IT Service Catalog FY 21-22
Severity Levels A P P E N D I X C
Severity Level Definitions
Severity Level
Examples
A critical failure affecting many such as A Production System Down or A Network Outage affecting multiple locations. Processes are halted. There are no workarounds available. A critical business process is impaired, causing a serious disruption of a major business function and causing a serious impact on daily functions or processing. There is no reasonable workaround. Non-critical issue occurs. Business processes are not disrupted and work can be completed. There is an acceptable workaround for the issue. An inquiry or low impact issue that does not require immediate attention. This includes cosmetic issues on screens, errors in documentation, or a request regarding use of Software or a service.
Critical
High
Medium
Low
IT Policies A P P E N D I X D
IT Policies The Information Technology Department has consolidated IT Policies into two reference manuals. The Information Technology Policy Catalog contains policies governing the acceptable use of systems, equipment, and data on the City of Greensboro network. The Cyber Security and Compliance Policy Catalog contains policies defining the principles by which the City of Greensboro will secure and protect systems, equipment, and data. Both IT Policy Catalogs can be found here . Cyber Security and Compliance Policy Catalog Cyber Security & Compliance Policy Cyber Security Incident Response Procedure Data Classification Policy Encryption Policy Information Security Management System (ISMS) Policy Information Technology Policy Catalog 2020-2021 Acceptable Use Policy
Back-Up and Retention Policy Card Payment Handling Policy Cell Phone Policy Change Management Policy Disaster Recovery Policy Email Retention and Disposition Policy File Access Guidelines iPad Management Policy IT Loaner Device Rental And Return Policy IT Operations Policy Lost/Stolen Leased Equipment Policy Monitoring Employees Use Of Electronics Resources Guidelines One Connect Policy Open Data Policy PC Secure Configuration Standards Printer Policy Printer Secure Configuration Standards Surplus Policy Surveillance Camera Monitoring and Auditing Policy
Mobile Device Policy Network Access Policy Patch Management Policy Remote Access Policy Social Media Policy Supplier Risk Management Policy User Provisioning Policy Vulnerability Management Policy
Technology Refresh Policy Third Party Access Policy Tier II Policy
39 I T S E R V I C E C A T A L O G • D E C E M B E R 2 0 2 1 - N O V E M B E R 2 0 2 2
Made with FlippingBook Learn more on our blog