Search results

Jump to navigation Jump to search
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009

Page text matches

  • ...plementation that reflects the recovery time frame that is required by the business. ...he technology support takes to deliver the recovered infrastructure to the business. ...
    2 KB (237 words) - 11:16, 27 October 2012
  • ...on) in order to avoid unacceptable consequences associated with a break in business continuity. ...able strategy options would include any which would enable resumption of a business process in a time frame at or near the RTO. This would include alternate or ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms us ...n actual and targeted state of business data across systems for individual business processes or process groups. ...
    2 KB (313 words) - 11:24, 27 October 2012
  • ...o admit computerized records is the business record exception. The Uniform Business Records as Evidence Act is a widely followed statement of this exception: ...d the mode of its preparation, and if it was made in the regular course of business at or near the time of the act, condition or event, and if, in the opinion ...
    1 KB (169 words) - 20:08, 22 February 2009
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> Obtain the criteria and business case used for selection of third-party service providers. Assess whether th ...
    2 KB (317 words) - 18:30, 14 June 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> ...data received from the business are processed, all output required by the business is prepared and delivered, and restart and reprocessing needs are supported ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...the IT continuity plan is kept up to date and continually reflects actual business requirements. It is essential that changes in procedures and responsibiliti ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...business in strategy and operations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enable ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 14:38, 13 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 18:29, 13 June 2006
  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...Limit your storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention pol ...cardholder data (e.g., cardholder data needs to be held for X period for Y business reasons). ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (294 words) - 18:21, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • '''1. Risk: Unauthorized users might exploit unauthorized access to critical business processes and data.'''<br> '''2. Risk: Unnecessary disruptions to business processes or data corruption may occur.'''<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • ...tives, measures, targets and benchmarks, and has them signed off on by the business and other relevant stakeholders.<br> * Business contribution including, but not limited to financials.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • * Business address * Home and business telephone numbers ...
    789 bytes (113 words) - 16:17, 18 February 2009
  • ...e to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ibility and alternative courses of action and make a recommendation to the business sponsor.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...tages. Each sign-off follows successful completion of quality reviews. The business sponsor has the final decision with respect to choice of solution and acqui ...
    2 KB (288 words) - 14:17, 3 May 2006
  • '''AI 1.1 Definition and Maintenance of Business Functional and Technical Requirements'''<br> ...d include any changes required to the nature of the enterprise’s business, business processes, people skills and competencies, organization structure, and the ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ines Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    3 KB (464 words) - 17:48, 14 January 2014
  • Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    266 bytes (41 words) - 16:55, 1 March 2009
  • ...rganizational level, so the management of security actions is in line with business requirements. ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Define and implement physical security measures in line with business requirements. Measures should include, but are not limited to, the layout o ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • See Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173, for an example of laying the fo ...
    286 bytes (42 words) - 17:13, 1 March 2009
  • * [[KY E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    924 bytes (100 words) - 20:14, 25 June 2006
  • * [[GA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    923 bytes (100 words) - 20:08, 25 June 2006
  • * [[LA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:09, 25 June 2006
  • * [[TX E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    921 bytes (100 words) - 20:10, 25 June 2006
  • * [[WI E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:11, 25 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    3 KB (379 words) - 18:17, 14 June 2006
  • ...aknesses in internal control and oversight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stak ...
    2 KB (334 words) - 13:36, 4 May 2006
  • * [[FL E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    928 bytes (100 words) - 20:06, 25 June 2006
  • ...e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods. ITIL 7.3 The business continuity life cycle.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    4 KB (507 words) - 14:58, 21 January 2014
  • Translate business requirements into a high-level design specification for software developmen ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...ftware|software]] and [[Computer hardware|hardware]] that are found in the business environment. ...organization is enforced by the compliance industry by companies such as [[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST] ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (291 words) - 16:02, 25 June 2006
  • Sufficiency of description of business records under Fourth Amendment requirement of particularity in federal warr ...
    374 bytes (49 words) - 11:18, 3 March 2009
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...is reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment. ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...t and asset management, or enterprise-wide activities such as security and business continuity planning. This dual role and the increasing use of technology ra ...le of aligning its IT infrastructure to support its business strategy adds value to its organization and positions itself for sustained success. The board o ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...st model. IT services should be linked to business processes such that the business can identify associated service billing levels. ...
    2 KB (243 words) - 14:06, 5 May 2006
  • [[Business_Continuity_Management: | Business Continuity Considerations]]<br> ...
    431 bytes (45 words) - 13:31, 10 April 2007
  • ...ormation assets are consistently available to conduct business and support business operations. ...modified business application must include a Security Impact Statement and Business Impact Analysis. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Fenwick & Davidson, Use of Computerized Business Records as Evidence, 19 Jurimetrics J 19 (no. 1 1978). ...
    365 bytes (43 words) - 17:08, 1 March 2009
  • ...on of IT services by helping organizations match their IT resources to the business demands. The high-level activities are Application Sizing, Workload Managem ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ITIL The Business Perspective, Supplier Relationship Management<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...Standard for information assets will be provided only to meet an approved business need or perform prescribed job responsibilities to comply with ISO Organiza ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that has been implemented fails to meet the business needs.'''<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ...he importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line ITIL Business Perspective.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
  • '''ME 4.3 Value Delivery'''<br> ...approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization o ...
    3 KB (393 words) - 14:35, 21 June 2006
  • ...ficient manner on a continual basis. Ensure contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk manage ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • ...ritization of IT-enabled investment programs in line with the enterprise’s business strategy and priorities; Track status of projects and resolve resource conf ::'''1. Risk: nformation security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    4 KB (506 words) - 20:00, 25 June 2006
  • ...dents and thus to minimize the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recu ...rn the service to normal level as soon as possible, with smallest possible business impact. ...
    3 KB (480 words) - 16:20, 20 March 2007
  • ==PO 1.2 Business-IT Alignment== ...tegy) is critically dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...ramework breaks policy into a hierarchical structure which is traceable to business needs and is based on:'''<br> Company business and interests.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...rganization’s change management procedure. Include periodic review against business needs, patch management and upgrade strategies, risks, vulnerabilities asse ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...
    6 KB (819 words) - 13:54, 23 June 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (354 words) - 13:39, 22 June 2006
  • ...ands IT recovery times and the necessary technology investments to support business recovery and resumption needs. ...
    2 KB (294 words) - 14:52, 4 May 2006
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...al conditions such as support issues and upgrades, periodic review against business needs, risks and security requirements.<br> ::'''1. Risk: In-House and or Package applications may not meet all business and application control requirements.'''<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • == Requirement 7: Restrict access to data by business need-to-know. == ...
    638 bytes (92 words) - 16:45, 7 July 2006
  • ITIL The Business Perspective.<br> ITIL 2.9 Business change The Business Perspective.<br> ...
    3 KB (424 words) - 17:01, 21 June 2006
  • ...appropriate remedial action should be taken and, if necessary, the program business case should be updated.<br> ...
    2 KB (303 words) - 18:29, 1 May 2006
  • ...ime is known as business activity monitoring. KPIs are frequently used to "value" difficult to measure activities such as the benefits of leadership develop ...he school understand its position in the educational community, whereas a business might consider the percentage of income from return customers as a potentia ...
    5 KB (786 words) - 16:48, 22 March 2007
  • ...of the existing plans and information systems in terms of contribution to business objectives, functionality, stability, complexity, costs, strengths and weak :::Projections of future capacity requirements should take account of new business and system requirements and current and projected trends in the organizatio ...
    4 KB (586 words) - 01:37, 1 May 2006
  • ...ated infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...the table of contents or executive overview of the strategic plan for the business and information systems.'''<br> ...
    2 KB (354 words) - 20:12, 25 June 2006
  • :*'''[[Business Continuity Management:|'''Business Continuity Management''']]<br> ...es for Information Security standards that are required to comply with ISO Business Continuity Management objectives and support the objectives established in ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...services and disseminating fictitious testimonials over the internet, the business engaged in false advertising in violation of the consumer protection law. S ...
    551 bytes (77 words) - 12:10, 18 February 2009
  • ...er of competent IT staff. Staffing takes into consideration co-location of business/IT staff, cross-functional training, job rotation and outsourcing opportuni ...
    2 KB (309 words) - 18:13, 1 May 2006
  • ...own under several titles (often interpreted as having increasing levels of business relevance) including: ...ir ICT requirements. A Service Desk seeks to facilitate the integration of business processes into the Service Management infrastructure. In addition to active ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...s record, getting testimony that it was not made in the ordinary course of business is quite valuable to the defense effort. ...
    2 KB (311 words) - 13:50, 22 February 2009
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ::'''2. Risk: A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    4 KB (594 words) - 19:50, 25 June 2006
  • Provide the business with procedures and tools enabling it to address its responsibilities for o ITIL The Business Perspective, Roles, Responsibilities and Interfaces.<br> ...
    2 KB (303 words) - 18:06, 1 May 2006
  • ==PO 1.1 IT Value Management== ...ored. Establish fair, transparent, repeatable and comparable evaluation of business cases including financial worth, the risk of not delivering a capability an ...
    6 KB (847 words) - 17:21, 25 April 2007
  • ::* Strategy for business continuity post compromise. ...s a requirement in the event of an actual or suspected compromise, for any business with California residents in their database). ...
    3 KB (357 words) - 20:12, 2 March 2007
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (385 words) - 16:14, 25 June 2006
  • See, generally, Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    535 bytes (79 words) - 17:10, 1 March 2009
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009
  • ...liance. This entity directs IT architecture design ensuring it enables the business strategy and considers regulatory compliance and continuity requirements. T ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ...
    3 KB (446 words) - 16:36, 1 May 2006
  • [[Business_Continuity_Management: | Business Continuity Management]] ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • Develop a framework for IT continuity to support enterprise wide business continuity management with a consistent process. The objective of the frame ITIL 7.3 The business continuity life cycle<br> ...
    3 KB (456 words) - 17:15, 15 February 2007
  • ...admissibility of computerized evidence, see Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    625 bytes (91 words) - 12:35, 28 February 2009
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...a potential impact on the goals or operations of the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operat ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • ==AI 4.2 Knowledge Transfer to Business Management== ...de access approval, privilege management, segregation of duties, automated business controls, backup/recovery, physical security and source document archival.< ...
    3 KB (362 words) - 23:55, 14 June 2007
  • ...ntification of irregularities, limitation of losses and timely recovery of business assets.<br> ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ...re specific to IT, enterprise portfolio management, business processes and business change processes. The IT process framework should be integrated in a qualit ::'''1. Risk: Business needs may not be met or adequate data safeguards may not be implemented or ...
    5 KB (699 words) - 19:59, 25 June 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ::'''PCI-12.8.3:''' Contract provisions include appropriate business continuity provided by the third party such that the third party’s services ...
    3 KB (377 words) - 14:37, 2 March 2007
  • ...ogy manager and should be designed to support the organization's overall [[business plan]]. ** Relationship to overall business strategy ...
    5 KB (777 words) - 17:59, 16 February 2007
  • ...f one or more configuration items (CI's)” Manage approved, cost effective, business enhancing changes (fixes) - with minimum risk to IT infrastructure. The goa ...from seeking imposed efficiency and effectiveness or to enable or reflect business initiatives, or from programmes, projects or service improvement initiative ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...igure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...and that these firewalls deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...
    2 KB (314 words) - 12:16, 16 June 2010
  • .... Issues to be considered include approval that design specifications meet business, functional and technical requirements; approval of change requests; and co ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...nstitution (BSI)'s standard in the field of [[Business continuity planning|Business Continuity Management]] (BCM). This standard replaces PAS 56, a publicly av BS 25999 is a Business Continuity Management (BCM) standard published by the British Standards Ins ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...terests inside and outside the IT function, such as the board, executives, business units, individual users, suppliers, security officers, risk managers, the c ITIL The Business Perspective.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...ating, managing and controlling programs. This includes clarifying desired business outcomes, ensuring that program objectives support achievement of the outco ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ITIL The Business Perspective, Managing the Provision of Service.<br> ...
    4 KB (510 words) - 13:54, 1 May 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (365 words) - 19:02, 17 April 2007
  • ...effective risk mitigation tool. Management should balance controls against business operations requirements, cost, efficiency, and effectiveness. ...
    655 bytes (85 words) - 19:15, 17 April 2007
  • ...er and service provider. The framework maintains continuous alignment with business requirements and priorities and facilitates common understanding between th ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.''' ...
    4 KB (524 words) - 15:03, 25 June 2006
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ...ty faced by the non-technically inclined in understanding the computer and business environments involved. Whether the case goes to trial or is disposed of by ...
    911 bytes (148 words) - 15:05, 22 February 2009
  • ...the framework, designed to reduce the impact of a major disruption on key business functions and processes. The plans should address requirements for resilien ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (270 words) - 18:10, 25 April 2007
  • ...ance of the deliverables of the previous phase, and approval of an updated business case at the next major review of the program. In the event of overlapping p ::'''1. Risk: In-House and or Package applications may not meet all business and application control requirements.'''<br> ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ...Also identify in the plan which technologies have the potential to create business opportunities. The plan should address systems architecture, technological ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...vides specific instructions and requirements on the proper and appropriate business use of Electronic Mail Resources. # '''Business Use''' ...
    7 KB (974 words) - 19:34, 16 January 2014
  • Establish a process to monitor business sector/industry, technology, infrastructure, legal and regulatory environme ISO 17799 11.1 Aspects of [[Business_Continuity_Planning_Booklet | business continuity management]].<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • ...s rights to systems and data should be in line with defined and documented business needs and job requirements. User access rights are requested by user manage ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...rs the Information Security Program to manage Information Security-related business risks.<br> :The Acceptable Use Policy defines objectives for ensuring the appropriate business use of information assets.<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • Ensure that awareness and understanding of business and IT objectives and direction are communicated throughout the enterprise. ::'''2. Risk: Critical Business Systems may be compromised as the result of the failure of IT security poli ...
    3 KB (442 words) - 18:58, 1 May 2006
  • :[[Business Application Best Practice Configuration Samples:|'''Business Application Best Practice Configuration Samples''']] ...samples and recommendations for applying secure best practices to various business applications.<br> ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...es addresses how an organization modifies system functionality to help the business meet its financial reporting objectives. Deficiencies in this area could si ...es should be tested to ensure that they achieve the necessary application, business, and user control requirements and that they do not negatively impact exist ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ....3:|'''SOX.3.1.3''']] External system connections should be used for valid business purposes only and controls should be in place to prevent these connections ::* PCI-1.1.5 Documented list of services/ports necessary for business. ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...for backup and restoration of systems, data and documentation in line with business requirements and the continuity plan. Verify compliance with the backup pro ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (471 words) - 12:32, 23 June 2006
  • * location and value of any real property owned, and encumbrances thereon; * business background; and ...
    1 KB (184 words) - 13:33, 22 February 2009
  • ...nagement direction and support for information security in accordance with business requirements and all relevant laws, regulations and private certificatory r ...on of trends in and anticipated changes to the organizational environment, business circumstances, and resource availability<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...ganizations to sustain the IT service availability in order to support the business at a justifiable cost. The high-level activities are Realize Availability R ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ...me. Projections of future capacity requirements should take account of new business and system requirements and current and projected trends in the organizatio ...sources. They should identify trends in usage, particularly in relation to business applications or management information system tools. ...
    3 KB (490 words) - 13:42, 4 May 2006
  • ...d defined to provide only the level of access required to meet an approved business need or perform prescribed job responsibilities. Proper identification and ...ote access to information assets will be provided only to meet an approved business need or perform prescribed job responsibilities. Remote access must be faci ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...anding of the client's difficulties rather than attempting to dispatch all business as quickly as possible. ...
    1 KB (214 words) - 16:12, 18 February 2009
  • ...or where changes to other related projects impact the program, the program business case should be updated.<br> ...
    3 KB (475 words) - 13:09, 23 June 2006
  • ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ::'''3. Risk: Application or system changes may disrupt business processes or corrupt production data stores.'''<br> ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...ant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and areas shoul ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • :This presentation on executive management awareness covers security and business risks, anatomy of an attack, and a security risk discussion exercise.<br> ...nclude business impact contexts, vertical regulations, and making relevant business cases for security.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...specific guidance to application developers who are creating or revising e-business and e-commerce applications.<br> :'''Building a Business Case for Computer Forensics:''' [[Media:Business-Case-for-Computer-Forensics.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • :* An effective planning process that aligns IT and business objectives :* If the IT function is decentralized, and business units manage the risk, then management should coordinate risk management ef ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...esults or do not meet usability requirements. A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    4 KB (501 words) - 18:24, 25 June 2006
  • ...y Program that empowers the Program to manage Information Security-related business risks.<br> ...curity Program Charter by defining objectives for ensuring the appropriate business use of electronic communications resources.<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...
    2 KB (281 words) - 14:46, 2 March 2007
  • ...n of successful elimination of the known error or after agreement with the business on how to alternatively handle the problem. ...
    2 KB (235 words) - 17:48, 5 May 2006
  • ...oy media containing cardholder information when it is no longer needed for business or legal reasons:'''<br> ...
    2 KB (298 words) - 14:33, 2 March 2007
  • ...esponsibility. The control environment is based on a culture that supports value delivery while managing significant risks, encourages cross-divisional co-o ::'''1. Risk: Systems do not meet business needs because not all business functional and non functional requirements are effectively gathered.'''<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...with a large amount of research and development expenditures can lead both business and technological risks since specialization does not lead to lower unit co ...
    1 KB (215 words) - 18:32, 13 April 2007
  • 1. Obtain the '''criteria''' and '''business case''' used for selection of third-party service providers. ...
    2 KB (302 words) - 15:57, 25 June 2006
  • ...try initiatives. It is an invaluable resource for legal counsel and global business leaders, as well as to anyone who wishes to litigate, research or study the ...
    3 KB (510 words) - 14:56, 10 April 2011
  • ..., it also underscores the longstanding general principle that those who do business in the United States must accept the burdens along with the benefits of U.S ...
    899 bytes (139 words) - 10:48, 16 March 2010
  • ...and prohibits information sharing outside of that required for legitimate business needs. Management should obtain signed confidentiality agreements before gr ...iding specific instructions and requirements on the proper and appropriate business use of Internet resources.<br> ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ::'''5. Risk: Unapproved application changes negatively impact business processing or may corrupt production data stores.''' ...
    2 KB (305 words) - 14:32, 23 June 2006
  • ...eminated to all relevant system users (including vendors, contractors, and business partners). ...
    2 KB (294 words) - 14:46, 2 March 2007
  • ...he barriers and persuading them that the likely costs of attack exceed the value of making the attack.<br> ...ormation; prevent loss, damage or compromise of assets and interruption to business activities; and prevent compromise or theft of information and information ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ate IT reporting on regulatory requirements with similar output from other business functions.<br> ...
    2 KB (252 words) - 13:19, 4 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...d defined to provide only the level of access required to meet an approved business need or perform prescribed job responsibilities. Proper identification and ...ote access to information assets will be provided only to meet an approved business need or perform prescribed job responsibilities. Remote access must be faci ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...erts, and distributing information to appropriate information security and business unit management personnel is formally assigned. ...
    2 KB (303 words) - 16:00, 2 March 2007
  • ...oy media containing cardholder information when it is no longer needed for business or legal reasons:'''<br> ...
    2 KB (323 words) - 14:31, 2 March 2007
  • ...t. Monitor how much effort is applied to firefighting rather than enabling business improvements and, where necessary, improve these processes to minimize prob ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...ion of assets. In so doing the financial institution seeks to control its business risk rather than the client's portfolio risk. ...roach to long-range plans.", Linneman, Robert E, Kennell, John D.; Harvard Business Review; Mar/Apr77, Vol. 55 Issue 2, p141 ...
    4 KB (607 words) - 18:29, 16 February 2007
  • ...acy of individuals as well as to the well-being of financial institutions, business concerns, governmental agencies and others within the state that lawfully u ...
    2 KB (244 words) - 14:48, 17 February 2009
  • ...that appropriate IT Service Continuity plans have been made to support the business and its continuity requirements. ...
    2 KB (253 words) - 15:44, 20 March 2007
  • [[AI1.1:| 1.1 Definition and Maintenance of Business Functional and Technical Requirements]]<br> [[AI4.2:| 4.2 Knowledge Transfer to Business Management]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> Statements of business requirements for new information systems, or enhancements to existing infor ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of Internet resources.<br> ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • '''7. Risk: Unidentifiable users may compromise critical business processes and data.'''<br> ...
    3 KB (356 words) - 17:48, 28 June 2006
  • ...ards and procedures, including legal and regulatory requirements, based on business and IT management’s governance oversight and operation of internal controls ...
    2 KB (271 words) - 13:16, 4 May 2006
  • ::'''1. Risk: Business needs may not be met or adequate data safeguards may not be implemented or ...
    3 KB (341 words) - 16:17, 21 June 2006
  • Base definitions of IT services on service characteristics and business requirements, organized and stored centrally via the implementation of a se ...
    2 KB (279 words) - 14:17, 3 May 2006
  • ...communications equipment, in line with laws and regulations, technical and business requirements, vendor specifications, and health and safety guidelines. ...
    2 KB (268 words) - 15:01, 8 May 2006
  • ...charge model to maintain its relevance and appropriateness to the evolving business and IT activities. ...
    2 KB (270 words) - 14:54, 5 May 2006
  • ...and that these firewalls deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into systems storing ca ...
    3 KB (332 words) - 11:38, 3 March 2007
  • ...-generated evidence in order to lay a foundation for its admission under a business records exception to hearsay rule, especially where the data consists of th ...balancing test as to whether such evidence, though relevant, had probative value that was not substantially outweighed by the danger of unfair prejudice, co ...
    2 KB (289 words) - 19:06, 22 February 2009
  • ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    3 KB (364 words) - 17:41, 21 June 2006
  • ...vides specific instructions and requirements on the proper and appropriate business use of Company Technology Resources while using a Company supported and or # '''Business Use''' ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (345 words) - 14:38, 2 March 2007
  • ...ations and systems, promotes a common understanding of data amongst IT and business users, and prevents incompatible data elements from being created.<br> ...
    2 KB (288 words) - 14:15, 1 May 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (348 words) - 14:41, 2 March 2007
  • ...n systems are normally identified as "critical" in the insurance company's business continuity plan.<br> * Section K – This scoping note considers the status of current or planned e-business initiatives. ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • ...Content of backup storage needs to be determined in collaboration between business process owners and IT personnel. Management of the offsite storage facility ...PCI-3.2.2 Do not store the card-validation code (Three-digit or four-digit value printed on the front or back of a payment card (e.g., CVV2 and CVC2 data)) ...
    5 KB (700 words) - 18:07, 23 June 2006
  • ...at if a law requires that a business retain a record of a transaction, the business satisfies the requirement by retaining an electronic record, as long as the ...
    3 KB (456 words) - 11:26, 30 October 2011
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (350 words) - 14:39, 2 March 2007
  • Business continuity planning <br> ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...). Verify that the PCI Data Security Standard requirements relevant to the business relationship between the organization and the third party are included in t ...
    3 KB (353 words) - 14:40, 2 March 2007
  • ...from seeking improved efficiency and effectiveness or to enable or reflect business initiatives, or from programs, projects or service improvement initiatives. ...sessing the impact, cost, benefit and risk of proposed changes, developing business justification and obtaining approval, '''managing''' and coordinating chang ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...received. See Charles R. Merrill, A Cryptographic Primer, The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues 14 ( Joseph F. Ruh, Jr., ed. ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...and availability management. Incidents should be classified according to a business and service priority and routed to the appropriate problem management team, ...
    2 KB (299 words) - 17:41, 5 May 2006
  • Ensure that business controls are properly translated into application controls such that proces ...
    2 KB (307 words) - 15:06, 3 May 2006
  • ...el facilitates the optimal creation, use and sharing of information by the business and in a way that maintains integrity and is flexible, functional, cost-eff ...
    2 KB (311 words) - 14:12, 1 May 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    3 KB (369 words) - 16:09, 21 June 2006
  • ::'''1. Risk: Information security and business requirements may be compromised. Inaccurate results are produced.'''<br> ...
    3 KB (368 words) - 11:58, 22 June 2006
  • ...users to effectively and efficiently use the application system to support business processes. The knowledge transfer should include the development of a train ...
    2 KB (298 words) - 16:59, 3 May 2006
  • ...nstitutions should integrate IT resources and investments into the overall business planning process. Major investments in IT resources have long-term implicat ...he plan. The individual departments and functional areas identify specific business needs and, ultimately, implement the plans.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • Essentially, it requires an agency, person or business that conducts business in California and owns or licenses computerized 'personal information' to d ...
    3 KB (522 words) - 13:52, 26 October 2011
  • Establish a formal, approved integrated project plan (covering business and information systems resources) to guide project execution and project c ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ...the production environment and critical functions must be reflected in the business continuity and recovery plans.<br> ...<br>Mandatory and must be implemented.</td><td>Implemented within 10 (ten) business days of approval.</td></tr> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...es to execute the current and future strategic objectives and keep up with business demands. Management should put clear, consistent and enforced human resourc ...
    2 KB (329 words) - 13:34, 4 May 2006
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...reporting on compliance progress and status with similar output from other business functions.<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ...that all software can be conceptually optimized to meet the demands of the business processes. ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ...ines. This forum directs technology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...continuous approach regarding quality management that is aligned with the business requirements. The QMS identifies quality requirements and criteria, key IT ...
    2 KB (337 words) - 19:47, 1 May 2006
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...ble content, Users should contact <Specify Contact> no later than the next business day of each occurrence.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...rs the Information Security Program to manage Information Security-related business risks.<br> :The Acceptable Use Standard defines objectives for ensuring the appropriate business use of information assets.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ITIL The Business Perspective.<br> ...
    2 KB (332 words) - 12:39, 4 May 2006
  • ...r each day the violation continues and at each office, branch, or place of business at which a violation occurs or continues.<br> ...f not more than $500 on any financial institution or nonfinancial trade or business which negligently violates any provision of this subchapter or any regulati ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of telecommunications resources.<br> ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...et and risks mitigated. Integrate reporting with similar output from other business functions. The performance measures should be approved by key stakeholders. ...
    2 KB (347 words) - 13:38, 4 May 2006
  • ...security standards may allow unauthorized access to production systems and business data stores.'''<br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...in 1986. American Express attempted to own almost every field of financial business (although there was little synergy between them). Things culminated in 1997 ...to buy insurance underwriters, as they seek to engage in a more profitable business of insurance brokerage by selling products of other insurance companies. Ot ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • :* Business Continuity Planning ===Business Continuity Planning=== ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • :1. Current and future business needs and strategy ...
    2 KB (333 words) - 16:42, 5 May 2006
  • * [[PCI 7:|'''Requirement 7: Restrict access to data by business need-to-know.''']] ...undertaken a risk analysis and have legitimate technological or documented business constraints can consider the use of compensating controls to achieve compli ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ITIL 4.2 The SLM process The Business Perspective, Concepts.<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • ...al sites for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into ...
    2 KB (350 words) - 18:15, 5 May 2006
  • ::'''1. Risk: A project that does not meet business requirements for internal controls at a milestone may continue without revi ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...tion's customers and to assist management by providing detailed and costed business cases for proposed changes to IT services"<br> ...used as a first step towards an IT organisation operating as an autonomous business. It may also be used to encourage users to move in a strategically importa ...
    6 KB (885 words) - 10:12, 23 March 2007
  • The following illustration represents the business process involved with the removal of access credentials from any system or ...
    3 KB (366 words) - 16:39, 26 June 2006
  • [[Business Continuity Management:|'''Business Continuity Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ::[[Image:Key-control.jpg]][[PCI-12.8.3:|PCI-12.8.3 Business continuity in the event of a major disruption, disaster or failure.]]<br> ...e the plan addresses, at a minimum, specific incident response procedures, business recovery and continuity procedures, data backup processes, roles and respon ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ::Interested Executive and Business Unit Management. ...
    2 KB (315 words) - 18:46, 25 September 2006
  • ...ource acquisition; and 2.) To report delivered service availability to the business as required by the SLA. Accompany all exception reports with recommendation ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ITIL 1.6.1 Organizational structure Business Perspective.<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ...clude do not exceed amounts commensurate with the customary conduct of the business, industry or profession of the customer concerned;<br> (9) Nor by a person engaged as a business in the transportation of currency, monetary instruments and other commercia ...
    4 KB (657 words) - 23:02, 1 November 2012
  • ISO 17799 9.1 Business requirement for access control.<br> ...
    3 KB (363 words) - 16:53, 9 April 2007
  • ::'''2. Risk: Data destruction or business process disruptions occur as a result of inadequately maintained anti-virus ...ar reviews of the software and data content of systems supporting critical business processes; the presence of any unapproved files or unauthorized amendments ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...T assets, which form the basis for the current IT budget. Provide input to business cases for new investments, taking into account current IT asset and service ...
    2 KB (353 words) - 18:22, 1 May 2006
  • ...defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...vides specific instructions and requirements on the proper and appropriate business use of Company software.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]].<br> ...
    2 KB (272 words) - 18:05, 25 April 2007
  • Identify, document and analyze risks associated with the business processes as part of the organization’s process for the development of requ ...
    2 KB (269 words) - 23:52, 14 June 2007
  • ...ams that execute the strategy, the individual investment programs, and the business and IT projects that make up the programs. The framework should provide for ...
    3 KB (397 words) - 13:28, 4 May 2006
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (278 words) - 18:21, 25 April 2007
  • ...ple whose work normally involves making contact with the victim's place of business, such as postal employees, janitors, customers, and salespeople. Other empl ...
    3 KB (418 words) - 15:26, 22 February 2009
  • ...[Business continuity management]] - protecting, maintaining and recovering business-critical processes and systems ...
    6 KB (847 words) - 16:57, 26 March 2007
  • Embed ownership and responsibility for IT-related risks within the business at an appropriate senior level. Define and assign roles critical for managi ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...ata, consistent with statutory, regulatory, certificatory, contractual and business requirements<br> ...it data on operational systems, while minimizing the risk of disruption to business processes. ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • ::'''2. Risk: Security and business requirements are not check listed adequately, enforced, and tested. Project ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ::[[Image:Key-control.jpg]][[PCI-1.1.5:|PCI-1.1.5 Documentation and business justification for use of all services, protocols, and ports allowed, includ ...igure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder dat ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ISO 11.1 Aspects of [[Business_Continuity_Management: | business continuity management]]. ...
    2 KB (297 words) - 18:35, 25 April 2007
  • A “recovery point objective” or “RPO”, is defined by [[business continuity planning]]. It is the maximum tolerable period in which data mi ...common mistakes around the use and definition of RPO. First, staff use a [[business impact analysis]] to determine RPO for each service. RPO is NOT determined ...
    13 KB (2,264 words) - 11:10, 27 October 2012
  • ...and procedures that are reviewed and updated regularly for changes in the business. When policies and procedures are changed, determine if management approves ...
    3 KB (432 words) - 12:23, 23 June 2006
  • ...es should be tested to ensure that they achieve the necessary application, business, and user control requirements and that they do not negatively impact exist ...
    3 KB (432 words) - 13:02, 23 June 2006
  • * ITIL The Business Perspective, The Value of IT.<br> * ITIL 3.4 Establishing a value culture.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • :'''Documentation and business justification for use of all services, protocols, and ports allowed, includ ...s include a documented list of services, protocols and ports necessary for business—for example, hypertext transfer protocol (HTTP) and Secure Sockets Layer (S ...
    3 KB (353 words) - 12:28, 16 June 2010
  • [[PO1.1:| 1.1 IT Value Management]]<br> [[PO1.2:| 1.2 Business-IT Alignment]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)