1 / 29

QMS Induction

QMS Induction. Objective. Introduction to ITL’s QMS General Awareness on ISMS. QMS – Basic Elements. Our QMS promotes continuous quality improvement & we have adopted

levi
Download Presentation

QMS Induction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. QMS Induction

  2. Objective • Introduction to ITL’s QMS • General Awareness on ISMS

  3. QMS – Basic Elements Our QMS promotes continuous quality improvement & we have adopted world-wide accepted quality models and conforms to the certification requirements. We are CMMI-Dev L5 , CMMI-Svc L3 v1.3 assessed & ISO 9001,ISO 20000 certified organization. We have also achieved ISO 27001 certification for Information Security, which provides complete confidentiality & secrecy of information while executing the projects for our clients.

  4. No one in the organisation is excluded, everyone participates in implementing quality. Not only should the consumer’s needs be satisfied, but internal customers should also be happy.   Appreciation of the organisation by the public may play a vital role in securing the success of the business. QMS – Basic Elements

  5. Quality JourneyCMMI-Dev L5 v1.3 & CMMI-Svc L3 v1.3

  6. ISO 9001 ISO 27001 ISO 20000 (QMS) (ISMS) (SMS)

  7. SAY WHAT YOU DO & DO WHAT YOU SAY …PROVE IT & IMPROVE IT

  8. QMS Link on ‘ITLCentro’ Portal

  9. QMS Portal

  10. QMS Structure QMS Quality Manual Engineering Processes Project Mgmt. Processes Support Processes Process Mgmt. Processes Process Assets Library Service Mgmt Processes Information Security Processes

  11. Defines the Quality and IS policies and how the requirements of ISO 9001,27001,20000 & CMMI, are met Quality Manual Define Activities, Responsibilities, Entry/Exit Criteria, Tasks, Verification and Measurements Procedures Templates, Forms Templates of Documents and Forms SDLC Model Defines Methodology and Life Cycle stages Standards, Guidelines, Checklist Documentation Standards and guidelines for each of the phases Documentation Structure

  12. QMS • Following groups facilitates in maintaining the QMS: • SQA Group: • SQA members are associated with every project to facilitate the project team. • Ensures that adherence of processes. • Non-compliance issues that are not closed at project level are reported to Sr.Mgmt.

  13. QMS • SEPG Group: • To facilitate process development and improvement. • Ensuring that the software processes used by the projects are appropriately tailored from the Organizational Standard Set of Processes available on QMS.. • Sub Group within SEPG • Metrics Council:To facilitate a quantitative approach to manage projects and measuring process success across the organization by data collection & analysis

  14. Project Execution at Vayam Project Execution at ITL Handover received along with contract and initial estimation from BD PM allocated by PMO Pre-Sales to Delivery Handover Initial planning of Project Re-estimation Schedule Resources plan Risk/issues Project Kickoff by PM Detail Project Planning Peer Review Quality Reviews Project Execution and tracking Project Reviews and Audits Delivery and customer feedback Updation of Process Assets Library (PAL) Project Closure

  15. QMS Related terms • Software Engineering Process Group (SEPG) • Metrics Council • Defect Prevention (DP) • Technology Change Management (TCM) • Process Change Management (PCM) • Software Quality Assurance (SQA) • Configuration Item (CI) • Configuration Controller (CC) • Process Asset Library (PAR) • Process Improvement Proposal (PIP)

  16. CMMi Framework CMMI Framework Optimizing (5) Continuously improving process Predictable process Quantitatively Managed (4) Standard consistent process Defined (3) Disciplined process Managed (2) Initial (1)

  17. Continuous Focus Level Process Areas process Organizational Innovation and Deployment Causal Analysis and Resolution improvement 5 Optimizing Quantitative management Organizational Process Performance Quantitative Project Management 4 Quantitatively Managed Requirements Development Technical Solution Product Integration Verification Validation Organizational Process Focus Organizational Process Definition Organizational Training Integrated Project Management Risk Management Decision Analysis and Resolution Process standardization 3 Defined Basic project management Requirements Management Project Planning Project Monitoring and Control Supplier Agreement Management Measurement and Analysis Process and Product Quality Assurance Configuration Management 2 Managed 1 Initial CMMi Framework CMMI Framework

  18. “Information is an asset which, like other business important assets, has value to an organization and consequently needs to be suitably protected” “Security is like Oxygen; when you have it, you take it for granted but when you don't; getting it becomes the immediate and pressing priority” Information Security Management System

  19. Subject Matter Expert Information Security Forum Information Security Forum Chief Information Security Officer Information Security Officer SVC Representative Software Solutions Representative HR Representative Technology Representative Physical Security Officer IS Organization Structure

  20. Parameters of Information Security Confidentiality Ensuring that information is accessible only to those authorised to have access. Integrity Safeguarding the accuracy and completeness of information & processing methods Availability Ensuring that authorised users have access to information and associated assets when required The enterprise would need to ensure protection of corporate information to gain a competitive advantage. The integrity of data used in the enterprise for decision making is very critical to the success of the enterprise High level of IT dependency and facilitation in the enterprise necessitates information availability at all times. Video-1

  21. Classifying Data ITL PUBLIC- For documents / information that are available on ITL’s website, for public access. e.g. : Corporate ITL’s website ITL INTERNAL contains all forms of proprietary information originated or owned by ITL, or entrusted to it by others. e.g.: ITLs Intranet, policies & procedures, etc ITL RESTRICTED-For documents / information that are available for access only to restricted employees of ITL e.g.: Department files Social Engineering – Video 2

  22. It enables suitable security controls are in place. It demonstrates commitment to security best practices. It ensures compliance with 3rd party obligations. Market differentiation. The only standard with global acceptance. Compliance with mandates & laws. ISMS Benefits

  23. ISMS Compliance • User shall be responsible for the maintaining confidentiality & integrity of the organization’s assets (e.g. laptop, documents, cd’s etc.) issued by the organization for work purpose. • User shall use lockable cabinets, drawers for keeping confidential documents and other items. • User shall immediately report damage (theft, loss or breakdown) of office equipment to the IT Deptt. • User shall lock the system whenever the workstation is left unattended.

  24. ISMS Compliance • Its mandatory to wear employee identity cards at all times in ITL’s office premises. • Do not send any chain letters, jokes on E-mail. • Do not subscribe to humor, pornography, sports, news, mailing lists. • E-mail abuse is against the cyber law and can put you in jail. • Do not access un-productive, non-business sites or online chat sites. This is prohibited. • Do not play songs, video, software, games or view images. • Do not share your password with anyone. • Ensure anti-virus software with latest virus updates is enabled in every desktop. • Download and installation of un-licensed, un-authorized software is strictly prohibited. (Non Compliance with these policies can result in disciplinary)

  25. ISMS Compliance All employees must: • Read and comply with the Information Security Policies (ISP). • Any security incident or breach of the Information Security policy, report immediately to. quality@ilfstechnologies.com

  26. USE IT!!! Ensure you are following the office’s best practices on a daily basis • Encourage others to use the QMS • Help identify & refine best practices for the office • Send us suggestions @ quality@ilfstechnologies.com • Communicate with your Quality Assurance coordinator www.vayamtech.com

  27. QMS Compliance Expectation from all employees at ITL Quality Assurance is necessarily a team work. Therefore, it needs to come from within every employee. It needs to be taken as a way of life, and not an imposed requirement. Every employee is expected to comply with the processes organization wide.

  28. Contact us quality@ilfstechnologies.com Extn: 6452

  29. Thank You!

More Related