Trinity Operating Procedures - TOPs
TOP-SYSTM: Computerized Systems
Rev: 08/11/2020
Scope: The term "computerized systems" includes Trinity Forge's network, software, data, Internet access, computers, terminals and all related devices and services. This procedure describes the control and security of these computerized systems.
Procedure:
Access to Systems
The IT Manager is responsible for protecting Trinity Forge's computerized systems against unauthorized access. All user accounts and all levels of access must be authorized by the IT Manager. All users must comply with any access requirements specified by the IT Manager, such as password restrictions, virus protection, time-of-use, etc. The IT Manager maintains the Authorized Computer User List.
Passwords
Passwords, including PIN's and other "keys" to Trinity Forge's systems are not to be shared with other people. If you find that someone else lacks the access they need, tell the IT Manager, don't just tell them your password. If you think someone else knows your password, get it changed immediately! When you set a password, don't make it obvious - passwords require a mixture of letters and numbers.
User Software
Users may only put software on Trinity Forge's systems with permission by the IT Manager. Even seemingly harmless software like screen savers may conflict with other systems or breach network security, so unless you are preauthorized by the IT Manager for a particular piece of software, ASK FIRST. As in most of life, "When in doubt, don't ."
System Changes
Any user may request modifications or additions to Trinity Forge's computer systems, including hardware, software, or services. Such a request is made to the IT Manager via the user's manager. The IT Manager first verifies that a change is necessary (often a bit of training is all that's needed). In the case of a "bug" or very inexpensive enhancement the IT Manager may proceed directly with the changes. Larger changes must be approved by the CFO who may determine the need for a Resource Request - see TOP-RSRCE.
System Quality Assurance
As
new
software is developed, acquired or requested, or as new versions become
available for existing software, the IT
Manager is
responsible for
assuring the quality of the software prior to its implementation in
Trinity Forge systems. Specifically this assurance entails:
For critical software used for making decisions regarding the acceptability of product (e.g., product chemistry requirements, mill heat information and the routines that compare the two to approve release of inventory) the IT Manager must work with user management to develop a formal, written list of test scenarios, including raw data requirements and expected results, that the software must satisfy prior to implementation. This list becomes the Software Verification Record. The IT Manager must test the software for each case listed, verify the results are as expected, then sign and date the Software Verification Record prior to implementing the software. The IT Manager retains the Software Verification Record.
Documentation
The IT Manager is responsible for maintaining all documentation for computerized systems, including user-oriented documentation, technical documentation and documentation to prove licensure . Any user in possession of any system-related documentation is responsible for bringing it to the IT Manager's attention. The IT Manager is responsible for maintaining System Recovery Instructions for what to do and who to contact in the case of likely failures, posting the System Recovery Instructions in the main server area, and providing a copy to the VP-Manufacturing for offsite back-up. The CFO is responsible for review, approval and maintaining of the System Recovery Instructions.
Data Backup
All users are responsible for ensuring that any files or other data they maintain are known to the IT Manager so that they may be backed-up against system failure. Personal computer hard drives are nearly never under the back-up program. The IT Manager is responsible for maintaining a backup and recovery program. The IT Manager is responsible for ensuring the integrity of daily, weekly, and monthly backups. The VP Quality & Engineering is responsible for review, approval and maintaining of the backup program.
Backup Strategy and Rotation
What-To-Do if System Fails
Any user identifying any failure of Trinity Forge's computerized system is responsible for immediately reporting the failure to the IT Manager, possibly via the user's manager. The IT Manager is responsible for seeing that the failure is corrected and the user's manager is responsible for monitoring records of any manual transactions, recording them after the failure is corrected and verifying all data is correct. If there is a loss of computerized data, even if most can be restored from backup disks, the IT Manager is responsible for explaining the scope of the problem to all affected user-department managers, and those managers are in turn responsible for ensuring that all lost data has been successfully restored or re-created. In such a case, each manager is responsible for involving all computer users in the department in reviewing the data since many files may have been updated without the manager’s awareness.
User Guidelines for Computer Use
Revision history:
Release Date |
Description of Change |
Owner |
Approver |
12/06/2017 |
Updated to comply with revised Quality Manual and new TOPs format. |
Tim Ellis |
Todd Sheppard |
08/11/2020 |
Updated to make changes to Data Backup and Backup Strategy and Rotation. |
Dustin Jump |
Todd Sheppard |
|
|||
|
|
|
|
|
|
|
|