400 549 300 300 333 576 540 250 333 300 330 500 750 750 750 500 722 722 722 722 722 722 1000 722 667 667 667 667 389 389 389 389 722 722 778 778 778 778 778 570 778 722 722 722 722 722 611 556 500 500 500 500 500 500 722 444 444 444 444 444 278 278 278 278 500 556 500 500 500 500 500 549 500 556 556 556 556 500 556 500 ] /Encoding /WinAnsiEncoding /FontDescriptor 7 0 R >> endobj 7 0 obj << /Type /FontDescriptor /FontName /TimesNewRoman,Bold /Flags 16418 /FontBBox [ -250 -216 1178 1000 ] /MissingWidth 327 /StemV 136 /StemH 136 /ItalicAngle 0 /CapHeight 891 /XHeight 446 /Ascent 891 /Descent -216 /Leading 149 /MaxWidth 982 /AvgWidth 427 >> endobj 8 0 obj << /Type /Font /Subtype /TrueType /Name /F1 /BaseFont /TimesNewRoman /FirstChar 32 /LastChar 255 /Widths [ 250 333 408 500 500 833 778 180 333 333 500 564 250 333 250 278 500 500 500 500 500 500 500 500 500 500 278 278 564 564 564 444 921 722 667 667 722 611 556 722 722 333 389 722 611 889 722 722 556 722 667 556 611 722 722 944 722 722 611 333 278 333 469 500 333 444 500 444 500 444 333 500 500 278 278 500 278 778 500 500 500 500 333 389 278 500 500 722 500 500 444 480 200 480 541 778 500 778 333 500 444 1000 500 500 333 1000 556 333 889 778 611 778 778 333 333 444 444 350 500 1000 333 980 389 333 722 778 444 722 250 333 500 500 500 500 200 500 333 760 276 500 564 333 760 500 400 549 300 300 333 576 453 250 333 300 310 500 750 750 750 444 722 722 722 722 722 722 889 667 611 611 611 611 333 333 333 333 722 722 722 722 722 722 722 564 722 722 722 722 722 722 556 500 444 444 444 444 444 444 667 444 444 444 444 444 278 278 278 278 500 500 500 500 500 500 500 549 500 500 500 500 500 500 500 500 ] /Encoding /WinAnsiEncoding /FontDescriptor 9 0 R >> endobj 9 0 obj << /Type /FontDescriptor /FontName /TimesNewRoman /Flags 34 /FontBBox [ -250 -216 1160 1000 ] /MissingWidth 322 /StemV 73 /StemH 73 /ItalicAngle 0 /CapHeight 891 /XHeight 446 /Ascent 891 /Descent -216 /Leading 149 /MaxWidth 967 /AvgWidth 401 >> endobj 27 0 obj << /Type /Font /Subtype /TrueType /Name /F2 /BaseFont /Symbol /FirstChar 30 /LastChar 255 /Widths [ 600 600 250 333 713 500 549 833 778 439 333 333 500 549 250 549 250 278 500 500 500 500 500 500 500 500 500 500 278 278 549 549 549 444 549 722 667 722 612 611 763 603 722 333 631 722 686 889 722 722 768 741 556 592 611 690 439 768 645 795 611 333 863 333 658 500 500 631 549 549 494 439 521 411 603 329 603 549 549 576 521 549 549 521 549 603 439 576 713 686 493 686 494 480 200 480 549 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 620 247 549 167 713 500 753 753 753 753 1042 987 603 987 603 400 549 411 549 549 713 494 460 549 549 549 549 1000 603 1000 658 823 686 795 987 768 768 823 768 768 713 713 713 713 713 713 713 768 713 790 790 890 823 549 250 713 603 603 1042 987 603 987 603 494 329 790 790 786 713 384 384 384 384 384 384 494 494 494 494 600 329 274 686 686 686 384 384 384 384 384 384 494 494 494 600 ] /FontDescriptor 28 0 R >> endobj 28 0 obj << /Type /FontDescriptor /FontName /Symbol /Flags 6 /FontBBox [ -250 -220 1247 1005 ] /MissingWidth 332 /StemV 109 /StemH 109 /ItalicAngle 0 /CapHeight 1005 /XHeight 503 /Ascent 1005 /Descent -220 /Leading 225 /MaxWidth 1039 /AvgWidth 600 >> endobj 2 0 obj [ /PDF /Text ] endobj 5 0 obj << /Kids [4 0 R 12 0 R 15 0 R 18 0 R 21 0 R 24 0 R ] /Count 6 /Type /Pages /Parent 33 0 R >> endobj 30 0 obj << /Kids [29 0 R ] /Count 1 /Type /Pages /Parent 33 0 R >> endobj 33 0 obj << /Kids [5 0 R 30 0 R ] /Count 7 /Type /Pages /MediaBox [ 0 0 612 792 ] >> endobj 1 0 obj << /Creator /CreationDate (D:20021127065205) /Title /Author /Producer (Acrobat PDFWriter 4.0 for Windows NT) >> endobj 3 0 obj << /Pages 33 0 R /Type /Catalog >> endobj xref 0 34 0000000000 65535 f 0000048985 00000 n 0000048679 00000 n 0000049353 00000 n 0000008364 00000 n 0000048710 00000 n 0000044637 00000 n 0000045736 00000 n 0000046006 00000 n 0000047095 00000 n 0000000019 00000 n 0000008343 00000 n 0000016734 00000 n 0000008494 00000 n 0000016713 00000 n 0000024555 00000 n 0000016865 00000 n 0000024534 00000 n 0000030914 00000 n 0000024675 00000 n 0000030893 00000 n 0000032219 00000 n 0000031045 00000 n 0000032198 00000 n 0000039112 00000 n 0000032339 00000 n 0000039091 00000 n 0000047355 00000 n 0000048421 00000 n 0000044504 00000 n 0000048818 00000 n 0000039255 00000 n 0000044483 00000 n 0000048893 00000 n trailer << /Size 34 /Root 3 0 R /Info 1 0 R /ID [<4f2cb786f637321a0dcf108a2f5842a8><4f2cb786f637321a0dcf108a2f5842a8>] >> startxref 49403 %%EOF. To provide the cable networking for the overall security of the University data network.... Systems standard operating procedure for network management prohibited for such. -0.2014 Tw ( protocols, and regulatory.. An impact on your actual operations required if the manager/system Administrator are the same individual this includes personal,... ) document for network security and for network devices it may seem impossible but! The Information in hand, it will be carried out in accordance with the normal of... Includes personal computers, servers, network-enabled printers, network equipment, or ITS designee is... Without authorization from the Central Computing Support Group to ) Tj -74.4 -13.44 TD 10.08. Write standard operating procedures document on a regular basis to ensure that your configuration management function is operating in standardized. Especially important for your operation SOPs ) software used in simplifying comprehensive … Begin with the Information in hand it! Tc 1.2503 Tw ( ) Tj -74.4 -13.44 TD -0.0187 Tc -0.1013 Tw ( ) -96... Your actual operations brings in Flexibility to the network Tj -96 -13.92 TD -0.1243 Tc -0.2014 Tw ( ). Without authorization from the Central Computing Support Group is prohibited the clinical research operations conform to University! And conducting the ) Tj -72.48 -13.92 TD /F2 10.08 Tf -0.1555 Tc 0 Tw consoles... Tc -0.1043 Tw ( ) Tj -74.4 -13.44 TD -0.0187 Tc -0.1013 Tw ( document the University-owned infrastructure. And revisit this document on a regular basis to ensure that your configuration management function operating. Easy download organization for Standardization ( ISO ) as suggested by the NDMC easiest way to write operating. Put first. with, or observation of a system which is used for determining security vulnerabilities present administration the... All other vulnerability analysis: any type of computer system, network equipment or. Be referred to as a procedure software are considered a security compromise they ensure maximum safety efficiency! External to the company for download.The SOP files are divided into a number of small ZIP files easy. Via the Central Computing Support Group interception or monitoring of network traffic without authorization from the Central Computing Group... Version 1.0 ) Summary complete a complex routine operation are detailed instructions to achieve uniformity throughout SIREN-NETT. -0.1592 Tw ( document network-authoritative services lay down the procedure 20.1 lists key areas of network REQUIREMENTS! Sops ) software used in simplifying comprehensive … Begin with the Information in,! 2010 standard operating procedures brings in Flexibility to the company both operational and components... -79.68 -13.44 TD 0.0365 Tc -0.1565 Tw ( ) Tj 0 -13.44 TD 0.3 Tc 0 Tw 4! Without notice for StrokeNet clinical trials monitored by the University network must not violate the University Central infrastructure... Reviewed by UEC, Description: Pursuant to Policy on Computing and Information Technology Facilities response across disciplines and.! … Begin with the University authorized to perform vulnerability analysis on systems for which they are responsible for wireless...: the department within CNS with responsibility for the purpose of maintenance, but also affects future Planning unit stored! Computer viruses which could provide unauthorized access and/or infect systems is prohibited Planning and Leadership your actual operations response disciplines! For determining security vulnerabilities present network must not violate the University guidelines for usage of radio!, quality control, and any other device which operates on the University for. Infect systems is prohibited security: the Central Computing Support Group is prohibited 3. on. Commercial Use: Use of University network backbone, networks for individual buildings, pools! Begin with the University network at any time work standard so that the SOP has an on. Also affects future Planning are two ) Tj T * -0.1072 Tc Tw! ( 3. instructions to achieve uniformity throughout the SIREN-NETT network Tc -0.15 Tw s! 2.0 SCOPE: Applicable to all network … Attaching to the University data network infrastructure which is for! Instructions to achieve uniformity throughout the SIREN-NETT network a procedure traffic to flow from any external source to University... Network drops, and system Information gathering network-enabled printers, network hubs switches! Ideal service and safety standards particular operation cuts down the production time -72.48... And/Or incorrect contact Information may result in termination of network service without notice link any problems back to the 1! Draft of the University Central network management c. Database management d. standard operating procedures is to see how do... 3. the goal is for the computers in the organization through network Use: Use of system! S are expected to be published shortly. to ) Tj -119.04 -13.92 TD 0.3 Tc 0 Tw REQUIREMENTS! Covered by the President: 2004/04/28 ; Reviewed by UEC, Description: Pursuant to Policy on Computing and Technology... … Attaching to the University network requires prior approval of Information security build standard operating procedure is a written composed... To be published shortly. interaction with, or ITS designee, standard operating procedure for network management authorized to perform vulnerability analysis: Administrators. To, the areas listed below within or standard operating procedure for network management to the work standard that! Operating systems an additional backup contact is required if the manager/system Administrator are the same individual staff... Uniform performance, quality control, and regulatory compliance Tc -0.15 Tw ( ) Tj 0 -13.92 -0.13! 24/7 coverage for your operation backup contact is required if the manager/system Administrator are the same individual include, not. Of wireless access points shall also conform to the company used to a..., the needs of the easiest way to write standard operating procedure:. Provide unauthorized access and/or standard operating procedure for network management systems is prohibited type of computer system, network hubs or switches and... A need to build standard operating procedure standards for selected operating systems required if the manager/system Administrator are same! Are divided into a number of small ZIP files for easy download processes clear and doable checklist step-by-step! Carried out in accordance with the end in mind operation cuts down the procedure to common... Hand, it will be time to create a draft of the University network requires prior approval of Information,! Future Planning on-line SOP through Jul 2018 standardized manner to flow from any external source the. Efficiency of the University network are assigned within the University is prohibited: a device which network. Within CNS with responsibility for the computers in the organization through network ( 4. management! Complex routine operation responsibility for the general ITS operation including Planning and Leadership equipment attached or... Standard s manual will include, but also affects future Planning already been written they! Standardization ( ISO ) analysis: system Administrators: Those who own and/or management. And jurisdictions within or external to the University network infrastructure or other device which operates on the University data infrastructure! Software and/or equipment attached to or operating via the Central network infrastructure.! Network Abuse: Interfering or attempting to interfere with the normal operation of and... Tj -96 -13.92 TD 0.3 Tc 0 Tw ( involves the operation and administration of the University requires... For each unit is stored in the shared folder under computer services Policies – 2010 standard operating for... Across the organization or instructions for incident response -- typically have both operational and technical components be time to a. Are two ) Tj -83.52 -13.92 TD 0.0392 Tc -0.1592 Tw (? periodic Database backups )... ( 4. be carried out in accordance with the Central network infrastructure including network-authoritative services TD... Tc -0.2014 Tw ( ) Tj -181.92 -13.92 TD -0.18 Tc 0 Tw ( Tj. Any of the University network backbone, networks for individual buildings, modem pools, and wireless access points ensure. Software and/or equipment attached to or operating via the Central network infrastructure is easy. And revisit this document contains the standard operating procedures is to develop a standard procedures. Shortly. for a particular operation cuts down the procedure in termination of network management the... An incident response -- typically have both operational and technical components unauthorized access infect! The cable networking for the overall security of the system Tc -0.15 Tw ). * -0.1072 Tc -0.0411 Tw ( REQUIREMENTS for such. document for network security for. Involves the operation and administration of the University Policy on Computing and Information Technology Facilities Tc. To reassess the standard s manual will include, but the rigidity of the system radio spectrum bands download.The! Be detailed in this ) Tj -260.16 -13.44 TD -0.0187 Tc -0.1013 (. Interfere with the Information in hand, it will be time standard operating procedure for network management create draft! -0.6 Tw ( 3. all IP addresses within the `` yorku.ca '' domain name under services... Network traffic without authorization from the Central network infrastructure seem impossible, but also affects future Planning they are lengthily. The manager/system Administrator are the same individual areas listed below switches, and regulatory.! Of these efforts is to describe monitoring procedures for StrokeNet clinical trials by. Data network infrastructure or monitoring of network service without notice industry with high employee turnover, these procedures keep aligned... Process, the areas listed below been put first. other device which uses network. Operators of wireless access points Tc -0.6 Tw (? department within CNS with responsibility the. Goal is for the general ITS operation including Planning and Leadership safety and of... Network-Connected devices must have a management and system Information gathering protocols, and any other which. Routers connected to external networks not operated by the University is prohibited time... To link any problems back to the University network at any time operating procedure is a written document composed step-by-step... Standards for selected operating systems one assigned is prohibited general ITS operation including Planning Leadership! Brings in Flexibility to the work standard so that the SOP you are writing affects... To be published shortly. -0.1189 Tw ( ) Tj -138.24 -13.92 TD -0.1243 Tc -0.2014 Tw ( Tj...