Free Essay

Security and Maintenance Plan

In:

Submitted By mchristiansen
Words 1848
Pages 8
Security and Maintenance Plan

Section Overview

> Section 1 Operating Procedures
> Section 2 Security and Maintenance Plan
> Section 3 Policy
> Section 4 Security & Maintenance Schedule
> Section 5 Security & Maintenance Checklist

Section One
Operating Procedures

This plan constitutes the “Standard Operating Procedures” relating to physical, cyber, and Procedural security for all (Utility) for all server rooms. It contains a comprehensive overview of the (Utility)’s security program, and in some sections, makes reference to other relevant plans and procedures. Security personnel, operators, and selected server personnel shall be familiar with the information and procedures associated with this Security Plan.

Section 2
Security and Maintenance Plan
Purpose
This policy is to be used as a reference when issuing keys within the (Utility). It will also
Explain our policy for returning keys, reporting lost or stolen keys, the use of unauthorized
Duplicate keys and loaned keys.
The key system will be entered into the computer-based Key Control Program for on-going
Maintenance and will be maintained by the Key Administrator.
The Facilities Department will program cores and cut keys, and the Key Administrator will issue keys. 6. Issuing Authority – Keys will be authorized in writing for issuance to employees of the
(Utility) by one of the following individuals:
a) General Manager
b) Executive Managers or their designees
c) Department Directors or their designees
If keys are requested from one Business Group that would access another Business
Group, written approval will be required from Directors of each unit.
All approvals will be routed through the Key Administrator. Only in an emergency will a key be issued by Building Maintenance Foreman without the Key Administrator’s prior knowledge, and it will require the approval of a Department Director. When a key is issued under these circumstances, the Building Maintenance Foreman will notify then Key Administrator as soon as possible.
2. Who is authorized to have specific keys – Access will be given only to areas where need can be demonstrated.
3. Keys will not be loaned and should not be left unattended – All keys issued on a “permanent” basis should be retained in the possession of the person to whom issued.
Keys may not be transferred directly from one employee to another. Avoid the practice of leaving keys on desks, counter tops, etc., or loaning to others.
4. Lost/Stolen Keys – Any person losing a key must report the loss to his or her superintendent/supervisor immediately, who will then report the loss to the Key Administrator.
The Security Department along with the Facilities Department will make a determination as to whether the system has been compromised and if a core change is necessary. If a core change is required, that expense will be borne by the department that misplaced the key.

Section 3
Policy #708
Purpose
This policy addresses the responsibility of all employees to comply with (Utility) security measures. Employees and contractors are prohibited from tampering with or obstructing the view of (Utility) security cameras and/or security-related equipment.
This policy also addresses interfering with or disabling any other security-related measures.
The (Utility) relies on comprehensive security systems and measures to ensure our employees, contractors and visitors remain safe and our critical assets are protected.
Many of these security measures are required by federal law due to the nature of the
(Utility)’s facilities. All employees are expected to know and support the security measures related to their jobs.
Security cameras strategically placed throughout the (Utility) have an integral role in security. Unauthorized interference with these cameras can jeopardize people and facilities. Therefore, no employee shall knowingly tamper with or obstruct the view of any security camera or security-related equipment.
The (Utility) has carefully implemented a number of other integrated security measures, including but not limited to: electronic access control, restricted access, intrusion alarms, locked doors/gates/windows, fencing, and signage. No employee shall knowingly disable, circumvent, bypass or compromise any of the (Utility)’s security measures.
Any employee having knowledge of any tampering with, circumvention of or breach of security or security measures shall notify either their supervisor or the Security Division immediately.
Investigations of alleged violations of this policy will be conducted under the direction of the Security director. If the director is unavailable, then the general counsel/chief compliance officer will assume such responsibility. At the conclusion of the investigation, any employees found to be in violation of this policy will be subject to disciplinary action, up to and including termination of employment.

Section 4
System & Maintenance Schedule

Incremental backup of files and database storage will take place every 24 hours. An incremental backup are backups that are taken place throughout the day when the data changes. The system will automatically backup files at 3am every morning. A full backup will occur bi-weekly. A full backup is a backup where all data is saved since the last full backup. We suggest that the backup tapes are placed at different locations in case of a disaster. Office managers will be responsible for theft, reporting power outages, and any damage related with networking equipment. Each employee will be informed about maintenance and security via email. During the training you will learn more about how to maintain the network and all employees will have to attend an information security class. The upgrades and testing will take place either before or after hours that way it doesn’t hinder patient care. HID single door access cards will provide external and internal security to the building and server room and this will help prevent intruder and theft. Along with the access cards two people will need to accompany each other when they enter the server room. There are discernible risks to this project. Any absence in the network administration department will postpone any networked share of the upgrade. Other interruptions may arise if the sellers don’t meet the stated delivery times or if the orders are shipped incorrectly. Any specialty software that we weren’t made aware of may cause other applications to not work properly and interfere with the installation processes.

These are the national standards we are going to follow:

6) EIA-606: The Administration Standard for the Telecommunications Infrastructure of Commercial Buildings

2) EIA-570: Residential and Light Commercial Telecommunications Wiring Standard

3) TIA/EIA-569: Commercial Building Standard for Telecommunications Pathways and Spaces

4) TIA/EIA-568B: Commercial Building Telecommunications Wiring Standard

5) TSB-36: Technical Systems Bulletin: Additional Cable Specifications for Unshielded Twisted-Pair Cables

6) TSB-40: Technical Systems Bulletin: Additional Transmission Specifications for Unshielded Twisted-Pair Connecting Hardware

We are going to follow the HIPAA Standards:

The federal law entitled the Health Insurance Portability and Accountability Act of 1996, also known as “HIPAA”, mandates how a patient’s health information is utilized. The aim of the law is to protect against the misuse of a patient’s health information and provide protection of patients’ health data.

Section 5
Computer Security and Maintenance Checklist

Maintaining your devices is essential to keep them running smoothly and securely, but sometimes you just don't remember what tasks are necessary. Use the checklist below to help you keep a safe and problem-free device. Add the items on this checklist to your calendar or print the PDF for students PDF or faculty and staff PDF next to your computer.

First, be sure you've installed the following tools:
•Symantec Endpoint Protection—Protects against viruses, spyware, and more, and is provided at no additional cost to all faculty, staff, and students for work and personal use.
•Spybot Search & Destroy—NUIT recommends this free antispyware application to detect spyware on your Windows computer. It is safe to use this tool with other antispyware or antimalware applications.

Before significantly changing your computer habits, check with your local technical support team or NUIT to avoid conflicts with departmental computer maintenance or security.

Protect Your Data
•Create a secure Net ID password (remember, longer is stronger!) to protect your paychecks, banking information, personal information, and more; don’t share it with friends, family, coworkers, instructors, or managers.
•Lock your screen when you step away to keep others from accessing information on your computer. Secure sensitive data with encryption software.
•Beware what you share on social media. Could someone find the answers to your security questions (birthdate and town, mother’s maiden name, model of your first car, name of your grade school)? Choose security questions with hard-to-guess answers, or use answers that don't match the question.
•Back up data regularly to a secure offsite or cloud-based location. Ask your local technical support.

Protect Your Devices
•Lock your phone with a strong passcode to protect personal information like email accounts, contacts, calendar, bank information, social media, etc. Use a cable lock and strong password to secure computers and other equipment.
•Install antivirus software on computers and set it to run weekly scans.
•Check weekly for updates to software or apps you use regularly on computers, smartphones, or tablets, including: ◦Operating system
◦Security software (antivirus, antispyware, firewall, etc.)
◦Productivity suites (Microsoft Office)
◦Internet browsers
◦Email client
◦iTunes and QuickTime
◦Adobe software (Reader, Flash Player)
◦Java

•Download apps with caution; when possible, only install reviewed apps from reputable sources.
•Uninstall or delete unused apps, photos, music, etc. regularly to save space and improve performance.
•Use a tracking service, if available, to find or remotely wipe your phone if it’s lost or stolen.

Keep Dell Desktop Protected.
•Learn the key identifiers of email scams to avoid sharing login information to secure University resources. Always check the URLs of sites that ask for personal information; if you receive an email claiming to be from Dell that asks you to enter personal data on a site, be sure the URL ends with northwestern.edu.
•If you become infected by a virus or worm, there is a strong possibility you could lose some or all of your data.
•Your computer could be used for illegal activities, like storing copyrighted materials, music and movies, or hacking into other computers.
•Worms can significantly increase network traffic on the network and negatively affect Internet speed for all users.
•Connect to a secure wireless network like Northwestern VPN from off campus; avoid public Wi-Fi if you can't connect to VPN at libraries, coffee shops, hotels, airports, etc. to protect sensitive information.
•Browse wisely; use common sense to avoid websites that seem questionable.
Important information
•If you run an antivirus scan with updated virus definition files and do not find any infections, please check for these programs that exhibit virus-like behavior: ◦Share Scan
◦Common Name

•Please remove these programs if you find them on your computer.
•If your computer is quarantined for the same virus after we re-enable your Reset jack, you will have to bring in your computer and have it disinfected before your jack will be turned back on

Practice general safe computing habits every day: keep your Net ID password private, stay aware of email scam attempts, and report any suspected security compromises to the NUIT Support Center at 847-491-4357 (1-HELP).

Similar Documents

Premium Essay

Security and Maintenance Plan

...Central Arkansas Family Doctor’s PLLC Security and Maintenance Plan Overview Central Arkansas Family Doctor’s IT personnel will be trained for the management, planning, quality testing, so that future renovation and implementation of new hardware, software, network updates , network security methods, and practices to sustain a strong, compatible, and reliable network communication between all three of the medical facilities. Cost Regulatory cost for planning, installing, and designing , including employee training can be found within the Cost analysis and Training Plan. Security Central Arkansas Family Doctors Clinic will be responsible for securing the Central office, and management of security. Standard Operation/Business practices Backup of files and database storage will take place at the central office every 24 hours. The system will automatically reboot and backup files at 3am every morning. Configuration management, problem report management, customer support, lifecycle testing, risk identification, data sharing and risk mitigation will be will be handled by CAFD IT personnel, and network management. Roles and Responsibilities IT management at the Little Rock Central Office will be responsible for network maintenance, Security updates, help desk support, documentation training and security operations. CAFD clinic will rely on experienced network engineers, current and future IT staff as well as contract employee’s and interns. Office managers...

Words: 370 - Pages: 2

Premium Essay

Software Failure

...activities involved in the development, integration and testing of information system? (10 Marks) b) What entails Implementation and Disposition Phases of the system development? (4 Marks) c) Discuss the differences between Implementation and Disposition phases based on tasks and activities. (10 Marks) d) What are the activities associated with the operations and maintenance phase of systems development. (8 Marks) e) Identify and discuss the types of maintenance. (8 Marks) f) Compare and contrast roles and responsibilities during development phase and integration and testing phases of systems development. (10 Marks) Lecturer: Nick Gachui. Date Due: August 2014.   a) What are the tasks and activities involved in the development, integration and testing of information system? i. Development  Code and Test Software Code each module according to established standards.  Integrate Software Integrate the software units and software components and test in accordance with the integration plan. Ensure that each module satisfies the requirements of the software at the conclusion of the integration activity.  Conduct Software Qualification Testing. Conducting qualification testing in accordance with the qualification requirements for the software item. Ensure that the implementation of each software requirement is tested for compliance. ii. Integration  Conduct System Qualification...

Words: 2123 - Pages: 9

Free Essay

Sec 402 Wk 8 Assignment 2 Implementing Network

... Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures Write a four to five (4-5) page paper in which you: 1. Create an information flow diagram, using Visio or Dia, which: a. Illustrates how remote users will securely connect to the government agency’s network. b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server. Note: The graphically depicted solution is not included in the required page length. 2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list: a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items. b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment. 3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you: a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan. b. Indicate specific activities, personnel / resources required, and frequency of execution. More Details hidden... Activity mode aims to provide quality study...

Words: 832 - Pages: 4

Free Essay

Capstone

...Security Maintenance Plan: 1. Introduction: Dr. Joe Bob’s Family Practice is in need of an offsite security maintenance plan to maintain the highest level of security for patient medical files in case of an emergency, disaster, or critical intrusion on the network system. Techs Rx, Inc. has agreed with Dr. Joe Bob’s Family Practice, to put in place a security maintenance plan for Dr. Joe Bob’s Family Practice. This plan will involve an offsite data storage company by the name of First Choice Data Management, Inc. The security maintenance plan will provide offsite storage of electronic medical records of all patients and include an onsite inspection by a representative of First Choice Data Management. The representative will inspect the health and condition of all critical files of the network, and perform the necessary operations to correct all deficiencies of the file system. Tech Rx, Inc will be responsible for contacting First Choice Data Management, Inc. and setting up Dr. Joe Bob’s Family Practice with the first initial request to the offsite storage facility. This will be done only one time, and only for the first initial set up. After the first initial setup, a manager from Dr. Joe Bob’s Family Practice will be responsible for any transactions thereafter. 2. Budget/Cost: Techs Rx, Inc. recommends that Dr. Joe Bob’s Family Practice contracts the services of a certified and technically competent IT consulting firm to maintain all critical...

Words: 2254 - Pages: 10

Premium Essay

Health Care Security

...PART A 1. Incident Reporting: a. The types of incidents that should be reported would be larceny, damage to property, breaking/entering, suspicious person, trespass, disturbance, missing person, patient restraint, assault, domestic, visitor restriction, auto accident, personal injury, alarm activated/reset, maintenance, lost and found. There is also the issue of workplace violence, which has increased and has become a serious issue in health care. Our health care workers are at higher risk for experiencing violence than workers in any other industry. Workplace violence includes any incident at the workplace that results in physical or psychological injury to someone, damage to property, or loss of productivity (Sells, 2000, p. 338). b. The expectation for reporting incidents in the workplace is to make the management aware so that they can be committed to the safety of their employees and also to set expectations regarding what is acceptable and unacceptable behaviors. Also, as employees they must do their parts in properly reporting the violent incidents to management. The security team will provide the employee with the incident report form or reporting tool. This form can also be used by external sources such as, police if they need to do a follow on the situation. The documentation will provide factual detail of what happen if the person is prosecuted or for other legal reasons. Mandatory reporting is required by some facilities, and that include incidents...

Words: 5467 - Pages: 22

Premium Essay

Its410 Portfolio

...company wide database system needs to be implemented. We are currently running a Microsoft Access database system in each department however these databases are not able to communicate with each other and the IT department has no solution in place for database maintenance and backup. It is my recommendation that the company move to a more secure, robust, centralized database server company wide. The database system recommended is Microsoft SQL Server 2005 for its ability to be a central database to handle, customer information, widget inventory, company payroll, and other sensitive data. Our current process requires users to open separate databases to retrieve information or call other users to obtain information out of another database. This current setup is not only inefficient it is also not secure and provides not backup for disaster recovery. I have created a comprehensive plan that will outline all of the requirements for upgrading our systems to Microsoft SQL Server 2005. The following will be addressed: * Installation requirements for SQL Server 2005 * Databases being used * Data types needed * Database Objects * Mail * Security * Database Protection * Availability * Maintenance and monitoring The first step in transitioning over to a Microsoft SQL Server 2005 system will be to prepare our server systems and make sure they meet the minimum requirements for installing. The minimum requirements for Microsoft SQL Server 2005 are...

Words: 4256 - Pages: 18

Premium Essay

Management Plan

...Property name: ________________ Address: ________________ Owner: ________________ MANAGEMENT PLAN TEMPLATE (This template is intended to serve as a helpful tool. HTF Contractors may elect to use it or not.) TABLE OF CONTENTS (List topics & page numbers.) I. MANAGEMENT (ON-SITE & OFF-SITE) • What management functions are performed on-site and by whom? (Property management company or sponsor organization?) • What management functions are performed off-site and by whom? • List property management staffing positions, and describe the roles and responsibilities of each position. • When and how is the property management company evaluated? • When and how is the management plan updated? • How are staff informed of contractual and management plan requirements? • Describe the property performance standards, including vacancy rates, rent collection ratio, turnover timeframes, etc. II. ACCOUNTING & RECORDKEEPING PROCEDURES • What records are kept on-site? • What records are maintained off-site? • Describe the checks and balances in your accounting system and the fiscal oversight. III. MARKETING • Describe procedures to ensure compliance with all applicable fair housing laws. • What strategies are used to reach eligible households? • If special needs households are served, what is the marketing strategy to reach that population? IV. LEASING PROCEDURES • How is household income...

Words: 647 - Pages: 3

Premium Essay

Community Observation

...Auxiliary services such as transportation, maintenance, and security, provide an important component in the operation of a school district. These services provide students, district staff, and the community with a safe and secure learning environment. In interviewing the directors from these three service areas, I learned their responsibilities and duties; their day to day activities, and the federal and state laws which regulate their operation. I learned that these services provide vital resources and if not provided, can impact the support of the instructional environment which a school district provides. The director of transportation, Mr. Carter oversees the maintenance of all district owned vehicles and must ensure the safe and efficient...

Words: 1356 - Pages: 6

Premium Essay

Est1 Task 1

...implementation of the EHRS system, support and maintenance will be required on a regular basis. The current and future workflows consist of a backup plan, in the event problems might arise. Over the next two years there will be ongoing training, maintenance, IT support and system updates. The support and maintenance after the implementation will yield improved productivity, it will enhance billing and collection, quality and coordination of care, and workflow will be streamlined. Job-specific training will be provided by specially trained “super-users” as coaches. Training will be continuous because new employees and contract employees who will need to be trained, and the training plan must account for them. The EHR system is also constantly changing and being updated, so continuing education and refresher courses must be available to system users. The staff will be trained by superusers, superusers are specialists in healthcare systems. Ideally, they have...

Words: 422 - Pages: 2

Premium Essay

Enterprise Security Plan Cmgt/430

...Enterprise Security Plan CMGT/430 Enterprise Security Plan This Enterprise Security Plan (ESP) for Riordan Manufacturing employees the levels of security required to protect the network and resources utilized to communicate. It is intended purpose is to formulate a means to counterattack against security risk from potential threat. The ESP servers as a way to identify risks and to ensure a contingency plan is in place to protect the availability, integrity, and confidentiality of the Riordan organization's information technology (IT) system. The ESP benefits all employees however it is most beneficial to information resource managers, computer security officials, and administrators as it is a good tool to use for establishing computer security policies. The ESP in its basic form is a systematic approach to addressing the company’s network, its capability, the threats it is susceptible to and a mitigation strategy that addresses those threats if and should they occur. In addition to addressing the threats the ESP will also make provisions for establishing contingency plans in case of a disaster. The information covered by this plan includes all information systems, IT resources, and networks throughout the Riordan global organization owned or operated by employees in the performance of their job duties, whether written, oral, or electronic. Further it establishes an effective set of security policies and controls required to identify and mitigate vulnerabilities that...

Words: 2085 - Pages: 9

Free Essay

Riordan Web Based Plan

...Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that followThe following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan. Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online ProcessingRiordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed...

Words: 2477 - Pages: 10

Free Essay

Group Study

...our spirit all aided us to surmount difficulties during doing the research and show our ability confidently as well. We are also indebted to HUCFL Second - year English students for their cooperation to complete our questionnaires and their active contributions to suggest feasible solutions for our research topic. Last but not least, we can’t help mentioning the remarkable efforts of our group members. They conducted the research to the best of their ability and worked very hard to perfect the research as well as possible. Their merits are thankworthy. ABSTRACT Our research was carried out to investigate the attitude of HUCFL Second- year English students toward the school facility protection and some solutions for school facility maintenance. Due to the important of school facilities in the cause of HUCFL’s education- training and its status quo, we carried out the small- scale research to examine main causes of HUCFL’s facility damage. We delivered 20 questionnaires randomly to the Second – year English students and we thereafter analyzed the data collected from those questionnaires. Based on the research findings, we had the clear understanding about the concerned reality of HUCFL’s school facilities and the close relationship between the lack of students’ awareness and the degraded quality of the facilities. What is more, we realized that the students’ responsibility for protecting the school facilities is the main...

Words: 3960 - Pages: 16

Premium Essay

Security Plan

...Your Company Security Plan for Unclassified Data Version 1.3 March 20, 2012 Developed By: Your Committee Committee Your Company Important Disclaimer: The Aerospace Industries Association of America, Inc. (“AIA”) has no intellectual property or other interest in this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data. By developing this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data Plan and making it freely available to anyone, AIA assumes no responsibility for this Guideline’s content or use, and disclaims any potential liability associated therewith. Executive Overview From time to time an AIA member company may be requested to provide the DOD, a prime contractor or an industry partner an Information Technology Security Plan for unclassified data. This security plan could be required at the enterprise, program or application level depending on the unique requirements of the request. This request might be challenging for those members that have never been required to provide such a document. This “Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data” provides a template and guidance to assist member companies in the development of a security plan to meet their customers or partners needs. Please keep in mind that this document is provided as a guideline and not a mandatory standard. AII member companies are encouraged to use this guideline. Use...

Words: 2097 - Pages: 9

Free Essay

Emergency Management Plan Chemical Spill/Release

...University | Emergency Management Plan | Chemical Spill/Release | | Erik Gohl | 11/7/2011 | | Purpose Events which interfere with the normal operations of Hennepin Technical College (HTC) are unavoidable. The purpose of this document is to explain the actions, roles, and responsibilities that are to be taken by individuals and departments in the event of a spill or release of a hazardous chemical or waste. (Homeland Security, 2011) Emergency Management Team The Emergency Management Team (EMT) shall consist of the following individuals: College President College Vice President(s) College Environmental Health and Safety (EHS) Officer Director of Security Maintenance Supervisor Administrator on Duty (AOD) Lead Custodian on Duty Faculty/Staff Emergency and Non-Emergency Hazardous Chemical and Waste Spill/Release A non-emergency spill/release is one of no more than five gallons where the substance can be absorbed, neutralized or otherwise controlled at the time of the release by employees in the immediate area and presents no hazard to people or the environment. The staff or faculty member for, and familiar with, the chemical or waste should attend to non-emergency releases. The front desk should be notified by dialing “0” if assistance is needed in locating the Maintenance Supervisor or maintenance staff. All recovered materials shall be assumed to be, and treated as, a hazardous waste. (HTC Emergency Plan, 2005) An emergency spill/release...

Words: 1382 - Pages: 6

Premium Essay

Electronic Library Card Catalog System

...Project Plan For NORSU Electronic Library Card Catalog System Researchers: Project Leader: Medura, Jess Linguaje, Ed Lorence Los Baños, Marilyn Maquiling, Marres Contents 1. Overview…………………………………………………………………………………………………………………………...3 2. Goals and scope………………………………………………………………………………………………………….….….4 2.1 Project Goals…………………………………………………………………………………………………………4 2.2Project Scope…………………………………………………………………………………………..……….……5 2.2.1 Included………………………………………………………………………………………………………….….5 2.2.2 Excluded .................................................................................................................5 3. Organization……………………………………………………………………………………………………………………….6 3.1 Organizational Boundaries and Interfaces…………………………………………………………….…...6 3.1.1 Resource Owners……………………………………………………………………………………………….6 3.1.2 Receivers…………………………………………………………………………………………………….……..6 3.1.3 Cross Functions…………………………………………………………………………………………………..7 3.2 Project Organization…………………………………………………………………………………………………..8 3.2.1 Project Manager…………………………………………………………………………………………….….8 3.2.2 Project Team……………………………………………………………………………………………………..9 4. Schedule and Budget…………………………………………………………………………………………………………10 4.1 Work Breakdown Structure…………………………………………………………………….…………...11 4.2 Schedule and Milestone………………………………………………………………………….……………12 4.3 Budget.......................................................................................................................13 4.4 Development Process…………………………………………………………………………………………...

Words: 4136 - Pages: 17