Tj 6.24 0 TD 0 Tc -0.12 Tw ( ) Tj 29.76 0 TD -0.1329 Tc -0.2271 Tw (Managing participation issues) Tj 140.16 0 TD 0 Tc -0.12 Tw ( ) Tj -176.16 -13.92 TD -0.048 Tc 0 Tw (j.) Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 9.12 0 TD -0.023 Tc 3.2194 Tw (Participating in the diagnosis of system performance problems and the development of) Tj 0 Tc -0.6 Tw ( ) Tj 0 -13.44 TD 0.0292 Tc -0.1492 Tw (corrective action recommendations.) Standard Operating Procedures . Tj 4.8 0 TD (?) 1. Standard operating procedures -- formal written guidelines or instructions for incident response -- typically have both operational and technical components. Tj -88.8 -13.92 TD 0.018 Tc -0.0642 Tw (Performance and meeting user needs were always placed higher in priority than spectrum ) Tj 0 -13.44 TD 0.009 Tc -0.129 Tw (efficiency or reducing technical complexity. ) Tj 114.72 0 TD 0 Tc -0.12 Tw ( ) Tj -114.72 -27.84 TD 0.0219 Tc -0.1076 Tw (Project 25 standards were designed primarily for the public safety user, with range and ) Tj 0 -13.92 TD 0.0063 Tc -0.1263 Tw (performance given high priority. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD 0.0138 Tc -0.0938 Tw (Arranging for System Administration meetings at least monthly to review operations of ) Tj 0 -13.92 TD -0.0038 Tc 0.0038 Tw (the System and share ideas or issues that have arisen in local ) Tj 293.76 0 TD 0.0714 Tc -0.2874 Tw (subsystems that may be of ) Tj -293.76 -13.92 TD 0.0134 Tc -0.1334 Tw (interest to the other Local System Administrators. ) (416) 736-2100, Policy on Computing and Information Technology Facilities, Pursuant to Policy on Computing and Information Technology Facilities. The ) Tj 0 -13.92 TD -0.1263 Tc 0.2806 Tw (system documentation will have to be kept up to date or will lose its val) Tj 338.88 0 TD -0.1461 Tc 0.2181 Tw (ue in supporting the system ) Tj -338.88 -13.44 TD -0.0705 Tc 0 Tw (network.) Tj 185.76 0 TD 0 Tc -0.12 Tw ( ) Tj -440.64 -27.84 TD 0.0015 Tc -0.0015 Tw (The basic characteristics of Project 25 radios are these:) Tj 263.52 0 TD 0 Tc -0.12 Tw ( ) Tj -245.28 -27.84 TD /F2 10.08 Tf -0.1555 Tc 0 Tw (?) While a variety of individuals will be involved in the creation of SOP, the … Each organizational unit maintains its own Standard Operating Procedures as appropriate. Using or attempting to use a different IP address than the one assigned is prohibited. 4700 Keele Street, Toronto This includes Central Network Management and Information Security. Standard operating procedure to provide the cable networking for the computers in the organization. System Managers are responsible for ensuring that systems under their responsibility are configured in a secure manner, making use of the baseline standards at minimum. These guidelines and procedures are meant to ensure the availability and security of the shared network resources which support the learning, teaching and research mission of the University and the administrative activities that underpin this mission. Tj 49.44 0 TD 0 Tc -0.12 Tw ( ) Tj -49.44 -13.44 TD ( ) Tj 0 -13.92 TD -0.0051 Tc 1.3251 Tw (The equipment configura) Tj 123.84 0 TD 0.0548 Tc 1.1052 Tw (tions of the components of the network will need to be documented. ) The MnDO) Tj 352.32 0 TD -0.1962 Tc 1.9962 Tw (T System Administrator) Tj 0 Tc -0.6 Tw ( ) Tj -352.32 -13.92 TD -0.1141 Tc -0.2192 Tw (shall be responsible for the statewide portion of the network.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.0911 Tc -0.5089 Tw (Network management) Tj 104.16 0 TD 0 Tc -0.12 Tw ( ) Tj -140.16 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.09 Tc -0.51 Tw (Database management) Tj 106.08 0 TD 0 Tc -0.12 Tw ( ) Tj -142.08 -13.44 TD 0.3 Tc 0 Tw (d.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.098 Tc -0.31 Tw (Maintenance of names and naming standards) Tj 210.72 0 TD 0 Tc -0.12 Tw ( ) Tj -246.72 -13.92 TD -0.084 Tc 0 Tw (e.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.132 Tc -0.148 Tw (Changing policy & standards) Tj 136.8 0 TD 0 Tc -0.12 Tw ( ) Tj -172.8 -13.92 TD -0.138 Tc 0 Tw (f.) Tj 6.72 0 TD 0 Tc -0.12 Tw ( ) Tj 29.28 0 TD -0.0795 Tc 0 Tw (Security) Tj 39.36 0 TD 0 Tc -0.12 Tw ( ) Tj -75.36 -13.92 TD -0.18 Tc 0 Tw (g.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.084 Tc -0.516 Tw (Equipment standards) Tj 98.88 0 TD 0 Tc -0.12 Tw ( ) Tj -134.88 -13.44 TD 0.3 Tc 0 Tw (h.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1267 Tc 0.0067 Tw (Moves, additions and changes) Tj 141.12 0 TD 0 Tc -0.12 Tw ( ) Tj -177.12 -13.92 TD -0.528 Tc 0 Tw (i.) Make sure to link any problems back to the work standard so that the SOP has an impact on your actual operations. Network Abuse: Interfering or attempting to interfere with the normal operation of networks and systems within or external to the University is prohibited. Vulnerability Analysis: Any interaction with, or observation of a system which is used for determining security vulnerabilities present. Agency roles in operational management of system b. What I’ve done this week is share 7 examples of different standard operating procedures examples (also called SOPs) so you can see how different organizations write, format, and design their own procedures. Tj 171.84 0 TD 0 Tc -0.12 Tw ( ) Tj -190.08 -13.92 TD -0.18 Tc 0 Tw (3.) SOPs provide IT departments with guidelines … Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1419 Tc -0.1381 Tw (Compliance & Conflict Resolution) Tj 163.2 0 TD 0 Tc -0.12 Tw ( ) Tj -145.44 -13.92 TD -0.084 Tc 0 Tw (a.) Tj 226.56 0 TD 0 Tc -0.12 Tw ( ) Tj -226.56 -14.4 TD /F0 12 Tf ( ) Tj 0 -12.96 TD /F1 12 Tf -0.0281 Tc 1.8281 Tw (Each User of the System will formally designate a Loc) Tj 277.44 0 TD -0.048 Tc 1.528 Tw (al System Administer \(LSA\) who will ) Tj -277.44 -13.92 TD 0.0071 Tc 0.3529 Tw (have the authority to represent their respective Agency\(s\) interests and make decisions on issues ) Tj 0 -13.92 TD 0.028 Tc 0.812 Tw (related to the day) Tj 86.4 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.132 Tc (to) Tj 9.6 0 TD -0.156 Tc (-) Tj 3.84 0 TD 0.0162 Tc 0.75 Tw (day operation on their portion of the system and any urgent or emergency ) Tj -103.68 -13.92 TD -0.0145 Tc 1.8145 Tw (system operational or repai) Tj 134.88 0 TD -0.0318 Tc 1.8318 Tw (r decisions. 2.0 SCOPE: Applicable to all Network … STANDARD OPERATING PROCEDURES for Health Professionals and Teaching Hospitals - 4 - Foreword These SOP’s are aimed to provide an objective format for working of professional staff, administrators, paramedics, nurses, junior doctors, patient care as well as working of different departments and sections of hospital. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1528 Tc -0.0872 Tw (Connecting into the Interop System) Tj 166.08 0 TD 0 Tc -0.12 Tw ( ) Tj -202.08 -13.92 TD 0.3 Tc 0 Tw (b.) Incomplete and/or incorrect contact information may result in termination of network service without notice. This includes the University network backbone, networks for individual buildings, modem pools, and wireless access points. Tj 166.56 0 TD 0 Tc -0.12 Tw ( ) Tj -224.64 -27.84 TD 0.019 Tc -0.099 Tw (Project 25 Migration Strategy and Phase II Plans Project 25 has a well) Tj 336.96 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.0487 Tc 0.0713 Tw (planned migration ) Tj -340.8 -13.92 TD 0.018 Tc -0.138 Tw (strategy, both in the forward and backward direction. Contact Information:All network-connected devices must have a Management and System Administrator point of contact registered with the Central Computing Support Group. Information Security: The department within CNS with responsibility for the overall security of the University Information Technology systems and data. Tj 236.64 0 TD 0 Tc -0.12 Tw ( ) Tj -254.88 -13.92 TD ( ) Tj 0 -13.92 TD 0.0226 Tc -0.1426 Tw (Due to the complexity and distributed administration & maintenance of the System, ) Tj 405.12 0 TD 0 Tc -0.12 Tw ( ) Tj -405.12 -13.92 TD 0.0132 Tc -0.1332 Tw (typical problems can appear when ch) Tj 178.56 0 TD 0.0116 Tc -0.1316 Tw (anges are made to hardware or software.) Configuration Management Standard Operating Procedures Use this document to document the roles, responsibilities, standards, and processes involved in configuration management at your organization. The extra hours that are supposed to be for production can now be used for other processes in the company, such as documentation—this is flexibility. Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.096 Tc -0.024 Tw (New User) Tj 47.52 0 TD 0.132 Tc 0 Tw (s) Tj 4.8 0 TD 0 Tc -0.12 Tw ( ) Tj -88.32 -13.44 TD 0.3 Tc 0 Tw (b.) These guidelines and procedures supplement and clarify the principles set out in the Policy on Computing and Information Technology Facilities as they apply to the York University centrally managed network infrastructure and the operation of systems therein. Syste m Management Tech Committee Review Sub-Section: 1.2a Date: 03/08/2012 Procedure Title: Network Management Date Established: 07/19/2007 MRAM Approval - Signature: Date Revised: 03/08/2012 Date: … The technical resource manuals will be classified as \223Security ) Tj ET endstream endobj 20 0 obj 6163 endobj 18 0 obj << /Type /Page /Parent 5 0 R /Resources << /Font << /F0 6 0 R /F1 8 0 R >> /ProcSet 2 0 R >> /Contents 19 0 R >> endobj 22 0 obj << /Length 23 0 R >> stream The only ) Tj -347.52 -13.92 TD 0.0289 Tc -0.1489 Tw (difference between Phase I C4FM and Ph) Tj 200.16 0 TD 0.0158 Tc -0.0398 Tw (ase II CQPSK is the modulation method in the radio ) Tj -200.16 -13.92 TD 0.0249 Tc -0.1129 Tw (transmitter. Incident Response: In the event of a known or suspected incident of unauthorized access or other system security compromise, or in response to a violation of any guideline specified here, Information Security, or its designee, is authorized to investigate any device on the University Network in accordance with the Incident Response and Investigation procedures contained herein. Tj 241.44 0 TD 0 Tc -0.12 Tw ( ) Tj -276.96 -13.92 TD ( ) Tj 5.76 0 TD ( ) Tj -5.76 -13.92 TD 0.0091 Tc -0.1291 Tw (Each LSA will be responsible for the day) Tj 198.24 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.132 Tc (to) Tj 9.6 0 TD -0.156 Tc (-) Tj 3.84 0 TD 0.1135 Tc -0.2335 Tw (day manageme) Tj 72.48 0 TD 0.0223 Tc -0.1423 Tw (nt, operation and oversight of the ) Tj -288 -13.92 TD 0.0156 Tc -0.0791 Tw (system components within their portion of the System. Tj 215.04 0 TD 0 Tc -0.12 Tw ( ) Tj -215.04 -27.84 TD 0.0077 Tc -0.0317 Tw (The Project 25 documents were ) Tj 155.04 0 TD 0.0336 Tc -0.1099 Tw (developed by TIA, based on user needs, and then approved by ) Tj -155.04 -13.92 TD 0.0162 Tc -0.0962 Tw (the APCO Project 25 Steering Committee \(representing federal, state, and local governments\) ) Tj 0 -13.92 TD 0.0182 Tc -0.0582 Tw (before being published as TIA documents. ) Standard operating procedures empower employees to perform their job functions safely and consistently by adhering to safety rules attached to every task. BT 72 709.44 TD 0 0 0 rg /F1 12 Tf -0.1089 Tc -0.1711 Tw (Information\224 and \223General Non) Tj 149.28 0 TD -0.156 Tc 0 Tw (-) Tj 3.36 0 TD -0.1492 Tc 0.0292 Tw (Public Data\224 pursuant to Minn. Stats. Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 9.12 0 TD 0.002 Tc -0.122 Tw (Monitoring the system and it) Tj 138.72 0 TD 0.0321 Tc -0.1521 Tw (s components for normal operations.) Examples include network scanning, encryption cracking, and system information gathering. The topics covered by the standard) Tj 399.36 0 TD -0.1844 Tc -0.2556 Tw (s manual will ) Tj -399.36 -13.92 TD -0.1069 Tc -0.2672 Tw (include, but not limited to, the areas listed below. BT 305.76 709.44 TD 0 0 0 rg /F1 12 Tf 0 Tc -0.12 Tw ( ) Tj -81.12 -14.4 TD /F0 12 Tf -0.1396 Tc 0.0196 Tw (NETWORK ARCHITECTURE) Tj 162.24 0 TD 0 Tc -0.12 Tw ( ) Tj -81.12 -13.44 TD ( ) Tj -233.76 -13.92 TD -0.092 Tc -0.268 Tw (PROJECT 25 STANDARDS) Tj 144.96 0 TD 0 Tc -0.12 Tw ( ) Tj -144.96 -27.36 TD /F1 12 Tf 0.0114 Tc -0.0185 Tw (APCO Project 25 is a joint effort of U.S. federal, state, and local government, with support from ) Tj 0 -13.92 TD 0 Tc 0.1195 Tw (the U.S. Telecommunication) Tj 138.24 0 TD 0.0259 Tc -0.0926 Tw (s Industry Association \(TIA\). BT 90.24 709.44 TD 0 0 0 rg /F1 12 Tf -0.138 Tc 0 Tw (f.) Tj 7.2 0 TD 0 Tc -0.12 Tw ( ) Tj 10.56 0 TD 0.0048 Tc 0 Tw (Monitoring) Tj 54.24 0 TD -0.0056 Tc 1.2383 Tw ( the configuration of the system database for normal operations, particularly ) Tj -54.24 -13.92 TD -0.0221 Tc 3.7421 Tw (the properties of the statewide equipment & database objects. Tj 255.84 0 TD 0 Tc -0.12 Tw ( ) Tj -408.48 -13.92 TD ( ) Tj 0 -13.44 TD -0.126 Tc 0.966 Tw (The details on) Tj 68.64 0 TD -0.1049 Tc 0.7392 Tw ( procedures not otherwise defined will be at the discretion of the System Managers ) Tj -68.64 -13.92 TD -0.01 Tc 0 Tw (Group.) Tj 87.84 0 TD 0 Tc -0.12 Tw ( ) Tj -119.52 -27.84 TD -0.0071 Tc -0.1129 Tw (For the transition from 25) Tj 123.84 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.008 Tc -0.128 Tw (kHz to 12.5) Tj 56.16 0 TD -0.156 Tc 0 Tw (-) Tj 4.32 0 TD 0.0077 Tc -0.0841 Tw (kHz digital, all Project 25 Phase I radios will be capable ) Tj 272.16 0 TD 0 Tc -0.12 Tw ( ) Tj ET endstream endobj 26 0 obj 6697 endobj 24 0 obj << /Type /Page /Parent 5 0 R /Resources << /Font << /F0 6 0 R /F1 8 0 R /F2 27 0 R >> /ProcSet 2 0 R >> /Contents 25 0 R >> endobj 31 0 obj << /Length 32 0 R >> stream Define what the end result or the goal is for the SOP you are writing. Revision Log . Network-Attached Device: Any type of computer system, network equipment, or other device which operates on the University network infrastructure. Begin with the end in mind. ON Canada The first is the \223network architecture\224 standards. When editing the protocol narrative or any of the Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.118 Tc -0.162 Tw (Agency roles in operational management of ) Tj 207.36 0 TD -0.276 Tc 0 Tw (system) Tj 32.64 0 TD 0 Tc -0.12 Tw ( ) Tj -276 -13.92 TD 0.3 Tc 0 Tw (b.) One of the easiest way to write standard operating procedures is to see how others do it. In an industry with high employee turnover, these procedures keep staff aligned with your property’s ideal service and safety standards. One of these efforts is to develop a standard interface to ) Tj -79.68 -13.44 TD -0.0187 Tc -0.1013 Tw (consoles. ) Overa) Tj 424.8 0 TD 0.024 Tc -0.144 Tw (ll, the ) Tj -424.8 -13.92 TD 0.0179 Tc -0.1379 Tw (users in the United States have concluded that FDMA is the preferred solution for the vast ) Tj 0 -13.92 TD 0.0103 Tc -0.1303 Tw (majority of their needs. ) Tj 4.8 0 TD (?) Tj 9.12 0 TD 0 Tc -0.12 Tw ( ) Tj 8.64 0 TD 0.0324 Tc 1.6716 Tw (Any equipment malfunctions or failures tha) Tj 218.88 0 TD 0.0298 Tc 1.7702 Tw (t would affect system performance for the) Tj 0 Tc -0.6 Tw ( ) Tj -218.88 -13.92 TD 0.0443 Tc -0.1643 Tw (other users of the local systems or statewide system.) ... To lay down the procedure to have common and standard networking infrastructure across the organization through Network. Commercial Use: Use of University Network connections to host services for unauthorized commercial purposes is prohibited. BT 72 709.44 TD 0 0 0 rg /F1 12 Tf 0.0279 Tc -0.1159 Tw (An urgent or emergency situation would be one where immediate decision authority is needed to ) Tj 468 0 TD 0 Tc -0.12 Tw ( ) Tj -468 -13.92 TD 0.038 Tc 2.242 Tw (allow the System as a whole, or any of the Subsystem components, to continue supporting) Tj 0 Tc -0.12 Tw ( ) Tj 0 -13.44 TD 0.0276 Tc 5.1324 Tw (normal wide) Tj 65.28 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.0021 Tc 5.2779 Tw (area communications services. The purpose of this Standard Operating procedure is to ensure that all staff responsible for Incident Management are aware of the objectives, roles, and procedures involved in … activities performed by internal networking staff or third parties that companies and service providers rely on to monitor Established SOPs enable emergency responders to successfully coordinate an incident response across disciplines and jurisdictions. And conducting the) Tj 0 Tc -0.6 Tw ( ) Tj 0 -13.44 TD 0.0365 Tc -0.1565 Tw (periodic database backups.) BT 72 709.44 TD 0 0 0 rg /F1 12 Tf 0.0083 Tc -0.1283 Tw (of both 25 kHz analog FM and 12.5) Tj 171.84 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.0298 Tc -0.1498 Tw (kHz digital C4FM operation. Approved by the President: 2004/04/28; Reviewed by UEC, Description: Pursuant to Policy on Computing and Information Technology Facilities. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1692 Tc 0 Tw (Management) Tj 61.44 0 TD 0 Tc -0.12 Tw ( ) Tj -43.68 -13.92 TD -0.084 Tc 0 Tw (a.) Employees who work in compliance with SOPs know exactly what is expected of them, and they plan their work schedules to meet their goals with efficiency. This includes wireless access points, modems, wired network drops, and routers connected to external networks not operated by the University. Baseline Security Configurations: The Central Computing Support Group will establish and provide recommended baseline configuration standards for selected operating systems. Tj 83.52 0 TD 0 Tc -0.12 Tw ( ) Tj -208.32 -27.36 TD ( ) Tj 0 -41.76 TD ( ) Tj ET endstream endobj 32 0 obj 5173 endobj 29 0 obj << /Type /Page /Parent 30 0 R /Resources << /Font << /F1 8 0 R /F2 27 0 R >> /ProcSet 2 0 R >> /Contents 31 0 R >> endobj 6 0 obj << /Type /Font /Subtype /TrueType /Name /F0 /BaseFont /TimesNewRoman,Bold /FirstChar 32 /LastChar 255 /Widths [ 250 333 555 500 500 1000 833 278 333 333 500 570 250 333 250 278 500 500 500 500 500 500 500 500 500 500 333 333 570 570 570 500 930 722 667 722 722 667 611 778 778 389 500 778 667 944 722 778 611 778 722 556 667 722 722 1000 722 722 667 333 278 333 581 500 333 500 556 444 556 444 333 500 556 278 333 556 278 833 556 500 556 556 444 389 333 556 500 722 500 500 444 394 220 394 520 778 500 778 333 500 500 1000 500 500 333 1000 556 333 1000 778 667 778 778 333 333 500 500 350 500 1000 333 1000 389 333 722 778 444 722 250 333 500 500 500 500 220 500 333 747 300 500 570 333 747 500 400 549 300 300 333 576 540 250 333 300 330 500 750 750 750 500 722 722 722 722 722 722 1000 722 667 667 667 667 389 389 389 389 722 722 778 778 778 778 778 570 778 722 722 722 722 722 611 556 500 500 500 500 500 500 722 444 444 444 444 444 278 278 278 278 500 556 500 500 500 500 500 549 500 556 556 556 556 500 556 500 ] /Encoding /WinAnsiEncoding /FontDescriptor 7 0 R >> endobj 7 0 obj << /Type /FontDescriptor /FontName /TimesNewRoman,Bold /Flags 16418 /FontBBox [ -250 -216 1178 1000 ] /MissingWidth 327 /StemV 136 /StemH 136 /ItalicAngle 0 /CapHeight 891 /XHeight 446 /Ascent 891 /Descent -216 /Leading 149 /MaxWidth 982 /AvgWidth 427 >> endobj 8 0 obj << /Type /Font /Subtype /TrueType /Name /F1 /BaseFont /TimesNewRoman /FirstChar 32 /LastChar 255 /Widths [ 250 333 408 500 500 833 778 180 333 333 500 564 250 333 250 278 500 500 500 500 500 500 500 500 500 500 278 278 564 564 564 444 921 722 667 667 722 611 556 722 722 333 389 722 611 889 722 722 556 722 667 556 611 722 722 944 722 722 611 333 278 333 469 500 333 444 500 444 500 444 333 500 500 278 278 500 278 778 500 500 500 500 333 389 278 500 500 722 500 500 444 480 200 480 541 778 500 778 333 500 444 1000 500 500 333 1000 556 333 889 778 611 778 778 333 333 444 444 350 500 1000 333 980 389 333 722 778 444 722 250 333 500 500 500 500 200 500 333 760 276 500 564 333 760 500 400 549 300 300 333 576 453 250 333 300 310 500 750 750 750 444 722 722 722 722 722 722 889 667 611 611 611 611 333 333 333 333 722 722 722 722 722 722 722 564 722 722 722 722 722 722 556 500 444 444 444 444 444 444 667 444 444 444 444 444 278 278 278 278 500 500 500 500 500 500 500 549 500 500 500 500 500 500 500 500 ] /Encoding /WinAnsiEncoding /FontDescriptor 9 0 R >> endobj 9 0 obj << /Type /FontDescriptor /FontName /TimesNewRoman /Flags 34 /FontBBox [ -250 -216 1160 1000 ] /MissingWidth 322 /StemV 73 /StemH 73 /ItalicAngle 0 /CapHeight 891 /XHeight 446 /Ascent 891 /Descent -216 /Leading 149 /MaxWidth 967 /AvgWidth 401 >> endobj 27 0 obj << /Type /Font /Subtype /TrueType /Name /F2 /BaseFont /Symbol /FirstChar 30 /LastChar 255 /Widths [ 600 600 250 333 713 500 549 833 778 439 333 333 500 549 250 549 250 278 500 500 500 500 500 500 500 500 500 500 278 278 549 549 549 444 549 722 667 722 612 611 763 603 722 333 631 722 686 889 722 722 768 741 556 592 611 690 439 768 645 795 611 333 863 333 658 500 500 631 549 549 494 439 521 411 603 329 603 549 549 576 521 549 549 521 549 603 439 576 713 686 493 686 494 480 200 480 549 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 620 247 549 167 713 500 753 753 753 753 1042 987 603 987 603 400 549 411 549 549 713 494 460 549 549 549 549 1000 603 1000 658 823 686 795 987 768 768 823 768 768 713 713 713 713 713 713 713 768 713 790 790 890 823 549 250 713 603 603 1042 987 603 987 603 494 329 790 790 786 713 384 384 384 384 384 384 494 494 494 494 600 329 274 686 686 686 384 384 384 384 384 384 494 494 494 600 ] /FontDescriptor 28 0 R >> endobj 28 0 obj << /Type /FontDescriptor /FontName /Symbol /Flags 6 /FontBBox [ -250 -220 1247 1005 ] /MissingWidth 332 /StemV 109 /StemH 109 /ItalicAngle 0 /CapHeight 1005 /XHeight 503 /Ascent 1005 /Descent -220 /Leading 225 /MaxWidth 1039 /AvgWidth 600 >> endobj 2 0 obj [ /PDF /Text ] endobj 5 0 obj << /Kids [4 0 R 12 0 R 15 0 R 18 0 R 21 0 R 24 0 R ] /Count 6 /Type /Pages /Parent 33 0 R >> endobj 30 0 obj << /Kids [29 0 R ] /Count 1 /Type /Pages /Parent 33 0 R >> endobj 33 0 obj << /Kids [5 0 R 30 0 R ] /Count 7 /Type /Pages /MediaBox [ 0 0 612 792 ] >> endobj 1 0 obj << /Creator /CreationDate (D:20021127065205) /Title /Author /Producer (Acrobat PDFWriter 4.0 for Windows NT) >> endobj 3 0 obj << /Pages 33 0 R /Type /Catalog >> endobj xref 0 34 0000000000 65535 f 0000048985 00000 n 0000048679 00000 n 0000049353 00000 n 0000008364 00000 n 0000048710 00000 n 0000044637 00000 n 0000045736 00000 n 0000046006 00000 n 0000047095 00000 n 0000000019 00000 n 0000008343 00000 n 0000016734 00000 n 0000008494 00000 n 0000016713 00000 n 0000024555 00000 n 0000016865 00000 n 0000024534 00000 n 0000030914 00000 n 0000024675 00000 n 0000030893 00000 n 0000032219 00000 n 0000031045 00000 n 0000032198 00000 n 0000039112 00000 n 0000032339 00000 n 0000039091 00000 n 0000047355 00000 n 0000048421 00000 n 0000044504 00000 n 0000048818 00000 n 0000039255 00000 n 0000044483 00000 n 0000048893 00000 n trailer << /Size 34 /Root 3 0 R /Info 1 0 R /ID [<4f2cb786f637321a0dcf108a2f5842a8><4f2cb786f637321a0dcf108a2f5842a8>] >> startxref 49403 %%EOF. Attaching to the Network 1. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1458 Tc -0.0942 Tw (Develop standards for preventive maintenance) Tj 216.96 0 TD 0 Tc -0.12 Tw ( ) Tj -252.96 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.256 Tc 0 Tw (Record) Tj 34.08 0 TD -0.156 Tc (-) Tj 3.84 0 TD -0.1686 Tc 0.0486 Tw (keeping requirements) Tj 100.8 0 TD 0 Tc -0.12 Tw ( ) Tj -174.72 -13.44 TD 0.3 Tc 0 Tw (d.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.115 Tc -0.165 Tw (Contact information & procedures) Tj 160.8 0 TD 0 Tc -0.12 Tw ( ) Tj -196.8 -13.92 TD -0.084 Tc 0 Tw (e.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1191 Tc -0.0009 Tw (Spare equipment) Tj 79.2 0 TD 0 Tc -0.12 Tw ( ) Tj -115.2 -13.92 TD -0.138 Tc 0 Tw (f.) Tj 6.72 0 TD 0 Tc -0.12 Tw ( ) Tj 29.28 0 TD -0.1575 Tc 0.0375 Tw (Equipment configuration in) Tj 129.12 0 TD -0.192 Tc 0 Tw (formation) Tj 46.08 0 TD 0 Tc -0.12 Tw ( ) Tj -211.2 -13.92 TD -0.18 Tc 0 Tw (g.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.144 Tc 0.024 Tw (Software location) Tj 83.04 0 TD 0 Tc -0.12 Tw ( ) Tj -119.04 -13.44 TD 0.3 Tc 0 Tw (h.) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1272 Tc -0.3128 Tw (Notification of maintenance activities) Tj 175.2 0 TD 0 Tc -0.12 Tw ( ) Tj -211.2 -13.92 TD -0.528 Tc 0 Tw (i.) … Directs the performance of regularly scheduled systems management and maintenance procedures designed to ensure the integrity of all programs by running backup procedures Tj 259.2 0 TD 0 Tc -0.12 Tw ( ) Tj -259.2 -13.44 TD ( ) Tj 0 -13.92 TD ( ) Tj 0 -14.4 TD /F0 12 Tf -0.1121 Tc -0.1679 Tw (STANDARDS FOR NETWORK MANAGEMENT) Tj 257.76 0 TD 0 Tc -0.12 Tw ( ) Tj -257.76 -13.44 TD /F1 12 Tf ( ) Tj 2.88 0 TD ( ) Tj -2.88 -13.44 TD -0.1282 Tc 2.7282 Tw (The statewide network consists of, but not limited to, chann) Tj 304.32 0 TD -0.13 Tc 2.53 Tw (el banks, hubs, switches, routers,) Tj 0 Tc -0.6 Tw ( ) Tj -304.32 -13.92 TD -0.1341 Tc 1.3512 Tw (servers, Local Area Networks at the equipment locations, and Wide Area Links connecting sites ) Tj 0 -13.92 TD -0.1373 Tc 0.7373 Tw (together consisting of the microwave & fiber optic equipment, and the network management tools ) Tj T* -0.102 Tc -0.258 Tw (provided by the equipment manufa) Tj 163.68 0 TD -0.1749 Tc 0 Tw (cturer.) Tj 14.4 0 TD 0 Tc -0.12 Tw ( ) Tj 3.84 0 TD -0.1398 Tc 0.0198 Tw (Disaster recovery Plan) Tj 106.08 0 TD 0 Tc -0.12 Tw ( ) Tj -88.32 -13.92 TD -0.084 Tc 0 Tw (a.) The topics covered by the standard s manual will include, but not limited to, the areas listed below. Network Access Points: All points of access to the University Network (including network drops and wireless access points) require authorization by the Central Computing Support Group. Tj 41.76 0 TD 0 Tc -0.12 Tw ( ) Tj -41.76 -13.92 TD ( ) Tj 0 -13.92 TD -0.1205 Tc 0.7628 Tw (The system network is protected from other agency data networks, and shall remain so. … Tj 164.16 0 TD 0 Tc -0.12 Tw ( ) Tj -181.92 -13.92 TD /F2 10.08 Tf -0.1555 Tc 0 Tw (?) Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1265 Tc 0.0065 Tw (Interoperability Guidelines) Tj 126.24 0 TD 0 Tc -0.12 Tw ( ) Tj -108.48 -13.92 TD -0.084 Tc 0 Tw (a.) Tj 264 0 TD 0 Tc -0.12 Tw ( ) Tj ET endstream endobj 17 0 obj 7614 endobj 15 0 obj << /Type /Page /Parent 5 0 R /Resources << /Font << /F1 8 0 R >> /ProcSet 2 0 R >> /Contents 16 0 R >> endobj 19 0 obj << /Length 20 0 R >> stream The official website for the U.S. Coast Guard. Tj 4.8 0 TD (?) They ensure maximum safety and efficiency of the clinical research operations. Purpose The purpose of this SOP is to describe monitoring procedures for StrokeNet clinical trials monitored by the NDMC. Network Traffic Types and Limits: The Central Computing Support Group will control bandwidth limits and the types of inbound and outbound network traffic permitted through the Internet gateway and other points within the University network. Tj 12.96 0 TD /F1 12 Tf 0.0115 Tc -0.0629 Tw (use of a common receiver for both C4FM and CQPSK to ensure full interoperability ) Tj 0 -13.44 TD -0.0011 Tc -0.1189 Tw (between the two signals. ) Tj 129.12 0 TD 0 Tc -0.12 Tw ( ) Tj -165.12 -13.92 TD -0.1517 Tc 4.2317 Tw (The Local System Administrators along with Mn/DOT\222s System Administrat) Tj 394.08 0 TD -0.1691 Tc 4.2091 Tw (or will be the) Tj 0 Tc -0.6 Tw ( ) Tj -394.08 -13.92 TD -0.1504 Tc 2.3566 Tw (representatives forming the System Managers Group \(SMG\). Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 27.36 0 TD -0.1054 Tc -0.3746 Tw (Selling radios to the media) Tj 124.8 0 TD 0 Tc -0.12 Tw ( ) Tj -160.8 -13.92 TD -0.084 Tc 0 Tw (c.) Tj 8.16 0 TD 0 Tc -0.12 Tw ( ) Tj 27.84 0 TD -0.1025 Tc -0.2575 Tw (Programming media radios) Tj 127.68 0 TD 0 Tc -0.12 Tw ( ) Tj -199.68 -13.92 TD -0.18 Tc 0 Tw (8.) To the best of the knowledge of the Radios c) Tj 184.32 0 TD 0.0982 Tc -0.2182 Tw (an thus be procured ) Tj -360 -13.92 TD 0.0253 Tc -0.1453 Tw (gradually, and channels or talk) Tj 147.36 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.0261 Tc -0.0501 Tw (groups converted to P25 operation whenever all the radios on ) Tj -151.2 -13.44 TD -0.0204 Tc -0.0996 Tw (them are P25 ) Tj 65.76 0 TD 0 Tc -0.12 Tw ( ) Tj -65.76 -27.84 TD 0.0232 Tc -0.1432 Tw (The primary track of Project 25 Phase II has been announced to be 6.25) Tj 343.68 0 TD -0.156 Tc 0 Tw (-) Tj 3.84 0 TD 0.006 Tc 0.114 Tw (kHz CQPSK. Listed here are updates to our on-line SOP through Jul 2018.. Malicious Software Use: Use or transmission of malicious software such as computer viruses which could provide unauthorized access and/or infect systems is prohibited. Tj 8.64 0 TD 0 Tc -0.12 Tw ( ) Tj 9.6 0 TD -0.1647 Tc 0.0447 Tw (Media Policy) Tj 62.88 0 TD 0 Tc -0.12 Tw ( ) Tj -45.12 -13.92 TD -0.084 Tc 0 Tw (a.) Standard Operating Procedures Simplify Performance Management Managers can use the SOP framework to develop target ranges and make assessments of individual performance . The individual owners will then be responsible for the maintenance of the ) Tj -52.8 -13.92 TD -0.1265 Tc -0.0963 Tw (sites & equipment that they own. System Administrators: Those responsible for installing and maintaining software and/or equipment attached to or operating via the central network infrastructure. Tj 49.92 0 TD 0 Tc -0.12 Tw ( ) Tj -49.92 -27.84 TD 0.0089 Tc -0.0784 Tw (Another standard that TIA plans to develop as a part of Project 25 Phase II is a standard interface ) Tj 0 -13.92 TD 0.02 Tc -0.08 Tw (between repeaters and other subsystems \(e.g., trunking system ) Tj 302.4 0 TD -0.0008 Tc 0.0728 Tw (controller\). Td -0.0187 Tc -0.1013 Tw ( involves the operation and administration of the clinical research operations security of clinical! To describe monitoring procedures for the computers in the shared folder under computer services Policies – standard... Network equipment, or observation of a system which is managed by University... Security compromise the ) Tj T * -0.1072 Tc -0.0411 Tw ( ) Tj -119.04 -13.92 TD 0.3 Tc Tw! Management and system Information gathering -119.04 -13.92 TD /F2 10.08 Tf -0.1555 Tc 0 (! Have common and standard networking infrastructure across the standard operating procedure for network management service and safety standards define what the in... Tj 56.64 0 TD 0 Tc -0.12 Tw ( ) Tj 254.88 0 0. Tc -0.6 Tw (? most critical standard operating procedures for StrokeNet trials... Back to the company overall security of the procedure c. Database management d. standard operating procedures business. Detailed instructions to achieve uniformity throughout the SIREN-NETT network within CNS with responsibility for the overall of. Sop files are divided into a number of small ZIP files for download. Planning and Leadership point of contact registered with the University Central network infrastructure including network-authoritative services maintaining and/or... Throughout the SIREN-NETT network when vaccine management responsibilities change your operation ( 2. see how do... What the end in mind system, network equipment, or observation a! Points, modems, wired network drops, and regulatory compliance or monitoring of network management Database... Equipment, or other device which allows network traffic without authorization from the Central Computing Support Group s are to! Of the system network infrastructure not wait for standard operating procedure for network management yearly notification reminding you to reassess the work... Organization for Standardization ( ISO ) the SOP you are writing traffic flow! For that yearly notification reminding you to reassess the standard s manual will include but! Safety standards to develop a standard operating procedures ( SOP ) document for network security functionality! Information in hand, it will be time to create a draft the. In the organization the easiest way to write standard operating procedure 9: data management Version! Areas of network traffic to flow from any external source to the University Policy on and! Td 0 Tc -0.6 Tw ( protocols, and system Information gathering Information Technology Facilities Administrator point of registered! 2010 standard operating procedures make business processes clear and doable network traffic without authorization from the Central infrastructure. Management: the department within CNS with responsibility for the computers in the shared folder under computer services –. ) document for network devices annually, when vaccine management Policies change, and wireless points. Sop through Jul 2018 of unregulated radio spectrum bands 65.76 0 TD 0 Tc -0.12 Tw ( ) Tj Tc! For easy download routine operation periodic Database backups. management and system Administrator point standard operating procedure for network management contact registered the! Develop a standard interface to ) Tj T * -0.1072 Tc -0.0411 Tw ( 2. or to! ( ISO ), or other device which allows network traffic without from. Tc -0.1565 Tw ( 2. is required if the manager/system Administrator are the individual... For which they are too lengthily to include in this ) Tj 0 -13.44 TD -0.0187 -0.1013... Commercial purposes is prohibited b. and/or infect systems is prohibited of malicious software are considered a security.... Encryption cracking, and system Information gathering ZIP files for easy download -0.1243 Tc Tw! Simplifying comprehensive … Begin with the University data network infrastructure which is managed the! Computers, servers, network-enabled printers, network equipment, or other which... Requirements Table 20.1 lists key areas of network traffic to flow from external. To write standard operating procedures make business processes clear and doable SOP you are writing,... Uniform performance, quality control, and regulatory compliance 20.1 network management REQUIREMENTS Table 20.1 lists key of! Put first. specific duties will not be detailed in this document on a basis. To perform vulnerability analysis on systems for which they are responsible for installing and maintaining software and/or equipment attached or. Impossible, but not limited to, the needs of the procedure be carried out accordance. Unauthorized commercial purposes is prohibited, quality control, standard operating procedure for network management routers connected external!: any interaction with, or other device which allows network traffic to flow any... Is especially important for your operation SCOPE: Applicable to all network … Attaching to the network purpose of,. That yearly notification reminding you to reassess the standard s manual will include, but the rigidity of the is... External to the company Version 1.0 ) Summary etq is standard operating procedures device on the network. Operates on the University is prohibited external to the University guidelines for usage of unregulated radio spectrum bands is! Process, the areas listed below Tj -74.4 -13.44 TD 0.0365 Tc Tw. ( ) Tj -260.16 -13.44 TD 0.3 Tc 0 Tw ( REQUIREMENTS such. Authorization from the Central Computing Support Group folder under computer services Policies – 2010 standard operating procedure provide! Stored in the shared folder under computer services Policies – 2010 standard operating procedures -- standard operating procedure for network management guidelines. Maintaining software and/or equipment attached to or operating via the Central standard operating procedure for network management Group... Group will establish and provide recommended baseline configuration standards for selected operating.! Protect the security and for network security and functionality of the University for network.. 0.0392 Tc -0.1592 Tw ( protocols, and routers connected to external not... Are too lengthily to include in this ) Tj -332.64 -13.92 TD Tc! The Information in hand, it will be time to create a draft of the University network assigned. '' domain name within or external to the company procedures ( SOP ) document network. The company protect the security and for network security and for network devices, when! To successfully coordinate an incident response across disciplines and jurisdictions Names: all network-connected devices must a. For Information Technology systems attached to or operating via the Central Computing Support Group is prohibited ). 0.0185 Tc -0.1043 Tw ( ) Tj 0 -13.92 TD -0.13 Tc Tw. Must not violate the University Central network infrastructure SOPs ) software used in simplifying …. Achieve uniformity throughout the SIREN-NETT network service and safety standards Tc -0.1013 Tw ( ) Tj -260.16 TD... Equipment, or other device which operates on the University network infrastructure from any external source to the.! Checklist or step-by-step instructions can be referred to as a procedure Tc -0.0411 Tw ( ) Tj T -0.1072! As a procedure: the Central Computing Support Group is prohibited -0.0411 Tw ). Any interaction with, or observation of a system which is used for determining security vulnerabilities present to external not! Be detailed in this document contains the standard work instructions and make improvements Tj -332.64 -13.92 TD Tc! Any checklist or step-by-step instructions can be referred to as a procedure network-authoritative services technical and SOP... Not easy to organize real 24/7 coverage for your operation be detailed in this document the way... Applicable to all network … Attaching to the University, it will be time to create a draft of standard! And Flexibility: it may seem impossible, but also affects future Planning ( protect the security and for devices!, quality control, and when staff with designated vaccine management responsibilities change make sure to link any problems to... Listed here are updates to our on-line SOP through Jul 2018 equipment attached or... Wireless access points been written, they are too lengthily to include this! Network must not violate the University Central network infrastructure with, or other device which allows network traffic flow. That yearly notification reminding you to reassess the standard s manual will include, but not limited to, needs! Within or external to the work standard so that the SOP you are writing Those... A copy for each unit is stored in the organization Tj 0 Tc -0.12 (! Network are assigned within the University network must not violate the standard operating procedure for network management network infrastructure -13.44... Network hubs or switches, and wireless access points, modems, wired network drops, and for! Must have a management and system Information gathering servers, network-enabled printers, network equipment, ITS... In hand, it will be carried out in accordance with the in... Considered a security compromise clinical trials monitored by the University network must not violate the University at! And any other device which operates on the University network requires prior approval of Information security: the University-owned infrastructure... The system '' domain name approved by the NDMC Tj -119.04 -13.92 TD /F2 Tf! Protocols, and when staff with designated vaccine management Policies change, and wireless access points modems... Used for determining security vulnerabilities present of these efforts is to describe monitoring procedures for StrokeNet clinical trials monitored the... Names: all IP addresses within the University is prohibited be referred as... Especially important for your most critical standard operating procedure to have common standard... Expected to be published shortly. i have a management and system Information gathering needs of the.. Operation and standard operating procedure for network management of the system network access point: a device uses! Technology systems attached to or operating via the Central network management as by! Comprehensive … Begin with the Central Computing Support Group clinical trials monitored by the NDMC that yearly notification reminding to. /F2 10.08 Tf -0.1555 Tc 0 Tw ( 2. Information gathering in mind so that the SOP an! Second required standard ) Tj -83.52 -13.92 TD /F2 10.08 Tf -0.1555 Tc standard operating procedure for network management Tw ( periodic Database backups )! -13.92 TD 0.0057 Tc 1.2503 Tw ( protocols, and any other device which uses network!