Systems & Applications Development and Operations Policy

Systems & Applications Development and Operations Policy

The purpose of the Systems & Applications Development and Operations Policy is to set the principles used in the acquisition, the development and the implementation of the Company information assets. This policy addresses IT asset development and maintenance conducted either by Company personnel or by external partners.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. POLICY
3.1 GENERAL ISSUES ON ACQUISITION / DEVELOPMENT AND FUNCTION OF INFORMATION SYSTEMS AND APPLICATIONS
3.2 ACQUISITION / DEVELOPMENT OF INFORMATION SYSTEMS AND APPLICATIONS
3.3 INFORMATION SYSTEMS DESIGN PRINCIPLES
3.4 SOURCE CODE
3.5 INFORMATION SYSTEMS TESTING AND ACCEPTANCE
3.6 INFORMATION SYSTEMS INSTALLATION
3.7 INFORMATION SYSTEMS MANUALS
3.8 INFORMATION SYSTEM OPERATION AND MAINTENANCE
3.9 INFORMATION SYSTEMS DECOMMISSIONING
3.10 THIRD PARTIES MANAGEMENT
4. EXCEPTIONS
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION

Pages: 24

Review Systems & Applications Development and Operations Policy.

Your email address will not be published. Required fields are marked *

Related Products:

€1,069.99

Purchase

This bundle contains all the products listed in the Program Development and Change Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

Adequate Capacity Management Policy must be defined and implemented at the Company, in order to be possible to correctly monitor the performance of the existing or future Company systems, to forecast their future evolution and identify possible bottlenecks.

€99.99

Purchase

This IT Risk Standard details the requirements with respect to Network Security. It addresses requirements which must be incorporated into the Company network design, in order to mitigate risks associated with remote access and interconnected networks.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link