Professional Documents
Culture Documents
Rechange
Rechange
Presented by:
Narra, Carl Patrick
Paje, Elpedian O.
Jagudilla, Christian
Siliacay, JohnMark
Gagui, Jefferson
Presented to:
Ms. Jahara Sumanpan, LPT
INTRODUCTION
Within these pages, system administrators will find detailed instructions on a wide
range of tasks, from routine maintenance and troubleshooting to disaster recovery and
cybersecurity protocols. By adhering to the guidelines outlined in this manual, administrators
can streamline their workflows, minimize downtime, and safeguard the university's data and
assets.
We trust that this manual will serve as a valuable resource and reference guide for all
system administrators at Gingoog Greenfield University, empowering them to fulfill their
responsibilities with confidence and proficiency.
ROLES AND RESPONSIBILITIES
Data backup and recovery are crucial for a system administrator because this involves
preventing data loss due to various factors such as accidental deletion, hardware failures,
software bugs, or malicious attacks. Having a backup ensures that critical data can be
recovered quickly in the event of a disaster, and minimizing downtime. Additionally, backup
and recovery processes help preserve valuable institutional knowledge and information,
providing peace of mind for system administrators and making sure that data is always
accessible when needed.
Security Management
User Support
System administrators ensure user support for several reasons. First, schools often
have a large number of users, including teachers, students, and administrative staff, who rely
on technology for their work. Providing timely and effective support helps ensure that these
users can use technology efficiently. Second, many users in schools may not have advanced
technical knowledge, so providing user support helps them overcome technical issues and
learn how to use technology effectively. Finally, by providing user support, system
administrators can build trust and rapport with users, creating a positive relationship that
fosters collaboration and communication within the school community.
● University President
The University President holds the highest position in the hierarchy and is
responsible for providing executive leadership and setting strategic direction of the
institution. They play a key role in advocating for the university’s interests,
promoting its reputation, and ensuring a supportive environment for students and
faculty. The university president serves as a key figure in both
internal and external communication. Overall, the president’s role in the
communication channel is to ensure that information flows effectively within the
university and between the university and its external stakeholders.
● System Administrator
● Department Heads/Faculty
● Access Recertification
Conducting periodic access recertification to ensure that users still need the
access they have been granted. This helps to identify and remove unnecessary access
rights.
Implementing SSO to allow users to access multiple systems with a single set
of credentials. This improves user experience and reduces the need for managing
multiple sets of credentials.
Implementing 2FA for accessing sensitive systems or data. This adds an extra
layer of security by requiring users to provide two forms of identification before
gaining access.
Maintains logs of user access and monitors for any unusual or unauthorized
activity. This helps to detect and respond to potential security incidents. Access
logging and monitoring help establish accountability by providing a record of who
accessed what information and when, deterring unauthorized access and ensuring
users are accountable for their actions.
● User Education and Awareness
Provides regular training and awareness programs to educate users about the
importance of access management and best practices for securing their accounts.
● Incident Response
1. Program Objectives
● Raise awareness about the importance of cybersecurity.
● Educate users on common cybersecurity threats and best practices.
● Empower individuals to recognize and respond to security incidents
effectively.
● Foster a culture of security and accountability across the university
community.
2. Target Audience
● All faculty members, administrative staff, students, and other
stakeholders at Gingoog Greenfield University.
3. Program Components
● Ensure that training modules are accessible via the university's learning
management system (LMS) for easy distribution and tracking of
completion.
e. Role-Based Training
● Use feedback and performance metrics to refine and improve training content
and delivery methods over time.
● Ensure alignment between security awareness and training programs and the
university's security policies and procedures.
6. Continuous Improvement
● Stay abreast of industry best practices and incorporate new training techniques
and tools to enhance the effectiveness of the programs.
Compliance Monitoring
It helps universities avoid costly fines and penalties, protect sensitive information,
and maintain the trust of students, faculty, and stakeholders. Compliance monitoring also
helps identify and address security gaps, ensuring that the university’s systems and processes
meet the necessary security requirements. Overall, compliance monitoring is critical for
maintaining a secure and compliant environment in a university.
Security Policies and Procedures
● Legal Review: Seek legal review to ensure that the drafted policies comply
with applicable laws, regulations, and industry standards.
5. Continuous Improvement
● Review and Revision: Regularly review and revise security policies and
procedures in response to evolving threats, technological advancements, and
changes in the university's operations or regulatory landscape.
Purpose
The purpose of this Standard Operating Procedure (SOP) is to ensure the integrity,
availability, and confidentiality of critical data through systematic backup procedures and to
provide a clear and efficient process for data recovery in the event of data loss or system
failure.
Scope
This SOP applies to all data storage systems, servers, and devices owned or managed
by Gingoog Greenfield University, encompassing academic, administrative, and research
data.
Backup Procedures
4. Security: Backup data is encrypted using robust algorithms like AES (Advanced
Encryption Standard), ensuring confidentiality and integrity. Encryption keys are
securely managed to prevent unauthorized decryption. This measure enhances
security, mitigates data breach risks, and ensures compliance with regulations. It adds
a layer of protection to sensitive information, reinforcing the organization's
commitment to safeguarding data.
Recovery Procedures
2. Assessment and Planning: Assess data loss, devise a recovery plan, prioritizing
data critical to university operations.
3. Execution of Recovery: Execute the recovery plan, restoring data from the most
recent backup and escalating to off-site backups if necessary.
Form a dedicated team comprising specific individuals to oversee the change process.
This team should include:
5. Key Stakeholders: Identify and involve individuals or groups who will be directly
affected by the change, such as students, alumni, advisory boards, or community
partners. These key stakeholders will represent various perspectives and ensure that
their concerns, interests, and needs are considered throughout the change process.
Communicate Vision and Objectives: Clearly communicate the vision for change and
the objectives it aims to achieve. Transparency and clarity in communication help in gaining
buy-in from all stakeholders and mitigate resistance.
Engage Stakeholders: Involve all stakeholders in the change process from the outset.
Seek feedback, address concerns, and incorporate suggestions to ensure inclusivity and
ownership of the change initiative.
Provide Training and Support: Offer comprehensive training programs and ongoing
support to equip faculty, staff, and students with the necessary skills and knowledge to adapt
to the changes effectively. This may include technical training, professional development
workshops, and access to resources.
Implement Pilot Programs: Pilot testing changes on a smaller scale before full-
scale implementation allows for identifying potential challenges, refining strategies, and
mitigating risks. Lessons learned from pilot programs can inform the broader change process.
Communication Channels: Ensure that all members of the university community are
aware of the designated communication channels for reporting problems or seeking
assistance. This may include contacting department heads, administrative offices, or utilizing
online portals.
Escalation Procedures: Define clear escalation procedures for unresolved issues that
require higher-level intervention. Designate appropriate authorities or committees responsible
for handling escalated cases promptly and effectively.
Data Analysis and Trend Identification: Analyze data on reported issues to identify
trends and patterns that may indicate systemic problems or areas requiring targeted
interventions. Use data-driven insights to inform proactive problem resolution strategies.
4. Firmware and Driver Updates: Keep firmware and device drivers up-to-date to
ensure optimal performance and compatibility with software applications and
operating systems, adhering to the system administration protocols of Gingoog
Greenfield University. Schedule regular firmware and driver updates according to
manufacturer recommendations and industry best practices.
5. Diagnostic Tools and Software: Utilize diagnostic tools and software to perform
comprehensive hardware checks, including memory tests, hard drive diagnostics, and
CPU stress tests, tailored to Gingoog Greenfield University's specific needs. Analyze
diagnostic results to identify any hardware issues or
potential failures, facilitating prompt corrective actions within the university's system
administration framework.
● System Name: [Enter the name of the new system or the system being
modified]
● Description: [Provide a brief description of the system and its purpose]
● Owner/Contact: [Specify the individual or department responsible for the
system]
● Date of Implementation: [Enter the planned or actual date of system
implementation]
● Proposed Changes: [Describe the changes proposed for the system,
including additions, modifications, or removals]
● Justification: [Explain the rationale behind the proposed changes, including
business requirements, technical considerations, and expected benefits]
● Impact Analysis: [Assess the potential impact of the changes on existing
systems, users, and processes, including risks and dependencies]
● Implementation Plan: [Outline the steps required to implement the changes,
including timelines, resource allocation, and coordination with stakeholders]
● Testing Procedures: [Detail the testing procedures to validate the
functionality, performance, and compatibility of the changes, including test
cases and acceptance criteria]
● Rollback Plan: [Specify the procedures for reverting the changes in case of
unexpected issues or failures, including rollback steps and contingency
measures]
● Validation Criteria: [Define the criteria for validating the success of the
changes, including metrics, benchmarks, and user feedback]
● Approval: [Obtain approvals from relevant stakeholders, including system
owners, project sponsors, and change management authorities]
● Documentation Updates: [Update relevant documentation, including
configuration records, user manuals, and training materials, to reflect the
changes accurately]
● Version Control: [Maintain version control for the documentation, including
revision history, change logs, and archival procedures, to ensure traceability
and accountability]
EMERGENCY PROCEDURES
In times of crisis or unforeseen events, it's crucial to have clear and effective
emergency procedures in place to ensure the safety of individuals and the continuity of
operations at Gingoog Greenfield University. This section outlines guidelines for handling
emergencies and provides a template for documenting emergency procedures.
Emergency Guidelines
7. Training and Drills: Provide regular training sessions and emergency drills for
faculty, staff, and students to enhance preparedness and response capabilities. Use
scenarios based on realistic emergency situations to simulate response actions and
assess performance.
● Faculty and Staff: Inform faculty and staff members about the emergency situation
and provide instructions for response actions through email, text messages, or other
communication channels.
● Students: Alert students about the emergency and provide guidance on safety
measures and evacuation procedures through mass notification systems, social media
platforms, and campus-wide announcements.
Effective training and onboarding processes are essential for ensuring that new team
members at Gingoog Greenfield University are equipped with the knowledge, skills, and
resources needed to contribute effectively to their roles. This section outlines guidelines for
conducting training and onboarding activities, along with procedures for onboarding new
team members and accessing training materials and resources.
2. Tailored Training Programs: Develop tailored training programs that address the
specific needs and objectives of new team members. Provide a combination of
orientation sessions, on-the-job training, online courses, workshops, and mentorship
opportunities to facilitate learning and skill development.
6. Recognition and Rewards: Recognize and reward team members who actively
participate in training and demonstrate commitment to their professional growth and
development. Acknowledge achievements, milestones, and contributions to fostering
a culture of learning and excellence.
2. Welcome and Orientation: On the first day, the new team member receives a
warm welcome from HR and their supervisor. They participate in an orientation
session covering university policies, benefits, facilities, and introductions to key
personnel.
1. LinkedIn Learning: Our team members will have access to LinkedIn Learning, a
leading online learning platform renowned for its extensive library of courses and
tutorials. With a focus on professional development, LinkedIn Learning offers a
diverse range of courses tailored to our team's roles and interests.