Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...luences operational risks (also referred to as transactional risks). These risks include the possibility of loss resulting from inadequate processes, person ...ls and discusses various development, acquisition, and maintenance project risks. Action summaries highlight the primary considerations within each section. ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • :* SP-3; Joint Interagency Issuance on End-User Computing Risks, January 1988 :* SP-8; Interagency Document on EDP Risks in Mergers & Acquisitions, September 1991 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...vernment-wide management and oversight of the related information security risks, including coordination of information security efforts throughout the civi ...
    1 KB (192 words) - 10:36, 1 June 2010
  • ...nsider the costs and benefits and select responses that constrain residual risks within the defined risk tolerance levels.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • Assess on a recurrent basis the likelihood and impact of all identified risks, using qualitative and quantitative methods. The likelihood and impact asso ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...ported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software model.<br> ...open source or not) will yield unacceptable levels of technical and legal risks for enterprises. Incorporate the following aspects in your open-source poli ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ::'''1. Risk: Third party processors create unacceptable control risks to the Company.'''<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • * Report security events, potential events, or other risks to the organization and its assets<br> ...n(s)/sensitivity(ies) of the information to be accessed, and the perceived risks<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ..., ensuring that the business and IT regularly assess and report IT-related risks and the impact on the business. Make sure IT management follows up on risk ...
    2 KB (334 words) - 13:36, 4 May 2006
  • ...tion. Seek approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner( ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ==E-Banking Risks== Transaction or Operations risks arises from fraud, processing errors, system disruptions, or other unantici ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ects technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...risk assessment, the goal of the assessment and the criteria against which risks are evaluated.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with enterprise standards. ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Upon review, any deviations from expected performance should be ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...ves have been achieved, deliverables obtained, performance targets met and risks mitigated. Integrate reporting with similar output from other business func ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ::Do not use scare tactics; give an even-handed presentation of risks. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ountants created two trust services, WebTrust and SysTrust, to address the risks and opportunities of information technology. WebTrust reports provide assur ...e effectiveness of the security process in continually mitigating changing risks. Additionally, the SAS 70 report may not address whether the TSP is meeting ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...inancial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...opment, test, and operational facilities should be separated to reduce the risks of unauthorized access or changes to the operational system.<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)