Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009

Page text matches

  • ...plementation that reflects the recovery time frame that is required by the business. ...he technology support takes to deliver the recovered infrastructure to the business. ...
    2 KB (237 words) - 11:16, 27 October 2012
  • ...on) in order to avoid unacceptable consequences associated with a break in business continuity. ...able strategy options would include any which would enable resumption of a business process in a time frame at or near the RTO. This would include alternate or ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms us ...n actual and targeted state of business data across systems for individual business processes or process groups. ...
    2 KB (313 words) - 11:24, 27 October 2012
  • ...o admit computerized records is the business record exception. The Uniform Business Records as Evidence Act is a widely followed statement of this exception: ...d the mode of its preparation, and if it was made in the regular course of business at or near the time of the act, condition or event, and if, in the opinion ...
    1 KB (169 words) - 20:08, 22 February 2009
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> Obtain the criteria and business case used for selection of third-party service providers. Assess whether th ...
    2 KB (317 words) - 18:30, 14 June 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> ...data received from the business are processed, all output required by the business is prepared and delivered, and restart and reprocessing needs are supported ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...the IT continuity plan is kept up to date and continually reflects actual business requirements. It is essential that changes in procedures and responsibiliti ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...business in strategy and operations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enable ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 14:38, 13 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 18:29, 13 June 2006
  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...Limit your storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention pol ...cardholder data (e.g., cardholder data needs to be held for X period for Y business reasons). ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (294 words) - 18:21, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)