Information Systems Management
- ❑ These are Trip Hill's checklists and guidelines for creating and maintaining adequate organization of your information systems. revision 0.3 Please use, copy, share, edit this document from www.triphill.com. No warranty, enjoy at your own risk
- ❑ The Systems Manger's Handbook should describe the environment:
- ❑ The Network:
- ❑ Locations of switches, routers, patch panels, cabling, drops (jacks)
- ❑ who has the passwords?
- ❑ Who backs-up the Systems Manager________________ phone number:
- ❑ IP addresses: router WAN:______________________router LAN:________________________
- ❑ Internet Service Provider (ISP)
- ❑ LAN (local area network) diagram
- ❑ firewall
- ❑ port-forwarding or Network Address Translation(NAT)?
- ❑ WAN (wide area network) diagram
- ❑ The computers (Servers and Workstations): Keep an up-to-date inventory:
- ❑ What operating systems?
- ❑ serial number, machine name, location, dept. or user
- ❑ remote administration? Who should have access? who has the passwords?
- ❑ what hardware?
- ❑ Is there a budget for replacement? on what timetable? 3yr? 5yr? never?
- ❑ Back-up:
- ❑ How is data preserved:
- ❑
- ❑ How is continuity of operation maintained:
- ❑
- ❑ PHONE LIST: Printed and posted. Who to call for help.
- ❑
- ❑ The applications are you using: Keep an up-to-date inventory of licenses and installations:
- ❑ word-processor
- ❑ spreadsheet
- ❑ e-mail client(s)
- ❑ web browser(s)
- ❑ business specific database or applications (reservations, practice management, drawing, editing, estimating)
- ❑ accounting software
- ❑ presentation software
- ❑ Who determines the requirements of a standard workstation?
- ❑ Who determines the permission levels of users and who adds new users?
- ❑ What are the business functions that these applications support?
- ❑ sales? customer relationship management?
- ❑ production?
- ❑ advertising?
- ❑ billing and payments?
- ❑ patient records / student records / order history/ HR ?
- ❑
- ❑ E-mail:
- ❑ who adds new users?
- ❑ where is the server?
- ❑ is it backed-up?
- ❑ Printers, Scanners, Cameras, and other Networked devices:
- ❑ where are they?
- ❑ what is the IP address?
- ❑ where are the drivers and special instructions?
- ❑ Security, access, virus, intrusion (SAVI):
- ❑ How many users:
- ❑ Who authorizes new users:
- ❑ Who creates the accounts and permissions:
- ❑ are the users trained regarding privacy, strong passwords, security standards, social engineering, HIPAA compliance?
- ❑ Do employees or former employees pose a risk to the operation?
- ❑ Virus, anti-virus, anti-spyware, trojan horse
- ❑ what software is in place to prevent intrusion, infection and infestation?
- ❑ Do end users have any education on these subjects? End user education is a great place to start.
- ❑ Your information systems are vital to your business. They are as important as your checkbook, your desk, your phone, your mailing address.
- ❑ Knowing what you have, where it is, how it works and how to fix it (if it breaks) may not interest you much... but will interest you a lot if it stops functioning. Someone should know and it should be documented for: future reference, vacation days, termination, and death.
- ❑ The documentation is called The Systems Manager's Handbook. It is kept up to date by the Systems Manager.
- ❑ The Systems Manager is the person responsible for maintaining the Information Systems.