| Sl. No. | Title |
| 1 | Hardware and Software Change Management of Computer System |
| 2 | File Server Security System |
| 3 | Physical and Logical Security of Server & Server Room |
| 4 | Network Components Change Control |
| 5 | Password Control of Different Users of System |
| 6 | Physical and Logical Security of Network |
| 7 | Allotment of Identification Number |
| 8 | Management of User ID |
| 9 | Access Right’s Allocation to User or User Group in SAP |
| 10 | Procedure for user creation, modification and privileges policy in Lab solution software |
| 11 | Procedure for Back up of data stored on server (Lab Solutions). |
| 12 | Operation of QEdge Software. |
| 13 | Procedure for user creation, modification and privileges policy in Tiamo software |
| 14 | Procedure for user creation, modification and privileges policy in Lab Hawk software |
| 15 | Procedure for user creation, modification and privileges policy in Spectra Manager CFR software |
| 16 | Procedure for user creation, modification and privileges policy in MasterSizer 3000 software |
| 17 | Procedure for user management, privileges policy in NIV-DAS Nihaar software |
| 18 | Procedure for data backup |
| 19 | Procedure for user creation, modification and privileges policy in Aetron-IDS Software |
| 20 | Procedure for Disaster Management of Data Recovery & Restoration from Backup Device. |

Follow
