IT Services and Functions
Application Management Services
Applications are the computer programs that enable government to function effectively and efficiently. Some applications are internal programs that enable government employees to do their jobs. Others enable government ministries and agencies to deliver services directly to Saskatchewan people and businesses. The Application Management Services (AMS) branch oversees application support, enhancement and project services for customer ministries.
Business Improvement Unit
The Business Improvement Unit (BIU) works to ensure IT initiatives meet the program needs of citizens, as well as the business needs of government. It collaborates with other ministries to make sure the government’s IT initiatives are governed and managed in a fiscally responsible manner and that they support the program and service delivery goals of the government as whole.
Chief Technology Office
Provides leadership to ensure IT investments align to government business needs. Its chief focus is what’s known as enterprise architecture, a practice designed to translate business vision and strategy into effective organizational-wide change. Its work is aimed at evolving the way government conducts business on everything from standardizing IT infrastructure to managing information.
Provides all IT operational services to the ITO and its customer ministries and agencies, including: help desk, remote computer support, equipment deployment and infrastructure services.
Relationship Management is the main liaison with internal government IT customer organizations. It is responsible for all aspects of customer support including business analysis and dispute resolution. The branch also leads the ministry’s Customer Service Excellence initiative, designed to foster a “customer first” mindset throughout the organization.
Provides guidance and policies that protect private information and the security of computer systems that house the information entrusted to government by the public. Part of the effort includes regular security audits and vulnerability testing on government networks, intrusion detection software and a wide array of other technologies, such as spam firewalls and standard virus software.