Independent Review Team UEA/CRU. Formal Record
|
|
|
- Raymond Miles
- 10 years ago
- Views:
Transcription
1 Notes of Interviews with Jonathan Colam-French (Director Information Services), Iain Reeman (ICT Systems Director) and Mike Salmon (IT Manager to the CRU - 40% time) Interviewers Sir Muir Russell & Prof. Jim Norton Interview carried out at UEA on 27 th January 2010 Introduction 1. Sir Muir set the scene by reiterating the objectives of the Independent Review and detailing the members of the Review Team. He explained the purpose of the meeting as exploratory, building on the initial discussions held in December. The Review would focus on the honesty and scientific rigour with which data had been collected, processed and presented in the context of the scientific norms relevant at the time, as well as FoI issues in relation to access to both scientific data and personal data. Background 2. Questioning established the overall University context for both Information Security and the handling of Freedom of Information (FoI) requests. A high level Information Systems Policy and a related Information Security Policy 1 had been agreed and put in place five years ago under the aegis of the University Information Systems Strategy Committee (ISSC), which includes representatives of all four Faculties. Low level, detailed, security policies had been developed and put in place two years ago In common with other areas of the Science Faculty, the CRU operated largely independent of the central IT functions of the University. Central IS had, in recent years, made significant efforts to better support the Science Faculty and some use of central facilities (such as the Storage Area Network) had been achieved. The University IS team did not provide desktop, remote access, hosting, database or software support to the CRU, nor any quality control or assessment. CRU had their own local architecture based on a mix of individual PC based and server based processing. In common with many other research groups across the university, this was distinct from the UEA preferred model of client server operation, see attached chart. Internet communications for the CRU were however routed over the university network and through the university firewall. The CRU had its own IT Manager (Mike Salmon) for whom CRU was 40% of his workload. The CRU had originally had no central backup 1 The following documents were received by the Review on 8 th February: High Level Information Security Policy ; and General Information Security Policy. 2 A draft Security Manual was also received by the Review on 8 th February. Page 1 of 4
2 arrangements for the individual researchers PCs however Mike Salmon had introduced automated backup (using open source software) to a simple server held securely within the Central IS machine room. Jonathan Colam-French (Director Information Services) indicated that, whilst the central IT function were aware of the existence of the CRU Backup Server, they had no knowledge of the nature of the information held on the server as it was managed from the CRU. IT within the CRU 4. Mike Salmon indicated that researchers within the CRU worked individually or in small groups. There was no master index of resources, be these data, algorithms or software. No systematic approach to the creation of metadata existed. There was no central database of underlying climate data; rather individual researchers assembled sets of data drawn from different primary sources outside the CRU (for example the Met. Office Hadley Centre for Climate Change). These might arrive by network (Janet & GÉANT), or on portable hard disks. Secretary s Note: Mike Salmon subsequently indicated in an of 3 rd February that the benefits of a central data catalogue had long been recognised within the CRU and past attempts had been made to create such a resource. These attempts had foundered on the lack of resources research grants made no provision for this and central UEA funding had not been available. A typical data set might comprise 10GBytes of data (Secretary s Note: Mike Salmon subsequently clarified, in an of 3 rd February 2010, that data sets were typically GBytes and could reach 500GBytes. A simulation might use up to 20 runs and so data requirements could easily reach into the Terabyte region). The data might be stored locally (cheaper), on the University Storage Area Network (SAN) or split between the two. There was no policy for the systematic archiving of data. Individual researchers were responsible for acquiring or developing their own software applications (usually written in Fortran or IDL). There was no formal quality control policy or review policy. FoI Issues 5. Jonathan Colam-French (Director Information Services) indicated that the initial response by Mr David Palmer, with respect to FoI requests related to personal data potentially held by the CRU (e.g. in s), had been based around a range of issues including disproportionate cost 3. Jonathan Colam-French promised 3 In a subsequent communication, Jonathan Colam-French confirmed that a full analysis of CRU FoI requests was being prepared for the Vice-Chancellor and would be fully available to the Review. Page 2 of 4
3 to provide copies of both the University FoI policy documents and the IT Strategy documents. 4 Lessons learnt 6. Iain Reeman (ICT Systems Director) indicated that lessons had been learnt and ISD expected (subject to the results of a security audit report) to bring forward proposals within the University for: Greater compliance with centrally defined IS policies and architecture; An audit of research data held in digital storage across the University; and Clear data retention (and destruction) policies. Jim Norton 2 nd March A copy of the Code of Practice for responding to requests for information under the Freedom of Information Act 2000 Final Draft 22/11/04 was also received by the Review on 8 th February. The IS strategy is available at Page 3 of 4
4 Page 4 of 4
5 Page 1, footnote 1 High Level Information Security Policy ; and General Information Security Policy. Page 3, footnote 4. Code of Practice
IT HELPDESK ADVISER REF: TC449
Information Services Directorate The Post IT HELPDESK ADVISER REF: TC449 The IT Helpdesk Advisor will be part of a team responsible for the provision of IT support via email, phone and face to face for
ICT Contingency Plan Top Level Plan
ICT Contingency Plan Top Level Plan - 1 - Document Control Information Title: ICT Contingency Plan: Top Level Plan Date: June 2013 Version: 3.0 Authors: John Redeyoff (NCC) Contents by Neil Dudleston /
DATABASE ADMINISTRATOR Ref: ALC434
Information Services Directorate Corporate Information Services Group The Post DATABASE ADMINISTRATOR Ref: ALC434 The postholder will be part of a small team undertaking database administration of corporate
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Tandberg Data AccuVault RDX
Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival
Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT
Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance
Head of Human Resources (Primary line manager) and Head of ICT
Job Description Job Title: Line manager: Responsible for: Key contacts & relationship: Systems and Database Administrator Head of Human Resources (Primary line manager) and Head of ICT No direct reports
CLASS SPECIFICATION Systems Support Analyst II
San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
GENERIC JOB DESCRIPTION - SCHOOLS
GENERIC JOB DESCRIPTION - SCHOOLS Job information as shown on organisation chart Job Title: Senior IT Technician Organisational information: Responsible to: Data Manager Post No: GEN75 Grade: HC6 Dimensions:
SAS System and SAS Program Validation Techniques Sy Truong, Meta-Xceed, Inc., San Jose, CA
SAS System and SAS Program Validation Techniques Sy Truong, Meta-Xceed, Inc., San Jose, CA ABSTRACT This course will teach methodologies of performing SAS system and SAS program validation including new
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company
Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company June 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Customer Overview...1 Business Challenges...1
Research Data Storage and the University of Bristol
Introduction: Policy for the use of the Research Data Storage Facility The University s High Performance Computing (HPC) facility went live to users in May 2007. Access to this world-class HPC facility
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your
Virtualization of CBORD Odyssey PCS and Micros 3700 servers. The CBORD Group, Inc. January 13, 2007
Virtualization of CBORD Odyssey PCS and Micros 3700 servers January 13, 2007 61 Brown Road Ithaca, NY 14850 (607) 257-2410 Document Revision: 2 Last revised: January 13, 2007 Changes are periodically made
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
ediscovery Implementation Services Statement of Work To be Executed under State Blanket Contract ITS53 Cat2B
ediscovery Implementation Services Statement of Work To be Executed under State Blanket Contract ITS53 Cat2B Overview: The Massachusetts Water Resources Authority is looking for a vendor to provide business
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
University of Bristol. Research Data Storage Facility (the Facility) Policy Procedures and FAQs
University of Bristol Research Data Storage Facility (the Facility) Policy Procedures and FAQs This FAQs should be read in conjunction with the RDSF usage FAQs - https://www.acrc.bris.ac.uk/acrc/rdsf-faqs.html
Computer Network & ICT Support Technician
Computer Network & ICT Support Technician The general competencies and skills enlisted in this document encompass the principle background needed for a Computer Network & ICT Support Technician to carry
The Theatres Trust. Records Assistant. Background Information
The Theatres Trust Records Assistant Background Information The Theatres Trust is an Advisory Arms Length Body of the DCMS. We were established by The Theatres Trust Act 1976 and The Theatres Trust (Scotland)
Record Management in SharePoint
Record Management in SharePoint JULY 2013 (please consult http://www.katprotech.com/whitepapers for the latest version of this paper) ABOUT KATPROTECHNOLOGIES: Katpro Technologies is an advanced technology
IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
GCP INSPECTORS WORKING GROUP <DRAFT> REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
European Medicines Agency London, 17 October 2007 Doc. Ref. EMEA/505620/2007 GCP INSPECTORS WORKING GROUP REFLECTION PAPER ON EXPECTATIONS FOR ELECTRONIC SOURCE DOCUMENTS USED IN CLINICAL TRIALS
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
Records Management Security of University Records Procedures
Records Management Security of University Records Procedures pro-064 To be read in conjunction with: Records Management Policy Version: 2.00 Last amendment: Nov 2014 Next Review: Nov 2016 Approved By:
CrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
IBM Tivoli Storage Manager Suite for Unified Recovery
IBM Tivoli Storage Manager Suite for Unified Recovery Comprehensive data protection software with a broad choice of licensing plans Highlights Optimize data protection for virtual servers, core applications
Windows Server 2012 Hyper-V Training
Course Details: Windows Server 2012 Hyper-V Training Chapter 1: Installing and Configuring the Hyper-V Server Role Verifying Hyper-V requirements Installing Hyper-V Determining the Configuration Settings
JP1 Version 11: Example Configurations
JP1 Version 11: Example Configurations Asset and Distribution Management January 2016 List of example configurations for IT asset and distribution management ITDM - 01 Configuration for centrally managing
Local Loading. The OCUL, Scholars Portal, and Publisher Relationship
Local Loading Scholars)Portal)has)successfully)maintained)relationships)with)publishers)for)over)a)decade)and)continues) to)attract)new)publishers)that)recognize)both)the)competitive)advantage)of)perpetual)access)through)
Internal audit report Information Security / Data Protection review
Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your
Document Number: SOP/RAD/SEHSCT/007 Page 1 of 17 Version 2.0
Standard Operating Procedures (SOPs) Research and Development Office Title of SOP: Computerised Systems for Clinical Trials SOP Number: 7 Version Number: 2.0 Supercedes: 1.0 Effective date: August 2013
How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC
How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC What is Remote Desktop? Remote Desktop allows multiple users to access a remote computer or server as if they were sitting in front
ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions
ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
Remote Support: Key Metrics to drive Improvement in your Center
Remote Support: Key Metrics to drive Improvement in your Center Jeremy Curley, Director of Business Solutions, Bomgar Mike Sell, Director of Strategic Alliances, Bomgar 0 Why Are Metrics Not Improving?
Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services
Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT
ICANWK402A Install and configure virtual machines for sustainable ICT
ICANWK402A Install and configure virtual machines for sustainable ICT Release: 1 ICANWK402A Install and configure virtual machines for sustainable ICT Modification History Release Release 1 Comments This
MIS. Platform Services. Software. Business Intelligence. Technology Customer Support
* Custom application development Payroll applications (time & attendance) Student assignment algorithm HR applications (staffing, transfers etc.) School safety web applications Mobile platform applications
Records management in English local government: the effect of Freedom of Information. Elizabeth Shepherd [email protected]
Records management in English local government: the effect of Freedom of Information Elizabeth Shepherd [email protected] Overview of presentation Research context: FOI Act 2000; role of Information
K-Series Guide: Guide to digitising your document and business processing. February 2014 LATEST EDITION
K-Series Guide: Guide to digitising your document and business processing February 2014 LATEST EDITION Kefron are the Document Kefron & simplifies the document and Information information management world
Records Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH
EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance
Cloud Computing. Chapter 8 Virtualization
Cloud Computing Chapter 8 Virtualization Learning Objectives Define and describe virtualization. Discuss the history of virtualization. Describe various types of virtualization. List the pros and cons
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
WDL RemoteBunker Online Backup For Client Name
WDL RemoteBunker Online Backup For Client Name November, 2011 Contact Phone: +234 802 698 7025 Email: [email protected] [email protected] http://remotebunker.webdatalinks.com INTRODUCTION
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
How Cisco IT Uses SAN to Automate the Legal Discovery Process
How Cisco IT Uses SAN to Automate the Legal Discovery Process Cisco dramatically reduces the cost of legal discovery through better data management. Cisco IT Case Study / Storage Networking / : This case
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Documentation for data centre migrations
Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed
Backup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
We take care of backup and recovery so you can take care of your business. INTRODUCING: HOSTED BACKUP
We take care of backup and recovery so you can take care of your business. INTRODUCING: HOSTED BACKUP RecoveryVault Hosted Backup allows Rico Teles at Sephaku Holdings to ensure recovery of all mission
StorPool Distributed Storage. Software-Defined. Business Overview
StorPool Distributed Storage. Software-Defined. Business Overview StorPool, 2015 Page 1 of 5 About StorPool StorPool is the leading vendor of distributed storage software. Our innovative solution eradicates
Why can you trust Google?
Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of
Comparative Analysis of Load Balancing Algorithms in Cloud Computing
Comparative Analysis of Load Balancing Algorithms in Cloud Computing Ms.NITIKA Computer Science & Engineering, LPU, Phagwara Punjab, India Abstract- Issues with the performance of business applications
Enterprise Infrastructure Architecture
Enterprise Infrastructure Architecture RL Information Consulting LLC January 7, 2003 The Information contained in this presentation is based on Intellectual Capital provided by David Merrill and Copyrighted
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
What is the CLOUD? PPD Computing The Old Manse, Lightcliffe, Halifax, HX3 8NT
What is the CLOUD? I don t know about you but I am asked more and more each day about 'the Cloud'. What is it? Where did this concept come from? Jaimie Dobson on the inet engineers blog explains this in
Name Jobtitel actidata GmbH
Name Jobtitel actidata GmbH Market and Trends 15.10.2010 2 Market 85% of the systems are not fully secured 53% loss due to hardware / software 38% losses by human error Software error 13% Virus attack
IT Data Security Policy
IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...
THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents
Framework for Data warehouse architectural components
Framework for Data warehouse architectural components Author: Jim Wendt Organization: Evaltech, Inc. Evaltech Research Group, Data Warehousing Practice. Date: 04/08/11 Email: [email protected] Abstract:
Flash Research Assignment: Virtualization and Cloud Computing
Flash Research Assignment: Virtualization and Cloud Computing You are the CTA for a small but rapidly growing manufacturing company. You have approximately 1,000 servers in your datacenter. The average
LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT
Journal homepage: www.mjret.in ISSN:2348-6953 LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT Ms. Shilpa D.More 1, Prof. Arti Mohanpurkar 2 1,2 Department of computer Engineering DYPSOET, Pune,India
Disaster Avoidance and Resilient IT for Business Continuity in Medical Practice :
Disaster Avoidance and Resilient IT for Business Continuity in Medical Practice : Proven strategies and procedures to assist with planning, implementation and testing of medical practice IT for business
Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary
Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) HELP DESK SUPPORT OFFICER
ICT (INFORMATION AND COMMUNICATION TECHNOLOGY) HELP DESK SUPPORT OFFICER The ICT Help Desk Support Officer is the first point of contact for all ICT Support and utilises their knowledge, training and skills
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
