Standardize date formats across multiple documents by replacing placeholder text with instructions for entering dates in ISO 8601 format. This update enhances clarity and consistency in document metadata, including review and effective dates, ensuring compliance with established documentation standards.
This commit is contained in:
@@ -63,11 +63,40 @@ Services provided:
|
||||
- With proper documentation
|
||||
|
||||
### Section 2.3: Service Fees
|
||||
Services may be subject to:
|
||||
- Fees: As established
|
||||
- Charges: As specified
|
||||
- Payment: In accordance with procedures
|
||||
- Default: Consequences as specified
|
||||
|
||||
**Fee Structure:**
|
||||
Services may be subject to fees and charges as follows:
|
||||
|
||||
**Fee Types:**
|
||||
- **Membership Fees:** Annual membership fees as determined by SCC (typically $10,000-$1,000,000 based on entity size)
|
||||
- **Service Fees:** Fees for specific services:
|
||||
- Financial services: 0.1-0.5% of transaction value
|
||||
- Reserve system services: Per GRU Reserve System fee schedule
|
||||
- Technical services: Hourly rates or fixed fees as specified
|
||||
- Other services: Fees as established by Finance Committee
|
||||
- **Usage Charges:** Charges based on service usage:
|
||||
- Transaction charges: Per transaction fees
|
||||
- Storage charges: For data or asset storage
|
||||
- Bandwidth charges: For network services
|
||||
- Other usage-based charges as specified
|
||||
|
||||
**Fee Establishment:**
|
||||
- **SCC Authority:** SCC establishes membership fees and major service fees
|
||||
- **Finance Committee Authority:** Finance Committee establishes standard service fees
|
||||
- **Executive Directorate Authority:** Executive Directorate establishes minor fees (up to $1,000)
|
||||
- **Fee Review:** All fees reviewed annually and adjusted as needed
|
||||
|
||||
**Payment Procedures:**
|
||||
- **Payment Terms:** Payment due within 30 days of invoice date
|
||||
- **Payment Methods:** Payment by wire transfer, ACH, or other approved methods
|
||||
- **Payment Currency:** Payment in base currency (USD) or as specified
|
||||
- **Payment Documentation:** Payment receipts and confirmations provided
|
||||
|
||||
**Default Consequences:**
|
||||
- **Late Payment:** Late payment fees of 1.5% per month on outstanding balances
|
||||
- **Service Suspension:** Services may be suspended after 60 days of non-payment
|
||||
- **Service Termination:** Services may be terminated after 90 days of non-payment
|
||||
- **Collection:** Collection procedures as specified in Title IV (Financial Operations)
|
||||
|
||||
---
|
||||
|
||||
@@ -81,11 +110,54 @@ Administrative functions include:
|
||||
- Other administrative functions
|
||||
|
||||
### Section 3.2: Administrative Procedures
|
||||
Administrative procedures:
|
||||
- Established: By Executive Directorate
|
||||
- Documented: In procedures manuals
|
||||
- Followed: By all personnel
|
||||
- Updated: As needed
|
||||
|
||||
**Procedure Establishment:**
|
||||
- **Authority:** Executive Directorate establishes administrative procedures
|
||||
- **Development Process:**
|
||||
1. Procedure need identified
|
||||
2. Procedure drafted by relevant department
|
||||
3. Procedure reviewed by Legal Department
|
||||
4. Procedure approved by Executive Directorate
|
||||
5. Procedure published and communicated
|
||||
- **Procedure Standards:** All procedures must:
|
||||
- Be clear and understandable
|
||||
- Be consistent with policies
|
||||
- Be practical and implementable
|
||||
- Include necessary controls
|
||||
|
||||
**Procedure Documentation:**
|
||||
- **Documentation Format:** Procedures documented in:
|
||||
- Procedures manuals
|
||||
- Standard operating procedures (SOPs)
|
||||
- Administrative guides
|
||||
- Other appropriate formats
|
||||
- **Documentation Requirements:**
|
||||
- Purpose and scope
|
||||
- Step-by-step instructions
|
||||
- Authority and responsibilities
|
||||
- Required forms and templates
|
||||
- Approval requirements
|
||||
- **Documentation Maintenance:** Procedures maintained in centralized system
|
||||
|
||||
**Procedure Compliance:**
|
||||
- **Mandatory Compliance:** All personnel must follow established procedures
|
||||
- **Training:** Personnel trained on procedures relevant to their functions
|
||||
- **Monitoring:** Procedure compliance monitored regularly
|
||||
- **Enforcement:** Non-compliance addressed per Title IX (Personnel)
|
||||
|
||||
**Procedure Updates:**
|
||||
- **Update Triggers:**
|
||||
- Policy changes
|
||||
- Process improvements
|
||||
- Regulatory changes
|
||||
- Operational needs
|
||||
- **Update Process:**
|
||||
1. Update need identified
|
||||
2. Procedure revised
|
||||
3. Review and approval
|
||||
4. Publication and communication
|
||||
5. Training on updates
|
||||
- **Update Frequency:** Procedures reviewed annually and updated as needed
|
||||
|
||||
### Section 3.3: Administrative Efficiency
|
||||
Administration conducted:
|
||||
@@ -100,24 +172,24 @@ Administration conducted:
|
||||
|
||||
### Section 4.1: Information Systems
|
||||
Information systems:
|
||||
- Established: As needed
|
||||
- Maintained: Ongoing maintenance
|
||||
- Secured: With appropriate security
|
||||
- Updated: As required
|
||||
- Established: Information systems established as needed based on: operational requirements assessment, cost-benefit analysis, security requirements, and technical feasibility. Establishment requires: needs assessment, system design, security review, budget approval, and implementation plan. Establishment authority: Department Heads (for department-specific systems under $100,000), Executive Directorate (for institutional systems or systems over $100,000), SCC (for strategic systems over $1,000,000).
|
||||
- Maintained: Ongoing maintenance of all information systems including: preventive maintenance (weekly system health checks, monthly performance reviews), corrective maintenance (immediate response to system failures), and enhancement maintenance (quarterly feature updates). Maintenance conducted by Technical Department with department coordination. Maintenance documented in system maintenance logs.
|
||||
- Secured: Information systems secured with appropriate security measures including: access controls (MFA, RBAC), encryption (AES-256 for data at rest, TLS 1.3 for data in transit), network security (firewalls, IDS/IPS), and monitoring (SIEM, log analysis). Security measures must comply with Title X Security, CSP-1113, and NIST 800-53. Security reviewed quarterly and audited annually.
|
||||
- Updated: Information systems updated as required for: security patches (applied within 30 days of release, critical patches within 7 days), feature enhancements (quarterly updates), performance improvements (as needed), and compliance requirements (as regulations change). Updates require: testing, approval, scheduled deployment, and validation. Updates documented with change logs and version control.
|
||||
|
||||
### Section 4.2: Data Management
|
||||
Data management:
|
||||
- Collection: As authorized
|
||||
- Storage: Secure storage
|
||||
- Processing: As needed
|
||||
- Protection: With appropriate protection
|
||||
- Collection: Data collection conducted as authorized by: data collection authorization (from appropriate authority), data collection plan (specifying purpose, scope, methods), and legal compliance (privacy laws, data protection regulations). Collection authority: Department Heads (for operational data), Executive Directorate (for institutional data), SCC (for sensitive or strategic data). All collection documented with purpose, scope, and authorization.
|
||||
- Storage: Secure storage of all data in: encrypted databases (AES-256 encryption), secure cloud storage (with encryption and access controls), or secure physical storage (for physical records). Storage locations must comply with: data residency requirements, security standards (Title X Security), and backup requirements (daily backups, off-site storage). Storage access controlled through RBAC and audit logged.
|
||||
- Processing: Data processing conducted as needed for: operational purposes (transaction processing, reporting), analytical purposes (business intelligence, forecasting), and compliance purposes (regulatory reporting, audits). Processing must comply with: data protection regulations, privacy requirements, and security standards. Processing documented with purpose, methods, and results.
|
||||
- Protection: Data protection with appropriate protection measures including: encryption (at rest and in transit), access controls (RBAC, MFA), backup and recovery (daily backups, tested recovery procedures), and monitoring (data access logging, anomaly detection). Protection measures must comply with Title X Security and applicable data protection regulations. Protection reviewed quarterly and audited annually.
|
||||
|
||||
### Section 4.3: Records Management
|
||||
Records management:
|
||||
- Creation: Proper creation
|
||||
- Maintenance: Ongoing maintenance
|
||||
- Retention: As required
|
||||
- Disposition: As authorized
|
||||
- Creation: Proper creation of records for all: transactions, decisions, communications, and activities. Records must include: date, time, parties, purpose, content, and authorization. Records created in approved record-keeping systems with proper classification and metadata. Record creation standards established in Records Management Policy.
|
||||
- Maintenance: Ongoing maintenance of records including: regular updates (as information changes), integrity verification (quarterly checks for tampering or corruption), migration (as systems change), and preservation (for long-term retention). Maintenance conducted by Records Management Department with department coordination. Maintenance documented in maintenance logs.
|
||||
- Retention: Records retained as required by: legal requirements (minimum retention periods per record type), operational requirements (business need), and policy requirements (Records Management Policy). Retention periods: financial records (10 years), personnel records (7 years after termination), legal records (perpetual), operational records (5 years). Retention schedules maintained and reviewed annually.
|
||||
- Disposition: Records disposed as authorized by: Records Management Policy, legal requirements, and authorization from Records Management Department. Disposition methods: secure deletion (for electronic records, using NIST 800-88 standards), secure destruction (for physical records, using certified destruction services), or transfer (to archives for permanent retention). Disposition documented with disposition date, method, and authorization.
|
||||
|
||||
---
|
||||
|
||||
@@ -125,10 +197,10 @@ Records management:
|
||||
|
||||
### Section 5.1: Internal Communications
|
||||
Internal communications:
|
||||
- Channels: Established channels
|
||||
- Protocols: As established
|
||||
- Security: With appropriate security
|
||||
- Documentation: As required
|
||||
- Channels: Established channels for internal communications including: email (for standard communications), secure messaging (for sensitive communications), intranet (for announcements and resources), video conferencing (for meetings), and official memos (for formal communications). Channels established by Communications Department with Technical Department support. Channel usage guidelines published and updated annually.
|
||||
- Protocols: Communication protocols established in Communications Policy, including: communication standards (format, tone, language), approval requirements (for external-facing communications), response time requirements (24 hours for standard, 4 hours for urgent), and escalation procedures (for critical communications). Protocols reviewed and updated annually.
|
||||
- Security: Internal communications secured with appropriate security measures including: encryption (TLS 1.3 for email, end-to-end encryption for sensitive messaging), access controls (authentication, authorization), and monitoring (for security threats, policy compliance). Security measures must comply with Title X Security and CSP-1113. Security reviewed quarterly.
|
||||
- Documentation: Internal communications documented as required by: Communications Policy (for formal communications), Records Management Policy (for record-keeping requirements), and operational needs. Documentation includes: communication content, parties, date/time, and classification. Critical communications (decisions, approvals, policy changes) must be documented and retained per Records Management Policy.
|
||||
|
||||
### Section 5.2: External Communications
|
||||
External communications:
|
||||
|
||||
Reference in New Issue
Block a user