Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009

Page text matches

  • ...plementation that reflects the recovery time frame that is required by the business. ...he technology support takes to deliver the recovered infrastructure to the business. ...
    2 KB (237 words) - 11:16, 27 October 2012
  • ...on) in order to avoid unacceptable consequences associated with a break in business continuity. ...able strategy options would include any which would enable resumption of a business process in a time frame at or near the RTO. This would include alternate or ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms us ...n actual and targeted state of business data across systems for individual business processes or process groups. ...
    2 KB (313 words) - 11:24, 27 October 2012
  • ...o admit computerized records is the business record exception. The Uniform Business Records as Evidence Act is a widely followed statement of this exception: ...d the mode of its preparation, and if it was made in the regular course of business at or near the time of the act, condition or event, and if, in the opinion ...
    1 KB (169 words) - 20:08, 22 February 2009
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> Obtain the criteria and business case used for selection of third-party service providers. Assess whether th ...
    2 KB (317 words) - 18:30, 14 June 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> ...data received from the business are processed, all output required by the business is prepared and delivered, and restart and reprocessing needs are supported ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...the IT continuity plan is kept up to date and continually reflects actual business requirements. It is essential that changes in procedures and responsibiliti ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...business in strategy and operations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enable ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 14:38, 13 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 18:29, 13 June 2006
  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...Limit your storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention pol ...cardholder data (e.g., cardholder data needs to be held for X period for Y business reasons). ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (294 words) - 18:21, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • '''1. Risk: Unauthorized users might exploit unauthorized access to critical business processes and data.'''<br> '''2. Risk: Unnecessary disruptions to business processes or data corruption may occur.'''<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • ...tives, measures, targets and benchmarks, and has them signed off on by the business and other relevant stakeholders.<br> * Business contribution including, but not limited to financials.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • * Business address * Home and business telephone numbers ...
    789 bytes (113 words) - 16:17, 18 February 2009
  • ...e to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ibility and alternative courses of action and make a recommendation to the business sponsor.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...tages. Each sign-off follows successful completion of quality reviews. The business sponsor has the final decision with respect to choice of solution and acqui ...
    2 KB (288 words) - 14:17, 3 May 2006
  • '''AI 1.1 Definition and Maintenance of Business Functional and Technical Requirements'''<br> ...d include any changes required to the nature of the enterprise’s business, business processes, people skills and competencies, organization structure, and the ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ines Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    3 KB (464 words) - 17:48, 14 January 2014
  • Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    266 bytes (41 words) - 16:55, 1 March 2009
  • ...rganizational level, so the management of security actions is in line with business requirements. ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Define and implement physical security measures in line with business requirements. Measures should include, but are not limited to, the layout o ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • See Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173, for an example of laying the fo ...
    286 bytes (42 words) - 17:13, 1 March 2009
  • * [[KY E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    924 bytes (100 words) - 20:14, 25 June 2006
  • * [[GA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    923 bytes (100 words) - 20:08, 25 June 2006
  • * [[LA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:09, 25 June 2006
  • * [[TX E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    921 bytes (100 words) - 20:10, 25 June 2006
  • * [[WI E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:11, 25 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    3 KB (379 words) - 18:17, 14 June 2006
  • ...aknesses in internal control and oversight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stak ...
    2 KB (334 words) - 13:36, 4 May 2006
  • * [[FL E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    928 bytes (100 words) - 20:06, 25 June 2006
  • ...e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods. ITIL 7.3 The business continuity life cycle.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    4 KB (507 words) - 14:58, 21 January 2014
  • Translate business requirements into a high-level design specification for software developmen ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...ftware|software]] and [[Computer hardware|hardware]] that are found in the business environment. ...organization is enforced by the compliance industry by companies such as [[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST] ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (291 words) - 16:02, 25 June 2006
  • Sufficiency of description of business records under Fourth Amendment requirement of particularity in federal warr ...
    374 bytes (49 words) - 11:18, 3 March 2009
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...is reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment. ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...t and asset management, or enterprise-wide activities such as security and business continuity planning. This dual role and the increasing use of technology ra ...le of aligning its IT infrastructure to support its business strategy adds value to its organization and positions itself for sustained success. The board o ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...st model. IT services should be linked to business processes such that the business can identify associated service billing levels. ...
    2 KB (243 words) - 14:06, 5 May 2006
  • [[Business_Continuity_Management: | Business Continuity Considerations]]<br> ...
    431 bytes (45 words) - 13:31, 10 April 2007
  • ...ormation assets are consistently available to conduct business and support business operations. ...modified business application must include a Security Impact Statement and Business Impact Analysis. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Fenwick & Davidson, Use of Computerized Business Records as Evidence, 19 Jurimetrics J 19 (no. 1 1978). ...
    365 bytes (43 words) - 17:08, 1 March 2009
  • ...on of IT services by helping organizations match their IT resources to the business demands. The high-level activities are Application Sizing, Workload Managem ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ITIL The Business Perspective, Supplier Relationship Management<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...Standard for information assets will be provided only to meet an approved business need or perform prescribed job responsibilities to comply with ISO Organiza ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that has been implemented fails to meet the business needs.'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ...he importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line ITIL Business Perspective.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • '''ME 4.3 Value Delivery'''<br> ...approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization o ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ficient manner on a continual basis. Ensure contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk manage ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...ritization of IT-enabled investment programs in line with the enterprise’s business strategy and priorities; Track status of projects and resolve resource conf ::'''1. Risk: nformation security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • ...dents and thus to minimize the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recu ...rn the service to normal level as soon as possible, with smallest possible business impact. ...
    3 KB (480 words) - 16:20, 20 March 2007
  • ==PO 1.2 Business-IT Alignment== ...tegy) is critically dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...rganization’s change management procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities asse ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ...ands IT recovery times and the necessary technology investments to support business recovery and resumption needs. ...
    2 KB (294 words) - 14:52, 4 May 2006
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...al conditions such as support issues and upgrades, periodic review against business needs, risks and security requirements.<br> ::'''1. Risk: In-House and or Package applications may not meet all business and application control requirements.'''<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • == Requirement 7: Restrict access to data by business need-to-know. == ...
    638 bytes (92 words) - 16:45, 7 July 2006
  • ITIL The Business Perspective.<br> ITIL 2.9 Business change The Business Perspective.<br> ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ...appropriate remedial action should be taken and, if necessary, the program business case should be updated.<br> ...
    2 KB (303 words) - 18:29, 1 May 2006
  • ...ime is known as business activity monitoring. KPIs are frequently used to "value" difficult to measure activities such as the benefits of leadership develop ...he school understand its position in the educational community, whereas a business might consider the percentage of income from return customers as a potentia ...
    5 KB (786 words) - 16:48, 22 March 2007
  • ...of the existing plans and information systems in terms of contribution to business objectives, functionality, stability, complexity, costs, strengths and weak :::Projections of future capacity requirements should take account of new business and system requirements and current and projected trends in the organizatio ...
    4 KB (586 words) - 01:37, 1 May 2006
  • ...ated infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...the table of contents or executive overview of the strategic plan for the business and information systems.'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • :*'''[[Business Continuity Management:|'''Business Continuity Management''']]<br> ...es for Information Security standards that are required to comply with ISO Business Continuity Management objectives and support the objectives established in ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...services and disseminating fictitious testimonials over the internet, the business engaged in false advertising in violation of the consumer protection law. S ...
    551 bytes (77 words) - 12:10, 18 February 2009
  • ...er of competent IT staff. Staffing takes into consideration co-location of business/IT staff, cross-functional training, job rotation and outsourcing opportuni ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ...own under several titles (often interpreted as having increasing levels of business relevance) including: ...ir ICT requirements. A Service Desk seeks to facilitate the integration of business processes into the Service Management infrastructure. In addition to active ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...s record, getting testimony that it was not made in the ordinary course of business is quite valuable to the defense effort. ...
    2 KB (311 words) - 13:50, 22 February 2009
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    4 KB (594 words) - 19:50, 25 June 2006
  • Provide the business with procedures and tools enabling it to address its responsibilities for o ITIL The Business Perspective, Roles, Responsibilities and Interfaces.<br> ...
    2 KB (303 words) - 18:06, 1 May 2006
  • ==PO 1.1 IT Value Management== ...ored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a capability an ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ::* Strategy for business continuity post compromise. ...s a requirement in the event of an actual or suspected compromise, for any business with California residents in their database). ...
    3 KB (357 words) - 20:12, 2 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (385 words) - 16:14, 25 June 2006
  • See, generally, Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    535 bytes (79 words) - 17:10, 1 March 2009
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009
  • ...liance. This entity directs IT architecture design ensuring it enables the business strategy and considers regulatory compliance and continuity requirements. T ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • [[Business_Continuity_Management: | Business Continuity Management]] ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • Develop a framework for IT continuity to support enterprise wide business continuity management with a consistent process. The objective of the frame ITIL 7.3 The business continuity life cycle<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • ...admissibility of computerized evidence, see Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    625 bytes (91 words) - 12:35, 28 February 2009
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)