Excerpt |
---|
This checklist identifies the major steps of the process |
This site contains additional examples, background materials, and resource links. Consider taking some time to become familiar with the resources on this site before you initiate a similar e-signature project. Also please consider corresponding with the team that developed this site. We may be of some assistance and we would appreciate your participation in improving these wiki pages with lessons learned from your efforts.
Tasklist |
---|
||Completed||Priority||Locked||CreatedDate||CompletedDate||Assignee||Name|| |F|M|F| | |ltalley|[Staging\|1 Staging New Build to Deployment Servers] ahead so that the build which has been tested is deployedEstablish the [Charter for eSignature Team] and sponsorship| |F|M|F| | ||Create an [Interdisciplinary Team\|Participant and Resource Contact Info]| |F|M|F| | | |Deployment to Training|Draft a [Proposed Meeting Schedule]| |F|M|F| | |ltalley|-- Training: Stop JBossIdentify [Potential Solutions\|Alternatives Analysis]| |F|M|F| | |ltalley|-- Training: [DB Synchronization\|DB Synchronization for Development, Test, Training and Production|Identify and Understand the [Stakeholders\|Stakeholder Impact Analysis]| |F|M|F| | |ltalley|--Develop Training:a Check[Stakeholder the DB Synchronization twiceCommunication Plan]| |F|M|F| | |ltalley|--Conduct Training:an [Web Application and Web Services\|2 Web Application and Web Services Build and Deployment]Alternatives Analysis], establishing the context, specifying evaluation criteria, and analyzing representative design alternatives per the criteria| |F|M|F| | ||Conduct a [Risk Assessment\|WCEFT E-Signature Risk Assessment], considering [FIPS |ltalley|-- Training: [Agency Workstation\|3 Agency Workstation Build and Deployment199\|http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf] categorization and [NIST 800-30: Risk Management Guide for Information Technology Systems\|http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf], the Agency's [e-signatures policy (32-110)\|http://reefshark.nmfs.noaa.gov/f/pds/publicsite/documents/policies/32-110.pdf] and [procedural directive (32-110-01)\|http://reefshark.nmfs.noaa.gov/f/pds/publicsite/documents/procedures/32-110-01.pdf], particularly the [Categories of Harm and Impact Definitions], and [Table B - Maximum Potential Impacts for Each Assurance Level]| |F|M|F| | |ltalley|--Conduct Training:enough [ProcessorCost/Benefit WorkstationAnalysis\|4 Processor Workstation Build and Deployment]WCEFT Cost Benefits Analysis] to make an informed go/nogo decision| |F|M|F| | |ltalley|--Draft Training:a [emailIf\|5 Mail Processor Build and DeploymentBusiness Plan\|West Coast E-Fishticket E-Signature Business Plan] per the Agency's e-signatures [procedural directive (32-110-01)\|http://reefshark.nmfs.noaa.gov/f/pds/publicsite/documents/procedures/32-110-01.pdf]| |F|M|F| | |ltalley|--Conduct Training: [Periodic Server Maintenance\|7 Periodic Server Maintenance]| |Stakeholder Reviews| |F|M|F| | |ltalley|-- Training: reboot (to ensure that we are bootable)Submit Final Business Plan to Region/Center Leadership for approval| |F|M|F| | |ltalley|--Implement Training: Smoke Testthe Plan| |