(1) The purpose of this procedure is to outline the principles that govern the management of University Business and Research Software Applications: (2) This procedure applies to: (3) Nil (4) Nil (5) The ITS department will maintain a register of Software Applications with appropriate classifications according to the degree of importance to University operations. This classification will influence the amount of resources applied to maintain the Software Application. (6) The table below defines the classification scheme: (7) A Software Application may still be allocated to Tier 1 - Mission Critical if it does not meet the criteria. Justifications include value to the University, strategic importance, reputational risks and external compliance. (8) Any new Software Application must meet certain requirements. (9) Any changes to the Software Application must be appropriately tested in a Test and UAT environment and approved for deployment into production by adhering to the Change Management Framework. (10) The changes must take into consideration resource availability and the impact of the change to University operations. Where possible, both changes to the Software Application and underlying ICT infrastructure will be undertaken concurrently to minimise multiple outages. (11) Software Application must be properly updated to reflect improvements and any changes or updates supplied by the supplier. In certain circumstances the updates improve performance and reduce system vulnerability. (12) All security and patch updates released by the suppliers of infrastructure, database, middleware and applications will require certification from the Software Application Supplier. This is to ensure the patch or security update does not generate application issues. (13) If the University detects a security threat from a proposed patch, a decision will be made with the Business Owner and ITS. The decision will take into consideration of business impact and the risks to the organisation. The supplier maintenance support contract is void until the patch is certified by the supplier. (14) All Software Applications should be reviewed at least once every 5 years to ensure the Software Application: (15) Software Application deemed unsuitable will undergo a Software Application assessment before a new product is purchased. (16) A Software Application no longer in use should be archived and removed from the University environment. (17) A Software Application that is approaching "end of life" will need to be retired with a transition plan to either develop or select a new Software Application. (18) NilIT Hardware and Software - Software Application Procedure
Section 1 - Purpose / Objectives
Top of PageSection 2 - Scope / Application
Top of PageSection 3 - Definitions
Section 4 - Policy Statement
Section 5 - Procedures
Roles/Responsibilities
Roles
Responsibility
Business Owner
- Determines the need to retain or replace a system including obtaining governance approval for capital funding.
- Periodically reviews the application to ensure it continues to support University compliance and business needs.
- Governs any changes to the Software Application to determine the impact to University operations. Approves the timing and installation of changes to production applications and notify affected users.
- Notifies affected users when the application is retired or significant changes are being proposed.
- Identify any training or professional development requirements for users of the system.
- Develop a business continuity plan to ensure continuity of business processes in the event of application failure.
Technical Custodian
- Manages the technical elements of the Software Application (database, Physical Infrastructure and operating system).
- Seeks approvals from the Business Owner to make appropriate changes to the technical environment.
- Reviews security controls at least once every 12 months. Works closely with the supplier of the product when upgrades are undertaken.
End user
Procedures
Application Classification
Classification
Criteria
Tier 1 — Mission Critical
- Supports University wide administrative, research, teaching and learning operations.
Tier 2 — Business Critical
- Used to support unique business processes that are not prevalent across the University.
Tier 3 - Departmental
Software Application Selection
Software Application Maintenance
Patch Management and Security Updates
Software Application Review
Software Application Retirement
Section 6 - Guidelines
View Document
This is not a current document. It has been repealed and is no longer in force.
- Prepares a business case to upgrade or replace existing systems. (This includes risk impacts, compliance and Organisational impacts.)
- Maintain a Disaster Recovery Plan aligned with the business continuity plan.
- Victoria University staff and students
- Software Application used widely by the University to provide a service.
- Software Application used by more than one Business Unit or Colleges.
- Software Application used exclusively by a single Business Unit or College to support business processes that are not available in either a Tier 1 or 2 classified system.