Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ==Information Security Aspects of Business Continuity Management== ...re timely resumption from, and if possible prevention of, interruptions to business activities and processes caused by failures of information systems. ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • [[Image:BCPLifecycle.gif|Business continuity planning life cycle]] ...t is also called ''business continuity and resiliency planning'' (BCRP). A business continuity plan is a road-map for continuing operations under adverse condi ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ==Motion to exclude computer-generated evidence—Laying business record exception foundation== ...ded by the proponent of the evidence, to establish the requirements of the business record exception. ...
    4 KB (684 words) - 20:10, 22 February 2009

Page text matches

  • ...plementation that reflects the recovery time frame that is required by the business. ...he technology support takes to deliver the recovered infrastructure to the business. ...
    2 KB (237 words) - 11:16, 27 October 2012
  • ...on) in order to avoid unacceptable consequences associated with a break in business continuity. ...able strategy options would include any which would enable resumption of a business process in a time frame at or near the RTO. This would include alternate or ...
    2 KB (272 words) - 11:15, 27 October 2012
  • ...RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. Similar terms us ...n actual and targeted state of business data across systems for individual business processes or process groups. ...
    2 KB (313 words) - 11:24, 27 October 2012
  • ...o admit computerized records is the business record exception. The Uniform Business Records as Evidence Act is a widely followed statement of this exception: ...d the mode of its preparation, and if it was made in the regular course of business at or near the time of the act, condition or event, and if, in the opinion ...
    1 KB (169 words) - 20:08, 22 February 2009
  • ==Business Impact Analysis== ...size and complexity of the institution. The institution should include all business functions and departments in this process, not just data processing.<br> ...
    3 KB (453 words) - 18:45, 25 April 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> Obtain the criteria and business case used for selection of third-party service providers. Assess whether th ...
    2 KB (317 words) - 18:30, 14 June 2006
  • '''DS 11.1 Business Requirements for Data Management '''<br> ...data received from the business are processed, all output required by the business is prepared and delivered, and restart and reprocessing needs are supported ...
    2 KB (244 words) - 17:51, 5 May 2006
  • ...the IT continuity plan is kept up to date and continually reflects actual business requirements. It is essential that changes in procedures and responsibiliti ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...business in strategy and operations, encouraging co-responsibility between business and IT for making strategic decisions and obtaining benefits from IT-enable ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 14:38, 13 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (297 words) - 18:29, 13 June 2006
  • ==Business-IT Alignment== ...er to develop a few concrete steps that companies can take to better align business and IT, consider the following points.<br> ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...Limit your storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention pol ...cardholder data (e.g., cardholder data needs to be held for X period for Y business reasons). ...
    3 KB (420 words) - 14:46, 28 February 2007
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (294 words) - 18:21, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • '''1. Risk: Unauthorized users might exploit unauthorized access to critical business processes and data.'''<br> '''2. Risk: Unnecessary disruptions to business processes or data corruption may occur.'''<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • ...tives, measures, targets and benchmarks, and has them signed off on by the business and other relevant stakeholders.<br> * Business contribution including, but not limited to financials.<br> ...
    3 KB (362 words) - 12:33, 4 May 2006
  • ==Business Continuity Planning== ...institution back in business. Without a BCP that considers every critical business unit, including personnel, physical workspace, and similar issues, an insti ...
    5 KB (705 words) - 13:42, 30 May 2007
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...leged system commands may disrupt business processes, and corrupt critical business data stores.'''<br> '''3. Risk: Unscheduled access by support vendors may result in business process interruptions or loss of production data.'''<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • * Business address * Home and business telephone numbers ...
    789 bytes (113 words) - 16:17, 18 February 2009
  • ...e to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.<br> ...h potential impact to financial reporting bypass processes for identifying business requirements, risks, and for designing needed controls.'''<br> ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ibility and alternative courses of action and make a recommendation to the business sponsor.<br> ...
    2 KB (357 words) - 14:15, 3 May 2006
  • ...tages. Each sign-off follows successful completion of quality reviews. The business sponsor has the final decision with respect to choice of solution and acqui ...
    2 KB (288 words) - 14:17, 3 May 2006
  • '''AI 1.1 Definition and Maintenance of Business Functional and Technical Requirements'''<br> ...d include any changes required to the nature of the enterprise’s business, business processes, people skills and competencies, organization structure, and the ...
    4 KB (538 words) - 13:16, 23 June 2006
  • ...ines Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    3 KB (464 words) - 17:48, 14 January 2014
  • Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173. ...
    266 bytes (41 words) - 16:55, 1 March 2009
  • ...rganizational level, so the management of security actions is in line with business requirements. ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Define and implement physical security measures in line with business requirements. Measures should include, but are not limited to, the layout o ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    4 KB (517 words) - 18:12, 21 June 2006
  • See Admissibility of Computerized Business Records, 14 Am. Jur. Proof of Facts 2d 173, for an example of laying the fo ...
    286 bytes (42 words) - 17:13, 1 March 2009
  • * [[KY E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    924 bytes (100 words) - 20:14, 25 June 2006
  • * [[GA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    923 bytes (100 words) - 20:08, 25 June 2006
  • * [[LA E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:09, 25 June 2006
  • * [[TX E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    921 bytes (100 words) - 20:10, 25 June 2006
  • * [[WI E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    925 bytes (100 words) - 20:11, 25 June 2006
  • ...met or third parties have inappropriate access to business data stores and business processes.'''<br> ...
    3 KB (379 words) - 18:17, 14 June 2006
  • ...aknesses in internal control and oversight, and their actual and potential business impact. The enterprise’s IT risk position should be transparent to all stak ...
    2 KB (334 words) - 13:36, 4 May 2006
  • * [[FL E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']] ...
    928 bytes (100 words) - 20:06, 25 June 2006
  • ...e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods. ITIL 7.3 The business continuity life cycle.<br> ...
    2 KB (303 words) - 18:16, 25 April 2007
  • ...the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipme ...ager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, ha ...
    4 KB (507 words) - 14:58, 21 January 2014
  • Translate business requirements into a high-level design specification for software developmen ::'''1. Risk: Security and business continuity risks are introduced by technical designs incompatible with ente ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...ce providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...ftware|software]] and [[Computer hardware|hardware]] that are found in the business environment. ...organization is enforced by the compliance industry by companies such as [[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST] ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ns. The design and implementation of the information system supporting the business process can be crucial for security. Security requirements should be identi ...of a project and justified, agreed, and documented as part of the overall business case for an information system.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)