Sl. No. | Title |
1 | Hardware and Software Change Management of Computer System |
2 | File Server Security System |
3 | Physical and Logical Security of Server & Server Room |
4 | Network Components Change Control |
5 | Password Control of Different Users of System |
6 | Physical and Logical Security of Network |
7 | Allotment of Identification Number |
8 | Management of User ID |
9 | Access Right’s Allocation to User or User Group in SAP |
10 | Procedure for user creation, modification and privileges policy in Lab solution software |
11 | Procedure for Back up of data stored on server (Lab Solutions). |
12 | Operation of QEdge Software. |
13 | Procedure for user creation, modification and privileges policy in Tiamo software |
14 | Procedure for user creation, modification and privileges policy in Lab Hawk software |
15 | Procedure for user creation, modification and privileges policy in Spectra Manager CFR software |
16 | Procedure for user creation, modification and privileges policy in MasterSizer 3000 software |
17 | Procedure for user management, privileges policy in NIV-DAS Nihaar software |
18 | Procedure for data backup |
19 | Procedure for user creation, modification and privileges policy in Aetron-IDS Software |
20 | Procedure for Disaster Management of Data Recovery & Restoration from Backup Device. |