Change Control Procedure
Change Control Procedure
Version History
Revision
Version Approved By Description Author
Date
1 20/07/2020 Initial document ICT Directorate
1
Change Control Procedure
Purpose
The purpose of this procedure manual is to outline the steps that has to be carried for managing
changes in the ICT resources to the entire roles in the Change Control Process. The manual will
manage change requests so that approved changes will be controlled, ensuring the efficiency
and effectiveness of work.
Scope
This procedure and all other documents referenced herein, shall apply to all members working
in the Change Control and change management of the application development, network
design and infrastructure, and ICT services.
Procedure Statements
I. Create and Log the RFC
Actions Responsibility
1. Identify and record the RFC (identifying information, a Change Initiator
description, configuration item incurring the change, a reason
for the change, requestor’s contact information, type of
change, timeframe, costs, back out plan and business
justification)
II. Verification of the RFC
Actions Responsibility
2. Prioritize, review and validate change request to ensure all Change Approver
necessary information is provided.
III. Analyze and record schedule, cost and effort impact of change
Actions Responsibility
5. Consultation with the technical peers Change Control
Committee
2
Change Control Procedure
3
Change Control Procedure
Actions Responsibility
21. Test the output and process of the change. Change Manager,
Change initiator
22. Close change request.
24. Confirm all updates have been recorded and file all change
request documents.
4
Change Control Procedure
Change Manager,
Change Initiator,
Roles and personals involved in overall change activities as
Change Approver,
indicated by the Change Control Policy.
Change Control
Committee
5
Change Control Procedure
Disclaimer Statement
Deviations from policies, procedures, processes, or guidelines published and approved by ICT
Directorate can only be done cooperatively between the ICT Directorate authorized personals
and the requesting entity with sufficient time to allow for appropriate risk analysis,
documentation, and possible presentation to ICT Directorate. Willful failure to adhere to ICT
Directorate written policies will meet governmental laws and regulations.