Please enable JavaScript.
Coggle requires JavaScript to display documents.
Technology Support Platform - Coggle Diagram
Technology Support Platform
Selection Criteria
Definition
Principles, requirements, or conditions used to choose the best option among several
alternative
Main Criteria
Technical Criteria
•Evaluation of skills and knowledge.
Compliance with specifications and standards.
Compatibility with existing systems or processes.
Economic Criteria
•Total cost of acquisition or implementation.
Cost-benefit ratio.
Return on Investment (ROI).
Quality Criteria
•Certifications and compliance with standards.
Durability and reliability.
Previous evaluations or references.
Experience Criteria
•Performance history.
Similar previous projects.
Market reputation.
Ethical and Environmental Criteria
•Environmental impact and sustainability.
Compliance with legal regulations.
Corporate social responsibility.
Applications of Selection Criteria
Purchasing and Acquisitions
Supplier evaluation based on quality, price, and delivery times
Projects
Prioritization of initiatives with higher feasibility and profitability
Human Resources
Candidate selection based on competencies, experience, and cultural fit.
User Management: Permissions and Administration
Definition
The process of managing user access to systems, applications, and data within an
organization.
User Administration
•User Registration, Deactivation, and Modification:
New account creation with appropriate permissions.
Deactivation of inactive or disconnected users.
Update of roles, permissions, or credentials.
User Roles
•Administrator: Full control over user, permission, and configuration management.
Standard User: Access limited to necessary functions based on their role.
Supervisor/Moderator: Can manage certain permissions or users but with restrictions.
Permission Management
Types of Permissions
are
•Read: Allows viewing information but not modifying it.
Write: Allows modifying existing data.
Execute: Allows executing certain functions or programs.
Delete: Allows deleting data or users.
Security and Best Practices
are
Least Privilege Principle: Grant only the necessary permissions to each user.
Multi-Factor Authentication (MFA): Adds security layers for access.
Monitoring and Auditing: Record user activity to detect unauthorized access.
Permission Revocation: Remove unnecessary accesses when a user changes roles or leaves the
organization.
Regulatory Compliance and Organizational Requirements
•Compliance with regulations such as GDPR, ISO 27001, HIPAA.
Access and Usage Policies: Define rules for user management.
•Staff Training: Training in security and system use.
Incident Recovery Procedures: Plans for failures or unauthorized access.