susier

Forum Replies Created

Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • in reply to: Datacenter – Backup Services SLA #502
    susier
    Participant

    CARC Systems comment: 2.1.2 states that “customers may not exceed previously agreed upon storage capacity when using the backup and restore service; Customers must purchase additional storage prior to exceeding capacity”. this seems to be a bit backwards: users may not realize that they are exceeding capacity for example until after they have finished a storage task. Why not adopt a “clean up or pay up” policy to give the user the option to expand their capacity within a certain timeframe of a notice?

    in reply to: Datacenter – Backup Services SLA #500
    susier
    Participant

    CARC Systems comment: 2.1.1 seems to indicate that the end user (UNM unit?) is responsible for monitoring log files for failures: This seems like it should be a part of the service provided. It should not be the user’s responsibility to monitor this and report errors in backups— it should be the other way around.

    in reply to: Email and Calendaring SLA #498
    susier
    Participant

    CARC Systems comment:

    Under 2.1.1 (very) strong passwords are explicitly forbidden. Why artificially limit passwords to 20 characters?

    in reply to: Email and Calendaring SLA #496
    susier
    Participant

    CARC Systems comment: There should be some verbiage to cover cases where (for security and other reasons), a unit is not using these services (e.g. email or calendaring); no charges should be incurred.

    in reply to: External Vendor SLA #129
    susier
    Participant

    Further to tjm’s comment, the title of this SLA should probably be changed to better reflect that this SLA governs services provided BY IT (as a vendor) to an external customer.

    in reply to: Department Web Hosting SLA #128
    susier
    Participant
    • Recommend replacing “Department” with the more general “academic unit” throughout.
    • $75/hour charge should be a link to a separate schedule that will be updated periodically, rather than being hardwired into the SLA.
    in reply to: Telephone Services SLA #127
    susier
    Participant

    Provide a statement about phone monitoring by the University.  What information is collected (or not)?  Outgoing phone #s, incoming phone #s, call duration?   Are the calls themselves ever monitored?

    in reply to: Security Assessment SLA #126
    susier
    Participant
    • Section 2.1.  Define “security posture.”
    • Section 2.1.  To whom will the “prioritized list of vulnerabilities” be provided?
    • Section 2.1.  “…. A security evaluation will contain recommendations to mitigate risks and formally transfer ownership of that risk to management. “    Which management?   Of the unit requesting the scan?  Central IT management?  Clarify.    Also, what does “formally transfer ownership” mean?
    • Section 2.1.  Are security scans/assessments conducted only following a (service) request by a  unit, or can IT initiate a scan/assessment and then bill the scanned unit?
    • Sections 2.1.2, 3.1, 6.3, etc. “Department” should be replaced by “Unit” or “Academic Unit” where applicable. A Center or a School is not a ‘department’, for example. However, Centers,  Schools, and Departments are all ‘units.’
    • Describe the process that the security teams will follow when contacting unit-level support to inform them a breach has occurred.
    • Section 6.1.  What is the hourly rate for using UNM IT consulting services to investigate a  security breach?    Provide a pointer for current costs associated with this specific level of service.
    • If a machine is breached within a unit, and the unit reports the incident to UNM C-IT, will the unit get billed in response?  This would seem to discourage (‘punitive’) rather than encourage such voluntary reporting.
    • Section 6.1.  “Time spent on resolving incidents that are end-user caused will be billed to the appropriate party at current hourly rate, including travel time. Material will be billed along with any associated expenses incurred to remedy the Incident.”   How will cases where there is joint  (cross-unit) or no obvious ‘end-user’ responsibility be handled/adjudicated?    Two use cases:  (i)  a server that is current on all OS security patches is nevertheless hacked; or  (ii) a departmental  server that is not current on current OS security patches is hacked, but concurrently, it is  determined that the network configurations interfacing to that server were improperly set up  by another unit at the time of building construction.
Viewing 8 posts - 1 through 8 (of 8 total)